The dependence of today's collaborative projects on knowledge acquisition and information dissemination
emphasizes the importance of minimizing communication breakdowns. However, as organizations are
increasingly relying on virtual teams to deliver better and faster results, communication issues come to the
forefront of project managers' concerns. This is particularly palpable in software development projects
which are increasingly virtual and knowledge-consuming as they require continuous generation and
upgrade of shared information and knowledge. In a previous work, we proposed an SNA-BI based system
(Covirtsys) that supplements the Analytics modules of the collaborative platform in order to offer a
complementary analysis of communication flows through a network perspective. This paper concerns the
application of this system on a software development project virtual team and shows how it can bring new
insights that could help overcome communication issues among team members.
2009-Social computing-First steps to netviz nirvanaMarc Smith
This document summarizes two user studies that evaluated NodeXL, an open-source social network analysis tool integrated with Microsoft Excel, and its effectiveness for teaching SNA concepts. 21 graduate students with varying technical backgrounds used NodeXL to analyze online communities. The studies found that NodeXL was usable for a diverse range of users and its integrated metrics and visualizations helped spark insights and facilitated understanding of SNA techniques. Lessons learned can help educators, researchers, and developers improve SNA tools.
The document describes the Semantic Communication Engine Innsbruck (SCEI), a software suite that supports online communication, feedback collection, and impact measurement across multiple channels. It introduces key terms and defines the problem of managing content distribution across different online channels. The proposed solution features a semantic layer that abstracts domain concepts from specific channels, and a "weaving process" that aligns content with channels. The architecture separates the software into a content management system and a distribution component called dacodi, which uses adapters to interface with individual channels in a standardized way.
2000 - CSCW - Conversation Trees and Threaded ChatsMarc Smith
The document discusses issues with traditional chat interfaces and proposes an alternative called Threaded Chat. Traditional chat ruptures connections between turns and replies by displaying messages in order of arrival rather than conversational order. Threaded Chat aims to address this by structuring messages as threaded responses like online forums, though designed for synchronous use. A study found Threaded Chat allowed equally effective but possibly more efficient discussions than traditional chat.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future advances may impact social networks and social network analysis.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future modeling could further social network analysis.
2009-Social computing-Analyzing social media networksMarc Smith
This document summarizes research on analyzing social networks within enterprises that have adopted social media applications. Key points:
- Social media applications generate social networks as employees interact by creating connections, replying to messages, collaborating on documents, and mentioning common topics. These networks reveal insights into an organization's structure and dynamics.
- Network analysis uses metrics from graph theory to describe network properties like individual roles (e.g. discussion starters), overall shape and size, and each individual's connections. Visualizations can highlight important people, events, and subgroups.
- Early social network analysis relied on manually collected data, limiting its use. Now, automatically captured social media data creates networks without explicit surveys, providing rich new data
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
2009-Social computing-First steps to netviz nirvanaMarc Smith
This document summarizes two user studies that evaluated NodeXL, an open-source social network analysis tool integrated with Microsoft Excel, and its effectiveness for teaching SNA concepts. 21 graduate students with varying technical backgrounds used NodeXL to analyze online communities. The studies found that NodeXL was usable for a diverse range of users and its integrated metrics and visualizations helped spark insights and facilitated understanding of SNA techniques. Lessons learned can help educators, researchers, and developers improve SNA tools.
The document describes the Semantic Communication Engine Innsbruck (SCEI), a software suite that supports online communication, feedback collection, and impact measurement across multiple channels. It introduces key terms and defines the problem of managing content distribution across different online channels. The proposed solution features a semantic layer that abstracts domain concepts from specific channels, and a "weaving process" that aligns content with channels. The architecture separates the software into a content management system and a distribution component called dacodi, which uses adapters to interface with individual channels in a standardized way.
2000 - CSCW - Conversation Trees and Threaded ChatsMarc Smith
The document discusses issues with traditional chat interfaces and proposes an alternative called Threaded Chat. Traditional chat ruptures connections between turns and replies by displaying messages in order of arrival rather than conversational order. Threaded Chat aims to address this by structuring messages as threaded responses like online forums, though designed for synchronous use. A study found Threaded Chat allowed equally effective but possibly more efficient discussions than traditional chat.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future advances may impact social networks and social network analysis.
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future modeling could further social network analysis.
2009-Social computing-Analyzing social media networksMarc Smith
This document summarizes research on analyzing social networks within enterprises that have adopted social media applications. Key points:
- Social media applications generate social networks as employees interact by creating connections, replying to messages, collaborating on documents, and mentioning common topics. These networks reveal insights into an organization's structure and dynamics.
- Network analysis uses metrics from graph theory to describe network properties like individual roles (e.g. discussion starters), overall shape and size, and each individual's connections. Visualizations can highlight important people, events, and subgroups.
- Early social network analysis relied on manually collected data, limiting its use. Now, automatically captured social media data creates networks without explicit surveys, providing rich new data
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSIJwest
This document discusses clustering academic social networks to analyze relationships between researchers. It proposes measuring similarity between researcher profiles based on attributes like research interests, publications, and co-authors. The profiles are represented using FOAF and RDF, with attributes like name, email, affiliation, interests, publications and coauthors. Similarities are calculated using measures like Euclidean distance, cosine similarity and Jaccard coefficient. Clustering profiles based on these similarities can simplify analysis of the large, dense social networks by identifying groups of related researchers.
An updated look at social network extraction system a personal data analysis ...eSAT Publishing House
This document summarizes a study on analyzing personal social network data over time. The study extracted data from Facebook, calculated social network analysis metrics like degree distribution and betweenness centrality, and analyzed how the network changed dynamically over time. Key findings included identifying influential and non-influential users, detecting communities that formed within the network, and identifying the celebrity or most influential user within one person's local network. Analyzing how social networks and interactions change dynamically provides insights useful for applications like marketing and recommendations.
2007-JOSS-Visualizing the signatures of social roles in online discussion groupsMarc Smith
The document discusses identifying social roles in online discussion groups based on behavioral and structural signatures. It focuses on distinguishing the role of "answer people", who primarily respond to others' questions. Three signatures are identified for answer people: 1) responding to isolated members, 2) having few intense ties and triangles in their local networks, and 3) typically contributing only one or two messages per thread. Regression analysis shows these signatures strongly predict being an answer person, explaining 72% of variation. The study advances understanding of social roles and identification methods, which can benefit online community managers.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
Social network analysis for modeling & tuning social media websiteEdward B. Rockower
Social Network Analysis of a Professional Online Social Media Collaboration Community. Tuning and optimizing based on observed social network dynamics and user behavior.
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...Asoka Korale
This summarizes a document describing a novel approach to analyzing social networks in mobile telecommunications by modeling call patterns between subscribers. It identifies leaders and communities by processing call initiation and termination data. Communities are detected using influence diffusion algorithms. Results are presented from a corporate network analyzed, identifying leaders and communities formed around them. The identified leaders are validated using existing centrality measures. The approach allows estimating the degree to which individuals belong to multiple overlapping communities.
TOPIC networking portfolio
ACADEMIC LEVEL Undergrad. (yrs 3-4)
DISCIPLINE Business Studies
DOCUMENT TYPE Term paper
SPACING DOUBLE
CITATION STYLE Harvard
The document discusses predicting human behavior and privacy issues in online social networks. It covers topics like understanding human behavior in social communities, user data management and inference, enabling new human experiences through reality mining and context awareness, and privacy concerns in online social networks. Architectural frameworks and methodologies are presented for managing user data, generating new knowledge, and exposing services to predict behavior and enhance experiences while maintaining user privacy.
Social Network Analysis for Competitive IntelligenceAugust Jackson
How can CI teams apply the concepts of social network analysis to gain insight into the capabilities and plans of their competitors? Presented by Jim Richardson and August Jackson in April 2007 at the Society of Competitive Intelligence Professionals annual conference in New York City.
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...COINs2010
COLLABORATIVE INNOVATION NETWORKS, VIRTUAL COMMUNITIES AND
GEOGRAPHICAL CLUSTERING
M. De Maggio, P. A. Gloor, G. Passiante
Abstract
This paper describes the emergence of Collaborative Knowledge Networks (CKNs), distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale.
CKNs are made up of groups of self-motivated individuals, linked by the idea of something new and exciting, and by the common goal of
improving existing business practices, new products or services for which they see a real need. Their strength is related to their ability to activate
creative collaboration, knowledge sharing and social networking mechanisms, affecting positively individual capabilities and organizations’
performance.
We describe the case of a Global Consulting Community to highlight the cultural and structural aspects of this phenomenon. Our case study also
illustrates the composition of the CKN ecosystem, which are made up by a combination of Collaborative Innovation, Learning and Interest Networks.
Empirical evidence suggests physical proximity as a supporting success factor of such communities, depending on the capital and knowledge intensity of the target industry.
Heterogeneous Device-to-Device mobile networks
are characterised by frequent network disruption and unreliability
of peers delivering messages to destinations. Trust-based
protocols has been widely used to mitigate the security and
performance problems in D2D networks. Despite several efforts
made by previous researchers in the design of trust-based routing
for efficient collaborative networks, there are fewer related
studies that focus on the peers’ neighbourhood as a routing
metrics’ element for a secure and efficient trust-based protocol.
In this paper, we propose and validate a trust-based protocol
that takes into account the similarity of peers’ neighbourhood
coefficients to improve routing performance in mobile HetNets
environments. The results of this study demonstrate that peers’
neighbourhood connectivity in the network is a characteristic
that can influence peers’ routing performance. Furthermore, our
analysis shows that our proposed protocol only forwards the
message to the companions with a higher probability of delivering
the packets, thus improving the delivery ratio and minimising
latency and mitigating the problem of malicious peers ( using
packet dropping strategy).
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...IJNSA Journal
The document presents a framework called SoNMine that identifies key players in the 9/11 covert network using node behavioral profiles. It generates profiles by analyzing node behaviors based on path types extracted from the network's multi-relational structure. The framework identifies outlier nodes with dense connections or high communication as influential players. It also determines dominant features that help classify normal and outlier nodes more accurately.
This short set of slides summarizes the characteristics of people who play specific roles in networks. In a social network analysis, people in these roles can be discovered by running mathematical algorithms through the social graphs. But you don't need to be an algorithm to spot some of these people in your networks!
Lectura 2.2 the roleofontologiesinemergnetmiddlewareMatias Menendez
The document discusses the role of ontologies in supporting emergent middleware. Emergent middleware is dynamically generated distributed system infrastructure that enables interoperability in complex distributed systems.
Ontologies play a key role by providing meaning and reasoning capabilities to allow the right runtime choices to be made. They support various functions throughout an emergent middleware architecture, including discovery, composition, and mediation. Two experiments provide initial evidence of ontologies' potential role in middleware by enabling semantic matching and process mediation. However, challenges remain around generating ontologies and addressing interoperability between heterogeneous ontologies.
The document discusses key concepts related to social networks and social networking sites. It defines social networks as networks formed by social ties that can be both personal networks and community networks. Social networking involves using one's social networks, often for professional advantage, and is supported by social networking sites. Social networking sites are primarily designed for managing personal social networks and making social ties explicit. The document also discusses issues like privacy, data ownership, and the structure and management of social networks and ties on social media platforms.
Garro abarca, palos-sanchez y aguayo-camacho, 2021ppalos68
This document summarizes research on factors that influence the performance of virtual teams. It begins by providing background on the rise of virtual teams and remote work. It then reviews literature on key factors for virtual team performance, organizing them into an input-process-output model. The main inputs discussed are task characteristics related to communication, and trust related to leadership, cohesion, and empowerment. The document describes a study examining how these factors influence the performance of 317 software engineering virtual teams during the COVID-19 pandemic. The results provide insight into determinants of virtual team performance that can guide future research and work strategies.
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
The trust and reputation models were introduced to restrain the impacts caused by rational but selfish
peers in P2P streaming systems. However, these models face with two major challenges from dishonest
feedback and strategic altering behaviors. To answer these challenges, we present a global trust model
based on network community, evaluation correlations, and punishment mechanism. We also propose a
two-layered overlay to provide the function of peers’ behaviors collection and malicious detection.
Furthermore, we analysis several security threats in P2P streaming systems, and discuss how to defend
with them by our trust mechanism. The simulation results show that our trust framework can successfully
filter out dishonest feedbacks by using correlation coefficients. It can effectively defend against the
security threats with good load balance as well.
A boring presentation about social mobile communication patterns and opportun...Save Manos
This document provides an outline and summary of a survey on social communication patterns and opportunistic forwarding in mobile networks. It begins with an introduction on opportunistic networking in infrastructureless environments. It then outlines key areas covered in the survey, including useful knowledge on social behavior patterns, how social patterns can impact opportunistic forwarding, and how social information can be exploited to enhance network performance. The document evaluates the state of the art in research on this topic and concludes with directions for future work, such as considering power consumption and marketing-oriented social behaviors.
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...Marc Smith
Wireless devices are becoming ubiquitous and will allow new forms of social interaction and organization. These devices will gather intimate data about users but also help groups overcome obstacles to cooperation. While enabling panoptic power over populations, wireless technologies could also increase successful resolution of collective action problems through online reputation systems during face-to-face interactions. Key technologies include wireless networks, portable devices, location awareness, and machine-readable tags.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share their interests without being at the same geographical location. With the great and rapid growth of Social Media sites such as Facebook, LinkedIn, Twitter…etc. causes huge amount of user-generated content. Thus, the improvement in the information quality and integrity becomes a great challenge to all social media sites, which allows users to get the desired content or be linked to the best link relation using improved search / link technique. So introducing semantics to social networks will widen up the representation of the social networks. In this paper, a new model of social networks based on semantic tag ranking is introduced. This model is based on the concept of multi-agent systems. In this proposed model the representation of social links will be extended by the semantic relationships found in the vocabularies which are known as (tags) in most of social networks.The proposed model for the social media engine is based on enhanced Latent Dirichlet Allocation(E-LDA) as a semantic indexing algorithm, combined with Tag Rank as social network ranking algorithm. The improvements on (E-LDA) phase is done by optimizing (LDA) algorithm using the optimal parameters. Then a filter is introduced to enhance the final indexing output. In ranking phase, using Tag Rank based on the indexing phase has improved the output of the ranking. Simulation results of the proposed model have shown improvements in indexing and ranking output.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
The document presents a new model for intelligent social networks based on semantic tag ranking. It uses a multi-agent system approach with agents performing indexing and ranking. For indexing, it uses an enhanced Latent Dirichlet Allocation (E-LDA) model that optimizes LDA parameters. Tags above a threshold from E-LDA output are ranked using Tag Rank. Simulation results showed improvements in indexing and ranking over conventional methods. The model introduces semantics to social networks to improve search and link recommendation.
Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSIJwest
This document discusses clustering academic social networks to analyze relationships between researchers. It proposes measuring similarity between researcher profiles based on attributes like research interests, publications, and co-authors. The profiles are represented using FOAF and RDF, with attributes like name, email, affiliation, interests, publications and coauthors. Similarities are calculated using measures like Euclidean distance, cosine similarity and Jaccard coefficient. Clustering profiles based on these similarities can simplify analysis of the large, dense social networks by identifying groups of related researchers.
An updated look at social network extraction system a personal data analysis ...eSAT Publishing House
This document summarizes a study on analyzing personal social network data over time. The study extracted data from Facebook, calculated social network analysis metrics like degree distribution and betweenness centrality, and analyzed how the network changed dynamically over time. Key findings included identifying influential and non-influential users, detecting communities that formed within the network, and identifying the celebrity or most influential user within one person's local network. Analyzing how social networks and interactions change dynamically provides insights useful for applications like marketing and recommendations.
2007-JOSS-Visualizing the signatures of social roles in online discussion groupsMarc Smith
The document discusses identifying social roles in online discussion groups based on behavioral and structural signatures. It focuses on distinguishing the role of "answer people", who primarily respond to others' questions. Three signatures are identified for answer people: 1) responding to isolated members, 2) having few intense ties and triangles in their local networks, and 3) typically contributing only one or two messages per thread. Regression analysis shows these signatures strongly predict being an answer person, explaining 72% of variation. The study advances understanding of social roles and identification methods, which can benefit online community managers.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
Social network analysis for modeling & tuning social media websiteEdward B. Rockower
Social Network Analysis of a Professional Online Social Media Collaboration Community. Tuning and optimizing based on observed social network dynamics and user behavior.
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...Asoka Korale
This summarizes a document describing a novel approach to analyzing social networks in mobile telecommunications by modeling call patterns between subscribers. It identifies leaders and communities by processing call initiation and termination data. Communities are detected using influence diffusion algorithms. Results are presented from a corporate network analyzed, identifying leaders and communities formed around them. The identified leaders are validated using existing centrality measures. The approach allows estimating the degree to which individuals belong to multiple overlapping communities.
TOPIC networking portfolio
ACADEMIC LEVEL Undergrad. (yrs 3-4)
DISCIPLINE Business Studies
DOCUMENT TYPE Term paper
SPACING DOUBLE
CITATION STYLE Harvard
The document discusses predicting human behavior and privacy issues in online social networks. It covers topics like understanding human behavior in social communities, user data management and inference, enabling new human experiences through reality mining and context awareness, and privacy concerns in online social networks. Architectural frameworks and methodologies are presented for managing user data, generating new knowledge, and exposing services to predict behavior and enhance experiences while maintaining user privacy.
Social Network Analysis for Competitive IntelligenceAugust Jackson
How can CI teams apply the concepts of social network analysis to gain insight into the capabilities and plans of their competitors? Presented by Jim Richardson and August Jackson in April 2007 at the Society of Competitive Intelligence Professionals annual conference in New York City.
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...COINs2010
COLLABORATIVE INNOVATION NETWORKS, VIRTUAL COMMUNITIES AND
GEOGRAPHICAL CLUSTERING
M. De Maggio, P. A. Gloor, G. Passiante
Abstract
This paper describes the emergence of Collaborative Knowledge Networks (CKNs), distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale.
CKNs are made up of groups of self-motivated individuals, linked by the idea of something new and exciting, and by the common goal of
improving existing business practices, new products or services for which they see a real need. Their strength is related to their ability to activate
creative collaboration, knowledge sharing and social networking mechanisms, affecting positively individual capabilities and organizations’
performance.
We describe the case of a Global Consulting Community to highlight the cultural and structural aspects of this phenomenon. Our case study also
illustrates the composition of the CKN ecosystem, which are made up by a combination of Collaborative Innovation, Learning and Interest Networks.
Empirical evidence suggests physical proximity as a supporting success factor of such communities, depending on the capital and knowledge intensity of the target industry.
Heterogeneous Device-to-Device mobile networks
are characterised by frequent network disruption and unreliability
of peers delivering messages to destinations. Trust-based
protocols has been widely used to mitigate the security and
performance problems in D2D networks. Despite several efforts
made by previous researchers in the design of trust-based routing
for efficient collaborative networks, there are fewer related
studies that focus on the peers’ neighbourhood as a routing
metrics’ element for a secure and efficient trust-based protocol.
In this paper, we propose and validate a trust-based protocol
that takes into account the similarity of peers’ neighbourhood
coefficients to improve routing performance in mobile HetNets
environments. The results of this study demonstrate that peers’
neighbourhood connectivity in the network is a characteristic
that can influence peers’ routing performance. Furthermore, our
analysis shows that our proposed protocol only forwards the
message to the companions with a higher probability of delivering
the packets, thus improving the delivery ratio and minimising
latency and mitigating the problem of malicious peers ( using
packet dropping strategy).
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...IJNSA Journal
The document presents a framework called SoNMine that identifies key players in the 9/11 covert network using node behavioral profiles. It generates profiles by analyzing node behaviors based on path types extracted from the network's multi-relational structure. The framework identifies outlier nodes with dense connections or high communication as influential players. It also determines dominant features that help classify normal and outlier nodes more accurately.
This short set of slides summarizes the characteristics of people who play specific roles in networks. In a social network analysis, people in these roles can be discovered by running mathematical algorithms through the social graphs. But you don't need to be an algorithm to spot some of these people in your networks!
Lectura 2.2 the roleofontologiesinemergnetmiddlewareMatias Menendez
The document discusses the role of ontologies in supporting emergent middleware. Emergent middleware is dynamically generated distributed system infrastructure that enables interoperability in complex distributed systems.
Ontologies play a key role by providing meaning and reasoning capabilities to allow the right runtime choices to be made. They support various functions throughout an emergent middleware architecture, including discovery, composition, and mediation. Two experiments provide initial evidence of ontologies' potential role in middleware by enabling semantic matching and process mediation. However, challenges remain around generating ontologies and addressing interoperability between heterogeneous ontologies.
The document discusses key concepts related to social networks and social networking sites. It defines social networks as networks formed by social ties that can be both personal networks and community networks. Social networking involves using one's social networks, often for professional advantage, and is supported by social networking sites. Social networking sites are primarily designed for managing personal social networks and making social ties explicit. The document also discusses issues like privacy, data ownership, and the structure and management of social networks and ties on social media platforms.
Garro abarca, palos-sanchez y aguayo-camacho, 2021ppalos68
This document summarizes research on factors that influence the performance of virtual teams. It begins by providing background on the rise of virtual teams and remote work. It then reviews literature on key factors for virtual team performance, organizing them into an input-process-output model. The main inputs discussed are task characteristics related to communication, and trust related to leadership, cohesion, and empowerment. The document describes a study examining how these factors influence the performance of 317 software engineering virtual teams during the COVID-19 pandemic. The results provide insight into determinants of virtual team performance that can guide future research and work strategies.
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
The trust and reputation models were introduced to restrain the impacts caused by rational but selfish
peers in P2P streaming systems. However, these models face with two major challenges from dishonest
feedback and strategic altering behaviors. To answer these challenges, we present a global trust model
based on network community, evaluation correlations, and punishment mechanism. We also propose a
two-layered overlay to provide the function of peers’ behaviors collection and malicious detection.
Furthermore, we analysis several security threats in P2P streaming systems, and discuss how to defend
with them by our trust mechanism. The simulation results show that our trust framework can successfully
filter out dishonest feedbacks by using correlation coefficients. It can effectively defend against the
security threats with good load balance as well.
A boring presentation about social mobile communication patterns and opportun...Save Manos
This document provides an outline and summary of a survey on social communication patterns and opportunistic forwarding in mobile networks. It begins with an introduction on opportunistic networking in infrastructureless environments. It then outlines key areas covered in the survey, including useful knowledge on social behavior patterns, how social patterns can impact opportunistic forwarding, and how social information can be exploited to enhance network performance. The document evaluates the state of the art in research on this topic and concludes with directions for future work, such as considering power consumption and marketing-oriented social behaviors.
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...Marc Smith
Wireless devices are becoming ubiquitous and will allow new forms of social interaction and organization. These devices will gather intimate data about users but also help groups overcome obstacles to cooperation. While enabling panoptic power over populations, wireless technologies could also increase successful resolution of collective action problems through online reputation systems during face-to-face interactions. Key technologies include wireless networks, portable devices, location awareness, and machine-readable tags.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share their interests without being at the same geographical location. With the great and rapid growth of Social Media sites such as Facebook, LinkedIn, Twitter…etc. causes huge amount of user-generated content. Thus, the improvement in the information quality and integrity becomes a great challenge to all social media sites, which allows users to get the desired content or be linked to the best link relation using improved search / link technique. So introducing semantics to social networks will widen up the representation of the social networks. In this paper, a new model of social networks based on semantic tag ranking is introduced. This model is based on the concept of multi-agent systems. In this proposed model the representation of social links will be extended by the semantic relationships found in the vocabularies which are known as (tags) in most of social networks.The proposed model for the social media engine is based on enhanced Latent Dirichlet Allocation(E-LDA) as a semantic indexing algorithm, combined with Tag Rank as social network ranking algorithm. The improvements on (E-LDA) phase is done by optimizing (LDA) algorithm using the optimal parameters. Then a filter is introduced to enhance the final indexing output. In ranking phase, using Tag Rank based on the indexing phase has improved the output of the ranking. Simulation results of the proposed model have shown improvements in indexing and ranking output.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
The document presents a new model for intelligent social networks based on semantic tag ranking. It uses a multi-agent system approach with agents performing indexing and ranking. For indexing, it uses an enhanced Latent Dirichlet Allocation (E-LDA) model that optimizes LDA parameters. Tags above a threshold from E-LDA output are ranked using Tag Rank. Simulation results showed improvements in indexing and ranking over conventional methods. The model introduces semantics to social networks to improve search and link recommendation.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share
their interests without being at the same geographical location. With the great and rapid growth of Social
Media sites such as Facebook, LinkedIn, Twitter...etc. causes huge amount of user-generated content.
Thus, the improvement in the information quality and integrity becomes a great challenge to all social
media sites, which allows users to get the desired content or be linked to the best link relation using
improved search / link technique. So introducing semantics to social networks will widen up the
representation of the social networks.
This document summarizes a research paper that analyzed social subgroups and community structure on social networking websites. The paper used the NodeXL tool to analyze Twitter data and identify the most influential group discussing "foreign affairs". It found that 232 users tweeted about foreign affairs, forming 30 groups. The largest group had 71 users and 93 unique connections. Network analysis metrics like in-degree, betweenness centrality, and eigenvector centrality identified the most influential users within the network discussing foreign affairs. This analysis can help organizations understand influential users and groups discussing certain topics on social media.
Mining and Analyzing Academic Social NetworksEditor IJCATR
Academics establish relationships by way of various interactions like jointly authoring a research paper or report, jointly
supervising a thesis, working jointly on a project, etc. Some of these relationships are ubiquitous whereas other are hard to keep track
of. Of all types of possible academic and research collaborations, co-authorship is best documented. In this paper we analyze the coauthorship
based academic social networks of computer science engineering departments of Indian Institutes of Technology (IITs) as
evidenced from their research publications produced during 2011 and 2015. We use social network analysis metrics to study the
collaboration networks in four leading IITs. From experimental results it can be concluded that IIT Delhi and IIT Kharagpur have a
close knit collaboration network whereas the collaboration network of IIT Kanpur and IIT Madras is fragmented. However, the
collaboration networks of all the four IITs exhibit similar network properties as expected from any other collaboration network
This document discusses machine learning techniques for filtering unwanted messages in online social networks. It proposes a content-based filtering system that allows users to control the messages posted on their walls by filtering out unwanted messages. The system uses a machine learning-based classifier to automatically categorize short text messages based on their content. It also includes a blacklist feature to block specific users from posting if they consistently share unwanted messages. The goal is to give users better control over their social media experience by reducing noise and unwanted content on their walls.
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...cscpconf
Communicating an organisation's requirements in a semantically consistent and understandable manner and then reflecting the potential impact of those requirements on the IT infrastructure presents a major challenge among stakeholders. Initial research findings indicate a desire among business executives for a tool that allows them to communicate organisational changes using natural language and a simulation of the IT infrastructure that supports those changes. Building on a detailed analysis and evaluation of these findings, the innovative CRESUS tool was designed and implemented. The purpose of this research was to investigate to what extent CRESUS both aids communication in the development of a shared understanding and supports collaborative requirements elicitation to bring about organisational, and associated IT infrastructural, change. This paper presents promising results that show how such a tool can facilitate collaborative requirements elicitation through increased communication around organisational change and the IT infrastructure.
The document proposes a system to bridge socially enhanced virtual communities for business collaborations. The system discovers relevant existing businesses and potential business alliances through a semi-automated approach using broker discovery. Brokers help connect separate groups within a professional virtual community and find new relevant groups to join. Metrics are used to support discovering and selecting brokers to improve interactions, relationships, and trust between members of the virtual communities.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Improving Knowledge Handling by building intellegent social systemsnazeeh
This document discusses improving knowledge handling by building intelligent systems using social agent modelling. It proposes capturing knowledge from social environments by developing new features in social network analysis systems and using this knowledge to model multi-agent systems. The approach involves extending social network analysis to cover more qualitative factors like emotions, relationships and trust to better represent knowledge and simulate agent behavior. Capturing these social aspects from real networks can provide criteria to analyze and design intelligent multi-agent systems.
COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...ijseajournal
The execution of collaborative activities enables interaction among its participants, however, the real
problem is to evaluate how much each subject contributed in the development of the activity. The
evaluation process allows to inform important aspects about the individual or the group, such as:
reliability, interdependence, flexibility, commitment, interpersonal relationship, productivity and
management strategies. This work proposes is based in domain based architecture and computer-supported
collaborative learning (CSCL) in order to measure individual and group contributions to the
accomplishment of its activities. The evaluation of the collaboration is made in a semi-automated way
using as criteria measures of collaboration present in the literature like counting the amount of meaningful
and valid words in conversations, which allows to evaluate its commitment. After the activity finalizes, a
collaboration score is given to the participant of the group. The proposed architecture was implemented in
the education domain. In addition to generate a set of exercises to the studied subject, the architecture
helped to provide statistic data related to the collaboration assessment among the peers during the
development of collaborative activities.
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mining developer communication data streamscsandit
This paper explores the concepts of modelling a software development project as a process that
results in the creation of a continuous stream of data. In terms of the Jazz repository used in this
research, one aspect of that stream of data would be developer communication. Such data can
be used to create an evolving social network characterized by a range of metrics. This paper
presents the application of data stream mining techniques to identify the most useful metrics for
predicting build outcomes. Results are presented from applying the Hoeffding Tree
classification method used in conjunction with the Adaptive Sliding Window (ADWIN) method
for detecting concept drift. The results indicate that only a small number of the available metrics
considered have any significance for predicting the outcome of a build
Online social networks (OSNs) contain data about users, their relations, interests and daily activities and
the great value of this data results in ever growing popularity of OSNs. There are two types of OSNs data,
semantic and topological. Both can be used to support decision making processes in many applications
such as in information diffusion, viral marketing and epidemiology. Online Social network analysis (OSNA)
research is used to maximize the benefits gained from OSNs’ data. This paper provides a comprehensive
study of OSNs and OSNA to provide analysts with the knowledge needed to analyse OSNs. OSNs’
internetworking was found to increase the wealth of the analysed data by depending on more than one OSN
as the source of the analysed data.
Paper proposes a generic model of OSNs’ internetworking system that an analyst can rely on. Two
different data sources in OSNs were identified in our efforts to provide a thorough study of OSNs, which
are the OSN User data and the OSN platform data. Additionally, we propose a classification of the OSN
User data according to its analysis models for different data types to shed some light into the current used
OSNA methodologies. We also highlight the different metrics and parameters that analysts can use to
evaluate semantic or topologic OSN user data. Further, we present a classification of the other data types
and OSN platform data that can be used to compare the capabilities of different OSNs whether separate or
in a OSNs’ internetworking system. To increase analysts’ awareness about the available tools they can use,
we overview some of the currently publically available OSNs’ datasets and simulation tools and identify
whether they are capable of being used in semantic, topological OSNA, or both. The overview identifies
that only few datasets includes both data types (semantic and topological) and there are few analysis tools
that can perform analysis on both data types. Finally paper present a scenario that shows that an
integration of semantic and topologic data (hybrid data) in the OSNA is beneficial.
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...ijwscjournal
In this paper we present a Service Injection and composition Design Pattern for Unstructured Peer-to-Peer
networks, which is designed with Aspect-oriented design patterns, and amalgamation of the Strategy,
Worker Object, and Check-List Design Patterns used to design the Self-Adaptive Systems. It will apply selfreconfiguration planes dynamically without the interruption or intervention of the administrator for
handling service failures at the servers. When a client requests for a complex service, Service Composition
should be done to fulfil the request. If a service is not available in the memory, it will be injected as
Aspectual Feature Module code. We used Service Oriented Architecture (SOA) with Web Services in Java
to Implement the composite Design Pattern. As far as we know, there are no studies on composition of
design patterns for Peer-to-peer computing domain. The pattern is described using a java-like notation for
the classes and interfaces. A simple UML class and Sequence diagrams are depicted.
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...ijwscjournal
In this paper we present a Service Injection and composition Design Pattern for Unstructured Peer-to-Peer networks, which is designed with Aspect-oriented design patterns, and amalgamation of the Strategy, Worker Object, and Check-List Design Patterns used to design the Self-Adaptive Systems. It will apply selfreconfiguration planes dynamically without the interruption or intervention of the administrator for handling service failures at the servers. When a client requests for a complex service, Service Composition should be done to fulfil the request. If a service is not available in the memory, it will be injected as Aspectual Feature Module code. We used Service Oriented Architecture (SOA) with Web Services in Java to Implement the composite Design Pattern. As far as we know, there are no studies on composition of design patterns for Peer-to-peer computing domain. The pattern is described using a java-like notation for the classes and interfaces. A simple UML class and Sequence diagrams are depicted.
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...ijwscjournal
In this paper we present a Service Injection and composition Design Pattern for Unstructured Peer-to-Peer networks, which is designed with Aspect-oriented design patterns, and amalgamation of the Strategy, Worker Object, and Check-List Design Patterns used to design the Self-Adaptive Systems. It will apply selfreconfiguration planes dynamically without the interruption or intervention of the administrator for handling service failures at the servers. When a client requests for a complex service, Service Composition should be done to fulfil the request. If a service is not available in the memory, it will be injected as Aspectual Feature Module code. We used Service Oriented Architecture (SOA) with Web Services in Java to Implement the composite Design Pattern. As far as we know, there are no studies on composition of design patterns for Peer-to-peer computing domain. The pattern is described using a java-like notation for the classes and interfaces. A simple UML class and Sequence diagrams are depicted.
This document discusses and compares several agent-assisted methodologies for developing multi-agent systems:
- It reviews Gaia, HLIM, PASSI, and Tropos methodologies, outlining their key models and phases. Gaia focuses on analysis and design, HLIM models internal and external agent behavior, and PASSI and Tropos incorporate UML modeling.
- It then proposes a new MAB methodology intended to address shortcomings of existing approaches. MAB includes requirements, analysis, design, and implementation phases and models such as use case maps and agent roles.
- Finally, it concludes that agent technologies represent a promising approach for developing complex software systems, but that matching methodologies to problem domains and developing princip
The document discusses social networks and social network analysis. It defines a social network as connections between individuals or organizations through various social relationships. It then discusses how social network analysis can be applied to map and measure relationships between people, groups, and other entities. Key aspects of social network analysis include degree centrality, betweenness centrality, and closeness centrality. The document provides examples of how social network analysis has been applied and discusses how technologies like LinkedIn and future modeling techniques could further social network analysis.
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...ijcsit
The requirements of software are key elements that contribute to the quality and users satisfaction of the
final system. In this work, Requirements Engineering (RE) of web sites is presented using an organizational
semiotics perspective. They are shown as being part of an organization, with particular practices, rules
and views considering stakeholders several differences and opinions. The main contribution of this paper is
to relate an experience, from elicitation to validation, showing how organizational semiotics artifacts were
exploited in a collaborative and participatory way to RE of a web portal. A case study is described in order
to demonstrate the feasibility of using such artifacts to RE when we think about the system as being part of
a social organization.
Similar to An Sna-Bi Based System for Evaluating Virtual Teams: A Software Development Project Case (20)
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
An Sna-Bi Based System for Evaluating Virtual Teams: A Software Development Project Case
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
An Sna-Bi Based System for Evaluating Virtual
Teams: A Software Development Project Case
Lamia Ben Hiba1 and Mohammed Abdou Janati Idrissi 2
1
Equipe TIME, ENSIAS, Mohammed V Souissi University, Rabat, Morocco
2
Mohammed V Souissi University, Rabat, Morocco
ABSTRACT
The dependence of today's collaborative projects on knowledge acquisition and information dissemination
emphasizes the importance of minimizing communication breakdowns. However, as organizations are
increasingly relying on virtual teams to deliver better and faster results, communication issues come to the
forefront of project managers' concerns. This is particularly palpable in software development projects
which are increasingly virtual and knowledge-consuming as they require continuous generation and
upgrade of shared information and knowledge. In a previous work, we proposed an SNA-BI based system
(Covirtsys) that supplements the Analytics modules of the collaborative platform in order to offer a
complementary analysis of communication flows through a network perspective. This paper concerns the
application of this system on a software development project virtual team and shows how it can bring new
insights that could help overcome communication issues among team members.
KEYWORDS
Virtual teams, team's communication evaluation, social network analysis, collaborative platforms.
1. INTRODUCTION
In an attempt to answer the pressing needs for quick, high quality and low cost solutions to the
increasingly complex problems brought about by their new ecosystem, organizations are moving
from the rigid, hierarchical and traditional functional and matrix team structures into more
organic and flexible forms of organizational structure that are team-based, collaborative and less
dependent on geography. These new structures, referred to as virtual teams, build on the gains
acquired from team-based designs (through delegating decision-making and problem solving
responsibilities to line-level employees) and the prevalence of networked information and
communication technologies. Virtual teams are thus defined as "groups of geographically,
organizationally and/or time dispersed workers brought together by information technologies to
accomplish one or more organizational tasks" [1]. They can hence be characterized as teams
whose members: (a) interact through interdependent tasks guided by common purposes, (b) use
ICT substantially more than face-to-face communication and (c) are geographically dispersed
from each other [2].
A particular field that has seen the prevalence of virtual teams is software development. As
companies are acknowledging that multi-site software development decreases product
development cycle and are increasingly handing off (outsourcing) their software development to
firms specializing in this area [3], software development teams moved from co-located to more
distributed forms known as project virtual teams. Project virtual teams are defined as virtual
teams which conduct longer-term projects with a predefined requirement and expected result
(Software product, information system etc.). Software development has been described as "a
DOI : 10.5121/ijcsit.2013.5607
91
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
collaborative problem-solving activity where success is dependent upon knowledge acquisition,
information sharing and integration, and the minimization of communication breakdowns" [4].
While networked technologies ensure communication and information dissemination within
software development project virtual teams, they have proven to present many limitations [5]. To
cite a few:
- Ineffective communication due to the absence of direct contact between team members and the
lack of non-verbal information which is important for building trust [6].
- Lack of a common vision that knits the whole team together as project virtual teams face
breakdowns in mutual knowledge that could undermine the success of the project at hand [7].
- Absence of visibility on the load and progress of work [8].
- Difficulties to monitor and manage the performance of the team [9].
- Difficulty of instilling trust among team members due to differences in thought processes
across cultures and functional positions [10].
- And complexity of the management due to the differences between time zones, cultures and
languages of the team members [11].
Because communication is instrumental to the collaboration of virtual teams, monitoring its flow
becomes crucial to their success. The study of communication and dissemination of information
relies increasingly on examining the interactions between members of the team. The analysis of
these interactions is possible through Social Network Analysis (SNA) which is a field that
provides research methods for mapping and measuring relationships and flows between people,
groups, organizations and other connected information/knowledge entities. The next section
introduces SNA and its underlying principles. It also presents the conceptual foundations of a
Covirtsys, a monitoring system we propose to assess the dynamics between virtual team members
through the analysis of the structure of their communication network. The third section describes
the application of Covirtsys to analyze communication in a software development project case
study. The last section concludes the paper and provides hints on future work.
2. SNA ON THE TEAM LEVEL
Social Network Analysis (SNA) is a descriptive, empirical discipline that studies networks as a
mathematical representation of complex systems by expressing them in terms of relationships
among actors. A Social network is “a set of nodes (e.g. persons, organizations) linked by a set of
social relationships (e.g. friendship, transfer of funds, overlapping membership) of a specified
type” [12]. A relationship is defined as “the mode or process in which members of a social system
are connected or associated interdependently among or between each other; i.e. a partial
unification of members which, when considered irrespective of such a relation, would be
incapable of being conceived together” [13]. SNA provides graph algorithms that help map,
characterize and quantify topological properties of social networks, identify patterns of relations
and recognize the roles of sub-groups and nodes within the network. SNA's underlying principles
as identified by Wellman [14] can be summed as follows:
1) Behavior is interpreted in terms of the group's structural constraints rather than by
examining drives, attitudes, or demographic characteristics of the group's individuals.
2) The focus of the analysis is on the interconnectedness between units and not on their
inherent characteristics
3) The analysis assumes an interdependence among the network's actors. For example, a
change in the relationships patterns affects network members' behavior.
4) The structure is considered as a network of networks. The structural properties of the
network are thus seen as more than the sum of dyadic exchanges.
92
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
5) The analysis regards organizations as overlapping networks with fuzzy boundaries rather
than discrete independent units of analysis.
SNA offers two perspectives of social systems: a micro-view and a macro-view. The micro or
Ego-centric view focuses on a select actor (ego) and examines its neighbors (nodes that are
connected to it), their neighbors and so forth. It studies the features of personal networks. The
macro or Socio-centric view, on the other hand, provides a bird's eye perspective of the network
and helps examine the structural patterns of the interactions among actors with the aim to explain
and potentially generalize an outcome.
Driven by the realization that the behavior of complex systems is shaped by the interactions
among their constituent elements [15], SNA is increasingly used to uncover patterns of relations
characterizing a group or social system as a whole. Based on the recognition that SNA provides
enough theoretical and practical ground to help make sense of communication flow patterns and
examine the ties between teams' stakeholders, we proposed in previous works [16][17] a
monitoring system for assessing the structure of the communication and information
dissemination network within project virtual teams. We refer to this system from this point on as
Covirtsys.
Figure 1. Covirtsys' conceptual model
The four-phases system is built on the collaborative platform in order to offer an SNA-based
module that supplements the platform's Analytics module. The first stage consists of alimenting
the system with the relevant data that originate from the collaborative platform. In the second
stage, the system offers a restitution of the built network and the relevant metrics. The third phase
aims to diagnose the network and identify the problems related to communication in the project
virtual team and consequently, in the final stage, support taking the appropriate decisions that will
enhance the team’s structure.
93
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
Figure 2. COVIRTSYS' applicative landscape
The upcoming sections of the paper describe the application of the above-mentioned system on a
software development project virtual team in order to analyze the team's communication network
and identify communication and information dissemination breakdowns.
3. ANALYSIS OF COMMUNICATION IN A SOFTWARE DEVELOPMENT VIRTUAL
TEAM: A CASE STUDY
3.1. Description of the case study
This case study examines the communication and information dissemination within a distributed
software development team based on "Redmine", the used collaborative project management
platform. Redmine is an open source web-based project management platform that supports many
functions : member roles, Gantt charts, scheduling, calendar, roadmap, versions management,
documents management, news delivery, files directory, activity view, and more [18]. It is
considered a good choice for spread software development teams [19].
The software development project at the heart of this study, intends to develop an urban district's
information system composed of three segments represented by projects on the Redmine
platform. This virtual project team provides a good case study because of its virtuality and
consequently its reliance on the collaborative platform. The online exchanges are thus considered
a good representation of the team's overall interactions. Furthermore, the use of an open source
collaboration platforms facilitates the tracking of relational data. The heterogeneous composition
of the team (developers, analysts and few key users), makes the latter more susceptible to
communication discrepancies, often caused by functional boundaries.
94
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
Figure 3. Redmine's Issues List
Team members communicate on the Redmine platform around issues which are considered the
principal artifact of conversation between the platform's users. Issues are used to track tasks and
subtasks regarding bugs, feature requests and support requests and are thus considered a good
indicator of the information dissemination processes relative to the collaboration within this
particular team. The application of Covirtsys in this virtual team case study amounts to plugging
the system on Redmine's database, collecting the pertinent data and computing the SNA-related
metrics as a basis for the analysis. The case study is limited to a snapshot of the virtual team at a
specific time and doesn't take into account the progress of the communication network that could
be historized within the datawarehouse component of the system for team communication's
monitoring purposes.
3.2. Data Collection
The data collection phase is shaped by the modeling of the virtual team as a social network. This
modeling enables the application of the extensive research around network theory and SNA for
examining the network's properties and topology. The communication and information
dissemination flows that are identified on the collaboration platform are modeled using a network
perspective and the structure of the team is examined by studying the underlying relationships
that are woven among team members. The project virtual team is thus modeled as a set V of
nodes or vertices, representing team’s members, interconnected through a set E of links, called
also edges or ties. A link (p,q) E is created whenever member q and p communicate around an
issue. The created communication network G := (V,E) is thus an undirected and unweighted
network (where there is no specification of the source and destination of the network's links and
all these links are uniform i.e. without weight).
∈
It is worth pointing out that parallel edges (where many ties exist among the same two nodes) are
only taken into account for the purpose of visualizing the network. When examining the structure
of the network, the parallel edges are reduced into single edges because on one hand, taking
account of the existence of the connection is more important than the number of connections in
studying characteristics such as clustering, brokerage etc. and on the other hand, the computed
SNA metrics for such purposes support only simple graphs.
The analysis of Redmine's database showed that three tables can be used to build the network,
namely Projects, Issues and Users. Each team member included in the project is presented by a
node in the network. Based on the Issues table, a tie is drawn between two nodes when the author
of an issue assigns it to a team member (self-loops aren't taken into account). The number of
95
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
occurrences of these pairings, reflecting the frequency of interaction between nodes, is also
extracted and stored for later use in the visualization of the network.
The extraction from Redmine's database regarding the project at hand shows that the project is
composed of three sub-projects. The team working on the project is comprised of 13 members. As
issues consist the main artifact of interaction among team members, they have been identified and
tracked while taking into account the author of the issue (who created it), the team member it was
assigned to (a different team member or the author himself). There are 330 issues relating to the
project, with 96 issues that are self-assigned (62 of them aren't assigned to anyone and thus are
implicitly considered handled by their own author). The constructed network is thus comprised of
13 nodes and 267 ties which are later reduced to 28 when the parallel edges are compacted into
single edges. For the purpose of this publication, nodes has been anonymized in order to conceal
the identity of team members.
3.3. Data restitution
The data restitution phase renders the two views of the network through graphic visualizations
(macro-view) along with a set of SNA-related metrics (micro-view). The network is built and
visualized by Covirtsys through, respectively, a Python-based program and a powerful open
source package named Gephi [20] which is often regarded in the network science communities as
the “Photoshop for networks” [21].
The visualization of the network is carried out in two different ways. The first graph takes into
account parallel edges in order to have an appreciation of the frequency of interactions among
team members. However, for better visibility, the parallel edges are compacted into single edges
and the frequency of connections is presented as an attribute (label) of the edges and is
proportional to the width of the edge in the built graph. The wider the edge, the more interactions
occur among the two nodes.
Figure 4 The communication network of the software development project virtual team (with parallel
edges)
96
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
The second visualization doesn't take into account parallel edges nor self-loops. The built network
allows the assessment of the connectivity among team members and dutifully represents the graph
used as basis for the computation of the network metrics. For better assessment of the positions of
certain nodes, the size of nodes is represented in proportion of their degree (number of
neighbors). The bigger the node, the more neighbors it has and the more central it is in the
network.
Figure 5. The communication network of the software development project virtual team (without parallel
edges)
Visualizations convey a general idea on the structure of the network that can only be confirmed
through the network's metrics. Covirtsys identifies the metrics pertaining to team network
structure and classifies them in three dimensions: "Density", "centrality" and "cliques and
bridges".
Each dimension examines the network through a different angle. The density dimension offers an
insight on the level of connectivity among collaborators. The centrality dimension highlights the
critical positions of certain actors within the team. The third dimension provides a view on the
nature of the relationships among collaborators and their connections with cliques (subgraphs of
the network where every two nodes are connected) within the network. The metrics, as specified
in Table 1, are calculated using the underlying algorithms of Covirtsys through the SNA toolkit
Networkx. "Networkx" is a Python language package for the exploration and analysis of
networks. It is widely used within the SNA community as it has the most permissive license
which allows integrating it within proprietary software [22].
97
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
Table 1. Results the computation of the network's measures
Dimension
Density
Centrality
cliques and bridges
Metrics
Density
Average Degree
Average neighbor degree
Degree centrality
Closeness centrality
Degree Centralization
Closeness Centralization
Clustering coefficient
Brokerage score (Betweeness)
Number of maximal cliques
Size of the largest clique
Heterogeneity
Results
0.359
4.308
5.899
Per node
Per node
0.462
0.026
0.365
Per node
17
4
0.641
The computation of the structural metrics delivers two types of results: Network-level and nodelevel metrics. Metrics on the network level are presented in Table 1. However, to get a better
appreciation of the metrics that are calculated on the node level, we plotted them in histograms
(cf. Figure 6).
Figure 6. Histograms of SNA metrics on the node level
3.4. Diagnosis
The rendered visualizations and metrics represent the basis of the diagnosis phase which aims to
identify communication-related issues within the virtual team. Communication issues arise in
different forms within the virtual team and can be reflected in a network perspective as [21]:
- Fragmentation: where the network is divided into disconnected subgroups.
- Domination: where communication flows are monopolized by a few central nodes creating
bottlenecks that could delay the speed of information spread within the virtual team.
98
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
- Insularity: where the nodes at the periphery of the network are disconnected or loosely
connected to the rest of the network
The assessment of the studied team's communication network shows that these three issues
emerge to different degrees.
Two graphs were constructed based on the studied team's communication network. The first
graph shows that most interactions occur among few team members (six) including the most
central nodes of the network. It also reveals the existence of an isolated team member ("ou") who
hasn't interacted with any other collaborator throughout the duration of the project. The second
graph brings to light four central nodes (hubs) who dominate the network("mo", "fb", "yc", "sb").
Apart from the isolated node, only three nodes have connections to non-hubs, while all the others
have interacted with at least two of the central nodes.
The rendered metrics seem to confirm the observations made on the basis of both visualizations.
I). The density dimension: The density metric (35%) reflects a weakly dense network with an
average degree that borders four and a node's neighborhood that is connected to an average of
five nodes. This means that a team member interacts in average with only four (out of twelve)
other members while his immediate contacts give him access to an average of five team members
(who could overlap with his neighbors).
II). The centrality dimension: The distribution of degree centrality confirms the existence of few
hubs that are central in the flow of information within the team. It also shows that most nodes are
close to the average and hence, are not very peripheral in the network (except for the isolate).
Closeness centrality reflects how fast information spreads from a given node to other reachable
nodes in the network [24]. The high closeness centrality of a few nodes shows that they are
adjacent to a great portion of the network's node (as it could be seen on the visualization). The
existence of central nodes insures that the distance among actors in the network is shortened and
thus information can reach nodes in a relatively short time. The centralization measures gauge the
variation in the centrality scores among the nodes [25]. In the current case study, a 46% degree
centralization shows that the power of actors varies substantially and the centrality is unequally
distributed in the network. The weak closeness centralization on the other hand, shows that nodes'
closeness centrality scores are at a close range from one another. This is mostly due to the
existence of the four central nodes which shorten the paths among team members.
III). The cliques and bridges dimension: The clustering coefficient reflects the tendency of node's
neighbors to connect to each other and thus to form cliques (subgraphs of the network where
every two nodes are connected). Our network has a clustering coefficient of 0.365 which means
that it's loosely clustered. This is confirmed by the high number of maximal cliques in the
network (17) and the small size of the largest clique (4). The heterogeneity score is a correlation
coefficient between nodes of different degrees. Networks with a positive heterogeneity coefficient
(which is the case here) have distributed and consequently vulnerable high-degree hubs [26] as
opposed to a negative heterogeneity that reflects a core of interconnected resilient hubs.
3.5. Decision Making
The diagnosis of the network's visualizations and metrics serves to identify communicationrelated issues and "support" the decision making process that aims to enhance the communication
network and by extension the collaboration within the virtual team. Depending on his objectives,
and based on information provided by Covirtsys through the three previous phases, the project
team manager can take certain measures to steer the existing network towards the desired team
99
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
structure. There are three principle issues that are observed in the studied network and that could
require immediate attention:
I). The most noticeable issue of the studied communication network is the fragmentation of the
network, apparent from the isolation of one node in the network. The integration of the
corresponding team member can be performed through an on-boarding program (in case he is a
new recruit) or a simple pairing with another more central team member (which will not only
connect the isolate node to the network but easily grant him access to other team members).
Techniques such as Pair Programming [27], where programmers develop software side by side,
could be envisaged in order to fully integrate developers within the overall network.
II). The visualizations and metrics demonstrate the existence of few hubs that dominate the
studied communication network as few nodes connect to non-hubs. Bypassing hubs when
connecting two team members offers the advantage of lowering the workload of hubs and
increasing the network's resilience (the decrease of the fragmentation's risk in cases where hubs
decide to leave the team). A redesign of business processes with a concern of circumventing these
central nodes is a viable action to make in order to overcome this domination problem.
III). The vulnerability of such network (due to its positive heterogeneity) also hints to a need to
drive a knowledge management initiative that captures the knowledge of its few hubs and makes
it available for reuse. The redistribution of knowledge will enable team members to address issues
without having to go through hubs and thus enhance the overall communication network.
4. CONCLUSIONS
The fundamental goal of this paper is to present the application of Covirtsys, an SNA-BI based
system we have proposed to assess and analyze virtual teams based on their members' interactions
within the used collaborative platform, on a software development project virtual team case study.
Covirtsys, which complements BI analytics modules, is based on SNA metrics in order to provide
network visualizations for communication flows' diagnosis. The principle goal of the system is to
continuously support decision makers in overcoming communication issues within virtual teams.
In this paper, we have applied Covirtsys to diagnose virtual teams' communication flows at a
specific time. The case study shows that Covirtsys is a viable decision support system which
would direct the decision maker to take measures that will enhance the existing communication
network. An interesting follow-up would be to validate the whole system and provide guidelines
in order to support the managerial interpretations and decisions to-be-made based on the restituted
results at different stages of the team's lifecycle.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
A. Powell, G. Piccoli, B. Ives, "Virtual teams: a review of current literature and directions for future
research". ACM Sigmis Database, Vol. 35, no. 1, pp 6-36, 2004
E. Brauner, W. Scholl, "The information processing approach as perspective for group research".
Group Processes and Intergroup Relations, Vol. 3, pp. 115–122, 2000
B. Sengupta, S. Chandra, V. Sinha, "A research agenda for distributed software development", in The
28th international conference on Software engineering ACM, Shanghai, China, May 20-28, 2006.
H. P. Andres, "A comparison of face-to-face and virtual software development teams". Team
Performance Management, Vol. 8 n. 1/2, pp 39-48, 2002.
B.J. Bergiel, E.B. Bergiel, P.W. Balsmeier, "Nature of virtual teams: A summary of their advantages
and disadvantages". Management Research News, Vol. 31 n. 2, pp. 99–110, 2008
J. D. Herbsleb, A. Mockus, "An empirical study of speed and communication in globally distributed
software development". Software Engineering, IEEE Transactions, Vol. 29 n. 6, pp. 481-494, 2003.
100
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
C. Cramton, "The mutual knowledge problem and its consequences for dispersed collaboration",
Organization Science, Vol. 12 n. 3, pp 346-371, 2001.
S. E. Poltrock, G. Engelbeck, "Requirements for a virtual collocation environment". Information and
Software Technology, Vol. 41 n. 6, pp. 331-339, 1999.
K. S. Pawar, S. Sharifi, "Physical or virtual team collocation: Does it matter?". International Journal
of Production Economics, Vol. 52 n.3, pp. 283-290, 1997.
B. Rosen, S. Furst, R. Blackburn, "Overcoming barriers to knowledge sharing in virtual teams".
Organizational Dynamics, Vol. 36 n.3, pp. 259-273, 2007.
P. R Kuruppuarachchi, "Virtual team concepts in projects: A case study". Project Management
Journal, Vol. 40 n. 2, pp. 19-33, 2009.
E. O. Laumann, J. Galaskiewicz, P.V. Marsden, "Community structure as interorganizational
linkages". Annual review of sociology, Vol. 4, pp. 455-484, 1978.
R. T. Wigand, "Communication network analysis: History and overview", In Handbook of
organizational communication, Ed. Norwood, NJ: Ablex, 1988, pp 319-359
B. Wellman, "Structural analysis: From method and metaphor to theory and substance". In Social
structures: A network approach, Ed. Cambridge, England: Cambridge University Press, 1988, pp 1961
E. Bullmore, O. Sporns, "Complex brain networks: graph theoretical analysis of structural and
functional systems". Nature Reviews Neuroscience, Vol. 10 n. 3, pp 186-198, 2009.
L. Ben Hiba, M.A.J. Idrissi, "Towards an SNA system for evaluating project virtual teams based on
social collaborative platforms". 4th Next Generation Networks and Services (NGNS) IEEE, Olhao,
Portugal, December 2-4, 2012.
L. Ben Hiba, M.A.J. Idrissi, "Towards an SNA-BI based support system for the structural evaluation
of project virtual teams". 13th Intelligent Systems: Theories and Applications ~SITA 2013~, IEEE,
Rabat, Morocco, May 08-09, 2013.
A. Lesyuk, Mastering Redmine. Packt Publishing Ltd, 2013
C. Martin, "Comparison On Open Source Collaborative Project Management Software". 5th
Knowledge Management: Projects, Systems and Technologies, Bucharest, Romania, November 1213, 2010.
M. Bastian, S. Heymann, M. Jacomy, "Gephi: an open source software for exploring and
manipulating networks." 3rd Int'l AAAI Conference on Weblogs and Social Media ~ICWSM~, San
Jose CA, USA, May 17-20, 2009.
E. Meeks, "Gephi is like Photoshop for Networks", [Retrieved on Nov. 27,2013], retrieved from
Stanford University site https://dhs.stanford.edu/tools/gephi-is-like-photoshop-for-networks/, 2011
D. Combe, C. Largeron, E. Egyed-Zsigmond, M. Géry, "A comparative study of social network
analysis tools", 2nd International workshop on Web Intelligence and virtual enterprises ~WIVE'10~,
Saint-Étienne, France, October 11-13, 2010.
R. L. Cross, R.J. Thomas, Driving results through social networks: How top organizations leverage
networks for performance and growth, Wiley, 2008
M.E.J. Newman, "A measure of betweenness centrality based on random walks". Social networks,
Vol. 27 n. 1, pp 39-54, 2005.
L. C. Freeman, "Centrality in social networks: Conceptual clarification". Social Networks, Vol. 1 n. 3,
pp 215–239, 1979.
M.E.J. Newman, "Assortative mixing in networks". Physical review letters Vol. 89 n. 20, pp
2087011–2087014, 2002
A. Cockburn, L. Williams, The costs and benefits of pair programming. Extreme programming
examined, Addison-Wesley, 2000
Authors
Ben Hiba Lamia, PhD candidate at ENSIAS, Mohammed V Souissi University.
Prof Mohammed Abdou Janati-Idrissi, Professor at ENSIAS, Mohammed V Souissi University.
101