Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1963405.1963505acmotherconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

we.b: the web of short urls

Published: 28 March 2011 Publication History

Abstract

Short URLs have become ubiquitous. Especially popular within social networking services, short URLs have seen a significant increase in their usage over the past years, mostly due to Twitter's restriction of message length to 140 characters. In this paper, we provide a first characterization on the usage of short URLs. Specifically, our goal is to examine the content short URLs point to, how they are published, their popularity and activity over time, as well as their potential impact on the performance of the web.
Our study is based on traces of short URLs as seen from two different perspectives: i) collected through a large-scale crawl of URL shortening services, and ii) collected by crawling Twitter messages. The former provides a general characterization on the usage of short URLs, while the latter provides a more focused view on how certain communities use shortening services. Our analysis highlights that domain and website popularity, as seen from short URLs, significantly differs from the distributions provided by well publicised services such as Alexa. The set of most popular websites pointed to by short URLs appears stable over time, despite the fact that short URLs have a limited high popularity lifetime. Surprisingly short URLs are not ephemeral, as a significant fraction, roughly 50%, appears active for more than three months. Overall, our study emphasizes the fact that short URLs reflect an "alternative" web and, hence, provide an additional view on web usage and content consumption complementing traditional measurement sources. Furthermore, our study reveals the need for alternative shortening architectures that will eliminate the non-negligible performance penalty imposed by today's shortening services.

References

[1]
Alexa Traffic Stats. http://www.alexa.com/siteinfo/bit.ly#trafficstats.
[2]
Announcement of URL shortening service available at makeashorterlink.com. http://www.metafilter.com/8916/.
[3]
TinyURL.com. http://tinyurl.com/.
[4]
TweetDeck. http://www.tweetdeck.com/.
[5]
Twitter Rate Limit. http://apiwiki.twitter.com/Rate-limiting.
[6]
Twitter Search. http://search.twitter.com/.
[7]
TwitterFeed. http://twitterfeed.com/.
[8]
Wikipedia - List of countries by number of Internet users. http://en.wikipedia.org/wiki/List_of_countries_by_number_of_Internet_users.
[9]
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web Caching and Zipf-like Distributions: Evidence and Implications. In IN INFOCOM, pages 126--134, 1998.
[10]
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web caching and zipf-like distributions: Evidence and implications. In IN INFOCOM, pages 126--134, 1998.
[11]
M. Cha, H. Kwak, P. R. P., Y.-Y. Ahn, and S. Moon. I Tube, You Tube, Everybody Tubes: Analyzing the World's Largest User Generated Content Video System. In ACM IMC '07, San Diego, CA, USA, pages 1--14, 2007.
[12]
M. Cha, A. Mislove, B. Adams, and K. Gummadi. Characterizing Social Cascades in Flickr. In ACM SIGCOMM Workshop on OSNs, 2008.
[13]
M. Cha, A. Mislove, and K. P. Gummadi. A Measurement-driven Analysis of Information Propagation in the Flickr Social Network. In Proc. of the 18 Intl. World Wide Web Conference (WWW), 2009.
[14]
H. Chun, H. Kwak, Y. Eom, Y. Ahn, S. Moon, and H. Jeong. Comparison of online social relations in volume vs interaction: a case study of cyworld. In IMC '08: Proc. of the ACM SIGCOMM conference on Internet measurement.
[15]
M. E. Crovella and A. Bestavros. Self-similarity in World Wide Web traffic: Evidence and possible causes. IEEE/ACM Transactions on Networking, 5(6):835--846, 1997.
[16]
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: the underground on 140 characters or less. In CCS '10: Proceedings of the 17th ACM conference on Computer and communications security, pages 27--37. ACM, 2010.
[17]
R. Kumar, J. Novak, and A. Tomkins. Structure and evolution of online social networks. In KDD '06: Proc. of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 611--617, 2006.
[18]
H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In WWW '10: Proceedings of the 19th international conference on World wide web, pages 591--600, New York, NY, USA, 2010. ACM.
[19]
K. Lerman and R. Ghosh. Information contagion: n empirical study of the spread of news on digg and twitter social networks. In Proceedings of the 3th AAAI Conference on Weblogs and Social Media (ICWSM'10), pages 90--97, 2010.
[20]
J. Leskovec, L. Adamic, and B. A. Huberman. The dynamics of viral marketing. In Proceedings of the 7th ACM conference on Electronic commerce (EC), 2006.
[21]
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and Analysis of Online Social Networks. In Proc of the 5th ACM/USENIX Internet Measurement Conference (IMC'07), 2007.
[22]
A. Nazir, S. Raza, and C. Chuah. Unveiling facebook: a measurement study of social network based applications. In IMC '08: Proc. of the ACM SIGCOMM conference on Internet measurement.
[23]
M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the Gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 2002.

Cited By

View all
  • (2024)An Effective Detection Approach for Phishing URL Using ResMLPIEEE Access10.1109/ACCESS.2024.340904912(79367-79382)Online publication date: 2024
  • (2022)Storing URL Shortener Links in The Decentralized Network2022 IEEE 6th Conference on Information and Communication Technology (CICT)10.1109/CICT56698.2022.9997849(1-4)Online publication date: 18-Nov-2022
  • (2022)Misinformation and professional news on largely unmoderated platforms: the case of telegramJournal of Information Technology & Politics10.1080/19331681.2022.207627220:2(198-212)Online publication date: 25-May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
WWW '11: Proceedings of the 20th international conference on World wide web
March 2011
840 pages
ISBN:9781450306324
DOI:10.1145/1963405
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 March 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. online social networks
  2. short urls
  3. twitter

Qualifiers

  • Research-article

Conference

WWW '11
WWW '11: 20th International World Wide Web Conference
March 28 - April 1, 2011
Hyderabad, India

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)4
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)An Effective Detection Approach for Phishing URL Using ResMLPIEEE Access10.1109/ACCESS.2024.340904912(79367-79382)Online publication date: 2024
  • (2022)Storing URL Shortener Links in The Decentralized Network2022 IEEE 6th Conference on Information and Communication Technology (CICT)10.1109/CICT56698.2022.9997849(1-4)Online publication date: 18-Nov-2022
  • (2022)Misinformation and professional news on largely unmoderated platforms: the case of telegramJournal of Information Technology & Politics10.1080/19331681.2022.207627220:2(198-212)Online publication date: 25-May-2022
  • (2022)ANURL: An Innovative Management Scheme for Web Uniform Resource LocatorsMicro-Electronics and Telecommunication Engineering10.1007/978-981-16-8721-1_55(561-571)Online publication date: 28-Feb-2022
  • (2021)Intelligent Classification Method for Web page Manipulation DetectionJournal of Physics: Conference Series10.1088/1742-6596/1916/1/0120731916:1(012073)Online publication date: 1-May-2021
  • (2020)A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real TimeSecurity and Trust Management10.1007/978-3-030-59817-4_3(39-54)Online publication date: 16-Sep-2020
  • (2019)Market basket applications on short web linksInternational Journal of Market Research10.1177/147078531881840862:2(139-157)Online publication date: 1-Jan-2019
  • (2018) ${\mathit{MALT^P}}$ : Parallel Prediction of Malicious TweetsIEEE Transactions on Computational Social Systems10.1109/TCSS.2018.28691715:4(1096-1108)Online publication date: Dec-2018
  • (2018)Using URL shorteners to compare phishing and malware attacks2018 APWG Symposium on Electronic Crime Research (eCrime)10.1109/ECRIME.2018.8376215(1-13)Online publication date: May-2018
  • (2018)Bit.ly/practice: Uncovering content publishing and sharing through URL shortening servicesTelematics and Informatics10.1016/j.tele.2018.03.00335:5(1310-1323)Online publication date: Aug-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media