networks

Notes on The Strength of Weak Ties revisited

From Mark Granovetter’s “The Strength Of Weak Ties: A Network Theory Revisited” [Sociological Theory, Volume 1 (1983), 201-233.]:

The argument asserts that our acquaintances (weak ties) are less likely to be socially involved with one another than are our close friends (strong ties).Thus the set of people made up of any individual and his or her acquaintances comprises a low-density network (one in which many of the possible relational lines are absent) whereas the set consisting of the same individual and his or her close friends will be densely knit (many of the possible lines are present). …

The weak tie between Ego and his acquaintance, therefore, becomes not merely a trivial acquaintance tie but rather a crucial bridge between the two densely knit clumps of close friends. To the extent that the assertion of the previous paragraph is correct, these clumps would not, in fact, be connected to one another at all were it not for the existence of weak ties (SWT, p. 1363).

It follows, then, that individuals with few weak ties will be deprived of information from distant parts of the social system and will be confined to the provincial news and views of their close friends. This deprivation will not only insulate them from the latest ideas and fashions but may put them in a disadvantaged position in the labor market, where advancement can depend, as I have documented elsewhere (1974), on knowing about appropriate job openings at just the right time. …

The macroscopic side of this communications argument is that social systems lacking in weak ties will be fragmented and incoherent. New ideas will spread slowly, scientific endeavors will be handicapped, and subgroups separated by race, ethnicity, geography, or other characteristics will have difficulty reaching a modus vivendi. …

In the evolution of social systems, perhaps the most important source of weak ties is the division of labor, since increasing specialization and interdependence result in a wide variety of specialized role relationships in which one knows only a small segment of the other’s personality. … the exposure to a wide variety of different viewpoints and activities is the essential prerequisite for the social construction of individualism. …

She relates this difference to Basil Bernstein’s dis- tinction between restricted and elaborated codes of communication. Restricted codes are simpler-more meanings are implicit and taken for granted as the speakers are so familiar with one another. Elaborated codes are complex and universal – more reflection is needed in organizing one’s communication “when there is more difference between those to whom the speech is addressed” (p. 256). …

At a more mundane level, I argued (SWT, pp. 1369-1373; 1974, pp. 51-62) that weak ties have a special role in a person’s opportunity for mobility-that there is a “structural tendency for those to whom one is only weakly tied to have better access to job information one does not already have. Acquaintances, as compared to close friends, are more prone to move in different circles than oneself. Those to whom one is closest are likely to have the greatest overlap in contact with those one already knows, so that the information to which they are privy is likely to be much the same as that which one already has” (1974, pp. 52-53). …

Administrative or managerial employees had a pattern very much like the one I reported: 35.5 percent using weak ties, 15.8 percent strong ones, and 48.7 percent intermediate. Professionals and office workers also were heavy users of weak ties (30.8 percent and 25.8 percent but, unlike managers, used strong ties even more frequently (51.0 and 44.4 percent). Semiprofessionals found only 13.1 percent of jobs through weak ties and blue-collar workers 19.1 percent; the former found 44.9 percent of jobs through strong ties, the latter only 19.1 percent. …

One set of results is of special interest, however. Ericksen and Yancey found that less-well-educated respondents were those most likely to use strong ties for jobs …

The argument of SWT implies that only bridging weak ties are of special value to individuals; the significance of weak ties is that they are far more likely to be bridges than are strong ties. It should follow, then, that the occupational groups making the greatest use of weak ties are those whose weak ties do connect to social circles different from one’s own. …

Consistent with this interpretation is the finding of Lin and col- leagues (1981) that weak ties have positive effects on occupational status only when they connect one to high-status individuals. For those of lower status, weak ties to those of similar low status were not especially useful, whereas those to high-status contacts were. In the latter case the status difference alone strongly suggests that the ties bridged substan- tial social distance. …

Weak ties provide people with access to information and resources beyond those available in their own social circle; but strong ties have greater motivation to be of assistance and are typically more easily available. …

Pool argues, for example, that the number of weak ties is increased by the development of the communications system, by bureaucratization, population density, and the spread of market mechanisms. Further, he suggests that average family size affects the number of weak ties, since where “primary families are large, more of the total contacts of an individual are likely to be absorbed in them” (p. 5). …

In my study of job finding, for example, I found that those whose job was found through strong ties were far more likely to have had a period of unemployment between jobs than those using weak ties (1974, p. 54). …

A number of studies indicate that poor people rely more on strong ties than do others. Ericksen and Yancey, in a study of Philadel- phia, conclude that the “structure of modern society is such that some people typically find it advantageous to maintain strong networks and we have shown that these people are more likely to be young, less well educated, and black” (1977, p. 23). …

Stack (1974) studied a black, urban American, midwestern ghetto … Stack: “Black families living in the Flats need a steady source of cooperative support to survive. They share with one another because of the urgency of their needs. . . . They trade food stamps, rent money, a TV, hats, dice, a car, a nickel here, a cigarette there, food, milk, grits, and children. . . . Kin and close friends who fall into similar economic crises know that they may share the food, dwelling, and even the few scarce luxuries of those individuals in their kin network. . . . Non-kin who live up to one another’s expectations express elaborate vows of friendship and conduct their social relations within the idiom of kinship” (1974, pp. 32-33, 40). …

At the same time, I would suggest that the heavy concentration of social energy in strong ties has the impact of fragmenting communities of the poor into encapsulated networks with poor connections between these units; individuals so encapsulated may then lose some of the advantages associated with the outreach of weak ties. This may be one more reason why poverty is self-perpetuating. Certainly programs meant to provide social services to the poor have frequently had trouble in their outreach efforts. From the network arguments advanced here, one can see that the trouble is to be expected. …

Furthermore, many cultural items never transmitted by the media are known throughout an extensive network: “Youth cultures offer excellent examples of subcultures which provide a set of communication channels external to the media. Much material which is common knowledge among young people – dirty jokes, sexual lore, aggressive humor . . . is not communicated by the adult-controlled media” (p. 9). …

What makes cultural diffusion possible, then, is the fact that small cohesive groups who are liable to share a culture are not so cohesive that they are entirely closed; rather, ideas may penetrate from other such groups via the connecting medium of weak ties. It is a seeming paradox that the effect of weak ties, in this case, is homogenization, since my emphasis has been the ability of weak ties to reach out to groups with ideas and information different from one’s own. The paradox dissolves, however, when the process is understood to occur over a period of time. The ideas that initially flow from another setting are, given regional and other variations, probably new. Homogeneous subcultures do not happen instantly but are the endpoint of diffusion processes. … Fine and Kleinman note that “culture usage consists of chosen behaviors. . . . Culture can be employed strategically and should not be conceptualized as a conditioned response. Usage of culture requires motivation and, in particular, identification with those who use the cultural items. Thus, values, norms, behaviors, and artifacts constitute a subculture only insofar as individuals see themselves as part of a collectivity whose members attribute particular meanings to these ‘objects'” (1979, pp. 12-13). …

The importance of this notion is clear. If “the innovativeness of central units is shackled by vested intellectual interests (or perspectives) then new ideas must emanate from the margins of the network” (p. 460). Furthermore, as I suggested in SWT for the case of high-risk innovations (p. 1367), Chubin points out that marginals, in science, can better afford to innovate; the innovations, if useful, are seized on by the center. …

Weimann finds also, however, that strong ties are not irrelevant in information flow-the speed of flow, credibility, and especially influence are all greater through strong ties and, in fact, “most of the influence is carried through strong ties” (1980, p. 12). He suggests a division of labor between weak and strong ties: Weak ties provide the bridges over which innovations cross the boundaries of social groups; the decision making, however, is influenced mainly by the strong-ties network in each group (p. 21). …

In the bureaucratic solution, the ties are hierarchical; in the democratic clinics, many of which have reacted against the formal model, “tena- cious ties provide a matrix of close primary group relations unifying the entire structure. These strong ties strikingly resemble patterns observed in small communities, summer camps, and Jesuit monastic orders” (p. 20). …

In their analysis Breiger and Pattison studied three types of ties in the two communities-social, community affairs, and business- professional-and found that social ties function as strong ties, that business-professional ties are weak, and that community-affairs ties are strong in relation to business ties but weak in relation to social ones (1978, pp. 222-224). …

I have not argued that all weak ties serve the functions described in SWT-only those acting as bridges between network segments. Weak ties are asserted to be important because their likelihood of being bridges is greater than (and that of strong ties less than) would be expected from their numbers alone. This does not preclude the possibility that most weak ties have no such function.

Notes on The Strength of Weak Ties revisited Read More »

The value of Group-Forming Networks

From David P. Reed’s “That Sneaky Exponential – Beyond Metcalfe’s Law to the Power of Community Building“:

Bob Metcalfe, inventor of the Ethernet, is known for pointing out that the total value of a communications network grows with the square of the number of devices or people it connects. This scaling law, along with Moore’s Law, is widely credited as the stimulus that has driven the stunning growth of Internet connectivity. Because Metcalfe’s law implies value grows faster than does the (linear) number of a network’s access points, merely interconnecting two independent networks creates value that substantially exceeds the original value of the unconnected networks. …

But many kinds of value are created within networks. While many kinds of value grow proportionally to network size and some grow proportionally to the square of network size, I’ve discovered that some network structures create total value that can scale even faster than that. Networks that support the construction of communicating groups create value that scales exponentially with network size, i.e. much more rapidly than Metcalfe’s square law. I will call such networks Group-Forming Networks, or GFNs. …

What kind of value are we talking about, when we say the value of a network scales as some function of size? The answer is the value of potential connectivity for transactions. That is, for any particular access point (user), what is the number of different access points (users) that can be connected or reached for a transaction when the need arises. …

The value of potential connectivity is the value of the set of optional transactions that are afforded by the system or network. …

Metcalfe’s law, simply derived, says that if you build a network so that any customer can choose to transact with any other customer, the number of potential connections each of the N customers can make is (N-1), giving a total number of potential connections as N(N-1) or N2-N. Assuming each potential connection is worth as much as any other, the value to each user depends on the total size of the network, and the total value of potential connectivity scales much faster than the size of the network, proportional to N2. …

In networks like the Internet, Group Forming Networks (GFNs) are an important additional kind of network capability. A GFN has functionality that directly enables and supports affiliations (such as interest groups, clubs, meetings, communities) among subsets of its customers. Group tools and technologies (also called community tools) such as user-defined mailing lists, chat rooms, discussion groups, buddy lists, team rooms, trading rooms, user groups, market makers, and auction hosts, all have a common theme—they allow small or large groups of network users to coalesce and to organize their communications around a common interest, issue, or goal. Sadly, the traditional telephone and broadcast/cable network frameworks provide no support for groups. …

What we see, then, is that there are really at least three categories of value that networks can provide: the linear value of services that are aimed at individual users, the “square” value from facilitating transactions, and exponential value from facilitating group affiliations. What’s important is that the dominant value in a typical network tends to shift from one category to another as the scale of the network increases. Whether the growth is by incremental customer additions, or by transparent interconnection, scale growth tends to support new categories of killer apps, and thus new competitive games. …

What’s important in a network changes as the network scale shifts. In a network dominated by linear connectivity value growth, “content is king.” That is, in such networks, there is a small number of sources (publishers or makers) of content that every user selects from. The sources compete for users based on the value of their content (published stories, published images, standardized consumer goods). Where Metcalfe’s Law dominates, transactions become central. The stuff that is traded in transactions (be it email or voice mail, money, securities, contracted services, or whatnot) are king. And where the GFN law dominates, the central role is filled by jointly constructed value (such as specialized newsgroups, joint responses to RFPs, gossip, etc.). …

I’d like to close with a speculative thought. As Francis Fukuyama argues in his book Trust, there is a strong correlation between the prosperity of national economies and social capital, which he defines culturally as the ease with which people in a particular culture can form new associations. There is a clear synergy between the sociability that Fukuyama discusses and the technology and tools that support GFNs-both are structural supports for association. As the scale of interaction grows more global via the Internet, isn’t it possible that a combination of social capital and GFN capital will drive prosperity to those who recognize the value of network structures that support free and responsible association for common purposes?

The value of Group-Forming Networks Read More »

Thieves use Bluetooth to find laptops in cars

From “Phone pirates in seek and steal mission“:

MOBILE phone technology is being used by thieves to seek out and steal laptops locked in cars in Cambridgeshire.

Up-to-date mobiles often have Bluetooth technology, which allows other compatible devices, including laptops, to link up and exchange information, and log on to the internet.

But thieves in Cambridge have cottoned on to an alternative use for the function, using it as a scanner which will let them know if another Bluetooth device is locked in a car boot.

Det Sgt Al Funge, from Cambridge’s crime investigation unit, said: “There have been a number of instances of this new technology being used to identify cars which have valuable electronics, including laptops, inside.

Thieves use Bluetooth to find laptops in cars Read More »

Tracking terrorists with Unintended Information Revelation

From “New search engine to help thwart terrorists“:

With news that the London bombers were British citizens, radicalised on the streets of England and with squeaky-clean police records, comes the realisation that new mechanisms for hunting terrorists before they strike must be developed.

Researchers at the University of Buffalo, US, believe they have discovered a technique that will reveal information on public web sites that was not intended to be published.

The United States Federal Aviation Administration (FAA) and the National Science Foundation (NSF) are supporting the development of a new search engine based on Unintended Information Revelation (UIR), and designed for anti-terrorism applications.

UIR supposes that snippets of information – that by themselves appear to be innocent – may be linked together to reveal highly sensitive data.

… “A concept chain graph will show you what’s common between two seemingly unconnected things,” said Srihari. “With regular searches, the input is a set of key words, the search produces a ranked list of documents, any one of which could satisfy the query.

“UIR, on the other hand, is a composite query, not a keyword query. It is designed to find the best path, the best chain of associations between two or more ideas. It returns to you an evidence trail that says, ‘This is how these pieces are connected.'”

Tracking terrorists with Unintended Information Revelation Read More »

Definitions of extranet

From Justin Hibbard’s “Lack of distributed object development delays extranets” in Computerworld (17 March 1997):

An extranet extends an intranet to trading partners, suppliers and customers via a secure Internet link.

From Robert Hertzberg’s The Raw Power of an Idea: in WebWeek (31 March 1997):

The extranet … revolves around the notion of business partners opening up their intranets to one another.

Or here’s another definition:

Internet: open access
Intranet: company access
Extranet: company, clients, partner access

Definitions of extranet Read More »

Serial killer apps

From “Andreessen singles out consumers as key to Web future“, in InfoWorld (26 May 1999):

[Mark Andreessen] then switched gears and talked about the “serial killer apps” on the Internet. A serial killer app, as opposed to a killer app, just keeps getting more useful and more killer as people keep coming online, according to Andreessen.

Andreessen listed the five serial killer apps as: e-mail, the Web, instant messaging, online calendaring, and auctions. …

Andreessen said serial killer apps are the reasons people get online, but once online they are not limited to these five arenas.

Serial killer apps Read More »

Clay Shirky’s Thinking About Networks syllabus

From Clay Shirky’s “Thinking About Networks” syllabus:

Communications networks are invisible in the traditional sense; their inner workings are hidden inside devices, behind walls and underground, or pass silently through the air. We will examine a variety of electronic networks — telegraph, telephones, internet — and design philosophies — client-server, lattice, peer-to-peer — and explore the ways different networks alter the experiences that are and are not possible within them.

Social networks are invisible in a different way; because we are immersed in myriad social networks — friends, family, work school — and because humans are so natively good at understanding and working in such networks, we don’t see them. We will examine some of the structural elements of social networks, such as strong and weak ties, clustering, and small worlds networks, to understand some of the ways that the shape of social networks affects us.

… Technological choices embodied in electronic networks profoundly affect their social dimensions: Why can we CC people on email but not on phone calls? How does the one-way network of television differ from the two-way network of the internet? What effect does bittorrent’s architectural decentralization have on its users? Social choices also affect the design of technology; resistance to spamming or attempts to hide from the RIAA have led to several deep technological changes in the design of weblogs and file-sharing networks respectively, changes that alter the social relations among the users. …

… what is special about a network, as different from a mere collection of nodes? …

Humans both shape and are shaped by networks. We live in them every day, and they become so completely woven into the fabric of our lives that the technology becomes invisible, and our primary experience of them becomes social. “Who said what to whom when” is more important than whether the messages traveled by email or carrier pigeon.

Yet the structure of networks does affect the culture that uses them. The kinds of conversations people have via snail mail differ significantly from the conversations they have in email; talking on the phone is very different than “talking” via IM; group conversations that take place in communities like Metafilter are very different from those that take place on irc and different again from mailing lists, in large part because the technology shapes the culture.

To a first approximation, networks can be defined by describing 3 aspects: nodes, connections, and contents. The Web and email, for example, use the same nodes (users computers), but have very different ways of connecting (real time versus delayed delivery) and very different sorts of contents (request and reply — “pull” — for a specific URL versus sending for later delivery — “push” — of text messages), which make using the Web so different from using email. …

PAPER #1 ASSIGNED: “Two Networks” Students pick two networks (Telephone vs telegraph, FedEx vs Bike messenger, etc) and contrast their structure and use. …

What is “information space”? How can you visualize an N-dimensional network in 2D space? 3D space? What visual tools and techniques are there for representing networks? How does the material used to represent a network affect the representation? When representing something as abstract as a network, what information about a network is it vital to represent? What information is it vital to ignore? …

… the 20th century was characterized by broadcast media of an unprecedented scale, but most of the new networking tools invented in the last 30 years have not adhered to the broadcast model. …

What is a social network? What social networks do you live in? How do social networks use technological networks? How do social networks affect technological network design? What are the social effects of privacy, secrecy, anonymity, security, reputation in a mediated setting?

Some takeaway thoughts & questions I have for my students in my Social Software class:

How are networks structured?

What are the named AND unnamed structures (assumed? cultural? instinctual?) you see in various networks?

How does software further those structures? Expose them? Subvert them?

Given the structure of software/system/service X, what social experiences are possible? What are unintended, but possible? What are desired, but impossible?

Look at Dr. Samuel Johnson’s famous definition of “network”: “Any thing reticulated, or decussated, at equal distances, with interstices between the intersections.”

Clay Shirky’s Thinking About Networks syllabus Read More »

The network is central

The centrality of the network in modern life, thought, & technology is apparent in that both ends of the use stack – users & developers – now think of the network as a given. A developer doesn’t graft networking on to software later in the process; instead, software is built assuming the network. Users expect networking in their apps as a matter of course, even if they don’t realize they’re relying on a network.

The network is central Read More »

The ACLU on monopoly control by ISPs

From the ACLU’s No Competition: How Monopoly Control of the Broadband Internet Threatens Free Speech:

Common carriage policy requires that a network owner – in this case, a telephone company – not discriminate against information by halting, slowing, or otherwise tampering with the transfer of any data. The purpose of common carriage is to prevent a network owner from leveraging its control over the pipeline for communication to gain power or control over the actual information, products and services that flow through it. This is not a new concept; for well over a century it has been applied in ways that have been central to the economic development of our nation, including canal systems, public highways, and the telegraph. And common carriage has been applied to the telephone system since the early 20th century, requiring it to serve all users in an equitable and nondiscriminatory fashion.

2. Cable networks are not open

Unlike phone companies, cable television providers do not have to provide nondiscriminatory access to their TV subscribers, because cable TV is not subject to the common carrier regulatory regime. As a result, the content that cable TV companies deliver is largely under their control. …

3. Cable providers wield total control over Internet use

… Cable providers are under no obligation to remain a neutral pipe for content over an end-to-end Internet – and have many incentives for interfering with that pipe:

Basic control of the service. Providers of course have control over the fundamentals of a customer’s Internet connection. For example, they can restrict the number of computers that a customer connects to the cable modem through a home network. They can control the overall speed and reliability of a customer’s online experie nce. And they can set the price for various levels of high-speed access.

Control over applications. Providers can block their customers from using particular applications, such as video conferencing, Internet telephony, and virtual private networks …

Control over access to content. Even more frightening is the growing ability of cable providers to interfere with content. … That is like the phone company being allowed to own restaurants and then provide good service and clear signals to customers who call Domino’s and frequent busy signals, disconnects and static for those calling Pizza Hut. …

Ability to force-feed content. Cable providers can also use their monopoly power to force-feed content to customers by requiring them to access the Internet through a particular home page containing material selected by the cable company. …

Ability to violate privacy. Finally, a cable provider’s absolute control over its network gives it the technical capacity to record everything its customers do online, down to the smallest mouse click. In February 2002, the nation’s third largest cable company, Comcast, without notification to its customers, began to track their Web browsing. …

According to data provided by the National Cable and Telecommunications Association, the top five cable companies in the United States control 75% of the market; if the proposed merger between Comcast and AT&T is approved, only four companies will control that 75%, with approximately 35% of all cable in the US controlled by Comcast alone. …

The FCC, meanwhile, decided in April 2002 to classify broadband Internet service over cable as an "interstate information service." That technical redefinition would mean that cable broadband could be completely exempt from federal regulation such as interconnection and common carriage requirements, as well as from oversight by local cable franchising authorities. …

In fact, the Internet would never have exploded into American life the way it has without regulations issued by the FCC that curbed the power of the telephone companies in ways that the agency is now refusing to do for cable:

  • In 1975, the FCC issued a landmark regulation preventing telephone companies from blocking their customers from attaching their own equipment to the phone network. If the agency had decided this issue the other way, regular Americans would not have been able to use computer modems, and the Internet as we know it never could have been created.
  • In 1980, the agency set out rules that required telephone companies to offer "data services" through separate affiliates because they would have had both the ability and the incentive to use their control of the telephone network to discriminate against unaffiliated, competing data services.
  • In 1983, the FCC issued a regulation preventing telephone companies from charging ISPs by the minute for their use of the local telephone network; if they had allowed such charges, consumers would have to pay per-minute fees for Internet access. That would have slowed the growth of the Internet, as such fees have done in Europe.

The ACLU on monopoly control by ISPs Read More »