{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:01:04Z","timestamp":1775152864222,"version":"3.50.1"},"reference-count":154,"publisher":"Emerald","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,30]]},"abstract":"<jats:p>Relationships make social media social. But, not all relationships are created equal. We have colleagues with whom we correspond intensely, but not deeply; we have childhood friends we consider close, even if we fell out of touch. Social media, however, treats everybody the same: someone is either a completely trusted friend or a total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic social science has investigated for decades under the name tie strength, a term for the strength of a relationship between two people. Despite many compelling findings along this line of research, social media does not incorporate tie strength or its lessons. Neither does most research on large-scale social phenomena.<\/jats:p>\n                  <jats:p>Simply put, we do not understand a basic property of relationships expressed online. This monograph takes a wide view of the problem, merging the theories behind tie strength with the data from social media. We show how to reconstruct tie strength from digital traces in online social media, and how to apply it as a tool in design and analysis. Specifically, this article makes two core contributions. First, it offers a rich, high-accuracy and general way to reconstruct tie strength from digital traces, traces like recency and a message\u2019s emotional content. For example, the model can split users into strong and weak ties with nearly 89% accuracy. We argue that it also offers us a chance to rethink many of social media\u2019s most fundamental design elements. Next, we showcase an example of how we can redesign social media using tie strength: a Twitter application open to anyone on the internet which puts tie strength at the heart of its design. Through this application, called We Meddle, we show that the tie strength model generalizes to a new online community, and that it can solve real people\u2019s practical problems with social media. It may be fair to see this monograph as linking the online to the offline; that is, it connects the traces we leave in social media to how we feel about relationships in real life. We conclude the article by reflecting on other ways design might appropriate ideas like tie strength in social computing.<\/jats:p>","DOI":"10.1561\/1100000044","type":"journal-article","created":{"date-parts":[[2014,10,30]],"date-time":"2014-10-30T10:48:44Z","timestamp":1414666124000},"page":"237-349","source":"Crossref","is-referenced-by-count":2,"title":["Computing and Building Around Tie Strength in Social Media"],"prefix":"10.1561","volume":"7","author":[{"given":"Eric","family":"Gilbert","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology , Atlanta,","place":["USA"]}]},{"given":"Karrie","family":"Karahalios","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign ,","place":["USA"]}]}],"member":"140","published-online":{"date-parts":[[2014,10,30]]},"reference":[{"issue":"3","key":"2026040213265844000_ref001","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","article-title":"Friends and neighbors on the Web","volume":"25","author":"Adamic","year":"2003","journal-title":"Social Networks"},{"issue":"1","key":"2026040213265844000_ref002","doi-asserted-by":"crossref","first-page":"17","DOI":"10.2307\/4134367","article-title":"Social capital: Prospects for a new concept","volume":"27","author":"Adler","year":"2002","journal-title":"Academy of Management Review"},{"issue":"1","key":"2026040213265844000_ref003","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","article-title":"Statistical mechanics of complex networks","volume":"74","author":"Albert","year":"2002","journal-title":"Reviews of Modern Physics"},{"key":"2026040213265844000_ref004","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/1281192.1281202","article-title":"Show me the money!: Deriving the pricing power of product features by mining consumer reviews","volume-title":"KDD \u201907: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Archak","year":"2007"},{"key":"2026040213265844000_ref005","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/1150402.1150412","article-title":"Group formation in large social networks: Membership, growth, and evolution","volume-title":"KDD \u201906: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Backstrom","year":"2006"},{"key":"2026040213265844000_ref006","first-page":"10","article-title":"Using lexical chains for text summarization","volume-title":"Proceedings of the ACL Workshop on Intelligent Scalable Text Summarization","author":"Barzilay","year":"1997"},{"issue":"1","key":"2026040213265844000_ref007","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1086\/386272","article-title":"Chains of affection: The structure of adolescent romantic and sexual networks","volume":"110","author":"Bearman","year":"2004","journal-title":"American Journal of Sociology"},{"key":"2026040213265844000_ref008","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/192426.192435","article-title":"Pad++: A zooming graphical interface for exploring alternate interface physics","volume-title":"UIST \u201994: Proceedings of the Annual ACM Symposium on User Interface Software and Technology","author":"Bederson","year":"1994"},{"key":"2026040213265844000_ref009","volume-title":"The Wealth of Networks: How Social Production Transforms Markets and Freedom","author":"Benkler","year":"2006"},{"key":"2026040213265844000_ref010","unstructured":"[10]\n          \n            \n              J.\n              Berger\n             and K.Milkman. Social transmission and viral culture. Preprint,  Retrieved August 28, 2010. Available at: http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1528077,2009."},{"issue":"1","key":"2026040213265844000_ref011","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1146\/annurev.an.13.100184.002431","article-title":"The problem of informant accuracy: The validity of retrospective data","volume":"13","author":"Bernard","year":"1984","journal-title":"Annual Review of Anthropology"},{"issue":"3","key":"2026040213265844000_ref012","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0378-8733(79)90014-5","article-title":"Informant accuracy in social network data IV: A comparison of clique-level structure in behavioral and cognitive network data","volume":"2","author":"Bernard","year":"1979","journal-title":"Social Networks"},{"issue":"5916","key":"2026040213265844000_ref013","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1126\/science.1165821","article-title":"Network analysis in the social sciences","volume":"323","author":"Borgatti","year":"2009","journal-title":"Science"},{"key":"2026040213265844000_ref014","article-title":"Faceted id\/entity: Managing representation in a digital world","volume-title":"MIT Master\u2019s Thesis","author":"Boyd","year":"2002"},{"issue":"12","key":"2026040213265844000_ref015","article-title":"Friends, friendsters, and top 8: Writing community into being on social network sites","volume":"11","author":"Boyd","year":"2006","journal-title":"First Monday"},{"key":"2026040213265844000_ref016","volume-title":"Structural Holes: The Social Structure of Competition","author":"Burt","year":"1995"},{"key":"2026040213265844000_ref017","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/S0191-3085(00)22009-1","article-title":"The network structure of social capital","volume":"22","author":"Burt","year":"2000","journal-title":"Research in Organizational Behavior"},{"issue":"6","key":"2026040213265844000_ref018","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1086\/228667","article-title":"Social contagion and innovation: Cohesion versus structural equivalence","volume":"92","author":"Burt","year":"1987","journal-title":"The American Journal of Sociology"},{"issue":"2","key":"2026040213265844000_ref019","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1086\/421787","article-title":"Structural holes and good ideas","volume":"110","author":"Burt","year":"2004","journal-title":"American Journal of Sociology"},{"issue":"5939","key":"2026040213265844000_ref020","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1126\/science.1171022","article-title":"Revisiting the foundations of network analysis","volume":"325","author":"Butts","year":"2009","journal-title":"Science"},{"issue":"2","key":"2026040213265844000_ref021","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1103\/RevModPhys.81.591","article-title":"Statistical physics of social dynamics","volume":"81","author":"Castellano","year":"2009","journal-title":"Reviews of Modern Physics"},{"issue":"3","key":"2026040213265844000_ref022","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1086\/521848","article-title":"Complex contagions and the weakness of long ties","volume":"113","author":"Centola","year":"2007","journal-title":"American Journal of Sociology"},{"key":"2026040213265844000_ref023","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1145\/1281192.1281214","article-title":"Discovering the hidden structure of house prices with a non-parametric latent manifold model","volume-title":"KDD \u201907: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Chopra","year":"2007"},{"issue":"4","key":"2026040213265844000_ref024","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1056\/NEJMsa066082","article-title":"The spread of obesity in a large social network over 32 years","volume":"357","author":"Christakis","year":"2007","journal-title":"New England Journal of Medicine"},{"issue":"21","key":"2026040213265844000_ref025","doi-asserted-by":"crossref","first-page":"2249","DOI":"10.1056\/NEJMsa0706154","article-title":"The collective dynamics of smoking in a large social network","volume":"358","author":"Christakis","year":"2008","journal-title":"New England Journal of Medicine"},{"key":"2026040213265844000_ref026","volume-title":"Arenas of Language Use","author":"Clark","year":"1993"},{"issue":"3","key":"2026040213265844000_ref027","first-page":"1","article-title":"Social integration and health: The case of the common cold","volume":"1","author":"Cohen","year":"2000","journal-title":"Journal of Social Structure"},{"issue":"4","key":"2026040213265844000_ref028","doi-asserted-by":"crossref","first-page":"253","DOI":"10.2307\/2785979","article-title":"The diffusion of an innovation among physicians","volume":"20","author":"Coleman","year":"1957","journal-title":"Sociometry"},{"key":"2026040213265844000_ref029","first-page":"112","article-title":"Docuburst: Document content visualization using language structure","volume-title":"Proceedings of IEEE Symposium on Information Visualization (InfoVis 2006)","author":"Collins","year":"2006"},{"key":"2026040213265844000_ref030","unstructured":"[30]\n          \n            comScore\n          . comscore media metrix ranks top 50 u.s. web properties for june 2008. 2008. Retrieved from http:\/\/www.comscore.com\/press\/release.asp?press=2339."},{"issue":"2","key":"2026040213265844000_ref031","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1287\/orsc.7.2.119","article-title":"The kindness of strangers: The usefulness of electronic weak ties for technical advice","volume":"7","author":"Constant","year":"1996","journal-title":"Organization Science"},{"key":"2026040213265844000_ref032","first-page":"32","article-title":"Suggestbot: Using intelligent task routing to help people find work in wikipedia","volume-title":"IUI \u201907: Proceedings of the International Conference on Intelligent User Interfaces","author":"Cosley","year":"2007"},{"issue":"3","key":"2026040213265844000_ref033","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1086\/268394","article-title":"The ipsative process to reduce response set bias","volume":"41","author":"Cunningham","year":"1977","journal-title":"Public Opinion Quarterly"},{"key":"2026040213265844000_ref034","first-page":"301","article-title":"Inferring relevant social networks from interpersonal communication","volume-title":"WWW 2010: Proceedings of the International Conference on World Wide Web","author":"Choudhury","year":"2010"},{"key":"2026040213265844000_ref035","first-page":"281","article-title":"Using latent semantic analysis to improve access to textual information","volume-title":"CHI \u201988: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Dumais","year":"1988"},{"key":"2026040213265844000_ref036","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, Crowds, and Markets: Reasoning About a Highly Connected World","author":"Easley","year":"2010"},{"key":"2026040213265844000_ref037","article-title":"Sentiwordnet: A publicly available lexical resource for opinion mining","author":"Esuli","year":"2006"},{"key":"2026040213265844000_ref038","article-title":"Personal map: Automatically modeling the user\u2019s online social network","volume-title":"Proceedings of INTERACT\u201903","author":"Farnham","year":"2003"},{"key":"2026040213265844000_ref039","volume-title":"Social Pressures in Informal Groups","author":"Festinger","year":"1963"},{"key":"2026040213265844000_ref040","article-title":"Using social sorting to enhance email management","volume-title":"Human-Computer Interaction Consortium (HCIC\u201906)","author":"Fisher","year":"2006"},{"issue":"3","key":"2026040213265844000_ref041","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1023\/A:1012474916001","article-title":"Efficient SVM regression training with SMO","volume":"46","author":"Flake","year":"2002","journal-title":"Machine Learning"},{"key":"2026040213265844000_ref042","doi-asserted-by":"crossref","first-page":"a2338","DOI":"10.1136\/bmj.a2338","article-title":"Dynamic spread of happiness in a large social network: Longitudinal analysis over 20 years in the framingham heart study","volume":"337","author":"Fowler","year":"2008","journal-title":"British Medical Journal"},{"key":"2026040213265844000_ref043","volume-title":"Information Retrieval: Data Structures and Algorithms","author":"Frakes","year":"1992"},{"issue":"1","key":"2026040213265844000_ref044","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1086\/229972","article-title":"The sociological concept of \u201cgroup\u201d an empirical test of two models","volume":"98","author":"Freeman","year":"1992","journal-title":"The American Journal of Sociology"},{"issue":"1","key":"2026040213265844000_ref045","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1086\/208532","article-title":"Purchasing behavior in embedded markets","volume":"17","author":"Frenzen","year":"1990","journal-title":"The Journal of Consumer Research"},{"issue":"4","key":"2026040213265844000_ref046","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1016\/0378-8733(80)90006-4","article-title":"A test of structural features of granovetter\u2019s strength of weak ties theory","volume":"2","author":"Friedkin","year":"1980","journal-title":"Social Networks"},{"key":"2026040213265844000_ref047","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1145\/1281192.1281226","article-title":"Finding tribes: Identifying close-knit individuals from employment patterns","volume-title":"KDD \u201907: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Friedland","year":"2007"},{"key":"2026040213265844000_ref048","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/1454008.1454020","article-title":"Personalized, interactive tag recommendation for flickr","volume-title":"RecSys \u201908: Proceedings of the 2008 ACM Conference on Recommender Systems","author":"Garg","year":"2008"},{"key":"2026040213265844000_ref049","first-page":"1303","article-title":"The impact of delayed visual feedback on collaborative performance","volume-title":"Proceedings of CHI","author":"Gergle","year":"2006"},{"key":"2026040213265844000_ref050","first-page":"211","article-title":"Predicting tie strength with social media","volume-title":"CHI \u201909: Proceedings of the International Conference on Human Factors in Computing Systems","author":"Gilbert","year":"2009"},{"key":"2026040213265844000_ref051","first-page":"1603","article-title":"The network in the garden: An empirical analysis of social media in rural life","volume-title":"CHI \u201908: Proceeding of the Annual SIGCHI Conference on Human Factors in Computing Systems","author":"Gilbert","year":"2008"},{"key":"2026040213265844000_ref052","volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research","author":"Glaser","year":"1967"},{"key":"2026040213265844000_ref053","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84628-905-7_3","article-title":"Rhythms of social interaction: Messaging within a massive online network","volume-title":"3rd International Conference on Communities and Technologies (CT2007)","author":"Golder","year":"2007"},{"key":"2026040213265844000_ref054","volume-title":"Getting a Job: A Study of Contacts and Careers","author":"Granovetter","year":"1974"},{"issue":"6","key":"2026040213265844000_ref055","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1086\/226707","article-title":"Threshold models of collective behavior","volume":"83","author":"Granovetter","year":"1978","journal-title":"The American Journal of Sociology"},{"key":"2026040213265844000_ref056","doi-asserted-by":"crossref","first-page":"201","DOI":"10.2307\/202051","article-title":"The strength of weak ties: A network theory revisited","volume":"1","author":"Granovetter","year":"1983","journal-title":"Sociological Theory"},{"issue":"1","key":"2026040213265844000_ref057","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1257\/0895330053147958","article-title":"The impact of social structure on economic outcomes","volume":"19","author":"Granovetter","year":"2005","journal-title":"Journal of Economic Perspectives"},{"issue":"6","key":"2026040213265844000_ref058","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1086\/225469","article-title":"The strength of weak ties","volume":"78","author":"Granovetter","year":"1973","journal-title":"The American Journal of Sociology"},{"key":"2026040213265844000_ref059","doi-asserted-by":"crossref","first-page":"xiv","DOI":"10.1109\/CTS.2009.5067428","article-title":"Venturing into social software","volume-title":"CTS \u201909: Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems","author":"Greif","year":"2009"},{"key":"2026040213265844000_ref060","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/62266.62273","article-title":"Why CSCW applications fail: Problems in the design and evaluation of organizational interfaces","volume-title":"CSCW \u201988: Proceedings of the 1988 ACM Conference on Computer-Supported Cooperative Work","author":"Grudin","year":"1988"},{"key":"2026040213265844000_ref061","first-page":"491","article-title":"Information diffusion through blogspace","volume-title":"Proceedings of WWW 2004","author":"Gruhl","year":"2004"},{"issue":"4","key":"2026040213265844000_ref062","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1046\/j.1535-6841.2003.00057.x","article-title":"Neighboring in netville: How the internet supports community and social capital in a wired suburb","volume":"2","author":"Hampton","year":"2003","journal-title":"City and Community"},{"issue":"1","key":"2026040213265844000_ref063","doi-asserted-by":"crossref","first-page":"82","DOI":"10.2307\/2667032","article-title":"The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits","volume":"44","author":"Hansen","year":"1999","journal-title":"Administrative Science Quarterly"},{"issue":"1","key":"2026040213265844000_ref064","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1111\/j.1083-6101.2007.00396.x","article-title":"Whose space? differences among users and non-users of social network sites","volume":"13","author":"Hargittai","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2026040213265844000_ref065","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/HICSS.2001.926199","article-title":"The strength and the impact of new media, system sciences, 2001","volume-title":"Proceedings of the Annual Hawaii International Conference on System Sciences","author":"Haythornthwaite","year":"2001"},{"issue":"5","key":"2026040213265844000_ref066","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1080\/01972240290108195","article-title":"Strong, weak, and latent ties and the impact of new media","volume":"18","author":"Haythornthwaite","year":"2002","journal-title":"Information Society"},{"issue":"12","key":"2026040213265844000_ref067","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1002\/(SICI)1097-4571(1998)49:12<1101::AID-ASI6>3.0.CO;2-Z","article-title":"Work, friendship, and media use for information exchange in a networked organization","volume":"49","author":"Haythornthwaite","year":"1998","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"1","key":"2026040213265844000_ref068","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1080\/00223980.1946.9917275","article-title":"Attitudes and cognitive organization","volume":"21","author":"Heider","year":"1946","journal-title":"Journal of Psychology"},{"key":"2026040213265844000_ref069","doi-asserted-by":"crossref","DOI":"10.1145\/800103.803348","article-title":"Issues in message technology","volume-title":"Proceedings of the Symposium on Data Communications","author":"Henderson Jr","year":"1977"},{"issue":"5837","key":"2026040213265844000_ref070","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1126\/science.1144581","article-title":"The product space conditions the development of nations","volume":"317","author":"Hidalgo","year":"2007","journal-title":"Science"},{"key":"2026040213265844000_ref071","unstructured":"[71]\n          \n            \n              B. J.\n              Hogan\n            \n          . Networking in everyday life. University of Toronto, PhD Thesis. Department of Sociology, 2009."},{"issue":"2","key":"2026040213265844000_ref072","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/1665997.1666004","article-title":"Don\u2019t ask me: Designing social q&a services","volume":"16","author":"Hsieh","year":"2009","journal-title":"Crossroads"},{"issue":"1","key":"2026040213265844000_ref073","article-title":"Social networks that matter: Twitter under the microscope","volume":"14","author":"Huberman","year":"2008","journal-title":"First Monday"},{"key":"2026040213265844000_ref074","unstructured":"[74]\n          \n            \n              S. T.\n              Iqbal\n            \n          . A framework for intelligent notification management in multitasking domains. University of Illinois, PhD thesis. Department of Computer Science, 2008."},{"issue":"4","key":"2026040213265844000_ref075","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1093\/revfin\/hhm009","article-title":"Information diffusion effects in individual investors\u2019 common stock purchases: Covet thy neighbors\u2019 investment choices","volume":"20","author":"Ivkovic","year":"2005","journal-title":"Review of Financial Studies"},{"key":"2026040213265844000_ref076","doi-asserted-by":"crossref","DOI":"10.1515\/9781400833993","volume-title":"Social and Economic Networks","author":"Jackson","year":"2008"},{"key":"2026040213265844000_ref077","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v3i1.13957","article-title":"Using transactional information to predict link strength in online social networks","volume-title":"Proceedings ICWSM","author":"Kahanda","year":"2009"},{"key":"2026040213265844000_ref078","volume-title":"Personal Influence: The Part Played By People in the Flow of Mass Communications","author":"Katz","year":"2006"},{"key":"2026040213265844000_ref079","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1145\/956750.956769","article-title":"Maximizing the spread of influence through a social network","volume-title":"KDD \u201903: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Kempe","year":"2003"},{"key":"2026040213265844000_ref080","first-page":"215","article-title":"Beyond wikipedia: Coordination and conflict in online production groups","volume-title":"CSCW 2010: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work","author":"Kittur","year":"2010"},{"issue":"2","key":"2026040213265844000_ref081","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.socnet.2005.01.006","article-title":"Social network research and human subjects protection: Towards more effective infectious disease control","volume":"27","author":"Klovdahl","year":"2005","journal-title":"Social Networks"},{"key":"2026040213265844000_ref082","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1145\/1401890.1401945","article-title":"The structure of information pathways in a social communication network","volume-title":"KDD \u201908: Proceeding of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Kossinets","year":"2008"},{"issue":"5757","key":"2026040213265844000_ref083","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1126\/science.1116869","article-title":"Empirical analysis of an evolving social network","volume":"311","author":"Kossinets","year":"2006","journal-title":"Science"},{"key":"2026040213265844000_ref084","first-page":"216","volume-title":"Networks and Organizations: Structure, Form, and Action","author":"Krackhardt","year":"1993"},{"issue":"2","key":"2026040213265844000_ref085","doi-asserted-by":"crossref","first-page":"123","DOI":"10.2307\/2786835","article-title":"Informal networks and organizational crises: An experimental simulation","volume":"51","author":"Krackhardt","year":"1988","journal-title":"Social Psychology Quarterly"},{"key":"2026040213265844000_ref086","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1037\/0003-066X.53.9.1017","article-title":"Internet paradox: A social technology that reduces social involvement and psychological well-being?","volume":"53","author":"Kraut","year":"1998","journal-title":"American Psychologist"},{"key":"2026040213265844000_ref087","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1145\/1772690.1772751","article-title":"What is twitter, a social network or a news media?","volume-title":"WWW \u201910: Proceedings of the International Conference on World Wide Web","author":"Kwak","year":"2010"},{"key":"2026040213265844000_ref088","first-page":"721","article-title":"Changes in participation and perception of facebook","volume-title":"CSCW 2008: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work","author":"Lampe","year":"2008"},{"key":"2026040213265844000_ref089","unstructured":"[89]\n          \n            \n              T.\n              Lau\n            \n          . Venture research. communications of the acm blog. 2009. Available from: http:\/\/cacm.acm.org\/blogs\/blog-cacm\/38421-venture-research\/fulltext."},{"issue":"4909","key":"2026040213265844000_ref090","doi-asserted-by":"crossref","first-page":"1186","DOI":"10.1126\/science.2543079","article-title":"Monitoring the AIDS epidemic in the united states: A network approach","volume":"244","author":"Laumann","year":"1989","journal-title":"Science"},{"issue":"5917","key":"2026040213265844000_ref091","first-page":"721","article-title":"Computational social science","volume":"323","author":"Lazer","journal-title":"Science"},{"issue":"1","key":"2026040213265844000_ref092","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1232722.1232727","article-title":"The dynamics of viral marketing","volume":"1","author":"Leskovec","year":"2007","journal-title":"ACM Transactions on the Web"},{"key":"2026040213265844000_ref093","first-page":"1361","article-title":"Signed networks in social media","volume-title":"CHI 2010: Proceedings of the Annual SIGCHI Conference on Human Factors in Computing Systems","author":"Leskovec","year":"2010"},{"issue":"11","key":"2026040213265844000_ref094","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1287\/mnsc.1030.0136","article-title":"The strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer","volume":"50","author":"Levin","year":"2004","journal-title":"Management Science"},{"key":"2026040213265844000_ref095","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1145\/956863.956972","article-title":"The link prediction problem for social networks","volume-title":"CIKM \u201903: Proceedings of the International Conference on Information and Knowledge Management","author":"Liben-Nowell","year":"2003"},{"issue":"12","key":"2026040213265844000_ref096","doi-asserted-by":"crossref","first-page":"4633","DOI":"10.1073\/pnas.0708471105","article-title":"Tracing information flow on a global scale using internet chain-letter data","volume":"105","author":"Liben-Nowell","year":"2008","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"2026040213265844000_ref097","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1145\/1280680.1280696","article-title":"Facemail: Showing faces of recipients to prevent misdirected email","volume-title":"Proceedings of the Symposium on Usable Privacy and Security","author":"Lieberman","year":"2007"},{"issue":"2","key":"2026040213265844000_ref098","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1177\/004912417800700203","article-title":"Analyzing the instrumental use of relations in the context of social structure","volume":"7","author":"Lin","year":"1978","journal-title":"Sociological Methods & Research"},{"issue":"4","key":"2026040213265844000_ref099","doi-asserted-by":"crossref","first-page":"393","DOI":"10.2307\/2095260","article-title":"Social resources and strength of ties: Structural factors in occupational status attainment","volume":"46","author":"Lin","year":"1981","journal-title":"American Sociological Review"},{"issue":"1","key":"2026040213265844000_ref100","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1146\/annurev.soc.28.110601.141117","article-title":"From factors to actors: Computational sociology and agent-based modeling","volume":"28","author":"Macy","year":"2002","journal-title":"Annual Review of Sociology"},{"issue":"4","key":"2026040213265844000_ref101","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.socnet.2004.06.001","article-title":"Are respondents more likely to list alters with certain characteristics?: Implications for name generator data","volume":"26","author":"Marin","year":"2004","journal-title":"Social Networks"},{"issue":"1","key":"2026040213265844000_ref102","doi-asserted-by":"crossref","first-page":"122","DOI":"10.2307\/2095397","article-title":"Core discussion networks of americans","volume":"52","author":"Marsden","year":"1987","journal-title":"American Sociological Review"},{"issue":"1","key":"2026040213265844000_ref103","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1146\/annurev.so.16.080190.002251","article-title":"Network data and measurement","volume":"16","author":"Marsden","year":"1990","journal-title":"Annual Review of Sociology"},{"issue":"2","key":"2026040213265844000_ref104","doi-asserted-by":"crossref","first-page":"482","DOI":"10.2307\/2579058","article-title":"Measuring tie strength","volume":"63","author":"Marsden","year":"1984","journal-title":"Social Forces"},{"key":"2026040213265844000_ref105","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","article-title":"Birds of a feather: Homophily in social networks","volume":"27","author":"Mcpherson","year":"2001","journal-title":"Annual Review of Sociology"},{"key":"2026040213265844000_ref106","article-title":"The Santa Barbara Independent","volume-title":"Caught on the Web: Internet Used More and More Often in Criminal Investigations","author":"Meagher","year":"2008"},{"issue":"1","key":"2026040213265844000_ref107","first-page":"60","article-title":"The small world problem","volume":"2","author":"Milgram","year":"1967","journal-title":"Psychology Today"},{"key":"2026040213265844000_ref108","first-page":"51","volume-title":"The Individual in a Social World","author":"Milgram","year":"1977"},{"key":"2026040213265844000_ref109","article-title":"The social network and relationship finder: Social sorting for email triage","volume-title":"Conference on E-mail and Anti-Spam","author":"Neustaedter","year":"2005"},{"issue":"23","key":"2026040213265844000_ref110","doi-asserted-by":"crossref","first-page":"8577","DOI":"10.1073\/pnas.0601602103","article-title":"Modularity and community structure in networks","volume":"103","author":"Newman","year":"2006","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"2026040213265844000_ref111","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1145\/956863.956972","article-title":"The link prediction problem for social networks","volume-title":"CIKM \u201903: Proceedings of the International Conference on Information and Knowledge Management","author":"Nowell","year":"2003"},{"issue":"2","key":"2026040213265844000_ref112","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1207\/S15327051HCI1523_4","article-title":"Distance matters","volume":"15","author":"Olson","year":"2000","journal-title":"Human-computer Interaction"},{"issue":"18","key":"2026040213265844000_ref113","doi-asserted-by":"crossref","first-page":"7332","DOI":"10.1073\/pnas.0610245104","article-title":"Structure and tie strengths in mobile communication networks","volume":"104","author":"Onnela","year":"2006","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"2026040213265844000_ref114","doi-asserted-by":"crossref","first-page":"79","DOI":"10.3115\/1118693.1118704","article-title":"Thumbs up?: Sentiment classification using machine learning techniques","volume-title":"EMNLP","author":"Pang","year":"2002"},{"issue":"4","key":"2026040213265844000_ref115","doi-asserted-by":"crossref","DOI":"10.1111\/j.1083-6101.1996.tb00176.x","article-title":"Making friends in cyberspace","volume":"1","author":"Parks","year":"1996","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2026040213265844000_ref116","volume-title":"Linguistic Inquiry and Word Count","author":"Pennebaker","year":"1999"},{"key":"2026040213265844000_ref117","doi-asserted-by":"crossref","first-page":"i152","DOI":"10.1136\/sti.78.suppl_1.i152","article-title":"Sexual network structure as an indicator of epidemic phase","volume":"78","author":"Potterat","year":"2002","journal-title":"Sexually Transmitted Infections"},{"issue":"6","key":"2026040213265844000_ref118","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.tree.2005.04.004","article-title":"Network thinking in ecology and evolution","volume":"20","author":"Proulx","year":"2005","journal-title":"Trends in Ecology & Evolution"},{"key":"2026040213265844000_ref119","unstructured":"[119]\n          \n            \n              Rapleaf\n            \n          . Rapleaf study of social network users vs. age. 2008. Available from http:\/\/business.rapleaf.com\/company%5C_press%5C_2008%5C_06%5C_18.html."},{"issue":"4","key":"2026040213265844000_ref120","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1287\/orsc.12.4.502.10637","article-title":"Networks, diversity, and productivity: The social capital of corporate R&D teams","volume":"12","author":"Reagans","year":"2001","journal-title":"Organization Science"},{"issue":"7191","key":"2026040213265844000_ref121","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1038\/453047a","article-title":"Networks: Teasing out the missing links","volume":"453","author":"Redner","year":"2008","journal-title":"Nature"},{"key":"2026040213265844000_ref122","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3115\/1119355.1119369","article-title":"Learning extraction patterns for subjective expressions","volume-title":"Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing","author":"Riloff","year":"2003"},{"key":"2026040213265844000_ref123","volume-title":"Diffusion of Innovations","author":"Rogers","year":"1995"},{"issue":"12","key":"2026040213265844000_ref124","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1097\/00002030-199812000-00016","article-title":"Social network dynamics and HIV transmission","volume":"12","author":"Rothenberg","year":"1998","journal-title":"Aids"},{"issue":"1","key":"2026040213265844000_ref125","first-page":"15","article-title":"The diffusion of hybrid seed corn in two iowa communities","volume":"8","author":"Ryan","year":"1944","journal-title":"Rural Sociology"},{"issue":"2","key":"2026040213265844000_ref126","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/S0306-4573(96)00062-3","article-title":"Automatic text structuring and summarization","volume":"33","author":"Salton","year":"1997","journal-title":"Information Process Management"},{"issue":"4","key":"2026040213265844000_ref127","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/BF00846149","article-title":"The health-related functions of social support","volume":"4","author":"Schaefer","year":"1981","journal-title":"Journal of Behavioral Medicine"},{"issue":"2","key":"2026040213265844000_ref128","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1111\/1539-6924.00306","article-title":"A social network contagion theory of risk perception","volume":"23","author":"Scherer","year":"2003","journal-title":"Risk Analysis"},{"issue":"1","key":"2026040213265844000_ref129","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.physa.2006.11.072","article-title":"Networks of strong ties","volume":"378","author":"Shi","year":"2007","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"issue":"1","key":"2026040213265844000_ref130","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1111\/j.1540-5907.2008.00361.x","article-title":"Social networks and collective action","volume":"53","author":"Siegel","year":"2009","journal-title":"American Journal of Political Science"},{"key":"2026040213265844000_ref131","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1145\/365024.365073","article-title":"Visualization components for persistent conversations","volume-title":"CHI \u201901: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Smith","year":"2001"},{"key":"2026040213265844000_ref132","article-title":"Inducing a network influence structure from multiple diffusion processes","volume-title":"Annual Meeting of American Sociological Association","author":"Strang","year":"1996"},{"issue":"1","key":"2026040213265844000_ref133","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1146\/annurev.soc.24.1.265","article-title":"Diffusion in organizations and social movements: From hybrid corn to poison pills","volume":"24","author":"Strang","year":"1998","journal-title":"Annual Review of Sociology"},{"key":"2026040213265844000_ref134","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v3i1.13947","article-title":"Gesundheit! Modeling contagion through facebook news feed","volume-title":"Proceedings ICWSM","author":"Sun","year":"2009"},{"key":"2026040213265844000_ref135","unstructured":"[135]\n          \n            \n              E.\n              Tahmincioglu\n            \n          . Facebook friends as job references?. 2008. Retrieved September 14, 2008. Available from http:\/\/www.msnbc.msn.com\/id\/26223330."},{"key":"2026040213265844000_ref136","doi-asserted-by":"crossref","first-page":"327","DOI":"10.3115\/1610075.1610122","article-title":"Get out the vote: Determining support or opposition from congressional floor-debate transcripts","volume-title":"EMNLP","author":"Thomas","year":"2006"},{"issue":"4","key":"2026040213265844000_ref137","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1177\/000312249906400402","article-title":"Embeddedness in the making of financial capital: How social relations and networks benefit firms seeking financing","volume":"64","author":"Uzzi","year":"1999","journal-title":"American Sociological Review"},{"key":"2026040213265844000_ref138","unstructured":"[138]\n          \n            \n              S.\n              van Dongen\n            \n          . Graph clustering by flow simulation. University of Utrecht. PhD Article, 2000."},{"issue":"6","key":"2026040213265844000_ref139","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1109\/TVCG.2007.70577","article-title":"Manyeyes: A site for visualization at internet scale","volume":"13","author":"Vi\u00e9gas","year":"2007","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"2026040213265844000_ref140","first-page":"575","article-title":"Studying cooperation and conflict between authors with history flow visualizations","volume-title":"CHI \u201904: Proceedings of the 2004 Conference on Human Factors in Computing Systems","author":"Vi\u00e9gas","year":"2004"},{"key":"2026040213265844000_ref141","doi-asserted-by":"crossref","DOI":"10.1145\/1592665.1592675","article-title":"On the evolution of user interaction in facebook","volume-title":"Proceedings of the ACM Workshop on Online Social Networks","author":"Viswanath","year":"2009"},{"key":"2026040213265844000_ref142","first-page":"110","article-title":"Arc diagrams: Visualizing structure in strings","volume-title":"Information Visualization, IEEE Symposium on Information Visualization","author":"Wattenberg","year":"2002"},{"key":"2026040213265844000_ref143","doi-asserted-by":"crossref","DOI":"10.1109\/TVCG.2008.172","article-title":"The word tree, an interactive visual concordance","volume-title":"Information Visualization, IEEE Symposium on Information Visualization","author":"Wattenberg","year":"2008"},{"key":"2026040213265844000_ref144","volume-title":"Six Degrees: The Science of a Connected Age","author":"Watts","year":"2004"},{"issue":"1","key":"2026040213265844000_ref145","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1146\/annurev.soc.22.1.213","article-title":"Computer networks as social networks: Collaborative work, telework, and virtual community","volume":"22","author":"Wellman","year":"1996","journal-title":"Annual Review of Sociology"},{"issue":"3","key":"2026040213265844000_ref146","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1086\/229572","article-title":"Different strokes from different folks: Community ties and social support","volume":"96","author":"Wellman","year":"1990","journal-title":"The American Journal of Sociology"},{"issue":"4","key":"2026040213265844000_ref147","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1145\/1035575.1035580","article-title":"Contactmap: Organizing communication in a social desktop","volume":"11","author":"Whittaker","year":"2004","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"2026040213265844000_ref148","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1145\/587078.587109","article-title":"Contact management: Identifying contacts to support long-term communication","volume-title":"CSCW \u201902: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work","author":"Whittaker","year":"2002"},{"key":"2026040213265844000_ref149","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1145\/289444.289500","article-title":"The dynamics of mass interaction","volume-title":"CSCW \u201998: Proceedings of the 1998 ACM Conference on Computer Supported Cooperative Work","author":"Whittaker","year":"1998"},{"issue":"4","key":"2026040213265844000_ref150","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1177\/1555412006292616","article-title":"From tree house to barracks: The social life of guilds in world of warcraft","volume":"1","author":"Williams","year":"2006","journal-title":"Games and Culture"},{"key":"2026040213265844000_ref151","doi-asserted-by":"crossref","first-page":"34","DOI":"10.3115\/1225733.1225751","article-title":"Opinionfinder: A system for subjectivity analysis","volume-title":"Proceedings of HLT\/EMNLP on Interactive Demonstrations","author":"Wilson","year":"2005"},{"issue":"36","key":"2026040213265844000_ref152","doi-asserted-by":"crossref","first-page":"15099","DOI":"10.1073\/pnas.0907905106","article-title":"What is a social tie?","volume":"106","author":"Wuchty","year":"2009","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"2026040213265844000_ref153","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1145\/1772690.1772790","article-title":"Modeling relationship strength in online social networks","volume-title":"WWW \u201910: Proceedings of the International Conference on World Wide Web","author":"Xiang","year":"2010"},{"key":"2026040213265844000_ref154","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1454008.1454018","article-title":"Social ranking: Uncovering relevant content using tag-based recommender systems","volume-title":"RecSys \u201908: Proceedings of the 2008 ACM Conference on Recommender Systems","author":"Zanardi","year":"2008"}],"container-title":["Foundations and Trends\u00ae in Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/fthci\/article-pdf\/7\/3\/237\/11138852\/1100000044en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/fthci\/article-pdf\/7\/3\/237\/11138852\/1100000044en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T17:27:20Z","timestamp":1775150840000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/fthci\/article\/7\/3\/237\/1331508\/Computing-and-Building-Around-Tie-Strength-in"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,30]]},"references-count":154,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,10,30]]}},"URL":"https:\/\/doi.org\/10.1561\/1100000044","relation":{},"ISSN":["1551-3955","1551-3963"],"issn-type":[{"value":"1551-3955","type":"print"},{"value":"1551-3963","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,30]]}}}