This document provides information on network structure and competitive advantage. It discusses how social networks map the distribution of information, with clusters indicating areas of homogeneous information and structural holes between clusters indicating heterogeneous information. People who can broker between clusters, bridging structural holes, gain advantages like access to diverse information and opportunities to combine ideas. The document uses examples, diagrams, and metrics to illustrate these network concepts.
1. Social capital refers to the benefits obtained from social networks and relationships. Structural holes refer to weak connections between different groups in a social network.
2. Individuals who bridge structural holes gain competitive advantages from access to non-redundant information and control over third-party relationships. This "structural hole hypothesis" has received empirical support.
3. Dense networks alone do not improve performance. However, closure within groups helps realize the added value from brokerage between groups. Social capital is maximized when networks have both structural holes and closure.
This document discusses the use of social network graphs and analytics. It provides an overview of key concepts in social network analysis (SNA) including representing social networks, identifying strong and weak ties, central nodes, and overall network structure. Examples are given of how SNA is used in business, law enforcement, social media sites, and more. Key measures discussed include degree, betweenness, closeness, eigenvector centrality, density, and clustering coefficient. The small-world phenomenon and preferential attachment are also covered.
1. The document discusses using information visualization techniques to analyze computer-mediated social systems and discover patterns in social media data.
2. It provides examples of visualizations like treemaps, graphs, and scatter plots applied to data from sites like Wikipedia, Usenet, and social networks.
3. The visualizations help reveal patterns in user behavior and relationships that can provide insights for social science research.
The community detection in complex networks has attracted a growing interest and is the subject of several
researches that have been proposed to understand the network structure and analyze the network
properties. In this paper, we give a thorough overview of different community discovery strategies, we
propose taxonomy of these methods, and we specify the differences between the suggested classes which
helping designers to compare and choose the most suitable strategy for the various types of network
encountered in the real world.
This document provides an introduction to social network analysis. It discusses how social network analysis views social relationships as connections between individuals, and uses tools to systematically study these connections. The key topics covered include:
- Why social networks are important to study as they influence information and resource sharing
- The basic data elements in social network analysis, including nodes to represent individuals and edges to represent relationships between nodes
- Different levels of network data, from ego networks to complete networks
- Common ways to represent network data structurally, including graphs, matrices, and lists
- An overview of how social network analysis can help answer questions about how social relationships influence individual behaviors and the structure of social hierarchies.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future modeling techniques could further social network analysis.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future modeling could further social network analysis.
1. Social capital refers to the benefits obtained from social networks and relationships. Structural holes refer to weak connections between different groups in a social network.
2. Individuals who bridge structural holes gain competitive advantages from access to non-redundant information and control over third-party relationships. This "structural hole hypothesis" has received empirical support.
3. Dense networks alone do not improve performance. However, closure within groups helps realize the added value from brokerage between groups. Social capital is maximized when networks have both structural holes and closure.
This document discusses the use of social network graphs and analytics. It provides an overview of key concepts in social network analysis (SNA) including representing social networks, identifying strong and weak ties, central nodes, and overall network structure. Examples are given of how SNA is used in business, law enforcement, social media sites, and more. Key measures discussed include degree, betweenness, closeness, eigenvector centrality, density, and clustering coefficient. The small-world phenomenon and preferential attachment are also covered.
1. The document discusses using information visualization techniques to analyze computer-mediated social systems and discover patterns in social media data.
2. It provides examples of visualizations like treemaps, graphs, and scatter plots applied to data from sites like Wikipedia, Usenet, and social networks.
3. The visualizations help reveal patterns in user behavior and relationships that can provide insights for social science research.
The community detection in complex networks has attracted a growing interest and is the subject of several
researches that have been proposed to understand the network structure and analyze the network
properties. In this paper, we give a thorough overview of different community discovery strategies, we
propose taxonomy of these methods, and we specify the differences between the suggested classes which
helping designers to compare and choose the most suitable strategy for the various types of network
encountered in the real world.
This document provides an introduction to social network analysis. It discusses how social network analysis views social relationships as connections between individuals, and uses tools to systematically study these connections. The key topics covered include:
- Why social networks are important to study as they influence information and resource sharing
- The basic data elements in social network analysis, including nodes to represent individuals and edges to represent relationships between nodes
- Different levels of network data, from ego networks to complete networks
- Common ways to represent network data structurally, including graphs, matrices, and lists
- An overview of how social network analysis can help answer questions about how social relationships influence individual behaviors and the structure of social hierarchies.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future modeling techniques could further social network analysis.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future modeling could further social network analysis.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future advances may impact social networks and social network analysis.
An overview of the Network Overview Discovery and Exploration add-in for Excel 2007 (NodeXL), a social network analysis add-in for the familiar spreadsheet application. Visualize twitter, flickr, facebook, and email networks with just a few mouse clicks.
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
Review of trends related to social network analysis in the enterprise. Presented at the 2010 Catalyst Conference in San Diego, CA july 29, 2010. Presented with Mike Gotta, Gartner Group.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
UNDERSTANDING THE THEORIES AND TYPES OF ENTERPRISE NETWORKSNGANG PEREZ
To begin, Casson and Giusta (2007) said a network refers to a set of elements or members that are connected to each other. Seibert, Kraimer, and Liden (2001) defined a network as “the pattern of ties linking a defined set of persons or social actors”. Before I go any further, to you, what do you think a network is all about? What opinion do you hold in your mind about this concept? From the two definitions I just presented, you will realize that connections or ties are the fundamental features of all networks. The connections are the results of relationships between the members. In addition, all members of a network are either directly or indirectly linked to each other (Casson & Giusta 2007). Thus, networks consist of a set of elements or members that are connected to each other as a result of the relationships of the members. Therefore, your class is made up of a network of individual members called students. Also, your church is made up of a network of Indi dual people called brethren as well as your family is made of a network of individual persons called family members. Almost in every situation in normal life and business, a network is bound to exist. This makes me tempted to say Man cannot live without a network, so also do businesses need networks to survive. I find it challenging when I hear people say, “I don’t need another man in this life” or “I can succeed without the help of any man” and there are many examples of such comment’s rights? I’m sure you too often hear people make statements. It's funny, and yes truly funny because such statements are made may be from ignorance or usually from nonsense pride. Hear me and hear me well! Even to go to heaven, you need God’s network if not you lie yourself. One famous Cameroonian politician once said, “you scratch my back, I scratch your back”. Therefore, the importance of networks cannot be overemphasized in business.
This document provides an introduction to sociograms and network analysis mapping. It discusses how sociograms use nodes and lines to represent individuals and their relationships in a network. Key network measures like degree centrality and betweenness centrality are calculated to understand popularity and influence. Examples of sociograms show components, bridges/cutpoints, and cliques within networks. Understanding these network characteristics can provide insights into communication patterns and strengths/weaknesses in an organizational structure. Sociograms are a tool that can be used along with other data to evaluate relationships and identify areas to improve communication.
This document provides an introduction to sociograms and network analysis mapping. It discusses how sociograms use nodes and lines to represent individuals and their connections in a network. Key network measures like degree centrality and betweenness centrality are calculated to understand roles. Examples of sociograms show components, bridges/cutpoints, and cliques to analyze network structure and locate influential positions. Sociograms are presented as a tool to evaluate relationships and diagnose organizational capacity.
This document provides an introduction to social networks and social network analysis. It defines social networks as descriptions of social structures between actors like individuals and organizations. Social network analysis maps and measures relationships and information flows. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document discusses how social network analysis can be applied in domains like knowledge management systems, counterterrorism, marketing, and more. It also profiles the social networking site LinkedIn and how its platform facilitates network growth and connection.
This document discusses 10 examples of using network analysis techniques in various domains:
1. Using social network analysis to map the workforce and labor supply as a complex system.
2. Analyzing social network and interest graph data to power future shopping through identifying customer segments and influencers.
3. Using social network diagrams by drug marketers to locate influential doctors by identifying prescribing patterns and relationships between doctors.
This document provides an introduction to social networks and social network analysis. It defines social networks as descriptions of social structures between actors like individuals and organizations. Social network analysis maps and measures relationships and information flows. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document discusses how social network analysis can be applied to knowledge management systems to identify bottlenecks, optimal connections, isolated individuals, and more. It also profiles the social networking site LinkedIn and how its platform allows users to map their extended professional networks. The future of social network analysis is discussed in terms of reducing complexity through simulation and modeling geographic relationships.
This document discusses social networks and social network analysis. It defines social networks as connections between individuals or organizations, and social network analysis as mapping and measuring relationships between connected entities. The document outlines how social network analysis is used to measure networks in terms of degree centrality, betweenness centrality, and closeness centrality. It provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and blogs help create social networks. The future of social networks and social network analysis is discussed in terms of reducing complexity through simulation analysis and geographic information modeling.
This document discusses social networks and social network analysis. It defines social networks as connections between individuals or organizations, and social network analysis as mapping and measuring relationships between connected entities. The document outlines how social network analysis is used to measure networks in terms of degree centrality, betweenness centrality, and closeness centrality. It provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and blogs help create social networks. The future of social networks and social network analysis is discussed in terms of reducing complexity through simulation analysis and using geographic information modeling.
Social Network Structures in Online CommunitiesSreyoshi Dey
This document summarizes key concepts from two journal articles about social network structures in online communities. It discusses how the flow of information and overall cohesion of online groups depends on their network structure. Some important concepts discussed include social capital, structural holes, brokerage vs closure, and betweenness vs constraint. The first article examines these concepts in the context of the online community Slashdot.org. The second article studies brokerage and closure in the virtual world of the massively multiplayer online game Everquest II.
Big Data Analytics : A Social Network ApproachAndry Alamsyah
This document discusses using social network analysis approaches for big data analytics. It begins by introducing social network metrics like centrality and modularity that can be applied to large social network datasets. It then provides examples of how social network analysis has been used to detect terrorist cells and identify research communities. Finally, it outlines the author's research interests and publications in areas like sentiment analysis on social media and using social networks to analyze industries.
2011 IEEE Social Computing Nodexl: Group-In-A-BoxMarc Smith
The document proposes a new layout called Group-In-a-Box (GIB) for visualizing clustered graphs that enables multi-faceted analysis of networks. GIB uses the treemap technique to display each graph cluster or category group within its own box, sized according to the number of vertices. This allows analysis of both community structure detected from network clustering algorithms as well as categories of individuals. The document demonstrates GIB on real social networks and synthetic networks, showing it can reveal intra-group network structures and the attributes of members in different groups.
This document summarizes a research paper that analyzed social subgroups and community structure on social networking websites. The paper used the NodeXL tool to analyze Twitter data and identify the most influential group discussing "foreign affairs". It found that 232 users tweeted about foreign affairs, forming 30 groups. The largest group had 71 users and 93 unique connections. Network analysis metrics like in-degree, betweenness centrality, and eigenvector centrality identified the most influential users within the network discussing foreign affairs. This analysis can help organizations understand influential users and groups discussing certain topics on social media.
This document discusses using an agent-based model and social network analysis to evaluate the effectiveness of different strategies for disrupting terrorist networks. The model is based on a 271-member al-Qaeda network and analyzes how network metrics change when kinetic and non-kinetic strategies are implemented under varying levels of network morale. The goal is to determine which strategies most impact network structure and achieve disruption goals. The document provides background on using social network analysis to understand terrorist networks and their evolution. It then describes how machine learning was used to train the al-Qaeda network model and outlines different disruption strategies that could be implemented in the model.
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxzmark3
response.pdf
response
by Abc Abc
Submission date: 14-May-2020 05:58AM (UTC-0400)
Submission ID: 1324028097
File name: response.docx (36.28K)
Word count: 355
Character count: 1780
0%
SIMILARITY INDEX
0%
INTERNET SOURCES
0%
PUBLICATIONS
0%
STUDENT PAPERS
Exclude quotes On
Exclude bibliography On
Exclude matches Off
response
ORIGINALITY REPORT
PRIMARY SOURCES
responseby Abc AbcresponseORIGINALITY REPORTPRIMARY SOURCES
response. d.docx
Running Head: RESPONSE
1
RESPONSE 2
Response
Name
Course
Date of Submission
Discussion 1
Hello, it was interesting to read your post. It is indeed true that honeypots are much expensive than the real security system. There exist several issues with honeypots and most of which make 'it hard for individuals to deal with them. One such issue is individuals' lack of familiarity with them, as you have stated in the post. The main objective of designing and using honeypots is for the attackers to make brute attacks on the system without being noticed by the administration. This is the reason why if a single honeypot gets into the system, it can end up being used to compromise the entire host system, as you have stated in your post. As you have stated in your post, a honeypot is highly relied upon when individuals are considering acquiring valuable intelligence from an organization but one that is still not the most sensitive. Some of the questions which arise with the usage of honeypots in such ventures are whether they can be used by forces to help counter-terrorism. In the age of technology, police are using the internet and its filtering capabilities to identify terrorists and how they conduct recruitment (Sharma & Kaul, 2018).
Discussion 2
Hello, it was interesting to read your post; it was informative. From your research, you have identified the primary objective of honeypot being diversion of assassins so as to extract critical information and data about them by following all the moves they make. This objective does not, however, acknowledge whether there are means of injecting honeypots to the assassins and whether they have measures of protecting their systems against such attempts. Honey pots have been noted to be effective at identifying potential assaults, as you have stated in your post. They are, however, not much effective as attacks still occur in their presence and can only identify a single attack at a time, as you have stated in the post.
References
Sharma, S., & Kaul, A. (2018). A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular Communications, 12, 138-164.
Discussion 1 :
Top of Form
Network separation is a standard network practice that has security architecture concepts that are implemented to secure the entire system. It uses various approaches such as.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share their interests without being at the same geographical location. With the great and rapid growth of Social Media sites such as Facebook, LinkedIn, Twitter…etc. causes huge amount of user-generated content. Thus, the improvement in the information quality and integrity becomes a great challenge to all social media sites, which allows users to get the desired content or be linked to the best link relation using improved search / link technique. So introducing semantics to social networks will widen up the representation of the social networks. In this paper, a new model of social networks based on semantic tag ranking is introduced. This model is based on the concept of multi-agent systems. In this proposed model the representation of social links will be extended by the semantic relationships found in the vocabularies which are known as (tags) in most of social networks.The proposed model for the social media engine is based on enhanced Latent Dirichlet Allocation(E-LDA) as a semantic indexing algorithm, combined with Tag Rank as social network ranking algorithm. The improvements on (E-LDA) phase is done by optimizing (LDA) algorithm using the optimal parameters. Then a filter is introduced to enhance the final indexing output. In ranking phase, using Tag Rank based on the indexing phase has improved the output of the ranking. Simulation results of the proposed model have shown improvements in indexing and ranking output.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
The document presents a new model for intelligent social networks based on semantic tag ranking. It uses a multi-agent system approach with agents performing indexing and ranking. For indexing, it uses an enhanced Latent Dirichlet Allocation (E-LDA) model that optimizes LDA parameters. Tags above a threshold from E-LDA output are ranked using Tag Rank. Simulation results showed improvements in indexing and ranking over conventional methods. The model introduces semantics to social networks to improve search and link recommendation.
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...dsnow9802
Colby Hobson stands out as a dynamic leader in the residential construction industry. With a solid reputation built on his exceptional communication and presentation skills, Colby has proven himself to be an excellent team player, fostering a collaborative and efficient work environment.
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...ssuserf63bd7
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd test bank.docx
https://qidiantiku.com/test-bank-for-small-business-management-an-entrepreneurs-guidebook-8th-edition-by-mary-jane-byrd.shtml
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future advances may impact social networks and social network analysis.
An overview of the Network Overview Discovery and Exploration add-in for Excel 2007 (NodeXL), a social network analysis add-in for the familiar spreadsheet application. Visualize twitter, flickr, facebook, and email networks with just a few mouse clicks.
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
Review of trends related to social network analysis in the enterprise. Presented at the 2010 Catalyst Conference in San Diego, CA july 29, 2010. Presented with Mike Gotta, Gartner Group.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
UNDERSTANDING THE THEORIES AND TYPES OF ENTERPRISE NETWORKSNGANG PEREZ
To begin, Casson and Giusta (2007) said a network refers to a set of elements or members that are connected to each other. Seibert, Kraimer, and Liden (2001) defined a network as “the pattern of ties linking a defined set of persons or social actors”. Before I go any further, to you, what do you think a network is all about? What opinion do you hold in your mind about this concept? From the two definitions I just presented, you will realize that connections or ties are the fundamental features of all networks. The connections are the results of relationships between the members. In addition, all members of a network are either directly or indirectly linked to each other (Casson & Giusta 2007). Thus, networks consist of a set of elements or members that are connected to each other as a result of the relationships of the members. Therefore, your class is made up of a network of individual members called students. Also, your church is made up of a network of Indi dual people called brethren as well as your family is made of a network of individual persons called family members. Almost in every situation in normal life and business, a network is bound to exist. This makes me tempted to say Man cannot live without a network, so also do businesses need networks to survive. I find it challenging when I hear people say, “I don’t need another man in this life” or “I can succeed without the help of any man” and there are many examples of such comment’s rights? I’m sure you too often hear people make statements. It's funny, and yes truly funny because such statements are made may be from ignorance or usually from nonsense pride. Hear me and hear me well! Even to go to heaven, you need God’s network if not you lie yourself. One famous Cameroonian politician once said, “you scratch my back, I scratch your back”. Therefore, the importance of networks cannot be overemphasized in business.
This document provides an introduction to sociograms and network analysis mapping. It discusses how sociograms use nodes and lines to represent individuals and their relationships in a network. Key network measures like degree centrality and betweenness centrality are calculated to understand popularity and influence. Examples of sociograms show components, bridges/cutpoints, and cliques within networks. Understanding these network characteristics can provide insights into communication patterns and strengths/weaknesses in an organizational structure. Sociograms are a tool that can be used along with other data to evaluate relationships and identify areas to improve communication.
This document provides an introduction to sociograms and network analysis mapping. It discusses how sociograms use nodes and lines to represent individuals and their connections in a network. Key network measures like degree centrality and betweenness centrality are calculated to understand roles. Examples of sociograms show components, bridges/cutpoints, and cliques to analyze network structure and locate influential positions. Sociograms are presented as a tool to evaluate relationships and diagnose organizational capacity.
This document provides an introduction to social networks and social network analysis. It defines social networks as descriptions of social structures between actors like individuals and organizations. Social network analysis maps and measures relationships and information flows. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document discusses how social network analysis can be applied in domains like knowledge management systems, counterterrorism, marketing, and more. It also profiles the social networking site LinkedIn and how its platform facilitates network growth and connection.
This document discusses 10 examples of using network analysis techniques in various domains:
1. Using social network analysis to map the workforce and labor supply as a complex system.
2. Analyzing social network and interest graph data to power future shopping through identifying customer segments and influencers.
3. Using social network diagrams by drug marketers to locate influential doctors by identifying prescribing patterns and relationships between doctors.
This document provides an introduction to social networks and social network analysis. It defines social networks as descriptions of social structures between actors like individuals and organizations. Social network analysis maps and measures relationships and information flows. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document discusses how social network analysis can be applied to knowledge management systems to identify bottlenecks, optimal connections, isolated individuals, and more. It also profiles the social networking site LinkedIn and how its platform allows users to map their extended professional networks. The future of social network analysis is discussed in terms of reducing complexity through simulation and modeling geographic relationships.
This document discusses social networks and social network analysis. It defines social networks as connections between individuals or organizations, and social network analysis as mapping and measuring relationships between connected entities. The document outlines how social network analysis is used to measure networks in terms of degree centrality, betweenness centrality, and closeness centrality. It provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and blogs help create social networks. The future of social networks and social network analysis is discussed in terms of reducing complexity through simulation analysis and geographic information modeling.
This document discusses social networks and social network analysis. It defines social networks as connections between individuals or organizations, and social network analysis as mapping and measuring relationships between connected entities. The document outlines how social network analysis is used to measure networks in terms of degree centrality, betweenness centrality, and closeness centrality. It provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and blogs help create social networks. The future of social networks and social network analysis is discussed in terms of reducing complexity through simulation analysis and using geographic information modeling.
Social Network Structures in Online CommunitiesSreyoshi Dey
This document summarizes key concepts from two journal articles about social network structures in online communities. It discusses how the flow of information and overall cohesion of online groups depends on their network structure. Some important concepts discussed include social capital, structural holes, brokerage vs closure, and betweenness vs constraint. The first article examines these concepts in the context of the online community Slashdot.org. The second article studies brokerage and closure in the virtual world of the massively multiplayer online game Everquest II.
Big Data Analytics : A Social Network ApproachAndry Alamsyah
This document discusses using social network analysis approaches for big data analytics. It begins by introducing social network metrics like centrality and modularity that can be applied to large social network datasets. It then provides examples of how social network analysis has been used to detect terrorist cells and identify research communities. Finally, it outlines the author's research interests and publications in areas like sentiment analysis on social media and using social networks to analyze industries.
2011 IEEE Social Computing Nodexl: Group-In-A-BoxMarc Smith
The document proposes a new layout called Group-In-a-Box (GIB) for visualizing clustered graphs that enables multi-faceted analysis of networks. GIB uses the treemap technique to display each graph cluster or category group within its own box, sized according to the number of vertices. This allows analysis of both community structure detected from network clustering algorithms as well as categories of individuals. The document demonstrates GIB on real social networks and synthetic networks, showing it can reveal intra-group network structures and the attributes of members in different groups.
This document summarizes a research paper that analyzed social subgroups and community structure on social networking websites. The paper used the NodeXL tool to analyze Twitter data and identify the most influential group discussing "foreign affairs". It found that 232 users tweeted about foreign affairs, forming 30 groups. The largest group had 71 users and 93 unique connections. Network analysis metrics like in-degree, betweenness centrality, and eigenvector centrality identified the most influential users within the network discussing foreign affairs. This analysis can help organizations understand influential users and groups discussing certain topics on social media.
This document discusses using an agent-based model and social network analysis to evaluate the effectiveness of different strategies for disrupting terrorist networks. The model is based on a 271-member al-Qaeda network and analyzes how network metrics change when kinetic and non-kinetic strategies are implemented under varying levels of network morale. The goal is to determine which strategies most impact network structure and achieve disruption goals. The document provides background on using social network analysis to understand terrorist networks and their evolution. It then describes how machine learning was used to train the al-Qaeda network model and outlines different disruption strategies that could be implemented in the model.
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxzmark3
response.pdf
response
by Abc Abc
Submission date: 14-May-2020 05:58AM (UTC-0400)
Submission ID: 1324028097
File name: response.docx (36.28K)
Word count: 355
Character count: 1780
0%
SIMILARITY INDEX
0%
INTERNET SOURCES
0%
PUBLICATIONS
0%
STUDENT PAPERS
Exclude quotes On
Exclude bibliography On
Exclude matches Off
response
ORIGINALITY REPORT
PRIMARY SOURCES
responseby Abc AbcresponseORIGINALITY REPORTPRIMARY SOURCES
response. d.docx
Running Head: RESPONSE
1
RESPONSE 2
Response
Name
Course
Date of Submission
Discussion 1
Hello, it was interesting to read your post. It is indeed true that honeypots are much expensive than the real security system. There exist several issues with honeypots and most of which make 'it hard for individuals to deal with them. One such issue is individuals' lack of familiarity with them, as you have stated in the post. The main objective of designing and using honeypots is for the attackers to make brute attacks on the system without being noticed by the administration. This is the reason why if a single honeypot gets into the system, it can end up being used to compromise the entire host system, as you have stated in your post. As you have stated in your post, a honeypot is highly relied upon when individuals are considering acquiring valuable intelligence from an organization but one that is still not the most sensitive. Some of the questions which arise with the usage of honeypots in such ventures are whether they can be used by forces to help counter-terrorism. In the age of technology, police are using the internet and its filtering capabilities to identify terrorists and how they conduct recruitment (Sharma & Kaul, 2018).
Discussion 2
Hello, it was interesting to read your post; it was informative. From your research, you have identified the primary objective of honeypot being diversion of assassins so as to extract critical information and data about them by following all the moves they make. This objective does not, however, acknowledge whether there are means of injecting honeypots to the assassins and whether they have measures of protecting their systems against such attempts. Honey pots have been noted to be effective at identifying potential assaults, as you have stated in your post. They are, however, not much effective as attacks still occur in their presence and can only identify a single attack at a time, as you have stated in the post.
References
Sharma, S., & Kaul, A. (2018). A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular Communications, 12, 138-164.
Discussion 1 :
Top of Form
Network separation is a standard network practice that has security architecture concepts that are implemented to secure the entire system. It uses various approaches such as.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share their interests without being at the same geographical location. With the great and rapid growth of Social Media sites such as Facebook, LinkedIn, Twitter…etc. causes huge amount of user-generated content. Thus, the improvement in the information quality and integrity becomes a great challenge to all social media sites, which allows users to get the desired content or be linked to the best link relation using improved search / link technique. So introducing semantics to social networks will widen up the representation of the social networks. In this paper, a new model of social networks based on semantic tag ranking is introduced. This model is based on the concept of multi-agent systems. In this proposed model the representation of social links will be extended by the semantic relationships found in the vocabularies which are known as (tags) in most of social networks.The proposed model for the social media engine is based on enhanced Latent Dirichlet Allocation(E-LDA) as a semantic indexing algorithm, combined with Tag Rank as social network ranking algorithm. The improvements on (E-LDA) phase is done by optimizing (LDA) algorithm using the optimal parameters. Then a filter is introduced to enhance the final indexing output. In ranking phase, using Tag Rank based on the indexing phase has improved the output of the ranking. Simulation results of the proposed model have shown improvements in indexing and ranking output.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
The document presents a new model for intelligent social networks based on semantic tag ranking. It uses a multi-agent system approach with agents performing indexing and ranking. For indexing, it uses an enhanced Latent Dirichlet Allocation (E-LDA) model that optimizes LDA parameters. Tags above a threshold from E-LDA output are ranked using Tag Rank. Simulation results showed improvements in indexing and ranking over conventional methods. The model introduces semantics to social networks to improve search and link recommendation.
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...dsnow9802
Colby Hobson stands out as a dynamic leader in the residential construction industry. With a solid reputation built on his exceptional communication and presentation skills, Colby has proven himself to be an excellent team player, fostering a collaborative and efficient work environment.
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...ssuserf63bd7
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd test bank.docx
https://qidiantiku.com/test-bank-for-small-business-management-an-entrepreneurs-guidebook-8th-edition-by-mary-jane-byrd.shtml
Leading Change_ Unveiling the Power of Transformational Leadership Style.pdfEnterprise Wired
In this comprehensive guide, we delve into the essence of transformational leadership style, its core principles, key characteristics, and its transformative impact on organizational culture and outcomes.
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...Samirsinh Parmar
Disaster management;
Cyclone Disaster Management;;
Biparjoy Cyclone Case Study;
Meteorological Observations;
Best practices in Disaster Management;
Synchronization of Agencies;
GSDMA in Cyclone disaster Management;
History of Cyclone in Arabian ocean;
Intensity of Cyclone in Gujarat;
Cyclone preparedness;
Miscellaneous observations - Biparjoy cyclone;
Role of social Media in Disaster Management;
Unique features of Biparjoy cyclone;
Role of IMD in Biparjoy Prediction;
Lessons Learned; Disaster Preparedness; published paper;
Case study; for disaster management agencies; for guideline to manage cyclone disaster; cyclone management; cyclone risks; rescue and rehabilitation for cyclone; timely evacuation during cyclone; port closure; tourism closure etc.
Project Management Infographics . Power point projetSAMIBENREJEB1
Project Management Infographics ces modèle power Point peut vous aider a traiter votre projet initiative pour le gestion de projet. Essayer dès maintenant savoir plus c'est quoi le diagramme gant et perte, la durée de vie d'un projet , ainsi que les intervenants d'un projet et le cycle de projet . Alors la question c'est comment gérer son projet efficacement ? Le meilleur planning et l'intelligence sont les fondamentaux de projet
Originally presented at XP2024 Bolzano
While agile has entered the post-mainstream age, possibly losing its mojo along the way, the rise of remote working is dealing a more severe blow than its industrialization.
In this talk we'll have a look to the cumulative effect of the constraints of a remote working environment and of the common countermeasures.
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...Rokibul Hasan
The Ready-Made Garments (RMG) industry in Bangladesh is a cornerstone of the economy, but increasing costs and stagnant productivity pose significant challenges to profitability. This study explores the implementation of Lean Management in the Sampling Section of RMG factories to enhance productivity. Drawing from a comprehensive literature review, theoretical framework, and action research methodology, the study identifies key areas for improvement and proposes solutions.
Through the DMAIC approach (Define, Measure, Analyze, Improve, Control), the research identifies low productivity as the primary problem in the Sampling Section, with a PPH (Productivity per head) of only 4.0. Using Lean Management techniques such as 5S, Standardized work, PDCA/Kaizen, KANBAN, and Quick Changeover, the study addresses issues such as pre and post Quick Changeover (QCO) time, improper line balancing, and sudden plan changes.
The research employs regression analysis to test hypotheses, revealing a significant correlation between reducing QCO time and increasing productivity. With a regression equation of Y = -0.000501X + 6.72 and an R-squared value of 0.98, the study demonstrates a strong relationship between the independent variables (QCO downtime and improper line balancing downtime) and the dependent variable (productivity per head).
The findings suggest that by implementing Lean Management practices and addressing key productivity inhibitors, RMG factories can achieve substantial improvements in efficiency and profitability. The study provides valuable insights for practitioners, policymakers, and researchers seeking to enhance productivity in the RMG industry and similar manufacturing sectors.
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Dr. Nazrul Islam
Healthy economic development requires properly managing the banking industry of any
country. Along with state-owned banks, private banks play a critical role in the country's economy.
Managers in all types of banks now confront the same challenge: how to get the utmost output from
their employees. Therefore, Performance appraisal appears to be inevitable since it set the
standard for comparing actual performance to established objectives and recommending practical
solutions that help the organization achieve sustainable growth. Therefore, the purpose of this
research is to determine the effect of performance appraisal on employee motivation and retention.
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Alexey Krivitsky
Is Agile dead? It depends on what you mean by 'Agile'. If you mean that the organizations are not getting the promised benefits because they were focusing too much on the team-level agile "ways of working" instead of systemic global improvements -- then we are in agreement. It is a misunderstanding of Agility that led us down a dead-end. At Org Topologies, we see bright sparks -- the signs of the 'second wave of Agile' as we call it. The emphasis is shifting towards both in-team and inter-team collaboration. Away from false dichotomies. Both: team autonomy and shared broad product ownership are required to sustain true result-oriented organizational agility. Org Topologies is a package offering a visual language plus thinking tools required to communicate org development direction and can be used to help design and then sustain org change aiming at higher organizational archetypes.
4. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
4)
CEO
C-Suite
Heir Apparent
Other Senior Person
Yanjie
B
B
B
B
Jim
Bob
B
B
B
Jie
Social Network
at the Top
of the Company
Lines indicate frequent and
substantive work discussion;
heavy lines especially
close relationships.
Asia
US
EU and Emerging
Markets
R&D
Front
Office
Back
Office
Figure 2 in Burt, "Network disadvantaged entrepreneurs" (Entrepreneurship Theory & Practice, 2019)
5. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
5)
This worksheet is completed in four steps:
(1) In the oval, write your first name.
(2) In the squares, write the first name or
nickname of five people with whom you
have had the most frequent and substantive
contact while you have been at Booth. This
could be other Booth students, professors,
staff, people with whom you
work, or just good friends with
whom you have had frequent
and substantive contact while at
Booth.
(3) Draw a line between each pair of contacts
who are connected in the sense that they
have frequent and substantive contact with
one another.
(4) Compute network density (# / #possible).
Count the number of lines between contacts
(exclude relations between you and the
contacts). Divide by the number possible
(n[n-1]/2, where n is number of contacts,
which is 5 in this example). Multiply by 100
and round to nearest percent.
DENSITY = _____________
Reflection #1: Network Data
(Complete this page, scan, and submit by midnight Thursday of the week when we finish discussing this handout.)
The "network" around a person is a pattern of relationships with and between colleagues.
SOCIOGRAM
graphic image of
a network in which
dots represent
nodes (a person,
group, etc.) and
lines represent
connections
Appendix I contains an illustrative survey webpage used to gather network data.
Please don't
use full names;
just first names
or nicknames.
A
B
C
D
E
_________________________________
Name, Section
7. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
7)
Network models of advantage are grounded in two facts about the social distribution of
information from the 1950s “golden age” of social psychology (e.g., Festinger, Schachter & Back, 1950;
Asch, 1951; Schachter, 1951; Katz & Lazarsfeld, 1955): (1) people cluster into groups as a result of contact
opportunities defined by the places where people meet, and (2) communication is more frequent and
influential within than between groups so that people in the same group develop similar views.
People tire of repeating arguments and stories explaining why they believe and behave the way they do.
Within a group, people create systems of phrasing, opinions, symbols and behaviors defining what it means to be a
member. Beneath the familiar arguments and experiences are new, emerging arguments and experiences awaiting a
label, the emerging items more understood than said within the group. What was once explicit knowledge interpretable
by anyone becomes tacit knowledge meaningful primarily to insiders. With continued time together, information in the
group becomes “sticky” – nuanced, interconnected meanings difficult to understand in other groups (Von Hippel,
1994). Much of what we know is not easily understood beyond the colleagues around us. Holes tear open in the flow of
information between groups. These holes in the social structure of communication, or more simply structural holes
(Burt, 1992), are missing relations indicating where information is likely to differ on each side of the hole and not flow
easily across the hole. In short, the bridge and cluster structure in social networks indicates where information is
relatively homogeneous (within cluster) and where information is likely to be heterogeneous (between clusters).
Bob Merton
1910-2003
Paul
Lazarsfeld
1901-1976
Elihu Katz
1926 - 2021
Stanley
Schachter
1922-1997
Leon Festinger
1919-1989
Solomon Asch
1907-1996
From Burt, "Network disadvantaged entrepreneurs" (Entrepreneurial Theory and Practice, 2019, page 22)
Network Structure Maps Distribution of Information
8. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
8)
James
Robert
1
2
3
5
4
6
7
A
B
C & D
25
1
0
100
29
Group A
Group B
Group C
Group D
Density Table
0
85
5
0
0
person 3: .402 = [.25+0]2 + [.25+.084]2 + [.25+.091]2 + [.25+.084]2
Robert: .148 = [.077+0]2 + [.154+0]2 + [.154+0]2 + [.154+0]2 + [.154+0]2 + [.154+0]2 + [.154+0]2
Network Constraint
(C = Σj cij = Σj [pij + Σq piqpqj]2, i,j ≠ q)
Network
indicates
distribution
of sticky
information,
which defines
advantage.
From Figure 1.1 in Brokerage and Closure.
Bridge & Cluster: The "Small World" of Social Life
9. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
9)
(“The Bull,” 1917 Berlin political cartoon of Bavarian bourgeois)
Social
Network
Analysis
Network
Brokerage
and
Competitive
Advantage
(page
4)
CEO
C-Suite
Heir Apparent
Other Senior Person
Yanjie
B
B
B
B
Jim
Bob
B
B
B
Jie
Social Network
at the Top
of the Company
Lines indicate frequent and
substantive work discussion;
heavy lines especially
close relationships.
Asia
US
EU and Emerging
Markets
R&D
Front
Office
Back
Office
Figure 2 in Burt, "Network disadvantaged entrepreneurs" (Entrepreneurship Theory & Practice, 2019)
Front
Office
JIM and JIE are
WARLORDs in their
businesses, Illustrating
the other rule of network
advantage:
Close the
network around your
contacts to promote trust
and efficiency.
11. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
11)
BEFORE
1
2
3
4
5
2
1
3
4
5
The employee AFTER is more positioned
at the crossroads of communication
between social clusters within the firm
and its market, and so is better
positioned to craft projects and
policy that add value across
clusters.
Here is the core network for a job BEFORE and AFTER the employee
expanded the network advantage of the job by reallocating network time
and energy to more diverse contacts.
Research shows that
employees in networks
like the AFTER network,
spanning structural holes,
are the key to integrating
operations across functional
and business boundaries. In
research comparing senior people
with networks like these BEFORE and
AFTER networks, it is the AFTER networks
that are associated with more creativity, faster
learning, more positive individual and team
evaluations, faster promotions,
and higher earnings.
*Network scores refer to direct contacts.
It is the weak connections (structural holes) between
contacts in the AFTER network that provides expanded
network advantage.
AFTER
5
3
.
6
c
o
n
s
t
r
a
i
n
t
20.0
constraint*
From Figure 1.4 in Burt (1992 Structural Holes), and Figure 1.2 in Brokerage and Closure.
See Appendix I on survey network data, Appendix II on measuring network constraint.
Create Value
by Bridging
Structural
Holes
STICKY INFORMATION
Information expensive to move
because: (a) tacit, (b) complex,
(c) requires other knowledge to
absorb, or (d) interaction with
sender, recipient, or channel.
STRUCTURAL HOLE
disconnection between two
groups or clusters of people
BRIDGE
relation across structural hole
NETWORK ENTREPRENEUR
or "broker," or "connector:"
a person who coordinates
across a structural hole
BROKERAGE
act of coordinating across
a structural hole
information
breadth,
timing, and
arbitrage
12. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
12)
(Q201) Sociograms of the bridge-and-cluster structure to an organization or its
market provide a map of how information is distributed. All of the below are
true except:
A. Clusters indicate where information
is likely to differ.
B. Clusters indicate where information
is likely to be sticky.
C. The lack of bridge relations indicates where there is a problem
for integrated company operations.
D. Bridge relations indicate which people are positioned to be
network brokers.
E. Clusters indicate where there are structural holes in the
organization or market.
CEO
C-Suite
Heir Apparent
Other Senior Person
Bill
B
B
B
B
B
B
B
Bob
13. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
13)
(Q261) Information and ways of understanding are more
homogeneous within than between social clusters. Being able to
see the boundaries between social clusters is therefore critical to
identifying the structural holes that define rewarding opportunities
for brokerage. Fortunately, (circle best completion to the
sentence):
A. the boundaries around social clusters are sharply defined by the
absence of connections between in clusters.
B. the boundaries around social clusters are often ambiguous but can be
identified by the absence of connections between clusters relative to
presence within clusters.
C. the boundaries around social clusters are often ambiguous so we define
them by talking with people in each cluster to learn whether opinion and
practice in one cluster differs from opinion or practice in the other cluster.
D. successful network brokers can ignore boundaries.
15. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
15)
MEASUREMENT: Idea is clear. Good prediction? Contrast
people rich in access to structural holes versus other
(cosmopolitans vs locals in Merton 1949; opinion leaders vs followers in Katz & Lazarsfeld 1955; extensive
vs intensive search in Rees 1966; leaders vs managers in Kotter 1990; exploration vs exploitation in March
1991; cultural omnivores vs univores in Peterson 1992; open vs closed networks, on the edge of worlds
vs at the center; and of course, Schumpeter's 1911 touchstone image of entrepreneurial "leaders" bringing
together elements from separate production spheres within which people live by routines)
Disconnected
contacts
provide rich
access to
structural
holes
Here network constraint – the extent to which a person’s network is limited to a
single group, which means they have no access to structural holes (other popular
measures are size, density, and ego-network betweenness). Constraint increases
as a network becomes small (few alternative contacts), dense (strong relations
between contacts), or hierarchical (central contact holds others together)
Data are easily available from surveys, 360˚, email, and other electronic trace
(badges, chat rooms, social media, virtual worlds, etc.).
Network Constraint
many ——— Structural Holes ——— few
— few
r = -.73
Z-Score
Business
(positive
evaluation,
high
compensa
100% in one
group provides
no access
to structural
holes
See Appendix I on network survey data, and Appendix II on measuring access to structural holes.
16. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
16)
size (degree)
density (# / #possible)
betweenness (holes)
size (degree)
density (# / #possible)
betweenness (holes)
E B
D C
A
E B
D C
A
E B
D C
A
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
C B
A
A A
C B
C B
_____
_____
_____
B
D
C
A
In-Class Worksheet for Network Metrics
Ego is not presented. These are just ego's key contacts. All connections are symmetric and binary (zei = zej = 1).
EgoNetwork Betweenness = ∑i
∑j>i
([zei zej - zij] / [∑k
zki zkj]), k ≠ i, j, and index k includes ego "e."
Discussed in Appendix II.
A B C D
A __
B __
C __
D __
17. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
17)
Network Constraint
decreases with number of contacts
(size), increases with strength of
connections between contacts
(density), and increases with sharing
the network (hierarchy/centralization,
table is discussed in Appendix II).
This is Figure 1 in Burt, "Reinforced Structural Holes,"
(2015, Social Networks, an elaboration of Figure B.2
in Neighbor Networks). Graph above plots density
and hierarchy for 1,989 networks observed in six
management populations (aggregated in Figure
2.4 in Neighbor Networks to illustrate returns to
brokerage). Squares are executives (MD or more
in finance, VP or more otherwise). Circles are lower
ranks. Executives have significantly larger, less
dense, and less hierarchical networks.
To keep the diagrams simple, relations with ego are not presented.
E B
D C
A
Clique
Networks
3
100
0
93
31
31
31
1.0
0.0
5
100
0
65
13
13
13
13
13
1.0
0.0
10
100
0
36
1.0
0.0
Partner
Networks
3
67
7
84
44
20
20
1.7
0.5
5
40
25
59
36
6
6
6
6
3.4
3.0
10
20
50
41
8.2
18.0
Broker
Networks
3
0
0
33
11
11
11
3.0
3.0
5
0
0
20
4
4
4
4
4
5.0
10.0
10
0
0
10
10.0
45.0
Small
Networks
contacts
density x 100
hierarchy x 100
constraint x 100
from:
A
B
C
nonredundant contacts
betweenness (holes)
Larger
Networks
contacts
density x 100
hierarchy x 100
constraint x 100
from:
A
B
C
D
E
nonredundant contacts
betweenness (holes)
Still Larger
Networks
contacts
density x 100
hierarchy x 100
constraint x 100
nonredundant contacts
betweenness (holes)
E B
D C
A
A
C B
A
C D
A
C B
A
C B
E B
D C
A
Network Density
Network
Hierarchy/Centralization
Partner Networks
Clique
Networks
B
r
okers
Broker Networks, Partner Networks, and Clique Networks
18. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
18)
Network Metrics
for More Usual Networks
Graph plots ego-network betweenness scores
against network constraint scores for a probability
sample of 700 Chinese entrepreneurs
See Appendix II for more on similarity between
alternative measures of access to structural holes.
Network Constraint
many ——— Structural Holes ——— few
Network
Betweenness
few
———
Structural
Holes
———
many
r = -.92
21. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
21) Reflection #2: Network Metrics
(Complete this page, scan, and submit by midnight Thursday
of the week when we finish discussing this handout.)
Compute the network metrics for ego in these six networks. Ego is not presented; just
ego's key contacts. All connections are symmetric and binary (zei = zej = 1).
_________________________________
Name, Section
size (degree)
density (# / #possible)
betweenness (holes)
size (degree)
density (# / #possible)
betweenness (holes)
E B
D C
A
E B
D C
A
E B
D C
A
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
_____
E B
D C
A
E B
D C
A
F B
D
C
A
22. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
22)
Strategic
Leadership
Foundations
(page
3)
CEO
C-Suite
Heir Apparent
Other Senior Person
Yanjie
B
B
B
B
Jim
Bob
B
B
B
Social Network
at the Top
of the Company
Lines indicate frequent and
substantive work discussion;
heavy lines especially
close relationships.
Asia
US
EU and Emerging
Markets
R&D
Front
Office
Back
Office
Figure 1 in Burt, "Network disadvantaged entrepreneurs" (Entrepreneurship Theory & Practice, 2019)
Back
Office
RULE 1, Brokers Do Better: For top-line growth, large open
networks facilitate creativity, innovation, and achievement via
information breadth, timing, and arbitrage advantages from
bridging structural holes (Milgram 1969; Granovetter 1973;
Freeman 1977; Burt 1980, 1992, 2005; 2021; Lin et al. 1981;
Gould & Fernandez 1989; Ahuja 2000; Lin 2001; Aral & Van
Alstyne 2011; Fleming & Waguespack 2007; Zaheer & Soda
2009; Goldberg et al. 2016; Soda, Tortoriello & Iorio 2018).
23. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
23)
Robert James
Now to establish the
empirical fact that
the people known as
"network brokers"
enjoy achievement
and rewards higher
than their peers.
Brokers are to the
left on the horizontal
axis contrasting
open with closed
networks.
small, closed
large, open
Network Constraint (x 100)
many ——— Structural Holes ——— few
Z-Score
Relative
Performance
Raw
Performance
Indicator
(evaluation,
compensation,
promotion)
Manager Background
(e.g., job rank, age, geography, kind of work,
organization division, education, etc.)
Bob’s performance
is higher than
expected
Jim’s performance
is lower than
expected
Define Z-Score
Relative Success
24. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
24)
Robert James
small, closed
large, open
Network Constraint (x 100)
many ——— Structural Holes ——— few
Z-Score
Relative
Performance
Raw
Performance
Indicator
(evaluation,
compensation,
promotion)
Manager Background
(e.g., job rank, age, geography, kind of work,
organization division, education, etc.)
Bob’s performance
is higher than
expected
Jim’s performance
is lower than
expected
Define Z-Score
Relative Success
Achievement and
rewards are
distinguished on the
vertical axis,
measuring the
extent to which a
person is doing
better than his or
her peers.
25. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
25)
Raw
Performance
Indicator
(evaluation,
compensation,
promotion)
Manager Background
(e.g., job rank, age, geography, kind of work,
organization division, education, etc.)
Bob’s performance
is higher than
expected
Jim’s performance
is lower than
expected
Define Z-Score
Relative Success
Network Constraint (x 100)
many ——— Structural Holes ——— few
Z-Score
Relative
Success
(evaluation,
compensation,
promotion)
Managers in the U.S.
(n = 2085, 7 study pops, r = -.75)
Managers in Europe
(n = 1094, 3 study pops, r = -.73)
Managers in Asia Pacific
(n = 507, 2 study pops, r = -.77)
Entrepreneurs in China
(n = 1084, 2 study pops, r = -.71)
EverQuest II Avatars (16109 people,
29555 characters, 2 samples, r = -.79)
Success Decreases as the Network
Around a Person Closes
median network
constraint (49 points)
NOTE — Plotted data are average scores within five-point intervals of network constraint within each study population (2018 survey added to Burt, Social Networks 2019:
Figure 1; see footnote 2 there for data sources; cf. Figure 1.8 in Brokerage and Closure). Correlations are computed from the plotted data using log network constraint
(-.75 for aggregate regression line displayed). Inset graph to the upper left contains hypothetical data illustrating computation of z-score relative success.
26. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
26)
Note the extreme
inequality in
Second Life,
a world of open
access and little
formal structure.
Achievement is in z-scores
so average is zero with
unit standard deviation. Of
6,391,823 avatars studied,
6,279,978 (98%) have zero
achievement (minimum
score of -0.12). see
Rosen (1981, AER, "The
economics of superstars"). Dots are average Y scores within integer (left) or five-point (right) intervals on
horizontal axis. EverQuest II achievement variable is the predicted character
level in Model 8, Tables 3.4 and 3.5. Second Life achievement is the canonical
correlation dependent variable in Model 15, Tables 3.5 and 3.6.
Effective Size
(Number of NonRedundant Contacts)
Predicted
Avatar
Z-score
Achievement
Network Constraint (x 100)
Predicted
Avatar
Z-score
Achievement
Second Life prediction from
constrained social network
Second Life prediction from
nonredundant social contacts
EverQuest II prediction
from constrained social (upper)
versus economic (lower) network
EverQuest II prediction from
nonredundant social (upper)
versus economic (lower) contacts
25+
from Burt (2020 Structural Holes in Virtual Worlds).
28. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
28)
Relative Network Constraint
(Actual Constraint on Subject / Average Actual Constraint on Teammates)
Percent
Leader
Cites
(Leader
Cites
to
Subject
/
Total
Leader
Cites
in
Team)
r = -.94 with ln(relative network constraint)
Person as constrained as
average teammate gets
20% of leadership vote.
Person half
as constrained
as average
teammate
gets 70% of
leadership
vote.
Even with Random Assignment to Networks,
Network Brokers Are Perceived To Be Leaders (results)
Data are averaged within .05 intervals of relative network constraint. Inset table contains standardized regression coefficients
and test statistics for constraint predictions with controls. Burt, Reagans, and Volvovsky (Social Networks, 2021:Fig 10).
beta
t-test
(N=385)
Network
Constraint
-.29 -5.24 Defined
-.45 -6.74 Behavioral
-.63 -13.91 Relative
29. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
29)
Returns to Brokerage Are Evident
in Low Returns to Over-Specialized Students
Figures and text are from Merluzzi and Phillips (2016 Administrative Science Quarterly),
“The Specialist Discount." For more applied discussion, see Merluzzi, (June 2016 HBR),
"Generalists get better job offers than specialists." Looking later in the career, Kleinbaum (2012 ASQ) "Organizational misfits,"
shows with email data that managers with unusual patterns of communication are most likely to emerge the valued network brokers.
Recent scholarship on the returns to labor market specialization often claims
that being specialized is advantageous for job candidates. We argue, in contrast,
that a specialist discount may occur in contexts that share three features: strong
institutionalized mechanisms, candidate profiles with direct investments that
signal their value, and a high supply of focused candidates relative to demand.
We then test whether there is a specialist discount for graduating elite MBAs,
as it is a labor market that exemplifies these conditions under which we expect
specialists to be penalized. Using rich data on two graduating cohorts from a top-
tier U.S. business school (full-time students, 2008-2009), we show that elite MBA
graduates who established a focused (specialized) market profile of experiences
relating to investment banking before and during the program were less likely to
receive multiple job offers and were offered less in starting-bonus compensation
than similar MBA candidates with no exposure or less-focused exposure to
investment banking. Our theory and findings suggest that the oft-documented
specialist advantage may be overstated.
Figure 1 displays predicted (marginal) probabilities of receiving multiple offers for
candidates who have mean values for each of the control variables but different
profiles.
Figure2comparesthestartingbonusesofhypotheticaljobcandidateswithdifferent
profiles. Each hypothetical candidate is a single white male who graduated from a
top-20 undergraduate institution, has above a 3.8 GPA, received more than one
job offer, has the mean age and work experience characteristics (months, number
of firms), accepts a job in I-banking, and earns the mean base salary for I-banking
jobs in his 2008 cohort year. The only difference is the candidate’s profile in terms
of exposure to I-banking.
FOCUSED (career history in finance before mba, concentration in finance, joined
an i-banking club during mba, and i-banking internship; 61% of students who
graduate to a job in i-banking were focused on i-banking)
NON-SEQUENTIAL exposure (neither of the above categories, but some mba
program contact with i-banking)
PARTIAL sequential exposure (prior experience in finance + concentration in
finance or participation in i-banking club)
PRE-MBA exposure (only exposure before mba program)
30. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
30)
Supplier
Evaluation
of
Telecom
(mean
eval
of
forecast
accuracy
and
development
cycle
volatilty)
(1
=
unacceptable,
2
=
satisfactory,
3
=
meets
requirement
Network Constraint on Best-Connected
Procurement Manager Assigned to the Supplier
(lowest network constraint score among managers for whom
the supplier is where manager spends the most time)
r = -.44
t = -2.89
P < .01
Returns to Brokerage Are Evident in
Business-to-Business Coordination
Supplier POC (from Telecom's periodic surveys
of suppliers): In 32 key supplier organizations, managers
with primary responsibility for sales to Telcom are surveyed
about their experience with Telecom. For larger suppliers, two
or three managers are interviewed (e.g., Foxconn, Samsung,
Sharp, Toshiba). Each interviewed manager is asked to describe
his or her experience with respect to Telecom forecast accuracy
and volatility in the development cycle (3 meets requirements, 2
satisfactory, or 1 unacceptable). The vertical axis is the average
evaluation for each key supplier of doing business with Telecom.
Telecom POC (from network survey
within Telecom): The 55 managers in
Telecom procurement support (no direct supplier
contact) are asked to indicate their involvement
in company operations with each of the 32 key
suppliers. A manager could say that a supplier
is one "on which I spend the most time," or "with
which I have some direct contact," or "on which I
work indirectly through other Telecom employees"
(or leave it blank if manager had no contact with
the supplier). For each of the 32 key suppliers,
I identified the managers who said they spend
"most time" on the supplier, and selected the two
respondents who had the most attractive network
metrics defined by "frequent and substantive
work contact" relations. The horizontal axis is
the average network constraint score for the
two best-connected procurement managers
spending "most time" on the supplier providing
the evaluation on the vertical axis.
31. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
31)
Returns to Brokerage Aggregate
to Companies, Industries, and Communities
People with phone networks
that span structural holes
live in communities higher
in socio-economic rank
Networks are defined by land-line & mobile
phone calls (map to left). Socio-economic
rank is UK government index of multiple
deprivation (IMD) based on local income,
employment, education, health, crime,
housing, and environmental quality (graph
below). Units are phone area codes.
figures from Eagle, Macy, and Claxton (2010 Science), “Network diversity and economic development”
32. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
32)
(Q150) Using network density as a rough indicator of John's
access to structural holes, do you expect him to be doing well or
not so well in his career?
A. Well, John’s contacts are well
connected.
B. Well, Susan serves as a
partner to John.
C. Not so well, John is disconnected.
D. Not so well, too many connections missing between
contacts
E. Not so well, too many connections between contacts.
33. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
33)
(Q15) An attractive feature to building a
brokerage network is that once you have
it in place, you can sit back and enjoy your
competitive advantage over your peers.
True or false?
(Q83) Returns to brokerage depend on
senior management recognizing the
importance of social networks for
employee performance. True or false?
A. True
B. False
A. True
B. False
34. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
34)
(Q289) Bridging structural holes can improve the odds of
achievement, but achievement improves the odds of
bridging structural holes. We cannot say that network
structure is always causal for achievement, but given
supportive evidence from experiments with random
assignment to networks, we believe it can be causal. True
or False?
A. True.
B. False.
Network Broker Achievement
35. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
35)
HOW IT WORKS: Creativity and Innovation
Are at the Heart of It
from Burt, "The social capital of structural holes" (2002 The New Economic Sociology). The consequences of the
information diversity associated with network brokerage is productively elaborated at length in economist Scott
Page's 2007 book, The Difference: How the Power of Diversity Creates Better Groups, Firms, Schools and Societies.
Brokerage
across
Structural Holes
Creativity & Innovation
(What should be done?)
Achievement & Rewards
(What benefits?)
Adaptive Implementation
(How to frame it & who should be involved?)
Alternative Perspective (how would this problem look from the perspective of
a different group, or groups — thinking “out of the box” is often less valuable than seeing
the problem as it would look if you were inside a specific “other box”)
Best Practice (something they think or do could be valuable in my operations)
Analogy (something about the way they think or behave has implications for how I can enhance the value of my operations; i.e., look for the value of
juxtapositioning two clusters, not reasons why the two are different so as to be irrelevant to one another — you often find what you look for)
Synergy (resources in our separate operations can be combined to create a valuable new idea/practice/product)
What in your work
improves the odds
that you will discover
the value of something
you don't know you don't know?
36. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
36)
Illustration: Where did the M-16 come from?
*Photos are from the video shown during the session. For discussion and references, see page 73 in Brokerage
and Closure. For sampling on the dependent variable, see Rosenzweig, “Misunderstanding the nature of
company performance: the halo effect and other business delusions,” 2007 California Management Review.
Rothenberg and Greenberg, 1976, The Index of Scientific Writings on Creativity 1566-1974. (10,000 entries)
Discussion Question*
Consequential ideas are typically attributed to special people, geniuses, in part to make us feel less
uncomfortable about our own ideas. True to form, an American armament expert describes Eugene
Stoner, the engineer who developed the M-16 assault rifle, as "an engineering genius of the first order."
Another describes him as "the most gifted small-arm designer since Browning." (Browning patented the
widely-adopted BAR and 45 automatic.)
Based on the brief history video, how would you describe Stoner's genius?
1 sociology
5 group processes
65 genius & talent
38. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
38)
Four Illustrative Idea Texts
(4.5 value, 20 network constraint, 122 words) — Reward program management for leveraging across the corporation. Poor
ability to forecast program releases to the part number level. Accounting for program release cycles as we attempt to establish
CWAs that span the Company. When it is time to handle the program release then time is too short to do all the necessary
cross-BU activity that is required. Lack of recognition of the difference between the effort required to get even semi-sophisticated
parts on CWA and with competing these items (versus obtaining COTS hardware) is associated with this problem. Also, having
adequate resources is part of the problem. Policy change needs to involve the best people, people who wield influence, true
commodity experts with practical experience on the largest programs.
(4.5 value, 22 network constraint, 114 words) — I believe that we are doing a lot of positive things to improve SCM across the
Company (Professional Development, CMMI, e-tools, Supplier Rating System, etc.). However, our current organization structure
inhibits us from leading the Industry in SCM effectiveness. Programs currently dictate our sources of supply. Therefore we are
not able to fully leverage our Company buying power nor are we able to present that one Company voice to our suppliers. If
SCM orgs reported directly to the Corporate VP of SCM, we would have more clout and be able to influence Enterprise
decisions. At minimum, SCM orgs should report dual solid line to both Corp VP SCM and the BU General Manager.
(1.5 value, 96 network constraint, 95 words) — Too much micromanagement! The cost-type development programs require cost-
type subcontracts and COTS equipment. There ARE differences in development and integration that make it difficult to forecast
beyond a few months relative to commitments, etc. We do not do fixed price production. The tools chosen by Corporate (i.e.,
Exostar and Freemarkets) are not useful at our location and don't really save money. Need to re-think the organization and
divide into production vs development-type orgs. Too many bosses and too many requests for info from too many sources. Too
many e-procurement initiatives.
(1.0 value, 100 network constraint, 102 words) — The number of new hires in SCM is growing at a rapid rate, specifically Buyers
and Planners. There are currently four working Managers overseeing approximately 90 Staff. Working Managers have broad
responsibilities over and above supporting their Staff. Therefore, the Staff does not get the direction nor support needed to excel
and improve processes. Recommendation of Change: (1) Relieve managers that oversee large staffs from other responsibilities
so that they can manage their staff, or (2) Add more senior managers so that the staffs are smaller, or (3) Put in place a second
line of supervision that can direct and support the staff.
NOTE — Word count is from LIWC. BU stands for business unit. CMMI stands for Capability Maturity Model Integration. “Company” stands for the name of
the firm. COTS stands for products available commercially off the shelf. CWA stands for CEN Workshop Agreement, which is a consensus-based
specification. Exostar and Freemarkets are commercial products for supply-chain management. SCM stands for supply-chain management or supply-chain
manager.
The 455 idea data from this study population are discussed with examples in Brokerage & Closure, pages 66-69.
39. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
39)
from Figure 2.1 in Brokerage and Closure (or Figure 5 in Burt, "Structural holes and good ideas," 2004 American Journal of Sociology,
point is elaborated in Burt and Soda, "The social origins of great strategies," 2017 Strategy Science).
^
Management
Evaluation
of
Idea's
Value
a
6.42
4.08
5.51
b
-1.04
-.63
-.91
t
-5.8
-3.9
-7.4
Executive 1
Executive 2
Combined
^
P(no idea)
11.2 logit test statistic
Network Constraint (x 100)
many ——— Structural Holes ——— few
Probability
". . . for those ideas that were
either too local in nature,
incomprehensible, vague,
or too whiny, I didn't rate them"
P(no idea)
11.2 logit test statistic
P(dismiss)
5.5 logit
test statistic
Network Constraint (x 100)
many ——— Structural Holes ——— few
Y = a + b ln(C),
across 455 managers
Network Brokers Are More Likely
to Propose Good Ideas
40. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
40)
NOTE — Columns distinguish the bottom, middle, and top third of 455 managers on network constraint. The three
columns (-1, 0, 1) predict the row variables. “Outstanding idea” is percent of managers whose idea received the
maximum rating from either judge (49 of 455 ideas). Probability test is based on a -4.76 z-score test statistic in a logit
regression model. “Idea Dismissed” is the percent of managers whose idea is dismissed by either judge as not worth
rating (145 of 455 ideas). Probability test is based on a 5.14 z-score in a logit regression model. “Familiar Text” is the
number of words in a manager’s text that are familiar in the sense that they are found in the LIWC language software
dictionary. Probability test is based on a -9.49 z-score in a Poisson regression model. All three predictions include a
control for the number of words in a manager’s idea text.
Network Brokers Use More Familiar Words
Network Brokers:
Relatively
Open Networks
(n = 146)
Average
Networks
(n = 157)
Clique Managers:
Relatively Closed
Networks
(n = 152)
Probability
No Difference
Outstanding Idea 23.3% 4.5% 5.3% P < .001
Idea Dismissed 14.4% 36.9% 43.4% P < .001
Familiar Words 56.3 46.7 34.3 P < .001
Adapted from Table 1 in Burt, "Social network and creativity" (Handbook of Research on Creativity and Innovation,
2020). For more general results on broker advantage depending on brokers using familiar language, see Goldberg,
Srivastava, et al., "Fitting in or standing out?" (2016, American Sociological Review)
41. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
41)
The Doctor Who Production World
These are the 593 connections among the 200 producers, directors, and writers,1963 to 2014 (from Soda,
Mannucci, Burt, 2021, AMJ). Lines connect people who worked on the same episode. Bold lines connect
people who worked on two or more episodes together. Larger symbols indicate people on more episodes.
42. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
42)
Colleagues = 3
Constraint = 92.6
Colleagues = 5
Constraint = 59.9
Colleagues = 8
Constraint = 33.1
NOTE — Persons B, C, and D are members
in A’s final team. Each dot is a different
person in prior teams. “Colleagues” is the
number of people with whom A has worked.
Constraint is 100 x A’s network constraint
score (horizontal axis in Figure 2B).
Relatively closed
team history (Ca
score of 92.6 is a
z-score of 0.8)
About average
team history
Relatively open
team history (Ca
score of 33.1 is a
z-score of -1.2)
A
D
B C
A
D
B C
A
D
B C
A
D
B C
A
D
B C
A
D
B C
D
B C
A
B C
D
B C
A
D
B C
D
B C
D
B C
A
B C
A
B C
A
B C
D
B C
Further Back Prior Final
Three Team Histories for Person A
Figure 3 in Burt, "Social network and creativity" (Handbook of Research on Creativity and Innovation, 2021).
43. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
43)
Maximum
Episode
Creativity
Maximum episode creativity
Mean of the other two measures
Maximum role-creativity in episode
Network Constraint
(lack of structural holes within and between
producer-director-writer teams in which an artist worked)
Greatest Creativity Decreases as Network Closes
Graph is from Soda, Mannucci, and Burt (2021, Academy of Management Journal). Creativity scores for the producers,
directors, and writers are averaged within five-point intervals of network constraint (two intervals containing only one individual
are combined with the closest adjacent interval). Creativity is measured by the highest creativity rating an artist ever received
for his or her role on an episode (square), and the highest rating ever received by an episode on which he or she worked
(circle). Solid dots are the average of the episode and role creativity averages.Test statistics are given in parentheses and
outlier producer John Nathan Turner is excluded from the prediction. Picture is an evil alien (Zygon) in the series.
44. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
44)
Career Creativity Decreases as Network Closes
Graph is from Soda, Mannucci, and Burt (2021). Creativity scores for the 200 producers, directors, and writers are averaged
within five-point intervals of network constraint (two intervals containing only one individual are combined with the closest adjacent
interval). Creativity is measured by the total number of an artist’s episodes given a maximum creativity rating by either judge
for the episode (circle) or the artist’s role on the episode (square). Solid dots are the average of the episode and role creativity
averages. Test statistics are given in parentheses and outlier producer John Nathan Turner is excluded from the prediction.
Network Constraint
(lack of structural holes within and between
producer-director-writer teams in which artist worked)
Number highly creative episodes
Mean of the two measures
Number of high role-creative episodes
Number
of
High-Creativity
Episodes
45. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
45)
(Q130) We discussed creativity/innovation as an import-export
game that does not require genius. Which of the below is most
responsible for the truth of the statement?
A. A person can be lucky whether or not she is a genius.
B. Genius is a word the ignorant use to describe competent.
C. To be seen as creative, find people more ignorant than
yourself.
D. Idea value resides in the audience.
E. Idea value resides in the inventor.
46. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
46)
(Q203) Closed networks do not identify
unintelligent managers so much as they
identify specialists. True or false?
(Q204) Innovation does not depend on
individual genius so much as it depends on
employees finding opportunities to broker
knowledge from where it is routine to where
it would create value. True or false?
(Q262) Network brokers are more likely to
propose creative, innovative ideas that appeal
to top management. One reason for the
appeal of broker proposals is the creative,
innovative language brokers use. True or
false?
A. True
B. False
A. True
B. False
A. True
B. False
47. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
47)
(Q260) The below team of four people, A B C D, are working on
current project. They worked together on their previous project.
They worked together on the project before that. Which of the
below sentences best describes the current team?
A. The team is likely to produce innovative content.
B. The team is unlikely to produce innovative content.
C. The team depends on executive sponsorship.
D. The team has a loose partner structure.
48. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
48)
Two Summary Points
Network Structure Is a Proxy for the Distribution of Information
For reasons of opportunity, shared interests, experience, a division of labor; organizations and markets
drift toward the bridge-and-cluster structure responsible for Milgram's “small world” phenomenon.
Rule One of Network Advantage: Brokers Do Better
Bridge relations across the structural holes between clusters provide information breadth, timing, and
arbitrage advantages, such that network brokers managing the bridges are at higher risk of “productive
accident” in detecting and developing good ideas. By clearing the sticky-information market across
organizations, brokers tend to be recognized leaders, better compensated than peers, more widely
celebrated than peers, and promoted to leadership more quickly than peers. Creativity and innovation
specifics:
- Closed networks do not identify unintelligent managers so much as specialists.
- Creativity is an import/export process. Value is not at the innovation source. It emerges each time
productive new knowledge is adopted in a target audience. In this, creativity and good ideas are
a by-product of network brokerage operating. "To feel creative, find someone more ignorant than
you."
- Creativity depends on the network as well as individual ability. It does not depend on individual
genius so much as it depends on people finding opportunities to broker knowledge from where it
is routine to where it would create value. In this, creativity and good ideas reflect how people are
organized as well as their individual abilities.
These are core rules for Leonardi and Contractor's
2018 HBR piece, "Better people analytics."
49. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
49)
Reflection #3:
Network Broker
(One page due by midnight Thursday of the week when we finish discussing this handout.)
Drawing on our discussion of this handout, describe an event in your experience
during which you believe you acted as a network broker.
What was the structural hole you brokered?
How did you become aware of the hole?
Why was the hole there?
How did you go about brokering across the hole? Did you have to
overcome resistence from either side of the hole?
What was the outcome?
_________________________________
Name, Section
53. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
53)
from Burt and Burzynska, "Chinese entrepreneurs, social networks, and
guanxi" (2018 Management and Organization Review)
Figure A2.
Business Event
Name Generator
The next five questions generate a summary
picture of the business network. To draw the
picture, you will be asked about people, but we
do not want to know any one's name. I will go
through this network worksheet with you, asking
about people who were useful to your business
in one way or another. Without mentioning
anyone's name to me, please write on your
worksheet the names of people who come to
mind in response to the questions. We will
create a list of names then refer to people by
their order on the list. No names. You will keep
the worksheet to yourself.
Q1. Let me begin with an example so you can
see how the interview protects your
confidentiality at the same time that a picture of
the business network emerges. Your business
time line shows that your firm was founded in
_(say founding year)_. Please think back to
your activities in founding the firm. Who
was the one person who was most valuable
to you in founding the firm?
Q2. Now please do the same thing for each of the significant events you listed on your business time line. The first significant
event you listed was __(say first event)__ in _(say year)_. Who was the person most valuable to you during that event?
Please write on the first line below the person's name. The person most valuable in this event could be the same person who was
most valuable to you in founding the firm. You would just enter the name again.
Confidential
Time Line for an Example Firm
today
2012
|
_____
|
_____
business
founded
_____
|
_____
today
2012
|
_____
|
_____
business
founded
_____
|
_____
1992
1993, secured technology partner
1999, first bank loan
2008, secured current
primary export customer
2004, first export contract
1997 2002 2007
2000, critical supplier
no longer available
Time Line for Your Firm
Business Time Line Worksheet
54. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
54)
from Burt and Burzynska, "Chinese entrepreneurs, social networks, and
guanxi" (2017 Management and Organization Review)
Figure A3. Name Interpreters Flesh Out Relationships
and Define Connections among Cited Contacts
§ Contact Gender (male, female)
§ Emotional Closeness to Contact (especially close, close, less close, distant)
§ Duration of Connection with Contact (years known)
§ Frequency of Contact (daily, weekly, monthly, less often)
§ Trust (1 to 5, low to high trust) “Consider the extent to which you trust each of the listed people.
For example, suppose one of the people asked for your help. The help is not extreme, but it is
substantial. It is a level of help you cannot offer to many people. To what extent would you trust each
person to give you all the information you need to decide on the help? For example, if the person was
asking for a loan, would they fully inform you about the risks of them being able to repay the loan? If the
person was asking you give a job to one of their relatives, would they fully inform you about their relative's
poor work attitude or weak abilities, or other qualities that would make you prefer not to hire the relative?”
§ Role (all that apply: family, extended family,
neighbor, party, childhood, classmate, military,
colleague, business association)
§ Matrix of Connections between Contacts
(especially close, distant,
or something in between)
55. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
55)
Appendix II: Measuring Access to Structural Holes*
from Burt, "Formalizing the argument," (1992, Structural Holes); "Gender of social capital" (1998, Rationality and Society); Appendix B "Measuring Access to Structural
Holes," (2010, Neighbor Networks). See the Jeff Pfeffer Stanford case #OB-66 for a productive overview ("A note on networks and network structure").
Network brokerage is typically measured in terms of opportunities to connect people. When everyone you know is connected
with one another, you have no opportunities to connect people. When you know a lot of people disconnected from one another,
then you have a lot of opportunities to connect people. “Opportunities” should be emphasized in these sentences. None of
the usual brokerage measures actually measures brokerage behavior. They index opportunities for brokerage. Reliability and
cost underlie the practice of measuring brokerage in terms of opportunities. It is difficult to know whether or not you acted on a
brokerage opportunity. One can know with more reliability whether or not you had an opportunity for brokerage. Acts of brokerage
could be studied with ethnographic data, but the needed depth of data would be expensive, if not impossible, to obtain by the
practical survey methods used to measure networks.
Good reasons notwithstanding, the practice of measuring brokerage by its opportunities rather than its occurrence means
that performance has uneven variance across levels of brokerage opportunities. Performance is typically low in the absence
of opportunities. Performance varies widely where there are many opportunities: (1) because some people with opportunities
do not act upon them and so show no performance benefit, (2) because it is not always valuable to move information between
disconnected people (e.g., explain to your grandmother the latest technology in your line of work), or (3) because the performance
benefit of brokerage can occur with just one key bridge relationship. A sociologist might do more creative work because of
working through an idea with a colleague from economics, but that does not mean that she would be three times more creative
if she also worked through the idea with a colleague from psychology, another from anthropology, and another from history. The
above three points can be true of brokerage measured in terms of action, but under the assumption that people invest less in
brokerage that adds no value, the three points are more obviously true of brokerage measured in terms of opportunities. It could
be argued that people more often involved in bridge relations are more likely to have one bridge that is valuable for brokerage,
and to understand how to use bridges to add value, but the point remains that the network measures discussed below index
opportunities for brokerage, not acts of brokerage.
Bridge Counts
Bridge counts are an intuitively appealing measure. The relation between two people is a bridge if there are no indirect connections
between the two people through mutual contacts. Associations with performance have been reported measuring brokerage
with a count of bridges (e.g., Burt, Hogarth, and Michaud, 2000:Appendix; Burt, 2002).
Constraint
I measure brokerage opportunities with a summary index, network constraint. As illustrated on the next page, network constraint
begins with the extent to which manager i’s network is directly or indirectly invested in the manager’s relationship with contact j
(Burt 1992: Chap. 2): cij = (pij + Σqpiqpqj)2, for q ≠ i,j, where pij is the proportion of i’s network time and energy invested in contact
56. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
56)
Illustrative
Network and
Computation
Constraint
measures the
extent to which a
network doesn't
span structural
holes
A
B
C
D
E
F
contact-specific
constraint (x100):
= aggregate constraint (C = Σj cij)
network data
A . 1 0 0 1 1 1
B 1 . 0 1 0 0 1
C 0 0 . 0 0 0 1
D 0 1 0 . 0 0 1
E 1 0 0 0 . 0 1
F 1 0 0 0 0 . 1
1 1 1 1 1 1 .
gray dot
A 15.1
B 8.5
C 2.8
D 4.9
E 4.3
F 4.3
total 39.9
cij = (pij + Σq piqpqj)2 q ≠ i,j
100(1/36)
Network constraint measures the extent to which your network time and energy
is concentrated in a single group. There are two components: (direct) a contact
consumes a large proportion of your network time and energy, and (indirect) a
contact controls other people who consume a large proportion of your network
time and energy. The proportion of i’s network time and energy allocated to j, pij,
is the ratio of zij to the sum of i’s relations, where zij is the strength of connection
between i and j, here simplified to zero versus one.
Figure 2.2 in Structural Holes.
57. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
57)
j, pij = zij / Σqziq, and variable zij measures the strength of connection between contacts i and j. Connection zij measures the lack
of a structural hole so it is made symmetric before computing pij in that a hole between i and j is unlikely to the extent that either
i or j feels that they spend a lot of time in the relationship (strength of connection “between” i and j versus strength of connection
“from” i to j; see Burt, 1992:51). The total in parentheses is the proportion of i’s relations that are directly or indirectly invested
in connection with contact j. The sum of squared proportions, Σjcij, is the network constraint index C. I multiply scores by 100
to discuss integer levels of constraint.
The network constraint index varies with three network dimensions: size, density, and hierarchy. Constraint on a person is
high if the person has few contacts (small network) and those contacts are strongly connected to one another, either directly (as
in a dense network), or through a central, mutual contact (as in a hierarchical network). The index, C, can be written as the sum
of three variables: Σj(pij)2 +2Σjpij(Σqpiqpqj) + Σj(Σqpiqpqj)2. The first term in the expression, C-size in Burt (1998), is a Herfindahl
index measuring the extent to which manager i’s relations are concentrated in a single contact. The second term, C-density in
Burt (1998), is an interaction between strong ties and density in the sense that it increases with the extent to which manager i’s
strongest relations are with contacts strongly tied to the other contacts. The third term, C-hierarchy in Burt (1998), measures the
extent to which manager i’s contacts concentrate their relations in one central contact. See Burt (1992:50ff.; 1998:Appendix),
Borgatti, Jones, and Everett (1998), Everett and Borgatti (2020) for discussion of components in network constraint.
Size
Network size, N, is the number of contacts in a person's network. In graph-theory discussions, the size of the network around
a person is discussed as “degree.” For non-zero network size, other things equal, more contacts mean that a manager is more
likely to receive diverse bits of information from contacts and is more able to play their individual demands against one another.
Network constraint is lower in larger networks because the proportion of a manager’s network time and energy allocated to any
one contact (pij in the constraint equation) decreases on average as the number of contacts increases.
Density
Density is the average strength of connection between contacts: Σ zij / N*(N-1), where summation is across all contacts i and
j. Dense networks are more constraining since contacts are more connected (Σqpiqpqj in the constraint equation). Contact
connections increase the probability that the contacts know the same information and eliminate opportunities to broker information
between contacts. Thus, dense networks offer less of the information and control advantage associated with spanning structural
holes. Density is only one form of network closure, but it is a form often discussed as closure.
Hypothetical networks in the table on page 16 illustrate how constraint varies with size, density, and hierarchy. Relations
are simplified to binary and symmetric in the networks. The graphs display relations between contacts. Relations with the person
at the center of the network are not presented (that person at the center is referenced by various labels such as "you," "ego,"
or "respondent"). The first column in the table contains examples of sparse networks (zero density). No contact is connected
with other contacts. The third column in the table contains maximum-density networks (density = 100). Every contact has a
strong connection with each other contact. At each network size, constraint is lower in the sparse-network column.
58. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
58)
Hierarchy/Centralization
Density is a form of closure in which contacts are equally connected. Hierarchy is another form of closure in which a minority of
contacts, typically one or two, stand above the others for being more the source of closure. The extreme is to have a network
organized around one contact. For people in job transition, such as M.B.A. students, that one contact is often the spouse. In
organizations, hierarchical networks are sometimes built around the boss.
Hierarchy and density both increase constraint, but in different ways. They enlarge the indirect connection component
in network constraint (Σqpiqpqj). Where network constraint measures the extent to which contacts are redundant, network
hierarchy measures the extent to which the redundancy can be traced to a single contact in the network. The central contact
in a hierarchical network gets the same information available to the manager and cannot be avoided in manager negotiations
with each other contact. More, the central contact can be played against the manager by third parties because information
available from the manager is equally available from the central contact since manager and central contact reach the same
people. Network constraint increases with both density and hierarchy, but density and hierarchy are empirically distinct measures
and fundamentally distinct with respect to network advanage because it is hierarchy that measures advantage borrowed from
a sponsor (this point is the focus of the later session on outsiders having to borrow network access from a strategic partner).
To measure the extent to which the constraint on a person is concentrated in certain contacts, I use the Coleman-Theil
inequality index for its attractive qualities as a robust measure of hierarchy (Burt, 1992:70ff.). Applied to contact-specific constraint
scores, the index is the ratio of Σj rj ln(rj) divided by N ln(N), where N is number of contacts, rj is the ratio of contact-j constraint
over average constraint, cij/(C/N). The ratio equals zero if all contact-specific constraints equal the average, and approaches
1.0 to the extent that all constraint is from one contact. Again, I multiply scores by 100 and report integer values.
In the first and third columns of the table on page 16, no one contact is more connected than others, so all of the hierarchy
scores are zero. Non-zero hierarchy scores occur in the middle column, where one central contact is connected to all others who
are otherwise disconnected from one another. Contact A poses more severe constraint than the others because network ties are
concentrated in A. The Coleman-Theil index increases with the number of people connected to the central contact. Hierarchy is
7 for the three-contact hierarchical network, 25 for the five-contact network, and 50 for the ten-contact network. This feature of
hierarchy increasing with the number of people in the hierarchy turns out to be important for measuring the network advantage
of outsiders because it measures the volume of opportunity borrowed from a sponsor, which strengthens the association with
performance.
Note that constraint increases with hierarchy and density such that evidence of density correlated with performance can
be evidence of a hierarchy effect. Constraint is high in the dense and hierarchical three-contact networks (93 and 84 points
respectively). Constraint is 65 in the dense five-contact network, and 59 in the hierarchical network; even though density is
only 40 in the hierarchical network. In the ten-contact networks, constraint is lower in the dense network than the hierarchical
network (36 versus 41), and density is only 20 in the hierarchical network. Density and hierarchy are correlated, but distinct,
components in network constraint.
59. Strategic
Leadership
Network
Structure
of
Competitive
Advantage
(page
59)
The Network Measures of Access to Structural Holes
Are Strongly Correlated
These are network metrics for 801 senior people in two organizations analyzed in Burt, "Reinforced structural
holes"(2015,SocialNetworks). Oneorganizationisacenter-periphery networkofinvestmentbankers(circles).
The other is a balkanized network of supply-chain managers in a large electronics company (squares). The
point is that networks rich in structural holes by one measure tend to be rich in the other measures.
-.90 correlation
with log constraint
NonRedundant
Contacts
Network Constraint (x 100)
many ——— Structural Holes ——— few
-.71 correlation
with log constraint
Ego-Network
Betweenness
(Number
Monopoly-Access
Holes)
Network Constraint (x 100)
many ——— Structural Holes ——— few
NonRedundant Contacts
few ——— Structural Holes ——— many
Ego-Network
Betweenness
(Number
Monopoly-Access
Holes)
R2
= .99
R2
= .92