skip to main content
10.1145/2428736.2428811acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Using graph theory to re-verify the small world theory in an online social network word

Published: 03 December 2012 Publication History

Abstract

The development in social network services changes our traditional social structure. Nowadays, people can easily communicate with their old friends or even make new ones. The "Small World Theory" [5] states that the median path length equal to 6 when posting letters through intermediaries, but researchers have not prove this theory completely until now. Because of social networks our world becomes smaller and smaller. In this paper, we propose new ideas about the "Small World Theory". We performed our experiment on Facebook platform to collect social data. Additionally, the graph database is used to conduct further analyses. To re-verify the "Small World Theory" and to extend this theory, we focused on the degree of separation and control the size of the dataset. The experimental results show that our dataset is "Four Degrees of Separation", and this conclusion can be extended to the whole world by further experiments.

References

[1]
Dunbar, R. 1993. Coevolution of neocortical size, group size and language in humans. Behavioral and Brain Sciences. 16, 4, 681--735.
[2]
Guiot, J. 1976. A modification of milgram's small world method. European journal of social psychology. 6, 503--507.
[3]
Leavitt, N. 2010. Will NoSQL Databases Live Up to Their Promise?. Computer. 43, 2, 12--14.
[4]
Leskovec, J. and Horvitz, E. 2008. Planetary-scale views on a large instant-messaging network. In Proceedings of the 17th international conference on World Wide Web, ACM (Beijing, China) 915--924.
[5]
Milgram, S. 1967. The small world problem. Psychology Today. 1, 1 (May. 1967), 60--67.
[6]
Skeels, M., and Grudin, J. 2009. When social networks cross boundaries: a case study of workplace use of Facebook and Linkedin. In Proc. group 2009. 95--104.
[7]
Vicknair, C., Macias, M., Zhao, Z., Nan, X Chen, Y., and Wilkins, D. 2010. A comparison of a graph database and a relational database: a data provenance perspective. Proceedings of the 48th Annual Southeast Regional Conference (Oxford, Mississippi), 1--6.
[8]
Watts, D. J. Six Degrees: The Science of a Connected Age. W. W. Norton. 2004.
[9]
Watts, D. J., Dodds, P. S., and Newman M. E. J. 2002. Identity and Search in Social Networks. Science. 296, 5571, 1302--1305.
[10]
Watts, D. J., and Strogatz, S. H. 1998. Collective dynamics of /'small-world/' networks. Nature. 393, 6684, 440--442.
[11]
Zhang, L. and Tu, W. 2009. Six degree of speration in online societ. In Proc. WebSci'09: Society On-Line (Athens, Greece).

Cited By

View all
  • (2024)Mobile Forensics: Extracting Geo-Location Data from Photos on Android SmartphonesInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP960(1915-1921)Online publication date: 3-Oct-2024
  • (2024)From Cryptography to Steganography: Detecting Hidden Data in the Digital WorldInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP937(1908-1914)Online publication date: 3-Oct-2024
  • (2022)The evolving network model with community size and distance preferencesPhysica A: Statistical Mechanics and its Applications10.1016/j.physa.2022.127112596(127112)Online publication date: Jun-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
IIWAS '12: Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
December 2012
432 pages
ISBN:9781450313063
DOI:10.1145/2428736
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • @WAS: International Organization of Information Integration and Web-based Applications and Services

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 December 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Facebook
  2. graph database
  3. re-verification
  4. six degree of separation
  5. small world problem
  6. social networks
  7. the rule of 150

Qualifiers

  • Research-article

Conference

IIWAS '12
Sponsor:
  • @WAS

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Mobile Forensics: Extracting Geo-Location Data from Photos on Android SmartphonesInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP960(1915-1921)Online publication date: 3-Oct-2024
  • (2024)From Cryptography to Steganography: Detecting Hidden Data in the Digital WorldInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP937(1908-1914)Online publication date: 3-Oct-2024
  • (2022)The evolving network model with community size and distance preferencesPhysica A: Statistical Mechanics and its Applications10.1016/j.physa.2022.127112596(127112)Online publication date: Jun-2022
  • (2015)A method of designing a generic actor model for a professional social networkHuman-centric Computing and Information Sciences10.1186/s13673-015-0042-15:1Online publication date: 12-Aug-2015
  • (2014)Relationship-based information sharing in cloud-based decentralized social networksProceedings of the 4th ACM conference on Data and application security and privacy10.1145/2557547.2557574(297-304)Online publication date: 3-Mar-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media