Browse Definitions:
Definition

six degrees of separation

Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. The concept of six degrees of separation is often represented by a graph database, a type of NoSQL database that uses graph theory to store, map and query relationships.

Real-world applications of the Six Degrees of Separation theory include power grid mapping and analysis, disease transmission mapping and analysis, computer circuitry design and search engine ranking. The theory was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains." In the 1950's, Ithiel de Sola Pool (MIT) and Manfred Kochen (IBM) set out to prove the theory mathematically. Although they were able to phrase the question mathematically (given a set N of people, what is the probability that each member of N is connected to another member via k_1, k_2, k_3...k_n links?), after twenty years they were still unable to solve the problem to their own satisfaction.

In 1967, American sociologist Stanley Milgram devised a new way to test the theory, which he called "the small-world problem." Milgram randomly selected people in the mid-West to send packages to a stranger located in Massachusetts. The senders knew the recipient's name, occupation and general location. Each participant was instructed to send the package to a person he knew on a first-name basis who was most likely, out of all the participant's friends, to know the target personally. That person would do the same, and so on, until the package was personally delivered to its target recipient. Although participants expected the chain to include at least a hundred intermediaries, it only took (on average) between five and seven intermediaries for each package to be delivered successfully.

Milgram's findings were published in Psychology Today and inspired the phrase "six degrees of separation." Playwright John Guare popularized the phrase when he chose it as the title for his 1990 play of the same name. Although Milgram's findings were discounted after it was discovered that he based his conclusion on a very small number of packages, six degrees of separation became an accepted notion in pop culture after Brett C. Tjaden published a computer game on the University of Virginia's Web site based on the small-world problem.

Tjaden used the Internet Movie Database (IMDB) to document connections between different actors. The game, which asked website visitors to guess the number of connections between the actor Kevin Bacon and any other actor in the datase, was called The Oracle of Bacon at Virginia. Time magazine selected it as one of the "Ten Best Web Sites of 1996."

In 2001, Duncan Watts, a professor at Columbia University, continued his own earlier research into the phenomenon and recreated Milgram's experiment on the Internet. Watts used an email message as the "package" that needed to be delivered, and surprisingly, after reviewing the data collected by 48,000 senders and 19 targets (in 157 countries), Watts found that the average number of intermediaries was indeed, six.

In 2008, Microsoft attempted to validate the experiment by analyzing the mininum chain length it would take to connect 180 billion different pairs of users in the Microsoft Messenger database. According to Microsoft's finding, the average chain length was 6.6 hops. In 2016, researchers at Facebook reported that the social networking site has reduced the chain length of its members three and a half degrees of separtion. Dutch mathematician Edsger Dijkstra is credited with developing the algorithm that made it possible to Facebook researchers and others to find the shortest path between two nodes in a graph database.

This was last updated in February 2017

Continue Reading About six degrees of separation

Join the conversation

6 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

i never thought that the script's song has a deeper meaning. though the song is really quite irrelevant.
Cancel
on the basis of 360 degree.. i can move 6 degree and not be close to anyone.. unless you are meaning the world is 360 but that would be a circle and the world is spherical like oval.. i guess i really dont know for sure since iv never actually measured it my self degrees that is .. in that case is the world is also 70% water... its only obvious that somewhere in that 70 percentile is not near anyone. just my analogy at least in my mind.. and since perception is my reality i must be personally right.
Cancel
I think Facebook proves the theory
Cancel
Assume I know 100 people, and each of them knows 100 people.... So 100 to the sixth is one trillion. But of course there is overlap, but conclusion still seems reasonable. This took me five minutes.
Cancel
Facebook proved that.
Cancel
Please give source of information. No source = hearsay
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close