SlideShare a Scribd company logo
1 of 1
Download to read offline
SOCIAL ROLES IN SOCIAL NETWORKS: Identifying Role Behaviors from Structure
                                                                                                 Eric Gleave              Thomas Lento                              Howard T. Welser            Marc Smith
                                                                                           University of Washington      Cornell University                          Ohio University        Microsoft Research
                                                                                            eric.gleave@gmail.com     thomas.lento@cornell.edu                       htwiii@gmail.com    marc.smith@microsoft.com
Introduction                                                                                                                                                                                                                                                                                    Methods
Moving from individuals to social roles                                                                                                                                                                                                                                                         Roles are identified through direct
simplifies complex social structures.                                                                                                                                                                                                                                                           observation and review of structural data.
Behavioral data identifies important                                                                                                                                                                                                                                                            Local network structures of individuals
social roles in online communities.                                                                                                                                                                               Hello,                                                                        performing key social role behaviors are
Corresponding social network structures                                                                                                                                                                           Yes, it is possible. IIS uses NTFS security, and you can configure the
                                                                                                                                                                                                                  correct NTFS settings on the files. By doing this, your users will be
                                                                                                                                                                                                                  prompted for a password.                                                      generated. Structural role models are
are characteristic of individuals playing                                                                                                                                                                         You can also completely remove the possibility for anonymous users by doing
                                                                                                                                                                                                                  this:
                                                                                                                                                                                                                                                                                                then used to identify additional individuals
specific social roles in computer-mediated
                                                                                                                                                                                                                  In IIS Manager, right click the Website and click Properties


                                                                                                                                                                                                                                                                                                who resemble the role. The models
                                                                                                                                                                                                                  Click on the Directory Security tab.
                                                                                                                                                                                                                  Click the Edit button for “Anonymous Access and authentication control”
                                                                                                                                                                                                                  Remove the check box for “Anonymous access”


interaction spaces.                                                                                                                                                                                               Make sure that “Integrated Windows Authentication” is selected.

                                                                                                                                                                                                                                                                                                are iteratively refined by subsequent
                                                                                                                                                                                                                  If you have further questions in setting this up, the people in the IIS
                                                                                                                                                                                                                  newsgroup will help you (it is easier for us to find your messages if you


                                                                                                                                                                                                                                                                                                observations.
                                                                                                                                                                                                                  post there):

                                                                                                                                                                                                                  microsoft.public.inetserver.iis
                                                                                                                                                                                                                  http://www.microsoft.com/windowsserver2003/community/centers/iis/defa...

                                                                                                                                                                                                                  Good luck!




Data
Since 2000 over two billion messages                                                                                                                                                                                                                                                            Conclusion
have been posted by tens of millions                                                                                                                                                                                                                                                            Traces of social structure are created by
of authors to hundreds of thousands of                                                                                                                                                                                                                                                          individual behaviors and interactions in
threaded conversation newsgroups in                                                                                                                                                                                                                                                             computer-mediated interaction systems.
Usenet. The Netscan Project has collected                                                                                                                                                                                                                                                       These traces reveal the presence of
every message posted to Usenet and built                                                                                                                                                                                                                                                        several distinct social roles. These roles
structural models of every author, thread                                                                                                                                                                                                                                                       are durable patterns of both individual
and newsgroup. Our research shows that                                                                                                                                                                                                                                                          behavior and structural position. The
technical support, social support, and                                                                                                                                                                                                                                                          structural signature of a role can be used
political discussion spaces are habitats in                                                                                                                                                                                                                                                     to rapidly identify additional individuals
which specific stable behaviors, “social                                                                                                                                                                                                                                                        performing defined roles without resorting
roles”, occur. The following are several                                                                                                                                                                                                                                                        to more labor intensive content analysis.
facets of behavior that illustrate key                                                                                                                                                                                                                                                          Communities can be classified on the
social roles in these computer-mediated                                                                                                                                                                                                                                                         basis of the ecology of roles found within
collective action systems.                                                                                                                                                                                                                                                                      them. These measures can also flag
                                                                                            Answer Person                               Discussion Person                               Discussion Catalyst
Microsoft Research Netscan Project                                                                                                                                                                                                                                                              important changes in groups over time as
http://netscan.research.microsoft.com
                                                                                            High Out-Degree                               High Degree                                   High In-Degree                                                                                          the community ecology evolves.
Welser, H.T., Gleave, E., Fisher, D., and Smith, M.A. (2007). “Visualizing the Structure
of Social Roles in Online Discussion Groups”. Journal of Social Structure. Vol. 8 No. 2.    Low In-Degree                                 Alters Highly Connected                       Low Out-Degree
http://www.cmu.edu/joss/content/articles/volume8/Welser
                                                                                            Alters are Unconnected                        High Tie Mutuality                            Alters Highly Connected
Turner, T.C., Smith, M.A., Fisher, D., and Welser, H.T. (2005). “Picturing Usenet:
Mapping Computer-Mediated Collective Action”. JCMC. 10(4), article 7.
                                                                                            Low Tie Strength                              High Tie Strength                             Low tie Strength
http://jcmc.indiana.edu/vol10/issue4/turner.html

More Related Content

More from Marc Smith

20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
Marc Smith
 

More from Marc Smith (20)

How to use social media network analysis for amplification
How to use social media network analysis for amplificationHow to use social media network analysis for amplification
How to use social media network analysis for amplification
 
Think link what is an edge - NodeXL
Think link   what is an edge - NodeXLThink link   what is an edge - NodeXL
Think link what is an edge - NodeXL
 
2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow
 
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
 
20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
 
2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna
 
2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming Skills
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted
 
2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis
 
20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...
 
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
 
2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer
 
20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
 
20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...
 
20111123 mwa2011-marc smith
20111123 mwa2011-marc smith20111123 mwa2011-marc smith
20111123 mwa2011-marc smith
 
20111103 con tech2011-marc smith
20111103 con tech2011-marc smith20111103 con tech2011-marc smith
20111103 con tech2011-marc smith
 
20110830 Introducing the Social Media Research Foundation
20110830 Introducing the Social Media Research Foundation20110830 Introducing the Social Media Research Foundation
20110830 Introducing the Social Media Research Foundation
 

Recently uploaded

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

2008 sunbelt - gleave lento welser smith - social roles in social networks

  • 1. SOCIAL ROLES IN SOCIAL NETWORKS: Identifying Role Behaviors from Structure Eric Gleave Thomas Lento Howard T. Welser Marc Smith University of Washington Cornell University Ohio University Microsoft Research eric.gleave@gmail.com thomas.lento@cornell.edu htwiii@gmail.com marc.smith@microsoft.com Introduction Methods Moving from individuals to social roles Roles are identified through direct simplifies complex social structures. observation and review of structural data. Behavioral data identifies important Local network structures of individuals social roles in online communities. Hello, performing key social role behaviors are Corresponding social network structures Yes, it is possible. IIS uses NTFS security, and you can configure the correct NTFS settings on the files. By doing this, your users will be prompted for a password. generated. Structural role models are are characteristic of individuals playing You can also completely remove the possibility for anonymous users by doing this: then used to identify additional individuals specific social roles in computer-mediated In IIS Manager, right click the Website and click Properties who resemble the role. The models Click on the Directory Security tab. Click the Edit button for “Anonymous Access and authentication control” Remove the check box for “Anonymous access” interaction spaces. Make sure that “Integrated Windows Authentication” is selected. are iteratively refined by subsequent If you have further questions in setting this up, the people in the IIS newsgroup will help you (it is easier for us to find your messages if you observations. post there): microsoft.public.inetserver.iis http://www.microsoft.com/windowsserver2003/community/centers/iis/defa... Good luck! Data Since 2000 over two billion messages Conclusion have been posted by tens of millions Traces of social structure are created by of authors to hundreds of thousands of individual behaviors and interactions in threaded conversation newsgroups in computer-mediated interaction systems. Usenet. The Netscan Project has collected These traces reveal the presence of every message posted to Usenet and built several distinct social roles. These roles structural models of every author, thread are durable patterns of both individual and newsgroup. Our research shows that behavior and structural position. The technical support, social support, and structural signature of a role can be used political discussion spaces are habitats in to rapidly identify additional individuals which specific stable behaviors, “social performing defined roles without resorting roles”, occur. The following are several to more labor intensive content analysis. facets of behavior that illustrate key Communities can be classified on the social roles in these computer-mediated basis of the ecology of roles found within collective action systems. them. These measures can also flag Answer Person Discussion Person Discussion Catalyst Microsoft Research Netscan Project important changes in groups over time as http://netscan.research.microsoft.com High Out-Degree High Degree High In-Degree the community ecology evolves. Welser, H.T., Gleave, E., Fisher, D., and Smith, M.A. (2007). “Visualizing the Structure of Social Roles in Online Discussion Groups”. Journal of Social Structure. Vol. 8 No. 2. Low In-Degree Alters Highly Connected Low Out-Degree http://www.cmu.edu/joss/content/articles/volume8/Welser Alters are Unconnected High Tie Mutuality Alters Highly Connected Turner, T.C., Smith, M.A., Fisher, D., and Welser, H.T. (2005). “Picturing Usenet: Mapping Computer-Mediated Collective Action”. JCMC. 10(4), article 7. Low Tie Strength High Tie Strength Low tie Strength http://jcmc.indiana.edu/vol10/issue4/turner.html