communication, but have proved vulnerable to 
unwanted machine-to-human communication. 
Forbidding automated use is not the solution. 
Twitter’s opening up of their API to the public has 
resulted in some useful and entertaining twittering 
machines, and is likely to stimulate the development 
of positive new Twitter uses.  
The solution is rather to create technical limits to 
the automated use of the system so as to allow non-
automated use to flourish. This may be done by 
increasing the cost (in money, time or human effort) 
of performing particular automated behaviours. The 
behaviours to target are ones that decrease the 
usefulness of the system for non-automated users, 
without being essential for legitimate marketing that 
may provide revenue for the information system. 
The suggestions in Section 5 propose limits of this 
type.  
Another observation is that to ensure that 
marketers do not make a nuisance of themselves in a 
social information network, it is not sufficient that 
marketing messages are opt-in only. For example, 
consider Twitter spammers that only send spam to 
their followees, using DMs. They only spam users 
who have opted to follow one of their accounts.  
However, such spammers an incentive to catch the 
attention of users and try to persuade them to opt in, 
for example by following many users, publishing 
automated “reply” tweets, or abusing trend words. 
This attention-catching behaviour can itself be an 
annoyance, even to users who never opt in. 
Designers of social information systems with opt-in 
marketing should try to ensure that it is not easy for 
marketers to use automation to do a large amount of 
attention-catching at a small (or zero) cost. 
Access control mechanisms may help to address 
these problems for information systems that are not 
open to the public. They are less useful for a public 
system such as Twitter, although it could be argued 
that some of the limits on Twitter use suggested in 
Section 5 are access control rules for particular 
Twitter capabilities. Content validation may also 
help protect against some kinds of automated 
misbehaviour. For example, if it is possible to have a 
service within a social information system that could 
check that shortened URLs published in the system 
do not lead to known phishing or malware-spreading 
sites, this could be rather useful. 
ACKNOWLEDGEMENTS 
Thanks to Martin Arlitt and Phillippa Gill for their 
assitance, and to the New York MOMA for their 
permission to use the Klee picture in my 
presentation.
 
REFERENCES 
BBC, 2009. BBC Newsnight television interview with Ev 
Harris, 5 August 2009.  
Brooks, D. (ed), 2009, Twitter marketing tips, Emereo Pty 
Ltd. 
Cheng, A., Evans, M., 2009. Inside Twitter: an in-depth 
look inside the Twitter world. Sysomos white paper, 
June 2009. http://www.sysomos.com/insidetwitter/ 
Cosoi, A.C., Cosoi, M., 2009. A fractal approach to social 
network spam detection. In VB2009, Virus Bulletin 
Conference. Virus Bulletin Ltd. 
Heil, B., Piskorski, M., 2009. New Twitter Research: Men 
follow men and nobody tweets.  Blog posting, 1 June 
2009. 
http://blogs.harvardbusiness.org/cs/2009/06/new_twitt
er_research_men_follo.html  
Huberman, B., Romero, D. M., Wu, F., 2009. Social 
networks that matter: Twitter under the microscope. 
First Monday 14 (1-5), January 2009. 
Java, A., Song, X., Finin, T., Tseng, B., 2007. Why we 
Twitter: understanding microblogging usage and 
communities. In Joint 9
th
 WEBKDD and SNA-KDD 
workshop. ACM Press. 
Klee, P., 1922. The Twittering Machine [Die Zwitscher-
Maschine], in the collection of the Museum of Modern 
Art, New York, http://www.moma.org . Digital image: 
http://www.moma.org/explore/collection/provenance/i
tems/564.39.html 
Krishnamurthy, B., Gill, P., Arlitt, M., 2008. A few chirps 
about Twitter. In 1
st
 Workshop on Online Social 
Networks. ACM Press. 
Mackey, J., 2009. The mystery behind FOLLOW and 
UNFOLLOW on Twitter revealed. Open Press Wire 
article, 8 March 2009, 
http://openpresswire.com/internet/the-mystery-behind-
follow-and-unfollow-on-twitter-revealed/ 
Metablocks.com, 2009. Beware of Twitter spam – an 
overview and guide. Blog posting, 29 June 2009. 
http://www.metablocks.com/blog/2009/06/29/beware-
of-twitter-spam-an-overview-and-guide/  
Poland, S., 2007. First Twitter bots launched: sports 
teams, weather, stock quotes. Blog posting, 4 April 
2007. http://blog.stevepoland.com/first-twitter-bots-
launched-sports-teams-weather-stock-quotes/  
Solis, B., 2009. Revealing the People Defining Social 
Networks. Blog posting on PR 2.0, 1 October 2009. 
http://www.briansolis.com/2009/10/revealing-the-
people-defining-social-networks/ 
Smith, J., Linares, J., 2009. Dominate your market with 
Twitter, Infinite Ideas Ltd.  
Zarella, D., 2009. State of the Twittersphere, June 2009. 
Hubspot.com white paper, 
http://blog.hubspot.com/Portals/249/sotwitter09.pdf  
 
WEBIST 2010 - 6th International Conference on Web Information Systems and Technologies
304