SlideShare a Scribd company logo
Centrality in Social Networks Lecture 3
Background ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Methods
Centrality in Social Networks Intuitively, we want a method that allows us to distinguish “important” actors.  Consider the following graphs:
The most intuitive notion of centrality focuses on degree: The actor with the most ties is the most important: Centrality in Social Networks Degree
Degree Distribution In a simple random graph (G n,p ), degree will have a Poisson distribution, and the nodes with high degree are likely to be at the intuitive center.  Deviations from a Poisson distribution suggest non-random processes, which is at the heart of current “scale-free” work on networks (see below).
Degree is a local measure
Normalizing Degree If we want to measure the degree to which the  graph as a whole  is centralized, we look at the  dispersion  of  centrality: Simple: variance of the individual centrality scores. Or, using Freeman’s general formula for centralization (which ranges from 0 to 1):
Degree Centralization Freeman: .07 Variance: .20 Freeman: 1.0 Variance: 3.9 Freeman: .02 Variance: .17 Freeman: 0.0 Variance: 0.0
Closeness Centrality An actor is considered important if he/she is relatively close to all other actors. Closeness is based on the inverse of the  distance  of each actor to every other actor in the network. Closeness Centrality: Normalized Closeness Centrality
Closeness Centrality in the examples Distance  Closeness  normalized 0 1 1 1 1 1 1 1  .143  1.00 1 0 2 2 2 2 2 2  .077  .538 1 2 0 2 2 2 2 2  .077  .538 1 2 2 0 2 2 2 2  .077  .538 1 2 2 2 0 2 2 2  .077  .538 1 2 2 2 2 0 2 2  .077  .538 1 2 2 2 2 2 0 2  .077  .538 1 2 2 2 2 2 2 0  .077  .538 Distance  Closeness  normalized 0 1 2 3 4 4 3 2 1  .050  .400 1 0 1 2 3 4 4 3 2  .050  .400 2 1 0 1 2 3 4 4 3  .050  .400 3 2 1 0 1 2 3 4 4  .050  .400 4 3 2 1 0 1 2 3 4  .050  .400 4 4 3 2 1 0 1 2 3  .050  .400 3 4 4 3 2 1 0 1 2  .050  .400 2 3 4 4 3 2 1 0 1  .050  .400 1 2 3 4 4 3 2 1 0  .050  .400
Examples, cont. Distance  Closeness  normalized 0 1 2 3 4 5 6  .048  .286 1 0 1 2 3 4 5  .063  .375 2 1 0 1 2 3 4  .077  .462 3 2 1 0 1 2 3  .083  .500 4 3 2 1 0 1 2  .077  .462 5 4 3 2 1 0 1  .063  .375 6 5 4 3 2 1 0  .048  .286
Examples, cont. Distance  Closeness  normalized 0 1 1 2 3 4 4 5 5 6 5 5 6  .021  .255 1 0 1 1 2 3 3 4 4 5 4 4 5  .027  .324 1 1 0 1 2 3 3 4 4 5 4 4 5  .027  .324 2 1 1 0 1 2 2 3 3 4 3 3 4  .034  .414 3 2 2 1 0 1 1 2 2 3 2 2 3  .042  .500 4 3 3 2 1 0 2 3 3 4 1 1 2  .034  .414 4 3 3 2 1 2 0 1 1 2 3 3 4  .034  .414 5 4 4 3 2 3 1 0 1 1 4 4 5  .027  .324 5 4 4 3 2 3 1 1 0 1 4 4 5  .027  .324 6 5 5 4 3 4 2 1 1 0 5 5 6  .021  .255 5 4 4 3 2 1 3 4 4 5 0 1 1  .027  .324 5 4 4 3 2 1 3 4 4 5 1 0 1  .027  .324 6 5 5 4 3 2 4 5 5 6 1 1 0  .021  .255
Betweenness Betweenness Centrality: Model based on communication flow:  A person who lies on communication paths can control communication flow, and is thus important.  Betweenness centrality counts the number of  shortest  paths between  i  and  k  that actor  j  resides on. b a C  d  e  f  g  h
Calculating Betweenness Betweenness Centrality: Where g jk  = the number of geodesics connecting  jk , and  g jk (n i )  = the number that actor  i  is on. Usually normalized by:
Betweenness Centralization Centralization: 1.0 Centralization: .31 Centralization: .59 Centralization: 0 Betweenness Centrality:
Examples, cont. Centralization: .183 Betweenness Centrality:
Information Centrality It is quite likely that information can flow through paths  other  than the geodesic.  The Information Centrality score uses all paths in the network, and weights them based on their length.
Graph Theoretic Center Graph Theoretic Center (Barry or Jordan Center). Identify the point(s) with the smallest, maximum distance to all other points. Value = longest distance to any other node. The graph theoretic center is ‘3’, but you might also consider a continuous measure as the inverse of the maximum geodesic
Comparison ,[object Object],[object Object],[object Object],  Low  Degree Low  Closeness Low Betweenness High Degree   Embedded in cluster that is far from the rest of the network Ego's connections are redundant - communication bypasses him/her High Closeness Key player tied to important important/active alters    Probably multiple paths in the network, ego is near many people, but so are many others High Betweenness Ego's few ties are crucial for network flow Very rare cell.  Would mean that ego monopolizes the ties from a small number of people to many others.   
Power/Eigenvector Centrality Bonacich Power Centrality:  Actor’s centrality (prestige) is equal to a function of the prestige of those they are connected to.  Thus, actors who are tied to very central actors should have higher prestige/ centrality than those who are not.  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Intepretation of Eigenvector Centrality Bonacich Power Centrality: The magnitude of    reflects the radius of power.  Small values of    weight local structure, larger values weight global structure. If    is positive, then ego has higher centrality when tied to people who are central. If    is negative, then ego has higher centrality when tied to people who are  not  central. As    approaches zero, you get degree centrality.
Power Centrality Bonacich Power Centrality:    = 0.23
Examples  =.35  =-.35 Bonacich Power Centrality:
Examples, cont. Bonacich Power Centrality:  =.23  =  -.23
Dimensions of Centrality In recent work, Borgatti (2003; 2005) discusses centrality in terms of two key dimensions:  Radial Medial Frequency Distance Degree Centrality Bon. Power centrality Closeness Centrality Betweenness (empty: but would be an interruption measure based on distance)
Interpretation of Centrality ,[object Object],[object Object],[object Object],[object Object]
Other Options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Next Time… ,[object Object],[object Object],[object Object],[object Object]
Noah Friedkin: Structural bases of interpersonal influence in groups ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Noah Friedkin: Structural bases of interpersonal influence in groups
Noah Friedkin: Structural bases of interpersonal influence in groups ,[object Object],[object Object],[object Object]
Noah Friedkin: Structural bases of interpersonal influence in groups ,[object Object],[object Object]
Noah Friedkin: Structural bases of interpersonal influence in groups French & Raven propose  alternative  bases for dyadic power: ,[object Object],[object Object],[object Object],[object Object],[object Object],Friedkin created a matrix of power attribution, b k , where the  ij  entry = 1 if person  i  says that person  j  has this base of power.
Noah Friedkin: Structural bases of interpersonal influence in groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Total Effects Centrality (Friedkin). Very similar to the Bonacich measure, it is based on an assumed peer influence model. The formula is: Where  W  is a row-normalized adjacency matrix, and    is a weight for the amount of interpersonal influence
Find that each matter for interpersonal communication, and that communication is what matters most for interpersonal influence. + + + Noah Friedkin: Structural bases of interpersonal influence in groups
Noah Friedkin: Structural bases of interpersonal influence in groups
World City System
World City System
World City System
World City System Relation among centrality measures (from table 3) Ln(out-degree) Ln(Betweenness) Ln(Closeness) Ln(In-Degree) r=0.88 N=41 r=0.88 N=33 r=0.62 N=26 r=0.84 N=32 r=0.62 N=25 r=0.78 N=40
World City System
World City System
Baker & Faulkner: Social Organization of Conspiracy Questions:  How are relations organized to facilitate illegal behavior? They show that the pattern of communication maximizes concealment, and predicts the criminal verdict. Inter-organizational cooperation is common, but too much ‘cooperation’ can thwart market competition, leading to (illegal) market failure. Illegal networks differ from legal networks, in that they must conceal their activity from outside agents.  A “Secret society” should be organized to (a) remain concealed and (b) if discovered make it difficult to identify who is involved in the activity The need for secrecy should lead conspirators to conceal their activities by creating sparse and decentralized networks.
Baker & Faulkner: Social Organization of Conspiracy Secrets in a Southern Sorority:
Baker & Faulkner: Social Organization of Conspiracy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Baker & Faulkner: Social Organization of Conspiracy Structure of Illegal networks ,[object Object],[object Object],[object Object],[object Object]
Baker & Faulkner: Social Organization of Conspiracy
Baker & Faulkner: Social Organization of Conspiracy
Baker & Faulkner: Social Organization of Conspiracy
Baker & Faulkner: Social Organization of Conspiracy
From an individual standpoint, actors want to be central to get the benefits, but peripheral to remain concealed. They examine the effect of Degree, Betweenness and Closeness centrality on the criminal outcomes, based on reconstruction of the communication networks involved. At the organizational level, they find decentralized networks in the two low information-processing conspiracies, but high centralization in the other.  Thus, a simple product can be organized without centralization. At the individual level, that degree centrality (net of other factors) predicts verdict,
Information Low High Secrecy Low High Centralized Decentralized Decentralized Centralized

More Related Content

What's hot

Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis Workshop
Data Works MD
 
Ppt
PptPpt
Link prediction
Link predictionLink prediction
Link prediction
Carlos Castillo (ChaTo)
 
Community Detection with Networkx
Community Detection with NetworkxCommunity Detection with Networkx
Community Detection with Networkx
Erika Fille Legara
 
Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview. Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview.
Doug Needham
 
Machine learning clustering
Machine learning clusteringMachine learning clustering
Machine learning clustering
CosmoAIMS Bassett
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
Sujoy Bag
 
Community detection algorithms
Community detection algorithmsCommunity detection algorithms
Community detection algorithms
Alireza Andalib
 
Data clustering
Data clustering Data clustering
Data clustering
GARIMA SHAKYA
 
K MEANS CLUSTERING.pptx
K MEANS CLUSTERING.pptxK MEANS CLUSTERING.pptx
K MEANS CLUSTERING.pptx
kibriaswe
 
Data cleaning-outlier-detection
Data cleaning-outlier-detectionData cleaning-outlier-detection
Data cleaning-outlier-detection
Chathurangi Shyalika
 
Overlapping community detection survey
Overlapping community detection surveyOverlapping community detection survey
Overlapping community detection survey
煜林 车
 
Bayesian networks in AI
Bayesian networks in AIBayesian networks in AI
Bayesian networks in AI
Byoung-Hee Kim
 
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Salah Amean
 
Clique and sting
Clique and stingClique and sting
Clique and sting
Subramanyam Natarajan
 
Heuristic Search Techniques {Artificial Intelligence}
Heuristic Search Techniques {Artificial Intelligence}Heuristic Search Techniques {Artificial Intelligence}
Heuristic Search Techniques {Artificial Intelligence}
FellowBuddy.com
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)
DheerajPachauri
 

What's hot (20)

Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis Workshop
 
Ppt
PptPpt
Ppt
 
Link prediction
Link predictionLink prediction
Link prediction
 
Community Detection with Networkx
Community Detection with NetworkxCommunity Detection with Networkx
Community Detection with Networkx
 
Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview. Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview.
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Machine learning clustering
Machine learning clusteringMachine learning clustering
Machine learning clustering
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Community detection algorithms
Community detection algorithmsCommunity detection algorithms
Community detection algorithms
 
Data clustering
Data clustering Data clustering
Data clustering
 
K MEANS CLUSTERING.pptx
K MEANS CLUSTERING.pptxK MEANS CLUSTERING.pptx
K MEANS CLUSTERING.pptx
 
Data cleaning-outlier-detection
Data cleaning-outlier-detectionData cleaning-outlier-detection
Data cleaning-outlier-detection
 
Overlapping community detection survey
Overlapping community detection surveyOverlapping community detection survey
Overlapping community detection survey
 
Bayesian networks in AI
Bayesian networks in AIBayesian networks in AI
Bayesian networks in AI
 
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
 
Clique and sting
Clique and stingClique and sting
Clique and sting
 
Presentation on K-Means Clustering
Presentation on K-Means ClusteringPresentation on K-Means Clustering
Presentation on K-Means Clustering
 
Small world
Small worldSmall world
Small world
 
Heuristic Search Techniques {Artificial Intelligence}
Heuristic Search Techniques {Artificial Intelligence}Heuristic Search Techniques {Artificial Intelligence}
Heuristic Search Techniques {Artificial Intelligence}
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)
 

Viewers also liked

Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social CapitalGiorgos Cheliotis
 
Introduction to ZendX jQuery
Introduction to ZendX jQueryIntroduction to ZendX jQuery
Introduction to ZendX jQuerydennisdc
 
MyFaces Extensions Validator Part 1 of 3
MyFaces Extensions Validator Part 1 of 3MyFaces Extensions Validator Part 1 of 3
MyFaces Extensions Validator Part 1 of 3
os890
 
This isn't what I thought it was: community in the network age
This isn't what I thought it was: community in the network ageThis isn't what I thought it was: community in the network age
This isn't what I thought it was: community in the network age
Nancy Wright White
 
The Network, the Community and the Self-Creativity
The Network, the Community and the Self-CreativityThe Network, the Community and the Self-Creativity
The Network, the Community and the Self-Creativity
Vince Cammarata
 
Detecting Community Structures in Social Networks by Graph Sparsification
Detecting Community Structures in Social Networks by Graph SparsificationDetecting Community Structures in Social Networks by Graph Sparsification
Detecting Community Structures in Social Networks by Graph Sparsification
Satyaki Sikdar
 
Network sampling, community detection
Network sampling, community detectionNetwork sampling, community detection
Network sampling, community detection
roberval mariano
 
Community detection in social networks[1]
Community detection in social networks[1]Community detection in social networks[1]
Community detection in social networks[1]
sdnumaygmailcom
 
Dynamic Adaptive Streaming over HTTP: From Content Creation to Consumption
Dynamic Adaptive Streaming over HTTP: From Content Creation to ConsumptionDynamic Adaptive Streaming over HTTP: From Content Creation to Consumption
Dynamic Adaptive Streaming over HTTP: From Content Creation to ConsumptionAlpen-Adria-Universität
 
Intro to Classification: Logistic Regression & SVM
Intro to Classification: Logistic Regression & SVMIntro to Classification: Logistic Regression & SVM
Intro to Classification: Logistic Regression & SVM
NYC Predictive Analytics
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network Analysis
Rory Sie
 

Viewers also liked (20)

6 Block Modeling
6 Block Modeling6 Block Modeling
6 Block Modeling
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social Capital
 
Introduction to ZendX jQuery
Introduction to ZendX jQueryIntroduction to ZendX jQuery
Introduction to ZendX jQuery
 
MyFaces Extensions Validator Part 1 of 3
MyFaces Extensions Validator Part 1 of 3MyFaces Extensions Validator Part 1 of 3
MyFaces Extensions Validator Part 1 of 3
 
1 Mechanics
1 Mechanics1 Mechanics
1 Mechanics
 
5 Structural Holes
5 Structural Holes5 Structural Holes
5 Structural Holes
 
6 Concor
6 Concor6 Concor
6 Concor
 
This isn't what I thought it was: community in the network age
This isn't what I thought it was: community in the network ageThis isn't what I thought it was: community in the network age
This isn't what I thought it was: community in the network age
 
The Network, the Community and the Self-Creativity
The Network, the Community and the Self-CreativityThe Network, the Community and the Self-Creativity
The Network, the Community and the Self-Creativity
 
6 Hiclus
6 Hiclus6 Hiclus
6 Hiclus
 
Detecting Community Structures in Social Networks by Graph Sparsification
Detecting Community Structures in Social Networks by Graph SparsificationDetecting Community Structures in Social Networks by Graph Sparsification
Detecting Community Structures in Social Networks by Graph Sparsification
 
Network sampling, community detection
Network sampling, community detectionNetwork sampling, community detection
Network sampling, community detection
 
6 Concor
6 Concor6 Concor
6 Concor
 
Community detection in social networks[1]
Community detection in social networks[1]Community detection in social networks[1]
Community detection in social networks[1]
 
4 Cliques Clusters
4 Cliques Clusters4 Cliques Clusters
4 Cliques Clusters
 
5 Structural Holes
5 Structural Holes5 Structural Holes
5 Structural Holes
 
2 Graph Theory
2 Graph Theory2 Graph Theory
2 Graph Theory
 
Dynamic Adaptive Streaming over HTTP: From Content Creation to Consumption
Dynamic Adaptive Streaming over HTTP: From Content Creation to ConsumptionDynamic Adaptive Streaming over HTTP: From Content Creation to Consumption
Dynamic Adaptive Streaming over HTTP: From Content Creation to Consumption
 
Intro to Classification: Logistic Regression & SVM
Intro to Classification: Logistic Regression & SVMIntro to Classification: Logistic Regression & SVM
Intro to Classification: Logistic Regression & SVM
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network Analysis
 

Similar to 3 Centrality

3centrality-1235089982174yuuhhh803-1.ppt
3centrality-1235089982174yuuhhh803-1.ppt3centrality-1235089982174yuuhhh803-1.ppt
3centrality-1235089982174yuuhhh803-1.ppt
Tariqqandeel
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
Duke Network Analysis Center
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
Duke Network Analysis Center
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Dave King
 
New Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community DetectionNew Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community Detection
IRJET Journal
 
02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
Duke Network Analysis Center
 
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
csandit
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
Arsalan Khan
 
Community detection
Community detectionCommunity detection
Community detection
Scott Pauls
 
Using Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactUsing Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactYunhao Zhang
 
09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence
Duke Network Analysis Center
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
Duke Network Analysis Center
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
Pvrtechnologies Nellore
 
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
csandit
 
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier DetectionReverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
1crore projects
 
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...Khan Mostafa
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Nicolas Kourtellis
 
Simplicial closure & higher-order link prediction
Simplicial closure & higher-order link predictionSimplicial closure & higher-order link prediction
Simplicial closure & higher-order link prediction
Austin Benson
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
Wael Elrifai
 
Higher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExHigher-order Link Prediction GraphEx
Higher-order Link Prediction GraphEx
Austin Benson
 

Similar to 3 Centrality (20)

3centrality-1235089982174yuuhhh803-1.ppt
3centrality-1235089982174yuuhhh803-1.ppt3centrality-1235089982174yuuhhh803-1.ppt
3centrality-1235089982174yuuhhh803-1.ppt
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
 
New Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community DetectionNew Similarity Index for Finding Followers in Leaders Based Community Detection
New Similarity Index for Finding Followers in Leaders Based Community Detection
 
02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
 
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
Community detection
Community detectionCommunity detection
Community detection
 
Using Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactUsing Networks to Measure Influence and Impact
Using Networks to Measure Influence and Impact
 
09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
 
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier DetectionReverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
 
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Simplicial closure & higher-order link prediction
Simplicial closure & higher-order link predictionSimplicial closure & higher-order link prediction
Simplicial closure & higher-order link prediction
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Higher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExHigher-order Link Prediction GraphEx
Higher-order Link Prediction GraphEx
 

More from Maksim Tsvetovat

11 Strength Of Strong Ties
11 Strength Of Strong Ties11 Strength Of Strong Ties
11 Strength Of Strong TiesMaksim Tsvetovat
 
12 Cognitive Social Structure
12 Cognitive Social Structure12 Cognitive Social Structure
12 Cognitive Social StructureMaksim Tsvetovat
 

More from Maksim Tsvetovat (7)

15 Orgahead
15 Orgahead15 Orgahead
15 Orgahead
 
14 Dynamic Networks
14 Dynamic Networks14 Dynamic Networks
14 Dynamic Networks
 
11 Strength Of Strong Ties
11 Strength Of Strong Ties11 Strength Of Strong Ties
11 Strength Of Strong Ties
 
12 Cognitive Social Structure
12 Cognitive Social Structure12 Cognitive Social Structure
12 Cognitive Social Structure
 
11 Contagion
11 Contagion11 Contagion
11 Contagion
 
10 Strength Of Weak Ties
10 Strength Of Weak Ties10 Strength Of Weak Ties
10 Strength Of Weak Ties
 
6 Block Modeling
6 Block Modeling6 Block Modeling
6 Block Modeling
 

Recently uploaded

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

3 Centrality

  • 1. Centrality in Social Networks Lecture 3
  • 2.
  • 3.
  • 4. Centrality in Social Networks Intuitively, we want a method that allows us to distinguish “important” actors. Consider the following graphs:
  • 5. The most intuitive notion of centrality focuses on degree: The actor with the most ties is the most important: Centrality in Social Networks Degree
  • 6. Degree Distribution In a simple random graph (G n,p ), degree will have a Poisson distribution, and the nodes with high degree are likely to be at the intuitive center. Deviations from a Poisson distribution suggest non-random processes, which is at the heart of current “scale-free” work on networks (see below).
  • 7. Degree is a local measure
  • 8. Normalizing Degree If we want to measure the degree to which the graph as a whole is centralized, we look at the dispersion of centrality: Simple: variance of the individual centrality scores. Or, using Freeman’s general formula for centralization (which ranges from 0 to 1):
  • 9. Degree Centralization Freeman: .07 Variance: .20 Freeman: 1.0 Variance: 3.9 Freeman: .02 Variance: .17 Freeman: 0.0 Variance: 0.0
  • 10. Closeness Centrality An actor is considered important if he/she is relatively close to all other actors. Closeness is based on the inverse of the distance of each actor to every other actor in the network. Closeness Centrality: Normalized Closeness Centrality
  • 11. Closeness Centrality in the examples Distance Closeness normalized 0 1 1 1 1 1 1 1 .143 1.00 1 0 2 2 2 2 2 2 .077 .538 1 2 0 2 2 2 2 2 .077 .538 1 2 2 0 2 2 2 2 .077 .538 1 2 2 2 0 2 2 2 .077 .538 1 2 2 2 2 0 2 2 .077 .538 1 2 2 2 2 2 0 2 .077 .538 1 2 2 2 2 2 2 0 .077 .538 Distance Closeness normalized 0 1 2 3 4 4 3 2 1 .050 .400 1 0 1 2 3 4 4 3 2 .050 .400 2 1 0 1 2 3 4 4 3 .050 .400 3 2 1 0 1 2 3 4 4 .050 .400 4 3 2 1 0 1 2 3 4 .050 .400 4 4 3 2 1 0 1 2 3 .050 .400 3 4 4 3 2 1 0 1 2 .050 .400 2 3 4 4 3 2 1 0 1 .050 .400 1 2 3 4 4 3 2 1 0 .050 .400
  • 12. Examples, cont. Distance Closeness normalized 0 1 2 3 4 5 6 .048 .286 1 0 1 2 3 4 5 .063 .375 2 1 0 1 2 3 4 .077 .462 3 2 1 0 1 2 3 .083 .500 4 3 2 1 0 1 2 .077 .462 5 4 3 2 1 0 1 .063 .375 6 5 4 3 2 1 0 .048 .286
  • 13. Examples, cont. Distance Closeness normalized 0 1 1 2 3 4 4 5 5 6 5 5 6 .021 .255 1 0 1 1 2 3 3 4 4 5 4 4 5 .027 .324 1 1 0 1 2 3 3 4 4 5 4 4 5 .027 .324 2 1 1 0 1 2 2 3 3 4 3 3 4 .034 .414 3 2 2 1 0 1 1 2 2 3 2 2 3 .042 .500 4 3 3 2 1 0 2 3 3 4 1 1 2 .034 .414 4 3 3 2 1 2 0 1 1 2 3 3 4 .034 .414 5 4 4 3 2 3 1 0 1 1 4 4 5 .027 .324 5 4 4 3 2 3 1 1 0 1 4 4 5 .027 .324 6 5 5 4 3 4 2 1 1 0 5 5 6 .021 .255 5 4 4 3 2 1 3 4 4 5 0 1 1 .027 .324 5 4 4 3 2 1 3 4 4 5 1 0 1 .027 .324 6 5 5 4 3 2 4 5 5 6 1 1 0 .021 .255
  • 14. Betweenness Betweenness Centrality: Model based on communication flow: A person who lies on communication paths can control communication flow, and is thus important. Betweenness centrality counts the number of shortest paths between i and k that actor j resides on. b a C d e f g h
  • 15. Calculating Betweenness Betweenness Centrality: Where g jk = the number of geodesics connecting jk , and g jk (n i ) = the number that actor i is on. Usually normalized by:
  • 16. Betweenness Centralization Centralization: 1.0 Centralization: .31 Centralization: .59 Centralization: 0 Betweenness Centrality:
  • 17. Examples, cont. Centralization: .183 Betweenness Centrality:
  • 18. Information Centrality It is quite likely that information can flow through paths other than the geodesic. The Information Centrality score uses all paths in the network, and weights them based on their length.
  • 19. Graph Theoretic Center Graph Theoretic Center (Barry or Jordan Center). Identify the point(s) with the smallest, maximum distance to all other points. Value = longest distance to any other node. The graph theoretic center is ‘3’, but you might also consider a continuous measure as the inverse of the maximum geodesic
  • 20.
  • 21.
  • 22. Intepretation of Eigenvector Centrality Bonacich Power Centrality: The magnitude of  reflects the radius of power. Small values of  weight local structure, larger values weight global structure. If  is positive, then ego has higher centrality when tied to people who are central. If  is negative, then ego has higher centrality when tied to people who are not central. As  approaches zero, you get degree centrality.
  • 23. Power Centrality Bonacich Power Centrality:  = 0.23
  • 24. Examples  =.35  =-.35 Bonacich Power Centrality:
  • 25. Examples, cont. Bonacich Power Centrality:  =.23  = -.23
  • 26. Dimensions of Centrality In recent work, Borgatti (2003; 2005) discusses centrality in terms of two key dimensions: Radial Medial Frequency Distance Degree Centrality Bon. Power centrality Closeness Centrality Betweenness (empty: but would be an interruption measure based on distance)
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Total Effects Centrality (Friedkin). Very similar to the Bonacich measure, it is based on an assumed peer influence model. The formula is: Where W is a row-normalized adjacency matrix, and  is a weight for the amount of interpersonal influence
  • 37. Find that each matter for interpersonal communication, and that communication is what matters most for interpersonal influence. + + + Noah Friedkin: Structural bases of interpersonal influence in groups
  • 38. Noah Friedkin: Structural bases of interpersonal influence in groups
  • 42. World City System Relation among centrality measures (from table 3) Ln(out-degree) Ln(Betweenness) Ln(Closeness) Ln(In-Degree) r=0.88 N=41 r=0.88 N=33 r=0.62 N=26 r=0.84 N=32 r=0.62 N=25 r=0.78 N=40
  • 45. Baker & Faulkner: Social Organization of Conspiracy Questions: How are relations organized to facilitate illegal behavior? They show that the pattern of communication maximizes concealment, and predicts the criminal verdict. Inter-organizational cooperation is common, but too much ‘cooperation’ can thwart market competition, leading to (illegal) market failure. Illegal networks differ from legal networks, in that they must conceal their activity from outside agents. A “Secret society” should be organized to (a) remain concealed and (b) if discovered make it difficult to identify who is involved in the activity The need for secrecy should lead conspirators to conceal their activities by creating sparse and decentralized networks.
  • 46. Baker & Faulkner: Social Organization of Conspiracy Secrets in a Southern Sorority:
  • 47.
  • 48.
  • 49. Baker & Faulkner: Social Organization of Conspiracy
  • 50. Baker & Faulkner: Social Organization of Conspiracy
  • 51. Baker & Faulkner: Social Organization of Conspiracy
  • 52. Baker & Faulkner: Social Organization of Conspiracy
  • 53. From an individual standpoint, actors want to be central to get the benefits, but peripheral to remain concealed. They examine the effect of Degree, Betweenness and Closeness centrality on the criminal outcomes, based on reconstruction of the communication networks involved. At the organizational level, they find decentralized networks in the two low information-processing conspiracies, but high centralization in the other. Thus, a simple product can be organized without centralization. At the individual level, that degree centrality (net of other factors) predicts verdict,
  • 54. Information Low High Secrecy Low High Centralized Decentralized Decentralized Centralized