{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T05:47:02Z","timestamp":1648792022528},"reference-count":25,"publisher":"World Scientific Pub Co Pte Lt","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Advs. Complex Syst."],"published-print":{"date-parts":[[2009,2]]},"abstract":"<jats:p> Email graphs have been used to illustrate the general properties of social networks of communication and collaboration. However, increasingly, the majority of Internet traffic reflects opportunistic rather than symbiotic social relations. Here we use email data drawn from a large university to construct directed graphs of email exchange that quantify the differences between social and opportunistic behavior, represented by legitimate messages and spam, respectively. We show that while structural characteristics typical of other social networks are shared to a large extent by the legitimate component, they are not characteristic of opportunistic traffic. To complement the graph analysis, which suffers from incomplete knowledge of users external to the domain, we study temporal patterns of communication to show dynamical properties of email traffic. The results indicate that social email traffic has lower entropy (higher structural information) than opportunistic traffic for periods covering both working and non-working hours. We see in general that both social and opportunistic traffics are not random, and that social email shows stronger temporal structure with a high probability for long silences and bursts of a few messages. These findings offer insights into the fundamental differences between social and opportunistic behavior in email networks, and may generalize to the structure of opportunistic social relations in other environments. <\/jats:p>","DOI":"10.1142\/s0219525909002088","type":"journal-article","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T07:24:00Z","timestamp":1237274640000},"page":"99-112","source":"Crossref","is-referenced-by-count":5,"title":["QUANTIFYING SOCIAL AND OPPORTUNISTIC BEHAVIOR IN EMAIL NETWORKS"],"prefix":"10.1142","volume":"12","author":[{"given":"LUIZ H.","family":"GOMES","sequence":"first","affiliation":[{"name":"Computer Science Department, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil"}]},{"given":"VIRGILIO A. F.","family":"ALMEIDA","sequence":"additional","affiliation":[{"name":"Computer Science Department, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil"}]},{"given":"JUSSARA M.","family":"ALMEIDA","sequence":"additional","affiliation":[{"name":"Computer Science Department, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil"}]},{"given":"FERNANDO D. O.","family":"CASTRO","sequence":"additional","affiliation":[{"name":"Computer Science Department, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil"}]},{"given":"LU\u00cdS M. A.","family":"BETTENCOURT","sequence":"additional","affiliation":[{"name":"Theoretical Division, MS B284, Los Alamos National Laboratory, Los Alamos NM 87545, USA"},{"name":"Santa Fe Institute, 1399 Hyde Park Road, Santa Fe NM 87501, USA"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.036122"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.065103"},{"key":"rf4","volume-title":"Communities and Technologies","author":"Tyler J. R.","year":"2003"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.012582999"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00130-1"},{"key":"rf7","first-page":"4","volume":"61","author":"Guimer\u00e0 R.","journal-title":"J. Economic Behaviour"},{"key":"rf9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.178702"},{"key":"rf10","first-page":"10","volume":"50","author":"Jagatic T.","journal-title":"Commun. ACM"},{"key":"rf12","first-page":"6","volume":"11","author":"Heymann P.","journal-title":"IEEE Internet Computing"},{"key":"rf13","first-page":"8","volume":"41","author":"Cranor L.","journal-title":"Communications of the ACM"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.22.1.213"},{"key":"rf15","first-page":"5757","volume":"311","author":"Kossinets J. G.","journal-title":"Science"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.035101"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0405728101"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.035103"},{"key":"rf20","first-page":"7","volume":"64","author":"Gomes L.","journal-title":"Performance Evaluation"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.208701"},{"key":"rf25","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MC.2005.132","volume":"38","author":"Boykin P. O.","journal-title":"IEEE Computer"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1038\/nature03459"},{"key":"rf27","first-page":"207","volume":"435","author":"Stouffer D. B.","journal-title":"Nature"},{"key":"rf28","first-page":"18152","volume":"105","author":"Malmgren R. D.","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"rf29","doi-asserted-by":"publisher","DOI":"10.1162\/089976601753195969"},{"key":"rf30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.93.268701"},{"key":"rf32","volume-title":"Spikes: Exploring the Neural Code","author":"Rieke F.","year":"1997"},{"key":"rf33","first-page":"1","volume":"14","author":"Veloso E.","journal-title":"IEEE\/ACM Trans. on Networking"}],"container-title":["Advances in Complex Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219525909002088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T16:26:51Z","timestamp":1565108811000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219525909002088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2]]},"references-count":25,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2009,2]]}},"alternative-id":["10.1142\/S0219525909002088"],"URL":"https:\/\/doi.org\/10.1142\/s0219525909002088","relation":{},"ISSN":["0219-5259","1793-6802"],"issn-type":[{"value":"0219-5259","type":"print"},{"value":"1793-6802","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,2]]}}}