SlideShare a Scribd company logo
1 of 3
Download to read offline
WEAK TIES
THE POWER
OF WEAK TIES
Mobile-phone records affirm
the idea that occasional
contacts between casual
acquaintances are crucial to
the spread of information.
STRONG TIES
Connections with high total
talk time (thick red lines) tend
to define tight, potentially
isolated, clusters.
Connections with low total talk
time (thin blue lines) tend to link
the clusters, allowing informa-
tion to move between them.
J
on Kleinberg’s early work was not for the
mathematically faint of heart. His first
publication1
, in 1992, was a computer-
science paper with contents as dense as its
title: ‘On dynamic Voronoi diagrams and
theminimumHausdorffdistanceforpointsets
under Euclidean motion in the plane’.
That was before the World-Wide Web
exploded across the planet, driven by millions
of individual users making independent deci-
sions about who and what to link to. And it
was before Kleinberg began to study the vast
array of digital by-products generated by life
in the modern world, from e-mails, mobile
phone calls and credit-card purchases to
Internet searches and social networks. Today,
as a computer scientist at Cornell University in
Ithaca, New York, Kleinberg uses these data to
write papers such as ‘How bad is forming your
own opinion?’2
and ‘You had me at hello: how
phrasing affects memorability’3
— titles that
would be at home in a social-science journal.
“I realized that computer science is not just
about technology,” he explains. “It is also a
human topic.”
Kleinberg is not alone. The emerging field
of computational social science is attracting
mathematically inclined scientists in ever-
increasing numbers. This, in turn, is spur-
ring the creation of academic departments
MAKING
THE LINKSFROME-MAILSTOSOCIAL
NETWORKS,THEDIGITALTRACES
LEFTBYLIFEINTHEMODERN
WORLDARETRANSFORMING
SOCIALSCIENCE.
BY JIM GILES
REF.7
4 4 8 | N A T U R E | V O L 4 8 8 | 2 3 A U G U S T 2 0 1 2
FEATURENEWS
© 2012 Macmillan Publishers Limited. All rights reserved
and prompting companies such as the social-
network giant Facebook, based in Menlo
Park, California, to establish research teams
to understand the structure of their networks
and how information spreads across them.
“It’s been really transformative,” says
Michael Macy, a social scientist at Cornell and
oneof15co-authorsofa2009manifesto4
seek-
ing to raise the profile of the new discipline.
“We were limited before to surveys, which
are retrospective, and lab experiments, which
are almost always done on small numbers of
college sophomores.” Now, he says, the digital
data-streams promise a portrait of individual
and group behaviour at unprecedented scales
and levels of detail. They also offer plenty of
challenges — notably privacy issues, and the
problem that the data sets may not truly be
reflective of the population at large.
Nonetheless, says Macy, “I liken the oppor-
tunities to the changes in physics brought
about by the particle accelerator, and in
neuroscience by functional magnetic reso-
nance imaging”.
SOCIAL CALLS
An early example of large-scale digital data
beingusedonasocial-scienceissuewasastudy
in2002byKleinbergandDavidLiben-Nowell,
a computer scientist at Carleton College in
Northfield,Minnesota.Theylookedatamech-
anism that social scientists believed helped
drive the formation of personal relationships:
peopletendtobecomefriendswiththefriends
of their friends. Although well established, the
ideahadneverbeentestedonnetworksofmore
than a few tens or hundreds of people.
Kleinberg and Liben-Nowell studied the
relationships formed in scientific collabo-
rations. They looked at the thousands of
physicists who uploaded papers to the arXiv
preprint server during 1994–96. By writing
software to automatically extract names from
the papers, the pair built up a digital network
several orders of magnitude larger than
any that had been examined before,
with each link representing two
researchers who had collaborated. By
following how the network changed
over time, the researchers identified
several measures of closeness among
the researchers that could be used to forecast
future collaborations5
.
As expected, the results showed
that new collaborations tended
to spring from researchers
whose spheres of existing col-
laborators overlapped — the
research analogue of ‘friends of
friends’.Butthemathematicalsophistication
of the predictions has allowed them to
beusedonevenlargernetworks.Klein-
berg’s former PhD student, Lars
Backstrom, also worked on the
connection-prediction prob-
lem — experience that he
has put to good use now that he works at Face-
book, where he designed the social network’s
current friend-recommendation system.
Another long-standing social-science idea
affirmed by computational researchers is the
importance of ‘weak ties’ — relationships with
distant acquaintances who are encountered
relatively rarely. In 1973, Mark Granovetter,
a social scientist now at Stanford University
in Stanford, California, argued that weak ties
form bridges between social cliques and so are
important to the spread of information and to
economic mobility6
. In the pre-digital era it
was almost impossible to verify his ideas at
scale. But in 2007, a team led by Jukka-Pekka
Onnela, a network scientist now at Harvard
University in Cambridge, Massachusetts, used
data on 4 million mobile-phone users to con-
firm that weak ties do indeed act as societal
bridges7
(see ‘The power of weak ties’).
In 2010, a second group, which included
Macy, showed that Granovetter was also right
about the connection between economic
mobility and weak ties. Using data from
65 million landlines and mobile phones in the
United Kingdom, together with national cen-
sus data, they revealed a powerful correlation
between the diversity of individuals’ relation-
ships and economic development: the richer
and more varied their connections, the richer
their communities8
(see ‘The economic link’).
“We didn’t imagine in the 1970s that we could
work with data on this scale,” says Granovetter.
INFECTIOUS IDEAS
In some instances, big data have showed that
long-standing ideas are wrong. This year,
Kleinberg and his colleagues used data from
the roughly 900 million users of Facebook to
study contagion in social networks — a pro-
cess that describes the spread of ideas such as
fads, political opinions, new technologies and
financial decisions. Almost all theories had
assumed that the process mirrors viral con-
tagion: the chance of a person adopting a new
idea increases with the number of believers to
which he or she is exposed.
Kleinberg’s student Johan Ugander found
that there is more to it than that: people’s deci-
sion to join Facebook varies not with the total
number of friends who are already using the
site, but with the number of distinct social
groups those friends occupy9
. In other words,
finding that Facebook is being used by peo-
ple from, say, your work, your sports club and
your close friends makes more of an impres-
sion than finding that friends from only one
group use it. The conclusion — that the spread
of ideas depends on the variety of people that
hold them — could be important for market-
ing and public-health campaigns.
As computational social-science studies
have proliferated, so have ideas about practi-
cal applications. At the Massachusetts Insti-
tute of Technology in Cambridge, computer
scientist Alex Pentland’s group uses smart-
phone apps and wearable recording devices
to collect fine-grained data on subjects’ daily
movements and communications. By com-
bining the data with surveys of emotional
and physical health, the team has learned
how to spot the emergence
of health problems such
as depression10
. “We see
groups that never call out,”
says Pentland. “Being able
to see isolation is really
important when it comes
to reaching people who
need to be reached.” Ginger.
io, a spin-off company in Cam-
bridge, Massachusetts, led
by Pentland’s former stu-
dent Anmol Madan, is now
developing a smartphone app
that notifies health-care provid-
ers when it spots a pattern in the
data that may indicate a health problem.
Other companies are exploiting the more
than 400 million messages that are sent every
R.CLAXTON/BTGROUP/REF.8
THEECONOMICLINK
British telephone records show that England’s
communication diversity (white links) correlates
strongly with higher economic prosperity (light blue).
2 3 A U G U S T 2 0 1 2 | V O L 4 8 8 | N A T U R E | 4 4 9
FEATURE NEWS
© 2012 Macmillan Publishers Limited. All rights reserved
“WEDIDN’TIMAGINEINTHE
1970sTHATWECOULDWORK
WITHDATAONTHISSCALE.”
day on Twitter. Several research groups have
developed software to analyse the sentiments
expressed in tweets to predict real-world out-
comes such as box-office revenues for films
or election results11
. Although the accuracy of
such predictions is still a matter of debate12
,
Twitter began in August to post a daily politi-
cal index for the US presidential election based
on just such methods (election.twitter.com).
At Indiana University in Bloomington, mean-
while, Johan Bollen and his colleagues
have used similar software to search for
correlations between public mood, as
expressed on Twitter, and stock-
marketfluctuations13
.Theirresults
have been powerful enough for Der-
went Capital, a London-based investment
firm, to license Bollen’s techniques.
MESSAGE RECEIVED
When such Twitter-based polls began to
appear around two years ago, critics wondered
whethertheservice’srelativepopularityamong
specific demographic groups, such as young
people, would skew the results. A similar
debate revolves around all of the new data sets.
Facebook, for example, now has close to a bil-
lion users, yet young people are still overrepre-
sented among them. There are also differences
between online and real-world communica-
tion, and it is not clear whether results from
one sphere will apply in the other. “We often
extrapolate from how one technology is used
by one group to how humans in general inter-
act,” notes Samuel Arbesman, a network sci-
entist at Harvard University. But that, he says,
“might not necessarily be reasonable”.
Proponents counter that these are not new
problems.Almostallsurveydatacontainsome
amount of demographic skew, and social sci-
entists have developed a variety of weighting
methods to redress the balance. If the bias in
a particular data set, such as an excess of one
group or another on Facebook, is understood,
the results can be adjusted to account for it.
Services such as Facebook and Twitter
are also becoming increasingly widely used,
reducingthebias.Andevenifthebiasremains,
it is arguably less severe than that in other data
sets such as those for psychology and human
behaviour, where most work is done on uni-
versity students from Western, educated,
industrialized, rich and democratic societies
(often denoted WEIRD).
Granovetter has a more philosophical res-
ervation about the influx of big data into his
field. He says he is “very interested” in the
new methods, but fears that the focus on data
detracts from the need to get a better theoreti-
cal grasp on social systems. “Even the very
best of these computational articles
are largely focused on existing
theories,” he says. “That’s valu-
able, but it is only one piece of
what needs to be done.” Granovet-
ter’s weak-ties paper6
, for example,
remains highly cited almost 40
years later. Yet it was
“more or less data-free”, he says. “It didn’t
result from data analyses, it resulted
from thinking about other studies.
That is a separate activity and we
need to have people doing that.”
The new breed of social scientists are also
wrestling with the issue of data access. “Many
of the emerging ‘big data’ come from private
sources that are inaccessible to other research-
ers,”BernardoHuberman,acomputerscientist
at HP Labs in Palo Alto, wrote in February14
.
“The data source may be hidden, compound-
ing problems of verification, as well as con-
cerns about the generality of the results.”
A prime example is Facebook’s in-house
research team, which routinely uses data about
the interactions among the network’s 900 mil-
lion users for its own studies, including a re-
evaluation of the famous claim that any two
peopleonEartharejustsixintroductionsapart.
(It puts the figure at five15
.) But the group pub-
lishes only the conclusions, not the raw data, in
part because of privacy concerns. In July, Face-
book announced that it was exploring a plan
thatwouldgiveexternalresearchersthechance
to check the in-house group’s published con-
clusions against aggregated, anonymized data
—butonlyforalimitedtime,andonlyiftheout-
sidersfirsttravelledtoFacebookheadquarters16
.
In the short term, computational social
scientists are more concerned about cultural
problems in their discipline. Several institu-
tions, including Harvard, have created pro-
grammes in the new field, but the power of
academicboundariesissuchthatthereisoften
little traffic between different departments.
At Columbia University in New York, social
scientist and network theorist Duncan Watts
recallsarecentschedulingerrorthatforcedhim
tocombinemeetingswithgraduatestudentsin
computerscienceandsociology.“Itwasabun-
dantly clear that these two groups could really
useeachother:thecomputer-sciencestudents
hadmuchbettermethodologicalchopsthan
their sociology counterparts, but the
sociologistshadmuchmoreinterest-
ingquestions,”hesays.“Andyetthey’d
never heard of each other, nor had it ever
occurredtoanyofthemtowalkovertothe
other’s department.”
Many researchers remain unaware of the
power of the new data, agrees David Lazer, a
social scientist at Northeastern
University in Boston, Massa-
chusetts, and lead author on the
2009 manifesto. Little data-driven
work is making it into top social-
science journals. And computer-
science conferences that focus on social
issues, such as the Conference on Weblogs
and Social Media, held in Dublin in June,
attract few social scientists.
Nonetheless, says Lazer, with land-
mark papers appearing in leading
journals and data sets on societal-
wide behaviours available for the
first time, those barriers are steadily
breaking down. “The changes are more in
front of us than behind us,” he says.
Certainly that is Kleinberg’s perception.
“I think of myself as a computer scientist
who is interested in social questions,” he says.
“But these boundaries are becoming hard to
discern.” ■
JimGiles is a freelance writer in San Francisco.
1.	 Huttenlocher, D. P., Kedem, K. & Kleinberg, J. M.
Proc. 8th Annu. Symp. on Computational Geometry
110–119 (1992).
2.	 Bindel, D., Kleinberg, J. & Oren, S. Proc. IEEE 52nd
Annu. Symp. Foundations of Computer Science
57–66 (2011).
3.	 Danescu-Niculescu-Mizil, C., Cheng, J., Kleinberg,
J. & Lee, L. Proc. 50th Annu. Meeting Assoc.
Computational Linguistics (in the press); Preprint at
http://arxiv.org/abs/1203.6360.
4.	 Lazer, D. et al. Science 323, 721–723 (2009).
5.	 Liben-Nowell, D. & Kleinberg, J. J. Am. Soc. Inf. Sci.
Technol. 58, 1019–1031 (2007).
6.	 Granovetter, M. S. Am. J. Sociol. 78, 1360–1380
(1973).
7.	 Onnela, J.-P. et al. Proc. Natl Acad. Sci. USA 104,
7332–7336 (2007).
8.	 Eagle, N., Macy, M. & Claxton, R. Science 328,
1029–1031 (2010).
9.	 Ugander, J., Backstrom, L., Marlow, C. & Kleinberg, J.
Proc. Natl Acad. Sci. USA 109, 5962–5966 (2012).
10.	Madan, A., Cebrian, M., Moturu, S., Farrahi, K. &
Pentland, S. IEEE Pervasive Computing http://
dx.doi.org/10.1109/MPRV.2011.79 (2011).
11.	Asur, S. & Huberman, B. A. Proc. 2010 IEEE/WIC/
ACM Int. Conf. Web Intelligence and Intelligent Agent
Technology Vol. 1, 492–499 (2010).
12.	Gayo-Avello, D., Metaxas, P. T. & Mustafaraj, E. Proc.
Fifth Int. AAAI Conf. on Weblogs and Social Media
490–493 (2011).
13.	Bollen, J. & Mao, H. IEEE Computer 44(10), 91–94
(2011).
14.	Huberman, B. A. Nature 482, 308 (2012).
15.	Backstrom, L., Boldi, P., Rosa, M., Ugander,
J. & Vigna S. Preprint at http://arxiv.org/
abs/1111.4570 (2011).
16.	Corbyn, Z. Nature http://dx.doi.org/10.1038/
nature.2012.11064 (2012).
FEATURENEWS
4 5 0 | N A T U R E | V O L 4 8 8 | 2 3 A U G U S T 2 0 1 2 | C O R R E C T E D 3 1 A U G U S T 2 0 1 2
© 2012 Macmillan Publishers Limited. All rights reserved

More Related Content

What's hot

Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Digital Divide
Digital DivideDigital Divide
Digital DivideKaruna Kak
 
Ethical issues of it
Ethical issues of itEthical issues of it
Ethical issues of itvamahambo
 
Peace on Facebook? Problematising social media as spaces for intergroup conta...
Peace on Facebook? Problematising social media as spaces for intergroup conta...Peace on Facebook? Problematising social media as spaces for intergroup conta...
Peace on Facebook? Problematising social media as spaces for intergroup conta...Paul Reilly
 
Pew Study: The Future Of The Internet
Pew Study: The Future Of The InternetPew Study: The Future Of The Internet
Pew Study: The Future Of The InternetDavid O'Reilly
 
Future%20of%20internet%202010%20 %20 Aaas%20paper
Future%20of%20internet%202010%20 %20 Aaas%20paperFuture%20of%20internet%202010%20 %20 Aaas%20paper
Future%20of%20internet%202010%20 %20 Aaas%20paperMarketingfacts
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskMarcelo Pesallaccia
 
Information, Science, and Society
Information, Science, and SocietyInformation, Science, and Society
Information, Science, and SocietyMelanie Swan
 
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구Han Woo PARK
 
Mapping big data science
Mapping big data scienceMapping big data science
Mapping big data scienceHan Woo PARK
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachIJECEIAES
 
POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...
POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...
POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...IAEME Publication
 
Relationship of facebook activity and narcissism among second (1)
Relationship of facebook activity and narcissism among second (1)Relationship of facebook activity and narcissism among second (1)
Relationship of facebook activity and narcissism among second (1)mims24
 
The unknown Facebook study that depressed the hell out of everyone
The unknown Facebook study that depressed the hell out of everyoneThe unknown Facebook study that depressed the hell out of everyone
The unknown Facebook study that depressed the hell out of everyoneMitchell Harris
 

What's hot (20)

Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Final-Literature Review Paper
Final-Literature Review PaperFinal-Literature Review Paper
Final-Literature Review Paper
 
Laurence Favier, University Charles De Gaulle – Lille 3: Social Influence and...
Laurence Favier, University Charles De Gaulle – Lille 3: Social Influence and...Laurence Favier, University Charles De Gaulle – Lille 3: Social Influence and...
Laurence Favier, University Charles De Gaulle – Lille 3: Social Influence and...
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Ethical issues of it
Ethical issues of itEthical issues of it
Ethical issues of it
 
Peace on Facebook? Problematising social media as spaces for intergroup conta...
Peace on Facebook? Problematising social media as spaces for intergroup conta...Peace on Facebook? Problematising social media as spaces for intergroup conta...
Peace on Facebook? Problematising social media as spaces for intergroup conta...
 
Pew Study: The Future Of The Internet
Pew Study: The Future Of The InternetPew Study: The Future Of The Internet
Pew Study: The Future Of The Internet
 
Future%20of%20internet%202010%20 %20 Aaas%20paper
Future%20of%20internet%202010%20 %20 Aaas%20paperFuture%20of%20internet%202010%20 %20 Aaas%20paper
Future%20of%20internet%202010%20 %20 Aaas%20paper
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online risk
 
2053951715611145
20539517156111452053951715611145
2053951715611145
 
Information, Science, and Society
Information, Science, and SocietyInformation, Science, and Society
Information, Science, and Society
 
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
 
Mariusz Luterek: E-government as a research field
Mariusz Luterek: E-government as a research field Mariusz Luterek: E-government as a research field
Mariusz Luterek: E-government as a research field
 
Mapping big data science
Mapping big data scienceMapping big data science
Mapping big data science
 
Segmenting the Health Consumer Population
Segmenting the Health Consumer PopulationSegmenting the Health Consumer Population
Segmenting the Health Consumer Population
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
 
Meet the e strangers
Meet the e strangersMeet the e strangers
Meet the e strangers
 
POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...
POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...
POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...
 
Relationship of facebook activity and narcissism among second (1)
Relationship of facebook activity and narcissism among second (1)Relationship of facebook activity and narcissism among second (1)
Relationship of facebook activity and narcissism among second (1)
 
The unknown Facebook study that depressed the hell out of everyone
The unknown Facebook study that depressed the hell out of everyoneThe unknown Facebook study that depressed the hell out of everyone
The unknown Facebook study that depressed the hell out of everyone
 

Viewers also liked

Viewers also liked (9)

Ssrn id799468
Ssrn id799468Ssrn id799468
Ssrn id799468
 
Watts
WattsWatts
Watts
 
Organizações virtuais
Organizações virtuaisOrganizações virtuais
Organizações virtuais
 
Venkatraman
VenkatramanVenkatraman
Venkatraman
 
Propriedades físicas dos compostos orgânicos
Propriedades físicas dos compostos orgânicosPropriedades físicas dos compostos orgânicos
Propriedades físicas dos compostos orgânicos
 
Spe
SpeSpe
Spe
 
Propriedade físicas e químicas dos compostos orgânicos
Propriedade físicas e químicas dos compostos orgânicosPropriedade físicas e químicas dos compostos orgânicos
Propriedade físicas e químicas dos compostos orgânicos
 
Propriedade físicas e químicas dos compostos orgânicos
Propriedade físicas e químicas dos compostos orgânicosPropriedade físicas e químicas dos compostos orgânicos
Propriedade físicas e químicas dos compostos orgânicos
 
Nomenclatura de Hidrocarbonetos
Nomenclatura de HidrocarbonetosNomenclatura de Hidrocarbonetos
Nomenclatura de Hidrocarbonetos
 

Similar to Ties

Sociological Research Methods – Group Research ProjectThe Ev.docx
Sociological Research Methods – Group Research ProjectThe Ev.docxSociological Research Methods – Group Research ProjectThe Ev.docx
Sociological Research Methods – Group Research ProjectThe Ev.docxjensgosney
 
Future of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportVasily Ryzhonkov
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglyJosh Cowls
 
Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)Han Woo PARK
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in CyberspaceMarc Smith
 
Brain juicer digividuals_research_robots_paper
Brain juicer digividuals_research_robots_paperBrain juicer digividuals_research_robots_paper
Brain juicer digividuals_research_robots_paperPhilter Phactory
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Marc Smith
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .pptPRANJAL SAIKIA
 
Influence of social media on the academic performance of the undergraduate st...
Influence of social media on the academic performance of the undergraduate st...Influence of social media on the academic performance of the undergraduate st...
Influence of social media on the academic performance of the undergraduate st...Alexander Decker
 
Integrative medicine becons ICT vendors: Kapil Khandelwal, www.kapilkhandelwa...
Integrative medicine becons ICT vendors: Kapil Khandelwal, www.kapilkhandelwa...Integrative medicine becons ICT vendors: Kapil Khandelwal, www.kapilkhandelwa...
Integrative medicine becons ICT vendors: Kapil Khandelwal, www.kapilkhandelwa...Kapil Khandelwal (KK)
 
Castells, the impact of the internet on society a global perspective
Castells, the impact of the internet on society a global perspectiveCastells, the impact of the internet on society a global perspective
Castells, the impact of the internet on society a global perspectiveGiuliano Tavaroli
 
Unit 1 cape sociology
Unit 1 cape sociologyUnit 1 cape sociology
Unit 1 cape sociologyAndreen18
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Identifying social media influencers through social media network analysis: A...
Identifying social media influencers through social media network analysis: A...Identifying social media influencers through social media network analysis: A...
Identifying social media influencers through social media network analysis: A...Miguel del Fresno
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremhaifa rzem
 

Similar to Ties (20)

Sociological Research Methods – Group Research ProjectThe Ev.docx
Sociological Research Methods – Group Research ProjectThe Ev.docxSociological Research Methods – Group Research ProjectThe Ev.docx
Sociological Research Methods – Group Research ProjectThe Ev.docx
 
Digital Life in 2025
Digital Life in 2025Digital Life in 2025
Digital Life in 2025
 
Future of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP Report
 
DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the ugly
 
Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
Brain juicer digividuals_research_robots_paper
Brain juicer digividuals_research_robots_paperBrain juicer digividuals_research_robots_paper
Brain juicer digividuals_research_robots_paper
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .ppt
 
Influence of social media on the academic performance of the undergraduate st...
Influence of social media on the academic performance of the undergraduate st...Influence of social media on the academic performance of the undergraduate st...
Influence of social media on the academic performance of the undergraduate st...
 
Integrative medicine becons ICT vendors: Kapil Khandelwal, www.kapilkhandelwa...
Integrative medicine becons ICT vendors: Kapil Khandelwal, www.kapilkhandelwa...Integrative medicine becons ICT vendors: Kapil Khandelwal, www.kapilkhandelwa...
Integrative medicine becons ICT vendors: Kapil Khandelwal, www.kapilkhandelwa...
 
Castells, the impact of the internet on society a global perspective
Castells, the impact of the internet on society a global perspectiveCastells, the impact of the internet on society a global perspective
Castells, the impact of the internet on society a global perspective
 
Unit 1 cape sociology
Unit 1 cape sociologyUnit 1 cape sociology
Unit 1 cape sociology
 
مثال 6.pdf
مثال 6.pdfمثال 6.pdf
مثال 6.pdf
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Identifying social media influencers through social media network analysis: A...
Identifying social media influencers through social media network analysis: A...Identifying social media influencers through social media network analysis: A...
Identifying social media influencers through social media network analysis: A...
 
Research Paper On Correlation
Research Paper On CorrelationResearch Paper On Correlation
Research Paper On Correlation
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measurem
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Ties

  • 1. WEAK TIES THE POWER OF WEAK TIES Mobile-phone records affirm the idea that occasional contacts between casual acquaintances are crucial to the spread of information. STRONG TIES Connections with high total talk time (thick red lines) tend to define tight, potentially isolated, clusters. Connections with low total talk time (thin blue lines) tend to link the clusters, allowing informa- tion to move between them. J on Kleinberg’s early work was not for the mathematically faint of heart. His first publication1 , in 1992, was a computer- science paper with contents as dense as its title: ‘On dynamic Voronoi diagrams and theminimumHausdorffdistanceforpointsets under Euclidean motion in the plane’. That was before the World-Wide Web exploded across the planet, driven by millions of individual users making independent deci- sions about who and what to link to. And it was before Kleinberg began to study the vast array of digital by-products generated by life in the modern world, from e-mails, mobile phone calls and credit-card purchases to Internet searches and social networks. Today, as a computer scientist at Cornell University in Ithaca, New York, Kleinberg uses these data to write papers such as ‘How bad is forming your own opinion?’2 and ‘You had me at hello: how phrasing affects memorability’3 — titles that would be at home in a social-science journal. “I realized that computer science is not just about technology,” he explains. “It is also a human topic.” Kleinberg is not alone. The emerging field of computational social science is attracting mathematically inclined scientists in ever- increasing numbers. This, in turn, is spur- ring the creation of academic departments MAKING THE LINKSFROME-MAILSTOSOCIAL NETWORKS,THEDIGITALTRACES LEFTBYLIFEINTHEMODERN WORLDARETRANSFORMING SOCIALSCIENCE. BY JIM GILES REF.7 4 4 8 | N A T U R E | V O L 4 8 8 | 2 3 A U G U S T 2 0 1 2 FEATURENEWS © 2012 Macmillan Publishers Limited. All rights reserved
  • 2. and prompting companies such as the social- network giant Facebook, based in Menlo Park, California, to establish research teams to understand the structure of their networks and how information spreads across them. “It’s been really transformative,” says Michael Macy, a social scientist at Cornell and oneof15co-authorsofa2009manifesto4 seek- ing to raise the profile of the new discipline. “We were limited before to surveys, which are retrospective, and lab experiments, which are almost always done on small numbers of college sophomores.” Now, he says, the digital data-streams promise a portrait of individual and group behaviour at unprecedented scales and levels of detail. They also offer plenty of challenges — notably privacy issues, and the problem that the data sets may not truly be reflective of the population at large. Nonetheless, says Macy, “I liken the oppor- tunities to the changes in physics brought about by the particle accelerator, and in neuroscience by functional magnetic reso- nance imaging”. SOCIAL CALLS An early example of large-scale digital data beingusedonasocial-scienceissuewasastudy in2002byKleinbergandDavidLiben-Nowell, a computer scientist at Carleton College in Northfield,Minnesota.Theylookedatamech- anism that social scientists believed helped drive the formation of personal relationships: peopletendtobecomefriendswiththefriends of their friends. Although well established, the ideahadneverbeentestedonnetworksofmore than a few tens or hundreds of people. Kleinberg and Liben-Nowell studied the relationships formed in scientific collabo- rations. They looked at the thousands of physicists who uploaded papers to the arXiv preprint server during 1994–96. By writing software to automatically extract names from the papers, the pair built up a digital network several orders of magnitude larger than any that had been examined before, with each link representing two researchers who had collaborated. By following how the network changed over time, the researchers identified several measures of closeness among the researchers that could be used to forecast future collaborations5 . As expected, the results showed that new collaborations tended to spring from researchers whose spheres of existing col- laborators overlapped — the research analogue of ‘friends of friends’.Butthemathematicalsophistication of the predictions has allowed them to beusedonevenlargernetworks.Klein- berg’s former PhD student, Lars Backstrom, also worked on the connection-prediction prob- lem — experience that he has put to good use now that he works at Face- book, where he designed the social network’s current friend-recommendation system. Another long-standing social-science idea affirmed by computational researchers is the importance of ‘weak ties’ — relationships with distant acquaintances who are encountered relatively rarely. In 1973, Mark Granovetter, a social scientist now at Stanford University in Stanford, California, argued that weak ties form bridges between social cliques and so are important to the spread of information and to economic mobility6 . In the pre-digital era it was almost impossible to verify his ideas at scale. But in 2007, a team led by Jukka-Pekka Onnela, a network scientist now at Harvard University in Cambridge, Massachusetts, used data on 4 million mobile-phone users to con- firm that weak ties do indeed act as societal bridges7 (see ‘The power of weak ties’). In 2010, a second group, which included Macy, showed that Granovetter was also right about the connection between economic mobility and weak ties. Using data from 65 million landlines and mobile phones in the United Kingdom, together with national cen- sus data, they revealed a powerful correlation between the diversity of individuals’ relation- ships and economic development: the richer and more varied their connections, the richer their communities8 (see ‘The economic link’). “We didn’t imagine in the 1970s that we could work with data on this scale,” says Granovetter. INFECTIOUS IDEAS In some instances, big data have showed that long-standing ideas are wrong. This year, Kleinberg and his colleagues used data from the roughly 900 million users of Facebook to study contagion in social networks — a pro- cess that describes the spread of ideas such as fads, political opinions, new technologies and financial decisions. Almost all theories had assumed that the process mirrors viral con- tagion: the chance of a person adopting a new idea increases with the number of believers to which he or she is exposed. Kleinberg’s student Johan Ugander found that there is more to it than that: people’s deci- sion to join Facebook varies not with the total number of friends who are already using the site, but with the number of distinct social groups those friends occupy9 . In other words, finding that Facebook is being used by peo- ple from, say, your work, your sports club and your close friends makes more of an impres- sion than finding that friends from only one group use it. The conclusion — that the spread of ideas depends on the variety of people that hold them — could be important for market- ing and public-health campaigns. As computational social-science studies have proliferated, so have ideas about practi- cal applications. At the Massachusetts Insti- tute of Technology in Cambridge, computer scientist Alex Pentland’s group uses smart- phone apps and wearable recording devices to collect fine-grained data on subjects’ daily movements and communications. By com- bining the data with surveys of emotional and physical health, the team has learned how to spot the emergence of health problems such as depression10 . “We see groups that never call out,” says Pentland. “Being able to see isolation is really important when it comes to reaching people who need to be reached.” Ginger. io, a spin-off company in Cam- bridge, Massachusetts, led by Pentland’s former stu- dent Anmol Madan, is now developing a smartphone app that notifies health-care provid- ers when it spots a pattern in the data that may indicate a health problem. Other companies are exploiting the more than 400 million messages that are sent every R.CLAXTON/BTGROUP/REF.8 THEECONOMICLINK British telephone records show that England’s communication diversity (white links) correlates strongly with higher economic prosperity (light blue). 2 3 A U G U S T 2 0 1 2 | V O L 4 8 8 | N A T U R E | 4 4 9 FEATURE NEWS © 2012 Macmillan Publishers Limited. All rights reserved
  • 3. “WEDIDN’TIMAGINEINTHE 1970sTHATWECOULDWORK WITHDATAONTHISSCALE.” day on Twitter. Several research groups have developed software to analyse the sentiments expressed in tweets to predict real-world out- comes such as box-office revenues for films or election results11 . Although the accuracy of such predictions is still a matter of debate12 , Twitter began in August to post a daily politi- cal index for the US presidential election based on just such methods (election.twitter.com). At Indiana University in Bloomington, mean- while, Johan Bollen and his colleagues have used similar software to search for correlations between public mood, as expressed on Twitter, and stock- marketfluctuations13 .Theirresults have been powerful enough for Der- went Capital, a London-based investment firm, to license Bollen’s techniques. MESSAGE RECEIVED When such Twitter-based polls began to appear around two years ago, critics wondered whethertheservice’srelativepopularityamong specific demographic groups, such as young people, would skew the results. A similar debate revolves around all of the new data sets. Facebook, for example, now has close to a bil- lion users, yet young people are still overrepre- sented among them. There are also differences between online and real-world communica- tion, and it is not clear whether results from one sphere will apply in the other. “We often extrapolate from how one technology is used by one group to how humans in general inter- act,” notes Samuel Arbesman, a network sci- entist at Harvard University. But that, he says, “might not necessarily be reasonable”. Proponents counter that these are not new problems.Almostallsurveydatacontainsome amount of demographic skew, and social sci- entists have developed a variety of weighting methods to redress the balance. If the bias in a particular data set, such as an excess of one group or another on Facebook, is understood, the results can be adjusted to account for it. Services such as Facebook and Twitter are also becoming increasingly widely used, reducingthebias.Andevenifthebiasremains, it is arguably less severe than that in other data sets such as those for psychology and human behaviour, where most work is done on uni- versity students from Western, educated, industrialized, rich and democratic societies (often denoted WEIRD). Granovetter has a more philosophical res- ervation about the influx of big data into his field. He says he is “very interested” in the new methods, but fears that the focus on data detracts from the need to get a better theoreti- cal grasp on social systems. “Even the very best of these computational articles are largely focused on existing theories,” he says. “That’s valu- able, but it is only one piece of what needs to be done.” Granovet- ter’s weak-ties paper6 , for example, remains highly cited almost 40 years later. Yet it was “more or less data-free”, he says. “It didn’t result from data analyses, it resulted from thinking about other studies. That is a separate activity and we need to have people doing that.” The new breed of social scientists are also wrestling with the issue of data access. “Many of the emerging ‘big data’ come from private sources that are inaccessible to other research- ers,”BernardoHuberman,acomputerscientist at HP Labs in Palo Alto, wrote in February14 . “The data source may be hidden, compound- ing problems of verification, as well as con- cerns about the generality of the results.” A prime example is Facebook’s in-house research team, which routinely uses data about the interactions among the network’s 900 mil- lion users for its own studies, including a re- evaluation of the famous claim that any two peopleonEartharejustsixintroductionsapart. (It puts the figure at five15 .) But the group pub- lishes only the conclusions, not the raw data, in part because of privacy concerns. In July, Face- book announced that it was exploring a plan thatwouldgiveexternalresearchersthechance to check the in-house group’s published con- clusions against aggregated, anonymized data —butonlyforalimitedtime,andonlyiftheout- sidersfirsttravelledtoFacebookheadquarters16 . In the short term, computational social scientists are more concerned about cultural problems in their discipline. Several institu- tions, including Harvard, have created pro- grammes in the new field, but the power of academicboundariesissuchthatthereisoften little traffic between different departments. At Columbia University in New York, social scientist and network theorist Duncan Watts recallsarecentschedulingerrorthatforcedhim tocombinemeetingswithgraduatestudentsin computerscienceandsociology.“Itwasabun- dantly clear that these two groups could really useeachother:thecomputer-sciencestudents hadmuchbettermethodologicalchopsthan their sociology counterparts, but the sociologistshadmuchmoreinterest- ingquestions,”hesays.“Andyetthey’d never heard of each other, nor had it ever occurredtoanyofthemtowalkovertothe other’s department.” Many researchers remain unaware of the power of the new data, agrees David Lazer, a social scientist at Northeastern University in Boston, Massa- chusetts, and lead author on the 2009 manifesto. Little data-driven work is making it into top social- science journals. And computer- science conferences that focus on social issues, such as the Conference on Weblogs and Social Media, held in Dublin in June, attract few social scientists. Nonetheless, says Lazer, with land- mark papers appearing in leading journals and data sets on societal- wide behaviours available for the first time, those barriers are steadily breaking down. “The changes are more in front of us than behind us,” he says. Certainly that is Kleinberg’s perception. “I think of myself as a computer scientist who is interested in social questions,” he says. “But these boundaries are becoming hard to discern.” ■ JimGiles is a freelance writer in San Francisco. 1. Huttenlocher, D. P., Kedem, K. & Kleinberg, J. M. Proc. 8th Annu. Symp. on Computational Geometry 110–119 (1992). 2. Bindel, D., Kleinberg, J. & Oren, S. Proc. IEEE 52nd Annu. Symp. Foundations of Computer Science 57–66 (2011). 3. Danescu-Niculescu-Mizil, C., Cheng, J., Kleinberg, J. & Lee, L. Proc. 50th Annu. Meeting Assoc. Computational Linguistics (in the press); Preprint at http://arxiv.org/abs/1203.6360. 4. Lazer, D. et al. Science 323, 721–723 (2009). 5. Liben-Nowell, D. & Kleinberg, J. J. Am. Soc. Inf. Sci. Technol. 58, 1019–1031 (2007). 6. Granovetter, M. S. Am. J. Sociol. 78, 1360–1380 (1973). 7. Onnela, J.-P. et al. Proc. Natl Acad. Sci. USA 104, 7332–7336 (2007). 8. Eagle, N., Macy, M. & Claxton, R. Science 328, 1029–1031 (2010). 9. Ugander, J., Backstrom, L., Marlow, C. & Kleinberg, J. Proc. Natl Acad. Sci. USA 109, 5962–5966 (2012). 10. Madan, A., Cebrian, M., Moturu, S., Farrahi, K. & Pentland, S. IEEE Pervasive Computing http:// dx.doi.org/10.1109/MPRV.2011.79 (2011). 11. Asur, S. & Huberman, B. A. Proc. 2010 IEEE/WIC/ ACM Int. Conf. Web Intelligence and Intelligent Agent Technology Vol. 1, 492–499 (2010). 12. Gayo-Avello, D., Metaxas, P. T. & Mustafaraj, E. Proc. Fifth Int. AAAI Conf. on Weblogs and Social Media 490–493 (2011). 13. Bollen, J. & Mao, H. IEEE Computer 44(10), 91–94 (2011). 14. Huberman, B. A. Nature 482, 308 (2012). 15. Backstrom, L., Boldi, P., Rosa, M., Ugander, J. & Vigna S. Preprint at http://arxiv.org/ abs/1111.4570 (2011). 16. Corbyn, Z. Nature http://dx.doi.org/10.1038/ nature.2012.11064 (2012). FEATURENEWS 4 5 0 | N A T U R E | V O L 4 8 8 | 2 3 A U G U S T 2 0 1 2 | C O R R E C T E D 3 1 A U G U S T 2 0 1 2 © 2012 Macmillan Publishers Limited. All rights reserved