cur that a user has never interact with another user
with who shares a direct link in any social network.
Consequently, taking into account the users’ activity
and not only the figurative relation is a more effective
approach.
Our proposal is oriented to the construction of the
user’s social sphere in the cloud taking into account
two different-nature contributions. Firstly, the inter-
action network which can be computed from the for-
mulation in this paper by extending the online, face-
to-face and interest-based interactions to other social
network sites. Secondly, the topological networks, i.e.
the real links which the user maintains (and implicitly
accepts) in a plethora of social services. We make out
the topological network as a surface where social tie
strength is deployed. So, to obtain the social influence
between two users we consider (1) the tie strength in-
ferred from the interaction between them and (2) the
accumulate tie strengths of paths through, at most,
one intermediate user (in Facebook, for example, it
would be between friends and friends of friends).
Although, in this paper, the tie strength is only
based on Facebook interactions between friends, the
proposed formulation may also used to obtain the tie
strength between any two Facebook users, not nec-
essarily friends
5
. Despite of the fact that at first
sight it is expected for two Facebook friends to have
a stronger tie than two non-friends, statistics show
Facebook users only regularly relate with a small sub-
set of their 130 friends, on average (Facebook, 2011).
Thus, it is perfectly possible for them to have more
interaction with a non-friend than with one of their
friends, which must not be ignored to obtain the users’
social sphere.
Besides, and as aforementioned, users’ social
sphere should be obtained not only with the Facebook
data, but also taking into account their interactions in
other social networks. Along this line, we are cur-
rently working on extending this approach to other
social sites having a public API and adapting the inter-
actions in each social network accordinglyto our clas-
sification (online, face-to-face and interest-based in-
teractions). For instance, in Twitter, retweets, replies
or private messages would be included into the on-
line category, as well as private messages or photo
comments in Flickr, private messages in LinkedIn
or Wall-posts, comments or +1 in Google+. How-
ever, tags in photos or videos in Google+, Picasa
or Flickr would belong to the face-to-face category;
whereas interactions among users in the same group
in Google+, Flickr, LinkedIn, etc. would be catego-
5
Please, note that some of the signs, like wall-post are
only available for friends, so the absence of these contribu-
tions entails a reduction in the tie strength.
rized as interest-based. Finally, interactions among
users occur in any Web 2.0 application, even if it does
not have a declarative network as, for example, in the
case of blogs or wikis. Consequently, we bear in mind
extending our proposal to cover all the range of Web
2.0 application.
REFERENCES
Backstrom, L., Bakshy, E., Kleinberg, J., Lenton, T., and
Rosenn, I. (2011). Center of attention: How facebook
users allocate attention across friends. In Proceedings
of the 5th International AAAI Conference on Weblogs
and Social Media.
Chen, W. and Fong, S. (2010). Social network collabo-
rative filtering framework and online trust factors: a
case study on facebook. In The 5th International Con-
ference on Digital Information Management (ICDIM
2010), pages 266–273, Thunder Bay, Canada.
Facebook (2011). Facebook statistics.
Gilbert, E. and Karahalios, K. (2009). Predicting tie
strength with social media. In Proceedings of the 27th
international conference on Human factors in comput-
ing systems, pages 211–220. ACM.
Granovetter, M. (1973). The strength of weak ties. Ameri-
can journal of sociology, pages 1360–1380.
Kahanda, I. and Neville, J. (2009). Using transactional in-
formation to predict link strength in online social net-
works. In International AAAI Conference on Weblogs
and Social Media (ICWSM).
Mutton, P. (2004). Inferring and visualizing social net-
works on internet relay chat. In Information Visual-
isation, 2004. IV 2004. Proceedings. Eighth Interna-
tional Conference on, pages 35–43. IEEE.
O’Donovan, J. and Smith, B. (2005). Trust in recommender
systems. In IUI ’05: Proceedings of the 10th In-
ternational Conference on Intelligent User Interfaces,
pages 167–174, New York, NY, USA. ACM Press.
Tyler, J., Wilkinson, D., and Huberman, B. (2005). E-mail
as spectroscopy: Automated discovery of community
structure within organizations. The Information Soci-
ety, 21(2):143–153.
Viswanath, B., Mislove, A., Cha, M., and Gummadi, K.
(2009). On the evolution of user interaction in face-
book. In Proceedings of the 2nd Workshop on Online
social networks, pages 37–42, Barcelona.
Wilson, C., Boe, B., Sala, A., Puttaswamy, K. P., and Zhao,
B. Y. (2009). User interactions in social networks and
their implications. In Proceedings of the 4th ACM Eu-
ropean conference on Computer systems, Nuremberg,
Germany.
USINGFACEBOOKACTIVITYTOINFERSOCIALTIES
333