SlideShare a Scribd company logo
1 of 23
Strength of Weak Ties (Granovetter)
What is a weak tie? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simplification ,[object Object],[object Object],[object Object],[object Object]
Example A B S={C,D,E…}
Connection Closure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cognitive Balance ,[object Object]
The “Forbidden Triad” ,[object Object],[object Object],[object Object],A B C Dissonance
Connections and Similarity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Weak ties and Bridging ,[object Object],[object Object]
 
 
Local Bridges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diffusion ,[object Object],[object Object],[object Object]
Weak Ties in Ego Nets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Empirical Study ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hypothesis: ,[object Object],[object Object],[object Object]
Result ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions ,[object Object],[object Object]
Questions ,[object Object],[object Object],[object Object],[object Object],[object Object]
More results ,[object Object],[object Object],[object Object],[object Object],[object Object]
Leadership and weak ties ,[object Object],[object Object],[object Object]
Weak ties in politics ,[object Object],[object Object]
Weak ties in politics ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Women and religion
Women and religionWomen and religion
Women and religionomimo
 
4. social network analysis
4. social network analysis4. social network analysis
4. social network analysisLokesh Ramaswamy
 
Chapter 9 Sex & Gender
Chapter 9 Sex & GenderChapter 9 Sex & Gender
Chapter 9 Sex & Genderderrickgriffey
 
Ties strength, similarities and surprise to disrupt the echo chamber effect
Ties strength, similarities and surprise to disrupt the echo chamber effectTies strength, similarities and surprise to disrupt the echo chamber effect
Ties strength, similarities and surprise to disrupt the echo chamber effectCarlos Figueiredo
 
Mary Douglas Presentation
Mary Douglas PresentationMary Douglas Presentation
Mary Douglas Presentationljr27
 
Revision notes SCLY1
Revision notes SCLY1Revision notes SCLY1
Revision notes SCLY1John Williams
 
Unit 3 Sociology: Beliefs in society
Unit 3 Sociology: Beliefs in societyUnit 3 Sociology: Beliefs in society
Unit 3 Sociology: Beliefs in societyemmaashman
 
Economic sociology: Introduction
Economic sociology: IntroductionEconomic sociology: Introduction
Economic sociology: IntroductionAbdiraxman Socy
 
Dimaggio and powell 1983 - the iron cage revisited - institutional isomorphis...
Dimaggio and powell 1983 - the iron cage revisited - institutional isomorphis...Dimaggio and powell 1983 - the iron cage revisited - institutional isomorphis...
Dimaggio and powell 1983 - the iron cage revisited - institutional isomorphis...Yassin Boullauazan
 
Social Construct of Gender
Social Construct of GenderSocial Construct of Gender
Social Construct of GenderDenise Aguilar
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network AnalysisPatti Anklam
 
Emile Durkheim, Sociologist ppt
Emile Durkheim, Sociologist pptEmile Durkheim, Sociologist ppt
Emile Durkheim, Sociologist pptSaman Ijaz
 
Soicalization factor cause gender inequality
Soicalization factor cause gender inequalitySoicalization factor cause gender inequality
Soicalization factor cause gender inequalityFJWU, PMAS-AAUR
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation Ratnesh Shah
 

What's hot (20)

AS Sociology: An in Depth Look at Giddens, Beck, Stacey & Weeks
AS Sociology: An in Depth Look at Giddens, Beck, Stacey & WeeksAS Sociology: An in Depth Look at Giddens, Beck, Stacey & Weeks
AS Sociology: An in Depth Look at Giddens, Beck, Stacey & Weeks
 
Women and religion
Women and religionWomen and religion
Women and religion
 
A2 Sociology: Defining Relgion
A2 Sociology: Defining RelgionA2 Sociology: Defining Relgion
A2 Sociology: Defining Relgion
 
03 Ego Network Analysis (2016)
03 Ego Network Analysis (2016)03 Ego Network Analysis (2016)
03 Ego Network Analysis (2016)
 
06 Community Detection
06 Community Detection06 Community Detection
06 Community Detection
 
4. social network analysis
4. social network analysis4. social network analysis
4. social network analysis
 
Chapter 9 Sex & Gender
Chapter 9 Sex & GenderChapter 9 Sex & Gender
Chapter 9 Sex & Gender
 
Ties strength, similarities and surprise to disrupt the echo chamber effect
Ties strength, similarities and surprise to disrupt the echo chamber effectTies strength, similarities and surprise to disrupt the echo chamber effect
Ties strength, similarities and surprise to disrupt the echo chamber effect
 
Mary Douglas Presentation
Mary Douglas PresentationMary Douglas Presentation
Mary Douglas Presentation
 
Revision notes SCLY1
Revision notes SCLY1Revision notes SCLY1
Revision notes SCLY1
 
Unit 3 Sociology: Beliefs in society
Unit 3 Sociology: Beliefs in societyUnit 3 Sociology: Beliefs in society
Unit 3 Sociology: Beliefs in society
 
Economic sociology: Introduction
Economic sociology: IntroductionEconomic sociology: Introduction
Economic sociology: Introduction
 
Dimaggio and powell 1983 - the iron cage revisited - institutional isomorphis...
Dimaggio and powell 1983 - the iron cage revisited - institutional isomorphis...Dimaggio and powell 1983 - the iron cage revisited - institutional isomorphis...
Dimaggio and powell 1983 - the iron cage revisited - institutional isomorphis...
 
Social Construct of Gender
Social Construct of GenderSocial Construct of Gender
Social Construct of Gender
 
Teaching Evidence Based Management in an evidence-based way
Teaching Evidence Based Management in an evidence-based wayTeaching Evidence Based Management in an evidence-based way
Teaching Evidence Based Management in an evidence-based way
 
Uncertainty Reduction
Uncertainty ReductionUncertainty Reduction
Uncertainty Reduction
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
 
Emile Durkheim, Sociologist ppt
Emile Durkheim, Sociologist pptEmile Durkheim, Sociologist ppt
Emile Durkheim, Sociologist ppt
 
Soicalization factor cause gender inequality
Soicalization factor cause gender inequalitySoicalization factor cause gender inequality
Soicalization factor cause gender inequality
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
 

Similar to 10 Strength Of Weak Ties

The Strength of Weak Ties
The Strength of Weak TiesThe Strength of Weak Ties
The Strength of Weak TiesJonas Rolo
 
11 Strength Of Strong Ties
11 Strength Of Strong Ties11 Strength Of Strong Ties
11 Strength Of Strong TiesMaksim Tsvetovat
 
Dmitry Gubanov. An Approach to the Study of Formal and Informal Relations of ...
Dmitry Gubanov. An Approach to the Study of Formal and Informal Relations of ...Dmitry Gubanov. An Approach to the Study of Formal and Informal Relations of ...
Dmitry Gubanov. An Approach to the Study of Formal and Informal Relations of ...Alexander Panchenko
 
COMM Final Presentation
COMM Final PresentationCOMM Final Presentation
COMM Final Presentationgiancarlo2195
 
Elevator Speech Part 2
Elevator Speech Part 2Elevator Speech Part 2
Elevator Speech Part 2Ray Brannon
 
Social Networks in Virtual Worlds
Social Networks in Virtual WorldsSocial Networks in Virtual Worlds
Social Networks in Virtual WorldsAleks Krotoski
 
620_aleks_krotoski
620_aleks_krotoski620_aleks_krotoski
620_aleks_krotoskiwebuploader
 
Predicting tie strength with ego network structures
Predicting tie strength with ego network structuresPredicting tie strength with ego network structures
Predicting tie strength with ego network structuresChristian Schlereth
 
Mark granovetterswt
Mark granovetterswtMark granovetterswt
Mark granovetterswtkcarter14
 
Article 2 Direct And Indirect Intergroup Friendship(Real I Hope)
Article 2 Direct And Indirect Intergroup Friendship(Real I Hope)Article 2 Direct And Indirect Intergroup Friendship(Real I Hope)
Article 2 Direct And Indirect Intergroup Friendship(Real I Hope)socialprejudice2008
 
Carmine gelormini network analysis
Carmine gelormini network analysisCarmine gelormini network analysis
Carmine gelormini network analysisCarmineGelormini
 
Correlational research
Correlational researchCorrelational research
Correlational researchTrung Le
 
12 Cognitive Social Structure
12 Cognitive Social Structure12 Cognitive Social Structure
12 Cognitive Social StructureMaksim Tsvetovat
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6jiahao84
 

Similar to 10 Strength Of Weak Ties (20)

The Strength of Weak Ties
The Strength of Weak TiesThe Strength of Weak Ties
The Strength of Weak Ties
 
11 Strength Of Strong Ties
11 Strength Of Strong Ties11 Strength Of Strong Ties
11 Strength Of Strong Ties
 
Dmitry Gubanov. An Approach to the Study of Formal and Informal Relations of ...
Dmitry Gubanov. An Approach to the Study of Formal and Informal Relations of ...Dmitry Gubanov. An Approach to the Study of Formal and Informal Relations of ...
Dmitry Gubanov. An Approach to the Study of Formal and Informal Relations of ...
 
COMM Final Presentation
COMM Final PresentationCOMM Final Presentation
COMM Final Presentation
 
Elevator Speech Part 2
Elevator Speech Part 2Elevator Speech Part 2
Elevator Speech Part 2
 
Social Networks in Virtual Worlds
Social Networks in Virtual WorldsSocial Networks in Virtual Worlds
Social Networks in Virtual Worlds
 
620_aleks_krotoski
620_aleks_krotoski620_aleks_krotoski
620_aleks_krotoski
 
Predicting tie strength with ego network structures
Predicting tie strength with ego network structuresPredicting tie strength with ego network structures
Predicting tie strength with ego network structures
 
Social Networks of Performance
Social Networks of PerformanceSocial Networks of Performance
Social Networks of Performance
 
Mark granovetterswt
Mark granovetterswtMark granovetterswt
Mark granovetterswt
 
Why Networks
Why NetworksWhy Networks
Why Networks
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Article 2 Direct And Indirect Intergroup Friendship(Real I Hope)
Article 2 Direct And Indirect Intergroup Friendship(Real I Hope)Article 2 Direct And Indirect Intergroup Friendship(Real I Hope)
Article 2 Direct And Indirect Intergroup Friendship(Real I Hope)
 
14 Dynamic Networks
14 Dynamic Networks14 Dynamic Networks
14 Dynamic Networks
 
Carmine gelormini network analysis
Carmine gelormini network analysisCarmine gelormini network analysis
Carmine gelormini network analysis
 
Correlational research
Correlational researchCorrelational research
Correlational research
 
12 Cognitive Social Structure
12 Cognitive Social Structure12 Cognitive Social Structure
12 Cognitive Social Structure
 
COM494_Networked Relationship
COM494_Networked RelationshipCOM494_Networked Relationship
COM494_Networked Relationship
 
09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6
 

More from Maksim Tsvetovat (13)

6 Hiclus
6 Hiclus6 Hiclus
6 Hiclus
 
15 Orgahead
15 Orgahead15 Orgahead
15 Orgahead
 
5 Structural Holes
5 Structural Holes5 Structural Holes
5 Structural Holes
 
11 Contagion
11 Contagion11 Contagion
11 Contagion
 
6 Block Modeling
6 Block Modeling6 Block Modeling
6 Block Modeling
 
6 Concor
6 Concor6 Concor
6 Concor
 
3 Centrality
3 Centrality3 Centrality
3 Centrality
 
6 Concor
6 Concor6 Concor
6 Concor
 
6 Block Modeling
6 Block Modeling6 Block Modeling
6 Block Modeling
 
5 Structural Holes
5 Structural Holes5 Structural Holes
5 Structural Holes
 
4 Cliques Clusters
4 Cliques Clusters4 Cliques Clusters
4 Cliques Clusters
 
1 Mechanics
1 Mechanics1 Mechanics
1 Mechanics
 
2 Graph Theory
2 Graph Theory2 Graph Theory
2 Graph Theory
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

10 Strength Of Weak Ties