How Did That Chain Letter Get To My Inbox?

May 16, 2008
How Did That Chain Letter Get To My Inbox?
Jon Kleinberg of Cornell University and David Liben-Nowell of Carleton College used a tree diagram to analyze the paths that forwarded e-mail petitions took through the Internet and into people's inboxes. The diagram allowed them to see how the messages got to people, and how many steps it took to get to them. Credit: Jason Koski/Cornell University Photography

Everyone who has an e-mail account has probably received a forwarded chain letter promising good luck if the message is forwarded on to others--or terrible misfortune if it isn't. The sheer volume of forwarded messages such as chain letters, online petitions, jokes and other materials leads to a simple question--how do these messages reach so many people so quickly?

New research into these forwarded missives by Jon Kleinberg of Cornell University and David Liben-Nowell of Carleton College suggests a surprising explanation.

In the past three decades, as more and more individuals have come online and begun using e-mail, the number of these mass-forwarded messages has grown substantially, reaching more and more people each year. It had been assumed that the messages traveled to e-mail users in much the same way that a disease spreads in an epidemic--people received the messages and passed them on to those they came in contact with, who, in turn, spread them to people they encountered, and so on. In recent years, some scientists, as well as marketers, have used the term, "viral," to describe this pattern.

Kleinberg and Liben-Nowell decided to study exactly how some selected messages were disseminated through the Internet. In a research study supported by the National Science Foundation--along with Google, Yahoo and the MacArthur Foundation--the researchers looked at two e-mail petitions that circulated within the past 10 years. One petition in support of public radio began circulating in 1995, and the other, in opposition to the U.S. invasion of Iraq, originated in 2002. The messages had the common characteristic of being widely circulated--the researchers were able to find 316 copies of the public radio petition containing more than 13,000 signatures, and 637 copies of the Iraq petition with almost 20,000 signatures.

Using this data, the researchers mapped out how these messages traveled from recipient to recipient on a tree diagram. A careful analysis of the diagram challenges some of the common assumptions about how messages spread, including the viral contagion theory. Rather than spreading like a virus, with each message producing many direct "descendents" in the tree diagram, the data suggest that people are selective in forwarding messages to others in their social networks. For example, the researchers discovered that 90 percent of the time, the messages produced only a single descendent.

These messages also rarely took the most direct route between two inboxes, even when two people were connected by a few degrees of separation. "The chain letters themselves often got to people by highly circuitous routes," Kleinberg explains. "You could be six steps away from someone, and yet the chain letter could pass through up to 100 intermediaries before showing up in your inbox."

Many e-mail users know it is not uncommon to receive these types of messages multiple times from different people. The results of this study suggest that since most individuals belong to different social circles, it is not uncommon to receive a message more than once. For example, a college student may receive a petition about a tuition increase from a classmate one day, from the president of a fraternity or sorority the next day, and from a cousin the following day.

Kleinberg and Liben-Nowell's research suggests that these messages travel in a less direct and more diffuse pattern than was previously assumed. It also means that messages can reach some groups of people very quickly and take a relatively longer period of time to reach others, creating opportunities for the original message to be altered or abbreviated. This insight has potential implications for scholars in computer networking, sociology, marketing, political science and other fields. "All of this adds up," Kleinberg says, "to cause a much more complex picture of how this information flows though social networks."

For now, Kleinberg and Liben-Nowell are continuing to examine how these messages travel though the Internet. They are looking for people who saved a copy of either the public radio or Iraq invasion petitions with a full or partial list of signers. For more information, go to petitions.cs.cornell.edu/ .

Source: NSF

Explore further: Iran says ready to let in Google, other Internet firms

add to favorites email to friend print save as pdf

Related Stories

Sony re-gifts 'The Interview' in limited release

Dec 23, 2014

"The Interview" was put back into theaters Thursday when Sony Pictures Entertainment announced a limited theatrical release for the comedy that provoked an international incident with North Korea and outrage ...

Timeline of the Sony Pictures Entertainment hack

Dec 18, 2014

It's been four weeks since hackers calling themselves Guardians of Peace began their cyberterrorism campaign against Sony Pictures Entertainment. In that time thousands of executive emails and other documents ...

Recommended for you

IOC defends Rio legacy amid green protests

19 hours ago

Ecological protests on Saturday dogged the final day of an International Olympic Committee executive board meeting in Rio as green campaigners slated the choice of a nature reserve to hold the golf event ...

Barclays to allow payments by using Twitter handles

Feb 27, 2015

The next chapter in banks moving into the digital age is a stretch beyond reminding customers over phone lines that they can also bank online. Barclays has launched Twitter payments through Pingit.

User comments : 4

Adjust slider to filter visible comments by rank

Display comments: newest first

nano999
4.2 / 5 (5) May 16, 2008
How Did That Chain Letter Get To My Inbox?
Idiot friends and relatives most likely.
yyz
1 / 5 (1) May 17, 2008
How Did That Chain Letter Get To My Inbox? Ditto nano999.
AJW
not rated yet May 17, 2008
"In recent years, some scientists, as well as marketers, have used the term, "viral," to describe this pattern."
If you must use biological references to explain this concept then please use one more closely related to the primary activity. In this case these letters are "Parasitic", since there purpose is not to just replicate but to co-op receivers' resources.
weewilly
not rated yet May 17, 2008
Very superstitious people must foward chain letters because they simply do not want to take a chance on not sending it.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.