How Did That Chain Letter Get To My Inbox?

May 16, 2008
How Did That Chain Letter Get To My Inbox?
Jon Kleinberg of Cornell University and David Liben-Nowell of Carleton College used a tree diagram to analyze the paths that forwarded e-mail petitions took through the Internet and into people's inboxes. The diagram allowed them to see how the messages got to people, and how many steps it took to get to them. Credit: Jason Koski/Cornell University Photography

Everyone who has an e-mail account has probably received a forwarded chain letter promising good luck if the message is forwarded on to others--or terrible misfortune if it isn't. The sheer volume of forwarded messages such as chain letters, online petitions, jokes and other materials leads to a simple question--how do these messages reach so many people so quickly?

New research into these forwarded missives by Jon Kleinberg of Cornell University and David Liben-Nowell of Carleton College suggests a surprising explanation.

In the past three decades, as more and more individuals have come online and begun using e-mail, the number of these mass-forwarded messages has grown substantially, reaching more and more people each year. It had been assumed that the messages traveled to e-mail users in much the same way that a disease spreads in an epidemic--people received the messages and passed them on to those they came in contact with, who, in turn, spread them to people they encountered, and so on. In recent years, some scientists, as well as marketers, have used the term, "viral," to describe this pattern.

Kleinberg and Liben-Nowell decided to study exactly how some selected messages were disseminated through the Internet. In a research study supported by the National Science Foundation--along with Google, Yahoo and the MacArthur Foundation--the researchers looked at two e-mail petitions that circulated within the past 10 years. One petition in support of public radio began circulating in 1995, and the other, in opposition to the U.S. invasion of Iraq, originated in 2002. The messages had the common characteristic of being widely circulated--the researchers were able to find 316 copies of the public radio petition containing more than 13,000 signatures, and 637 copies of the Iraq petition with almost 20,000 signatures.

Using this data, the researchers mapped out how these messages traveled from recipient to recipient on a tree diagram. A careful analysis of the diagram challenges some of the common assumptions about how messages spread, including the viral contagion theory. Rather than spreading like a virus, with each message producing many direct "descendents" in the tree diagram, the data suggest that people are selective in forwarding messages to others in their social networks. For example, the researchers discovered that 90 percent of the time, the messages produced only a single descendent.

These messages also rarely took the most direct route between two inboxes, even when two people were connected by a few degrees of separation. "The chain letters themselves often got to people by highly circuitous routes," Kleinberg explains. "You could be six steps away from someone, and yet the chain letter could pass through up to 100 intermediaries before showing up in your inbox."

Many e-mail users know it is not uncommon to receive these types of messages multiple times from different people. The results of this study suggest that since most individuals belong to different social circles, it is not uncommon to receive a message more than once. For example, a college student may receive a petition about a tuition increase from a classmate one day, from the president of a fraternity or sorority the next day, and from a cousin the following day.

Kleinberg and Liben-Nowell's research suggests that these messages travel in a less direct and more diffuse pattern than was previously assumed. It also means that messages can reach some groups of people very quickly and take a relatively longer period of time to reach others, creating opportunities for the original message to be altered or abbreviated. This insight has potential implications for scholars in computer networking, sociology, marketing, political science and other fields. "All of this adds up," Kleinberg says, "to cause a much more complex picture of how this information flows though social networks."

For now, Kleinberg and Liben-Nowell are continuing to examine how these messages travel though the Internet. They are looking for people who saved a copy of either the public radio or Iraq invasion petitions with a full or partial list of signers. For more information, go to .

Source: NSF

Explore further: Digital dilemma: How will US respond to Sony hack?

add to favorites email to friend print save as pdf

Related Stories

Beacons pop up in stores ahead of holidays

Dec 04, 2014

From American Eagle to Apple Stores, beacons are popping up everywhere. Are they a shopper's best friend or another pesky Big Brother monitoring our every move?

In cybersecurity, the weakest link is you

Nov 03, 2014

A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually ...

This is why some urban legends go viral

Jun 30, 2014

Urban legends get around, but we don't really understand why. We conducted a study to explain how misinformation spreads surprisingly fast and why people feel compelled to share it.

Research reveals workers' worst inbox sins

Jan 20, 2014

Workers obsessed with checking their emails could be damaging their own mental health and that of their colleagues, according to research at London's Kingston University.

Recommended for you

Digital dilemma: How will US respond to Sony hack?

Dec 18, 2014

The detective work blaming North Korea for the Sony hacker break-in appears so far to be largely circumstantial, The Associated Press has learned. The dramatic conclusion of a Korean role is based on subtle ...

UN General Assembly OKs digital privacy resolution

Dec 18, 2014

The U.N. General Assembly has approved a resolution demanding better digital privacy protections for people around the world, another response to Edward Snowden's revelations about U.S. government spying.

Online privacy to remain thorny issue: survey

Dec 18, 2014

Online privacy will remain a thorny issue over the next decade, without a widely accepted system that balances user rights and personal data collection, a survey of experts showed Thursday.

Spain: Google News vanishes amid 'Google Tax' spat

Dec 16, 2014

Google on Tuesday followed through with a pledge to shut down Google News in Spain in reaction to a Spanish law requiring news publishers to receive payment for content even if they are willing to give it away.

User comments : 4

Adjust slider to filter visible comments by rank

Display comments: newest first

4.2 / 5 (5) May 16, 2008
How Did That Chain Letter Get To My Inbox?
Idiot friends and relatives most likely.
1 / 5 (1) May 17, 2008
How Did That Chain Letter Get To My Inbox? Ditto nano999.
not rated yet May 17, 2008
"In recent years, some scientists, as well as marketers, have used the term, "viral," to describe this pattern."
If you must use biological references to explain this concept then please use one more closely related to the primary activity. In this case these letters are "Parasitic", since there purpose is not to just replicate but to co-op receivers' resources.
not rated yet May 17, 2008
Very superstitious people must foward chain letters because they simply do not want to take a chance on not sending it.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.