SlideShare a Scribd company logo
1 of 12
1Copyright © 2011, Elsevier Inc. All rights Reserved
Chapter 8
Email: The Lifeblood of
Modern
Communication
Analyzing Social Media Networks with NodeXL
Insights from a Connected World
2Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.1
Chapter8
A simple email network visualized in NodeXL. Arrows point from the sender
to the receiver(s). Edge thickness (1 to 3) is based on number of messages
exchanged. Edge opacity is set to 50. Vertex size (1.5 to 5) is based on out-
degree or number of messages sent.
3Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.2
Chapter8
Window’s search results show all 2174 email messages and the folder they
are contained in on the desktop containing the search term “NodeXL.”
4Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.3
Chapter8
NodeXL Import from Email Network dialog filtered to only include messages
with the term “NodeXL” between 1/1/2009 and 5/31/2009 in a specified
folder.
5Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.4
Chapter8
Excel 2007 Find and Replace function used to merge different email
addresses in a NodeXL Edges worksheet.
6Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.5
Chapter8
A Lookup table and the Excel VLOOKUP() formula is used to combine
duplicate email addresses in NodeXL.
7Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.6
Chapter8
Effects of NodeXL’s Merge Duplicate Edges feature after combining
duplicate addresses. A self-loop is shown in red.
8Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.7
Chapter8
Derek Hansen’s email network for
May 2009, showing only
connections with over five
messages (Edge Visibility > 4).
Size is based on the Log of total
sent messages (1.5 to 3.5). Opacity
is based on the Log of total
received messages (30 to 100).
Edge weight is mapped to Edge
Width (1 to 4) and log of edge
weight is mapped to Edge Opacity
(10 to 70). Shape is set to Label for
email lists; Ben Shneiderman and
Marc Smith are labeled with the
Shape kept as a Disk.
9Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.8
Chapter8
NodeXL visualization of Derek’s personal email message network limited to
messages with the term “NodeXL” sent or received over a 5-month period;
shown before and after the application of dynamic filters. Size maps to the
Log of total sent messages, Opacity maps to the Log of total received
messages. Edge width and opacity map to edge weight.
10Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.9
Chapter8
TechABC’s organizational
unit email network “backbone,”
focusing on high-traffic
connections between units (i.e.,
those who exchange more than
50 messages per FTE). Color
is mapped to betweenness
centrality with green vertices
playing important roles as
bridge spanners. Edge opacity
is mapped to messages per
FTE. Dynamic filters were used
to exclude those with low
closeness centrality, which is a
trick for filtering out all vertices
that are not part of the large
component.
11Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.10
Chapter8
TechABC’s organizational unit network including research units (maroon squares)
and nonresearch units connected to them (blue disks) through the exchange of
email. Only edges with 10 or more messages sent per FTE are included. Edge width
(1-2) and opacity (40-100) are based on raw sent messages. Vertex size is based
on the number of group members (FTEs). Notice some obvious disconnects (e.g.,
Market Research 1 and 2), as well as some of the important bridge spanning
research groups (e.g., Specific 6) and nonresearch groups (e.g., Blue disk just
above General 17).
12Copyright © 2011, Elsevier Inc. All rights Reserved
FIGURE 8.11
Chapter8
Enron Corporation’ s network of email including messages with the word “FERC”
exchanged between employees. Vertex size (1.5 to 4) is based on indegree.
Greener vertices received many FERC messages but did not send many out. The
Harel-Karen layout was initially used, followed by Fruchterman-Reingold, to push
the more peripheral vertices to the edges. Tim Belden, who pleaded guilty and
witnessed against other top Enron executives, is labeled.

More Related Content

What's hot (7)

Analyzing social media networks with NodeXL - Chapter-10 Images
Analyzing social media networks with NodeXL - Chapter-10 ImagesAnalyzing social media networks with NodeXL - Chapter-10 Images
Analyzing social media networks with NodeXL - Chapter-10 Images
 
Magazine awr-ims-3
Magazine awr-ims-3Magazine awr-ims-3
Magazine awr-ims-3
 
LECTURE-1 (Data Communication) ~www.fida.com.bd
LECTURE-1 (Data Communication) ~www.fida.com.bdLECTURE-1 (Data Communication) ~www.fida.com.bd
LECTURE-1 (Data Communication) ~www.fida.com.bd
 
M1-R4 - IT Tools And Business Systems - Jan 2014 Solved Paper Part-1
M1-R4 - IT Tools And Business Systems - Jan 2014 Solved Paper Part-1M1-R4 - IT Tools And Business Systems - Jan 2014 Solved Paper Part-1
M1-R4 - IT Tools And Business Systems - Jan 2014 Solved Paper Part-1
 
Automatic Visualization of Grouped Networks
Automatic Visualization of Grouped NetworksAutomatic Visualization of Grouped Networks
Automatic Visualization of Grouped Networks
 
CMSC 350 FINAL PROJECT
CMSC 350 FINAL PROJECTCMSC 350 FINAL PROJECT
CMSC 350 FINAL PROJECT
 
Advanced formula
Advanced formulaAdvanced formula
Advanced formula
 

Similar to Analyzing social media networks with NodeXL - Chapter- 08 images

Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
Anuja Lad
 
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
IJNSA Journal
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernet
IAEME Publication
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
IJRAT
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiver
iaemedu
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
Shaheen Khan
 

Similar to Analyzing social media networks with NodeXL - Chapter- 08 images (20)

Introduction to computer network.ppt
Introduction to computer network.pptIntroduction to computer network.ppt
Introduction to computer network.ppt
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
 
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
 
Email forensic
Email forensic Email forensic
Email forensic
 
A New Architecture for Email Knowledge Extraction
A New Architecture for Email Knowledge Extraction  A New Architecture for Email Knowledge Extraction
A New Architecture for Email Knowledge Extraction
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernet
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
 
How email works
How email worksHow email works
How email works
 
Email
EmailEmail
Email
 
INTERNET APPLICATION AND EMAIL:
INTERNET APPLICATION AND EMAIL:INTERNET APPLICATION AND EMAIL:
INTERNET APPLICATION AND EMAIL:
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Experimental Analysis of Small Internetwork using OPNET 9.1
Experimental Analysis of Small Internetwork using OPNET 9.1Experimental Analysis of Small Internetwork using OPNET 9.1
Experimental Analysis of Small Internetwork using OPNET 9.1
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
0 csc 3311 slide internet programming
0 csc 3311 slide internet programming0 csc 3311 slide internet programming
0 csc 3311 slide internet programming
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiver
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
 
I017554954
I017554954I017554954
I017554954
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 

More from Marc Smith

20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
Marc Smith
 
2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box
Marc Smith
 

More from Marc Smith (20)

How to use social media network analysis for amplification
How to use social media network analysis for amplificationHow to use social media network analysis for amplification
How to use social media network analysis for amplification
 
Think link what is an edge - NodeXL
Think link   what is an edge - NodeXLThink link   what is an edge - NodeXL
Think link what is an edge - NodeXL
 
2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow
 
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
 
20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
 
2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna
 
2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming Skills
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted
 
2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis
 
20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...
 
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
 
2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer
 
20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
 
20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...
 
20111123 mwa2011-marc smith
20111123 mwa2011-marc smith20111123 mwa2011-marc smith
20111123 mwa2011-marc smith
 
20111103 con tech2011-marc smith
20111103 con tech2011-marc smith20111103 con tech2011-marc smith
20111103 con tech2011-marc smith
 
2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 

Recently uploaded (20)

1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

Analyzing social media networks with NodeXL - Chapter- 08 images

  • 1. 1Copyright © 2011, Elsevier Inc. All rights Reserved Chapter 8 Email: The Lifeblood of Modern Communication Analyzing Social Media Networks with NodeXL Insights from a Connected World
  • 2. 2Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.1 Chapter8 A simple email network visualized in NodeXL. Arrows point from the sender to the receiver(s). Edge thickness (1 to 3) is based on number of messages exchanged. Edge opacity is set to 50. Vertex size (1.5 to 5) is based on out- degree or number of messages sent.
  • 3. 3Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.2 Chapter8 Window’s search results show all 2174 email messages and the folder they are contained in on the desktop containing the search term “NodeXL.”
  • 4. 4Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.3 Chapter8 NodeXL Import from Email Network dialog filtered to only include messages with the term “NodeXL” between 1/1/2009 and 5/31/2009 in a specified folder.
  • 5. 5Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.4 Chapter8 Excel 2007 Find and Replace function used to merge different email addresses in a NodeXL Edges worksheet.
  • 6. 6Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.5 Chapter8 A Lookup table and the Excel VLOOKUP() formula is used to combine duplicate email addresses in NodeXL.
  • 7. 7Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.6 Chapter8 Effects of NodeXL’s Merge Duplicate Edges feature after combining duplicate addresses. A self-loop is shown in red.
  • 8. 8Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.7 Chapter8 Derek Hansen’s email network for May 2009, showing only connections with over five messages (Edge Visibility > 4). Size is based on the Log of total sent messages (1.5 to 3.5). Opacity is based on the Log of total received messages (30 to 100). Edge weight is mapped to Edge Width (1 to 4) and log of edge weight is mapped to Edge Opacity (10 to 70). Shape is set to Label for email lists; Ben Shneiderman and Marc Smith are labeled with the Shape kept as a Disk.
  • 9. 9Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.8 Chapter8 NodeXL visualization of Derek’s personal email message network limited to messages with the term “NodeXL” sent or received over a 5-month period; shown before and after the application of dynamic filters. Size maps to the Log of total sent messages, Opacity maps to the Log of total received messages. Edge width and opacity map to edge weight.
  • 10. 10Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.9 Chapter8 TechABC’s organizational unit email network “backbone,” focusing on high-traffic connections between units (i.e., those who exchange more than 50 messages per FTE). Color is mapped to betweenness centrality with green vertices playing important roles as bridge spanners. Edge opacity is mapped to messages per FTE. Dynamic filters were used to exclude those with low closeness centrality, which is a trick for filtering out all vertices that are not part of the large component.
  • 11. 11Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.10 Chapter8 TechABC’s organizational unit network including research units (maroon squares) and nonresearch units connected to them (blue disks) through the exchange of email. Only edges with 10 or more messages sent per FTE are included. Edge width (1-2) and opacity (40-100) are based on raw sent messages. Vertex size is based on the number of group members (FTEs). Notice some obvious disconnects (e.g., Market Research 1 and 2), as well as some of the important bridge spanning research groups (e.g., Specific 6) and nonresearch groups (e.g., Blue disk just above General 17).
  • 12. 12Copyright © 2011, Elsevier Inc. All rights Reserved FIGURE 8.11 Chapter8 Enron Corporation’ s network of email including messages with the word “FERC” exchanged between employees. Vertex size (1.5 to 4) is based on indegree. Greener vertices received many FERC messages but did not send many out. The Harel-Karen layout was initially used, followed by Fruchterman-Reingold, to push the more peripheral vertices to the edges. Tim Belden, who pleaded guilty and witnessed against other top Enron executives, is labeled.