Review of social media network analysis of Internet social spaces like twitter, flickr, email, message boards, etc. Network analysis and visualization of social media collections of connections.
This short set of slides summarizes the characteristics of people who play specific roles in networks. In a social network analysis, people in these roles can be discovered by running mathematical algorithms through the social graphs. But you don't need to be an algorithm to spot some of these people in your networks!
This short set of slides summarizes the characteristics of people who play specific roles in networks. In a social network analysis, people in these roles can be discovered by running mathematical algorithms through the social graphs. But you don't need to be an algorithm to spot some of these people in your networks!
Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
2009-JCMC-Discussion catalysts-Himelboim and SmithMarc Smith
This study addresses 3 research questions in the context of online political discussions:
What is the distribution of successful topic starting practices, what characterizes the content
of large thread-starting messages, and what is the source of that content? A 6-month
analysis of almost 40,000 authors in 20 political Usenet newsgroups identified authors
who received a disproportionate number of replies. We labeled these authors ‘‘discussion
catalysts.’’ Content analysis revealed that 95 percent of discussion catalysts’ messages
contained content imported from elsewhere on the web, about 2/3 from traditional news
organizations. We conclude that the flow of information from the content creators to the
readers and writers continues to be mediated by a few individuals who act as filters and
amplifiers.
The science of networks is becoming an increasingly important and intriguing area of study that reveals many a patterns and relationships often hidden. This presentation is about the use of SNA to study the network of the Digital Library Community
Visible Effort: A Social Entropy Methodology for Managing Computer-Mediated ...Sorin Adam Matei
A theoretically-grounded learning feedback tool suite, the Visible Effort (VE) Mediawiki extension, is proposed for optimizing online group learning activities by measuring the amount of equality and the emergence of social structure in groups that participate in Computer-Mediated Collaboration (CMC). Building on social entropy theory, drawn from Shannon’s Mathematical Theory of Communication, VE captures levels of CMC unevenness and group structure and visualizes them on wiki Web pages through background colors, charts, and tabular data. Visual information provides users entropic feedback on how balanced and equitable collaboration is within their online group are, while helping them to maintain it within optimal levels. Finally, we present the theoretical and practical implications of VE and the measures behind it, as well as illustrate VE’s capabilities by describing a quasi-experimental teaching activity (use scenario) in tandem with a detailed discussion of theoretical justification, methodological underpinning, and technological capabilities of the approach.
Social Network Analysis for Competitive IntelligenceAugust Jackson
How can CI teams apply the concepts of social network analysis to gain insight into the capabilities and plans of their competitors? Presented by Jim Richardson and August Jackson in April 2007 at the Society of Competitive Intelligence Professionals annual conference in New York City.
Social Network Analysis power point presentation Ratnesh Shah
Basics of social network analysis,Application and also explain interesting study done by facebook , twitter, youtube and many more social media network ,slide contains some of interesting study to get knowledge about online social network analysis.
Social Network Analysis Workshop
This talk will be a workshop featuring an overview of basic theory and methods for social network analysis and an introduction to igraph. The first half of the talk will be a discussion of the concepts and the second half will feature code examples and demonstrations.
Igraph is a package in R, Python, and C++ that supports social network analysis and network data visualization.
Ian McCulloh holds joint appointments as a Parson’s Fellow in the Bloomberg School of Public health, a Senior Lecturer in the Whiting School of Engineering and a senior scientist at the Applied Physics Lab, at Johns Hopkins University. His current research is focused on strategic influence in online networks. His most recent papers have been focused on the neuroscience of persuasion and measuring influence in online social media firestorms. He is the author of “Social Network Analysis with Applications” (Wiley: 2013), “Networks Over Time” (Oxford: forthcoming) and has published 48 peer-reviewed papers, primarily in the area of social network analysis. His current applied work is focused on educating soldiers and marines in advanced methods for open source research and data science leadership.
More information about Dr. Ian McCulloh's work can be found at https://ep.jhu.edu/about-us/faculty-directory/1511-ian-mcculloh
Social Network Analysis (SNA) and its implications for knowledge discovery in...ACMBangalore
Social Network Analysis (SNA) and its implications for knowledge discovery in Informal Networks- Talk by Dr Jai Ganesh, SETLabs, Infosys at Search and Social Platforms tutorial, as part of Compute 2009, ACM Bangalore
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
More than ever, we need to learn how to harness the power of networks to tackle the complex issues we're facing as a society. Here's a quick guide to the basics of social network analysis.
Interested? Sign up at http://kumu.io
A Perspective on Graph Theory and Network ScienceMarko Rodriguez
The graph/network domain has been driven by the creativity of numerous individuals from disparate areas of the academic and the commercial sector. Examples of contributing academic disciplines include mathematics, physics, sociology, and computer science. Given the interdisciplinary nature of the domain, it is difficult for any single individual to objectively realize and speak about the space as a whole. Any presentation of the ideas is ultimately biased by the formal training and expertise of the individual. For this reason, I will simply present on the domain from my perspective---from my personal experiences. More specifically, from my perspective biased by cognitive and computer science.
This is an autobiographical lecture on my life (so far) with graphs/networks.
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
Review of trends related to social network analysis in the enterprise. Presented at the 2010 Catalyst Conference in San Diego, CA july 29, 2010. Presented with Mike Gotta, Gartner Group.
Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
2009-JCMC-Discussion catalysts-Himelboim and SmithMarc Smith
This study addresses 3 research questions in the context of online political discussions:
What is the distribution of successful topic starting practices, what characterizes the content
of large thread-starting messages, and what is the source of that content? A 6-month
analysis of almost 40,000 authors in 20 political Usenet newsgroups identified authors
who received a disproportionate number of replies. We labeled these authors ‘‘discussion
catalysts.’’ Content analysis revealed that 95 percent of discussion catalysts’ messages
contained content imported from elsewhere on the web, about 2/3 from traditional news
organizations. We conclude that the flow of information from the content creators to the
readers and writers continues to be mediated by a few individuals who act as filters and
amplifiers.
The science of networks is becoming an increasingly important and intriguing area of study that reveals many a patterns and relationships often hidden. This presentation is about the use of SNA to study the network of the Digital Library Community
Visible Effort: A Social Entropy Methodology for Managing Computer-Mediated ...Sorin Adam Matei
A theoretically-grounded learning feedback tool suite, the Visible Effort (VE) Mediawiki extension, is proposed for optimizing online group learning activities by measuring the amount of equality and the emergence of social structure in groups that participate in Computer-Mediated Collaboration (CMC). Building on social entropy theory, drawn from Shannon’s Mathematical Theory of Communication, VE captures levels of CMC unevenness and group structure and visualizes them on wiki Web pages through background colors, charts, and tabular data. Visual information provides users entropic feedback on how balanced and equitable collaboration is within their online group are, while helping them to maintain it within optimal levels. Finally, we present the theoretical and practical implications of VE and the measures behind it, as well as illustrate VE’s capabilities by describing a quasi-experimental teaching activity (use scenario) in tandem with a detailed discussion of theoretical justification, methodological underpinning, and technological capabilities of the approach.
Social Network Analysis for Competitive IntelligenceAugust Jackson
How can CI teams apply the concepts of social network analysis to gain insight into the capabilities and plans of their competitors? Presented by Jim Richardson and August Jackson in April 2007 at the Society of Competitive Intelligence Professionals annual conference in New York City.
Social Network Analysis power point presentation Ratnesh Shah
Basics of social network analysis,Application and also explain interesting study done by facebook , twitter, youtube and many more social media network ,slide contains some of interesting study to get knowledge about online social network analysis.
Social Network Analysis Workshop
This talk will be a workshop featuring an overview of basic theory and methods for social network analysis and an introduction to igraph. The first half of the talk will be a discussion of the concepts and the second half will feature code examples and demonstrations.
Igraph is a package in R, Python, and C++ that supports social network analysis and network data visualization.
Ian McCulloh holds joint appointments as a Parson’s Fellow in the Bloomberg School of Public health, a Senior Lecturer in the Whiting School of Engineering and a senior scientist at the Applied Physics Lab, at Johns Hopkins University. His current research is focused on strategic influence in online networks. His most recent papers have been focused on the neuroscience of persuasion and measuring influence in online social media firestorms. He is the author of “Social Network Analysis with Applications” (Wiley: 2013), “Networks Over Time” (Oxford: forthcoming) and has published 48 peer-reviewed papers, primarily in the area of social network analysis. His current applied work is focused on educating soldiers and marines in advanced methods for open source research and data science leadership.
More information about Dr. Ian McCulloh's work can be found at https://ep.jhu.edu/about-us/faculty-directory/1511-ian-mcculloh
Social Network Analysis (SNA) and its implications for knowledge discovery in...ACMBangalore
Social Network Analysis (SNA) and its implications for knowledge discovery in Informal Networks- Talk by Dr Jai Ganesh, SETLabs, Infosys at Search and Social Platforms tutorial, as part of Compute 2009, ACM Bangalore
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
More than ever, we need to learn how to harness the power of networks to tackle the complex issues we're facing as a society. Here's a quick guide to the basics of social network analysis.
Interested? Sign up at http://kumu.io
A Perspective on Graph Theory and Network ScienceMarko Rodriguez
The graph/network domain has been driven by the creativity of numerous individuals from disparate areas of the academic and the commercial sector. Examples of contributing academic disciplines include mathematics, physics, sociology, and computer science. Given the interdisciplinary nature of the domain, it is difficult for any single individual to objectively realize and speak about the space as a whole. Any presentation of the ideas is ultimately biased by the formal training and expertise of the individual. For this reason, I will simply present on the domain from my perspective---from my personal experiences. More specifically, from my perspective biased by cognitive and computer science.
This is an autobiographical lecture on my life (so far) with graphs/networks.
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
Review of trends related to social network analysis in the enterprise. Presented at the 2010 Catalyst Conference in San Diego, CA july 29, 2010. Presented with Mike Gotta, Gartner Group.
The emerging field of computational social science (CSS) is devoted to the pursuit of interdisciplinary social science research from an information processing perspective, through the medium of advanced computing and information technologies.
Practical Applications for Social Network Analysis in Public Sector Marketing...Mike Kujawski
Over the past decade there has been a growing public fascination with the complex connectedness of modern society. This has been driven in large part by the wide availability of public digital data produced through our daily interactions on the modern social web. This data can now easily be mined and analyzed to produce valuable and actionable business insights leading to better decision making in nearly every field of practice, especially marketing and communications. In this presentation, Joshua Gillmore and Mike Kujawski introduce the basics of social network analysis and some of the privacy related challenges that this rapidly growing space brings with it. Focus of this deck is on public sector organizations.
By: @mikekujawski and @joshuagillmore
A high-level overview of social network analysis, providing background on how it came into the knowledge management field. Includes an example and core concepts pertinent to the audience, online community managers.
Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...Saratoga
An advocate for open tools, open data and open scholarships, Marc Smith strives for access to information to be available to all. Pioneering the possibilities through charting collections and creating maps with NodeXL.
Slides from talks presented at Mammoth BI in Cape Town on 17 November 2014.
Visit www.mammothbi.co.za for details on the event. Follow @MammothBI on twitter.
2010 june - personal democracy forum - marc smith - mapping political socia...Marc Smith
Marc Smith's presentation to the Personal Democracy Forum 2010 in New York City on June 4th, 2010 about the use of NodeXL, a social media network analysis tool, to map political topics in services like Twitter.
NodeXL is available from http://nodexl.codeplex.com
New Metrics for New Media Bay Area CIO IT Executives MeetupTatyana Kanzaveli
Presentation done by Marc Smith, Chief Social Scientist, Telligent at the Bay Area CIO/IT Executives meetup http://www.meetup.com/CIO-IT-Executives/ run by Tatyana Kanzaveli.
Similar to 2009 - Connected Action - Marc Smith - Social Media Network Analysis (20)
How to use social media network analysis for amplificationMarc Smith
How can social media network analysis help you get your message out? Use network maps of social media to identify the most influential contributors based on their location within the network. Use content analysis to identify the topics, hashtags and URLs of greatest interest to the "mayors" of the hashtags that matter to you.
A network is a collection of connections. Learn how to express an edge in NodeXL. If you can make a pie chart, you can now make a network chart in NodeXL,
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...Marc Smith
Networks are a powerful way to understand social media.
This talk reviews the ways the NodeXL application can be used to reveal the social media networks structures around topics.
2014 TheNextWeb-Mapping connections with NodeXLMarc Smith
Slides from a talk at the 2014 TheNextWeb in Amsterdam.
NodeXL social media network analysis of Twitter reveals six common structures in Twitter networks.
Think Link: Network Insights with No Programming SkillsMarc Smith
Networks are everywhere, but the tools for end users to access, analyze, visualize and share insights into connected structures have been absent. NodeXL, the network overview discovery and exploration add-in for Excel makes network analysis as easy as making a pie chart.
2013 NodeXL Social Media Network AnalysisMarc Smith
Social media network analysis and visualization with NodeXL - the network overview discovery and exploration add-in for Excel. Map Twitter, Facebook, email, blogs, and the web with a point and click interface within the familiar spreadsheet.
Course description for Optimice class on organizational network analysis (ONA) - the application of social network analysis (SNA) to business organizations.
Slides for talk at ConTech 2011 the International Symposium on Convergence Technology (ConTech 2011) – Smart & Humane World – on November 3rd in Seoul, South Korea.
Date: 2011 November 3 (Thurs)
Place: COEX Grand Ballroom, Seoul, Korea
Organized by Advanced Institutes of Convergence Technologies (AICT), Seoul National University (SNU)
In Cooperation with Ministry of Knowledge Economy, Ministry of Education, Science and Technology, National Research Foundation of Korea, Graduate School of Convergence Science and Technology (GSCST)
20110830 Introducing the Social Media Research FoundationMarc Smith
Description of the activities and goals of the Social Media Research Foundation. The foundation is dedicated to Open Tools, Open Data, and Open Scholarship. See: http://www.smrfoundation.org.
One project from the Social Media Research Foundation is NodeXL, the network overview, discovery and exploration add-in for Excel 2007/2010. See: http://www.smrfoundation.org
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
When stars align: studies in data quality, knowledge graphs, and machine lear...
2009 - Connected Action - Marc Smith - Social Media Network Analysis
1. Marc A. Smith
Chief Social Scientist
Connected Action Consulting Group
Marc@connectedaction.net
http://www.connectedaction.net
http://www.codeplex.com/nodexl
http://www.twitter.com/marc_smith
http://delicious.com/marc_smith/Paper
http://www.flickr.com/photos/marc_smith
http://www.facebook.com/marc.smith.sociologist
http://www.linkedin.com/in/marcasmith
http://www.slideshare.net/Marc_A_Smith
Mobile social media networks
6. When my phone notices your phone
a new set of mobile social software applications
become possible that
capture data about other people
as they beacon
their identifies to one another.
7. Interactionist
Sociology
• Central tenet
– Focus on the active effort of
accomplishing interaction
• Phenomena of interest
– Presentation of self
– Claims to membership
– Juggling multiple (conflicting) roles
– Frontstage/Backstage
– Strategic interaction
– Managing one’s own and others’ “face”
• Methods
– Ethnography and participant observation
– (Goffman, 1959; Hall, 1990)
8. Innovations in the interaction order:
45,000 years ago: Speech, body adornment
10,000 years ago: Amphitheater
5,000 years ago: Maps
150 years ago: Clock time
-2 years from now: machines with
social awareness
9. Whyte, William H. 1971. City: Rediscovering the Center. New York: Anchor Books.
10. • Hardin, Garrett. 1968/1977. “The tragedy
of the commons.” Science 162: 1243-48.
Pp. 16-30 in Managing the Commons,
edited by G. Hardin and J. Baden. San
Francisco: Freeman.
• Wellman, Barry. 1997. “An electronic group
is virtually a social network.” In S. Kiesler
(Ed.), The Culture of the Internet. Hillsdale,
NJ: Lawrence Erlbaum.
10
Nobel in
Economics
2009
12. Social media
usage generates
Social Networks
Social media platforms
are a source of multiple
Social network data
sets:
“Friends”
“Replies”
“Follows”
“Comments”
“Reads”
“Co-edits”
“Co-mentions”
“Hybrids”
22. • Central tenet
– Social structure emerges from
– the aggregate of relationships (ties)
– among members of a population
• Phenomena of interest
– Emergence of cliques and clusters
– from patterns of relationships
– Centrality (core), periphery (isolates),
– betweenness
• Methods
– Surveys, interviews, observations,
log file analysis, computational
analysis of matrices
(Hampton &Wellman, 1999; Paolillo, 2001; Wellman, 2001)
Source: Richards, W.
(1986). The NEGOPY
network analysis
program. Burnaby, BC:
Department of
Communication, Simon
Fraser University. pp.7-
16
Social Network
Theory
23. SNA 101
• Node
– “actor” on which relationships act; 1-mode versus 2-mode networks
• Edge
– Relationship connecting nodes; can be directional
• Cohesive Sub-Group
– Well-connected group; clique; cluster
• Key Metrics
– Centrality (group or individual measure)
• Number of direct connections that individuals have with others in the group (usually look at
incoming connections only)
• Measure at the individual node or group level
– Cohesion (group measure)
• Ease with which a network can connect
• Aggregate measure of shortest path between each node pair at network level reflects
average distance
– Density (group measure)
• Robustness of the network
• Number of connections that exist in the group out of 100% possible
– Betweenness (individual measure)
• # shortest paths between each node pair that a node is on
• Measure at the individual node level
• Node roles
– Peripheral – below average centrality
– Central connector – above average centrality
– Broker – above average betweenness
E
D
F
A
CB
H
G
I
C
D
E
A B D E
26. Reply-To Network
Network at distance 2 for the most prolific author of the
microsoft.public.internetexplorer.general newsgroup
The Ties that Blind?
31. Distinguishing attributes of online social roles
• Answer person
– Outward ties to local
isolates
– Relative absence of
triangles
– Few intense ties
• Reply Magnet
– Ties from local isolates
often inward only
– Sparse, few triangles
– Few intense ties
31
32. Distinguishing attributes:
• Answer person
– Outward ties to local
isolates
– Relative absence of
triangles
– Few intense ties
• Discussion person
– Ties from local isolates
often inward only
– Dense, many triangles
– Numerous intense ties
32
33. Leading research: Adamic et al. 2008
Knowledge Sharing and Yahoo Answers: Everyone Knows
Something,Adamic, Lada A., Zhang Jun, Bakshy Eytan,
and Ackerman Mark S. , WWW2008, (2008)
34. Clear and consistent signatures
of an “Answer Person”
1
10
100
0 1 2 4 8 16 32 64
• Light touch to numerous threads initiated by
someone else
• Most ties are outward to local isolates
• Many more ties to small fish than big fish
34
35. Roles Project
Identify social
roles in
threaded
discussions
Next steps:
quantify &
explore in more
depth
35
Answer Person, microsoft.public.windows.server.general
Discussion, rec.kites
Flame, alt.flame
Social Support, alt.support.divorce
PUBLISHED in HICSS, JCMC, JoSS, IEEE Internet
Communications (special issue on Social Networks)
36.
37. NodeXL: Network Overview,
Discovery and Exploration for Excel
Leverage spreadsheet for storage of
edge
and vertex data
http://www.codeplex.com/nodexl
39. The NodeXL project is
Available via the
CodePlex Open Source
Project Hosting Site:
http://www.codeplex.com/nodexl
40. A minimal network can illustrate
the ways different locations have
different values for centrality and
degree
NodeXL
Network Overview Discovery and Exploration add-in for Excel 2007
50. From Page Rank to People Rank
• People Rank is critical component of an effective community strategy.
• Communities are composed of a relatively small set of roles.
• Technology to identify these roles is critical for selecting high quality
content in a vast and diverse sea of material.
• Social Accounting Metadata is the raw material of social sorting, a people
rank that brings high quality content to the surface of an online
community.
• Reputations and profile are central to the effective management of a
community.
67. WIFE/MOTHER/WORKER/SPY
Does This Pencil Skirt Have an App?
http://www.nytimes.com/2009/09/24/fashion/24spy.html
“…a new iPhone app called Lose It! Which sounds like a
diet, if you ask me. For weeks he’d been keeping a food
diary on his phone — all the calories he ate, and all the
calories he burned — and it was constantly generating cool
little charts and graphs to let him know whether he was
meeting his goals.
“I’ve lost 12 pounds,” he said.
“Get it for me,” I hissed. “Now.”
Lose It! has its own database listing the calories in a few
thousand different foods. And if a food was not listed? I
could always find it in another iPhone app, the LiveStrong
calorie counter, which lists 450,000 foods.
LoseIt! Weight Loss iPhone App
68. Quantified Self:
people self-administer medical monitoring
Additional
sensors will
collect medical
data to improve
our health and
safety, as early
adopters in the
"Quantified Self"
movement make
clear.
71. Risky behavior will be priced in
real time, 3rd glass of wine
tonight? Click here for a $20
extension for alcohol related
injury or illness.
http://www.connectedaction.net/2009/02
/18/the-future-of-helath-insurance-
mobile-medical-sensors-and-dynamic-
pricing/
72. http://www.ft.com/cms/s/0/c1473442-a6f4-11de-bd14-00144feabdc0.html
Novartis chip to help ensure bitter pills are
swallowed
By Andrew Jack in London
Published: September 21 2009 23:06 | Last
updated: September 21 2009 23:06
technology that inserts a tiny microchip into
each pill swallowed and sends a reminder to
patients by text message if they fail to follow
their doctors’ prescriptions.
the system – which broadcasts from the “chip
in the pill” to a receiver on the shoulder – on
20 patients using Diovan, a drug to lower
blood pressure, had boosted “compliance”
with prescriptions from 30 per cent to 80 per
cent after six months.
73. Prediction: a mobile App will be more
medically effective than many drugs
If only because it will make you take the drug
properly
77. SenseNetworks
Integrate a sensor grid to create
real time maps
of major cities,
create "tribes"
based on shared behavior.
http://www.sensenetworks.com/
78. Result: lives that are more publicly
displayed than ever before.
• Add potential improvements in audio and
facial recognition and a new world of
continuous observation and publication
emerges.
• Some benefits, like those displayed by the
Google Flu tracking system, illustrate the
potential for insight from aggregated sensor
data.
• More exploitative applications are also likely.
83. Patterns of connection
may uniquely identify
De-anonymizing Social Networks
Arvind Narayanan & Vitaly Shmatikov
http://33bits.org/2009/03/19/de-anonymizing-social-networks/
Abstract:
Operators of online social networks are increasingly sharing potentially sensitive information
about users and their relationships with advertisers, application developers, and data-mining
researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
We present a framework for analyzing privacy and anonymity in social networks and develop a
new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its
effectiveness on real-world networks, we show that a third of the users who can be verified to
have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-
sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our
de-anonymization algorithm is based purely on the network topology, does not require creation
of a large number of dummy “sybil” nodes, is robust to noise and all existing defenses, and works
even when the overlap between the target network and the adversary’s auxiliary information is
small.
84. Cryptography weakens over time
Eventually, private bits,
even when encrypted,
become public because
the march of computing
power makes their
encryption increasingly
trivial to break.
86. Unintended cascades
• Taking a photo or updating a status message
can now set off a series of unpredictable
events.
87. Marc A. Smith
Chief Social Scientist
Connected Action Consulting Group
Marc@connectedaction.net
http://www.connectedaction.net
http://www.codeplex.com/nodexl
http://www.twitter.com/marc_smith
http://delicious.com/marc_smith/Paper
http://www.flickr.com/photos/marc_smith
http://www.facebook.com/marc.smith.sociologist
http://www.linkedin.com/in/marcasmith
http://www.slideshare.net/Marc_A_Smith
Mobile social media networks
Editor's Notes
“You can make a mess.”
A tutorial on analyzing social media networks is available from: casci.umd.edu/NodeXL_TeachingDifferent positions within a network can be measured using network metrics.
Research projects at Microsoft demonstrate the emergence of continuous data collection tools. These were applied to assist Alzheimer’s patients improve their recall of prior events.
Track your tracks with Path Tracks – monitor biking, skating, running performance
Applications are already getting “persuasive” – encouraging positive behaviors by tracking improvement or compliance.
Not only are people recording intimate medical data about themselves on an on-going basis, they are *publishing* this data to shared communities on the web. The goal is to aggregate data and insights into self treatment to build evidence and guidance for improved treatment.
Better tools for remote monitoring of chronic medical care patients.
The aggregate data from social media is creating new opportunities for gaining insights into macro trends across populations.
New sources of data and sensors attached to mobile devices are making new levels of awareness of real time social activity possible.