skip to main content
10.1145/2675133.2675143acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

"You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength

Published: 28 February 2015 Publication History

Abstract

How effective are call and SMS logs in modeling tie strength? Frequency and duration of communication has long been cited as a major aspect of tie strength. Intuitively, this makes sense: people communicate with those that they feel close to. Highly cited research papers have pushed this idea further, using communication as a direct proxy for tie strength. However, this operationalization has not been validated. Our work evaluates this assumption. We collected call and SMS logs and ground truth relationship data from 36 participants. Consistent with theory, we found that frequent or long-duration communication likely indicates a strong tie. However, the use of call and SMS logs produced many errors in separating strong and weak ties, suggesting this approach is incomplete. Follow-up interviews indicate fundamental challenges for inferring tie strength from communication logs.

References

[1]
Ackerman, J. M., Kenrick, D. T., and Schaller, M. Is friendship akin to kinship? Evolution and Human Behavior 28, 5 (2007).
[2]
Allen, T. Managing the flow of scientific and technological information. 1966.
[3]
Backstrom, L. and Kleinberg, J. Romantic partnerships and the dispersion of social ties. In Proc. CSCW '14.
[4]
Burke, M. Reading, Writing, Relationships: The Impact of Social Network Sites on Relationships and WellBeing. 2011.
[5]
De Choudhury, M., Mason, W. A., Hofman, J. M., and Watts, D. J. Inferring relevant social networks from interpersonal communication. In Proc. WWW '10.
[6]
Christakis, N. A. and Fowler, J. H. Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. 2009.
[7]
Conti, M., Passarella, A., and Pezzoni, F. A model for the generation of social network graphs. In Proc. WWMMN '11.
[8]
Cranshaw, J., Toch, E., and Hong, J. Bridging the Gap Between Physical Location and Online Social Networks. In Proc. Ubicomp '10.
[9]
Cummings, J. N., Lee, J. B., and Kraut, R. Communication technology and friends during the transition from high school to college. In Computers, phones, and the Internet: Domesticating information technology. 2006.
[10]
Danezis, G. Inferring Privacy Policies for Social Networking Services. AISec, (2009).
[11]
Eagle, N., Pentland, A., and Lazer, D. Inferring Social Network Structure using Mobile Phone Data. PNAS 106, 36 (2009).
[12]
Eagle, N. and Pentland, A. Social serendipity: Mobilizing social software. IEEE Pervasive Computing 4, 2 (2005), 28--34.
[13]
Festinger, L. Informal social communication. PsychRev 57, 5 (1950), 271--282.
[14]
Gilbert, E. and Karahalios, K. Predicting tie strength with social media. (2009), 211--220.
[15]
Gliem, J. A. and Gliem, R. R. Calculating, Interpreting, And Reporting Cronbach's Alpha Reliability Coefficient For Likert-Type Scales. (2003).
[16]
Granovetter, M. The strength of weak ties. The American Journal of Sociology, (1973).
[17]
Granovetter, M. The Strength of Weak Ties: A Network Theory Revisited. Sociological Theory, (1983).
[18]
Hidalgo, C.A. and Rodriguez-Sickert, C. The dynamics of a mobile phone network. Physica A: Statistical Mechanics and its Applications 387, 2008, 3017--3024.
[19]
Hill, R. A. and Dunbar, R. I. M. Social network size in humans. Human Nature 14, (2003), 53--72.
[20]
Kim, J. and Zimmerman, J. Cherish. In Proc. CHI EA '06, (2006), 953.
[21]
Kim, T. H.-J., Yamada, A., Gligor, V., Hong, J., and Perrig, A. RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. Financial Cryptography and Data Security, (2013).
[22]
Marin, A. and Hampton, K. N. Simplifying the Personal Network Name Generator. Field Methods 19, 2007.
[23]
Marsden, P. V. and Campbell, K. E. Measuring tie strength. Social Forces 63, 1984, 482--501.
[24]
McCarty, C. Structure in personal networks. Journal of Social Structure 3, 1 (2005).
[25]
Mesch, G. S. Social context and communication channels choice among adolescents. Computers. Human Behavior 25, (2009), 244--251.
[26]
Min, J.-K., Wiese, J., Hong, J. I., and Zimmerman, J. Mining smartphone data to classify life-facets of social relationships. In Proc. CSCW '13.
[27]
Miritello, G., Moro, E., Lara, R., et al. Time as a limited resource: Communication strategy in mobile phone networks. Social Networks, (2013).
[28]
Neustaedter, C., Brush, A. J. B., Smith, M. A., and Fisher, D. The Social Network and Relationship Finder: Social Sorting for Email Triage. In Proc. CEAS '05.
[29]
Newcomb, T. The acquaintance process. New York: Holt, Rinehart, & Winston, 1961.
[30]
Odom, W., Zimmerman, J., and Forlizzi, J. Teenagers and Their Virtual Possessions: Design Opportunities and Issues. Proc. of CHI '11.
[31]
Onnela, J.-P., Saramäki, J., Hyvönen, J., et al. Structure and tie strengths in mobile communication networks. PNAS, (2007).
[32]
Pentland, A. Honest Signals: How They Shape Our World (Bradford Books). The MIT Press, 2008.
[33]
Ricken, S. T., Schuler, R. P., Grandhi, S. A., and Jones, Q. TellUsWho: Guided Social Network Data Collection. HICSS '10.
[34]
Roberts, S. G. B., Dunbar, R. I. M., Pollet, T. V., and Kuppens, and T. Exploring variation in active network size: Constraints and ego characteristics. Social Networks, (2009).
[35]
Roberts, S. G. B. and Dunbar, R. I. M. Communication in social networks: Effects of kinship, network size, and emotional closeness. Personal Relationships, (2011).
[36]
Spencer, L. and Pahl, R. Rethinking Friendship: Hidden Solidarities Today. 2006.
[37]
Wang, D., Pedreschi, D., Song, C., Giannotti, F., and Barabasi, A.-L. Human mobility, social ties, and link prediction. In Proc. KDD '11.
[38]
Wiese, J., Hong, J. I., and Zimmerman, J. Challenges and opportunities in data mining contact lists for inferring relationships. In Proc. Ubicomp '14.
[39]
Wiese, J., Kelley, P., Cranor, L. F., Dabbish, L., Hong, J. I., and Zimmerman, J. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In Proc. UbiComp '11.
[40]
Xiang, R., Neville, J., and Rogati, M. Modeling relationship strength in online social networks. In Proc. WWW '10, .
[41]
Zhou, W. X., Sornette, D., Hill, R. A., and Dunbar, R. I. M. Discrete hierarchical organization of social group sizes. In Proc RSBS '10.
[42]
Zipf, G. Human behavior and the principle of least effort. 1949.
[43]
Weka 3: Data Mining Software in Java.

Cited By

View all
  • (2023)Lengthy early morning instant messages reveal more than you think: Analysing interpersonal relationships using mobile communication metadataPervasive and Mobile Computing10.1016/j.pmcj.2023.10178191(101781)Online publication date: Apr-2023
  • (2023)What makes IM users (un)responsiveInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2022.102983172:COnline publication date: 1-Apr-2023
  • (2023)Analyzing text message linguistic features: Do people with depression communicate differently with their close and non-close contacts?Behaviour Research and Therapy10.1016/j.brat.2023.104342166(104342)Online publication date: Jul-2023
  • Show More Cited By

Index Terms

  1. "You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '15: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing
    February 2015
    1956 pages
    ISBN:9781450329224
    DOI:10.1145/2675133
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 February 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. smartphone
    2. social graph
    3. tie strength

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSCW '15
    Sponsor:

    Acceptance Rates

    CSCW '15 Paper Acceptance Rate 161 of 575 submissions, 28%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Lengthy early morning instant messages reveal more than you think: Analysing interpersonal relationships using mobile communication metadataPervasive and Mobile Computing10.1016/j.pmcj.2023.10178191(101781)Online publication date: Apr-2023
    • (2023)What makes IM users (un)responsiveInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2022.102983172:COnline publication date: 1-Apr-2023
    • (2023)Analyzing text message linguistic features: Do people with depression communicate differently with their close and non-close contacts?Behaviour Research and Therapy10.1016/j.brat.2023.104342166(104342)Online publication date: Jul-2023
    • (2022)Predicting Tie Strength with Ego Network StructuresJournal of Interactive Marketing10.1016/j.intmar.2020.10.00154:1(40-52)Online publication date: 31-Jan-2022
    • (2022)Beyond Pen and Paper: Reimagining Assessment of Personal Relationships and Quality of Life Using Digital TechnologiesQuantifying Quality of Life10.1007/978-3-030-94212-0_14(355-369)Online publication date: 14-Apr-2022
    • (2021)Personal Context from Mobile Phones—Case Study 5Intelligent Computing for Interactive System Design10.1145/3447404.3447424(341-376)Online publication date: 23-Feb-2021
    • (2021)Simulating systematic bias in attributed social networks and its effect on rankings of minority nodesApplied Network Science10.1007/s41109-021-00425-z6:1Online publication date: 2-Nov-2021
    • (2020)Machine Learning for Phone-Based Relationship EstimationProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33698203:4(1-23)Online publication date: 14-Sep-2020
    • (2020)Predicting mental health using smart-phone usage and sensor dataJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-020-02616-5Online publication date: 2-Nov-2020
    • (2019)Key individual identification using dimensional relevance in the stratum of networksJournal of Intelligent & Fuzzy Systems10.3233/JIFS-181517(1-15)Online publication date: 3-Aug-2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media