SlideShare a Scribd company logo
Social Network
  Analysis
‘...a central Jack or a periphery Bob?’



                                   -Alcott & Christopoulos
Network Type
Example: Ego-Centric
• Ties in these networks are
  defined by a single central
  actor/node (including perceived
  ties between other actors).
• Ego-centric networks ...provide
  network analysts and researchers
  with interesting and useful data
  about the roles individuals
  adopt…                  -Fisher

Alternatives:
• Socio-centric
• One Mode
• Two Mode
Network Density
Example: Sparse
• Ego-centric networks are
  vulnerable if the central node
  is removed and you are unable
  to recruit any other actor who
  is structurally equivalent.

Alternatives:
• Dense – networks where the
   majority of nodes are directly
   linked to each other are more
   resilient as there is little/no
   disruption to communication
   flows if an actor is removed.
Cliques
Example: 16, 7, 8

• A clique is a subgroup of
  actors who are all directly
  connected to one another
  and no additional network
  member exists who is also
  connected to all members of
  the subgroup.
  -Hawe, Webster & Shiell
Brokers
Good or bad?

• Described as …individuals
  who are the glue that holds
  a social network together …

• In most cases, knowledge
  brokers are good, but there
  are times when they are
  hoarders of information or
  power brokers.
                     -Tennant
Peripherals
Not necessarily out-on-a-limb...

Remember:
  ...some organisations within an
  inter-organisational network can
  exercise power by refusing to lend
  their credibility to the network.
  They remain on the periphery
  structurally, but are able to
  influence the direction the
  network takes entirely because of
  their size, reputation, or through
  the power of sanctions.
              -Hawe, Webster & Shiell
Advantages of SNA
        • Key actors identified by the
          network are often missed by
          hierarchical/organisational
          related approaches.

        • Visual impact: From a good
          visualization, the observer can
          begin to understand
          communication
          patterns, including who on the
          nursing unit may influence the
          flow of information (e.g., act as a
          gatekeeper) or who has more or
          authority due to their
          coordination role in the network.
                 -Effken & Benham-Hutchins
Limitations of SNA
                                        • Identifying isolates in the
                                          workplace/school setting
                                          etc must be approached
                                          with caution
                                        • Findings tend to
                                          represent ‘snapshots’;
                                          follow-up investigation
                                          often recommended to
                                          spot trends over time
                                        • Often survey-based;
                                          vulnerable to low
                                          response rate and
                                          inaccuracies
Image credit: spaceodissey via flickr
SNA in action:
    business connectivity in Bristol
• ‘Engaging with this project, individual actors have been able to
  discern weaknesses in their network position and detect
  opportunities in those that reciprocate a collaboration interest.

• At the same time they have been able to gain an overview of the
  structure of interactions among others and potentially determine
  an optimal strategy for their own network interactions.

• By improving on their cognitive map of the network they are
  effectively improving their horizon and making an informed
  decision on whether it is best for them to meet a central Jack or a
  peripheral Bob. ‘

                                                          -Alcott & Christopoulos
Bibliography
•   ALCOTT, T. and CHRISTOPOULOS, D.C . (2011). Is it important to know Jack? Using
    social network analysis to assess regional business connectivity in Bristol. [online].
    Procedia - Social and Behavioral Sciences, 10, 90-97. Last accessed 15 July 2012 at:
    http://www.sciencedirect.com/science/article/pii/S1877042811000139
•   EFFKEN , J. and BENHAM-HUTCHINS, M. (2011). Technology-Enhanced Social
    Network Analysis: An Old Idea Whose Time Has Come—Again. (Issues, Impacts
    and Insights Column). [online]. Online Journal of Nursing Informatics (OJNI),15 (1).
    Last accessed 15 July 2012 at: http://ojni.org/issues/?p=326
•   FISHER, D. (2005). Egocentric Networks To Understand Communication. [online].
    IEEE Internet Computing. 9(5). Last accessed 15 July 2012 at:
    http://research.microsoft.com/pubs/69319/ieee_egocentric.pdf
•   HAWE, P., WEBSTER, C. and SHIELL, A. (2004). A glossary of terms for navigating
    the field of social network analysis. [online] Journal of Epidemiol Community
    Health. 58:971-975. Last accessed 15 July 2012 at:
    http://jech.bmj.com/content/58/12/971.full
•   TENNANT, N. (2012). Social Networks for Talent Identification: Is the 9-Box Dead?
    [online]. Management Innovation eXchange. 24/04/12. Last accessed 15 July
    2012 at: http://www.managementexchange.com/story/social-networks-talent-
    identification-9-box-dead

More Related Content

Similar to SNA

Social Network Analysis & an Introduction to Tools
Social Network Analysis & an Introduction to ToolsSocial Network Analysis & an Introduction to Tools
Social Network Analysis & an Introduction to Tools
Patti Anklam
 
Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012
CameliaN
 
The Key Success Factor in Knowledge Management... What Else? Change Management
The Key Success Factor in Knowledge Management... What Else? Change ManagementThe Key Success Factor in Knowledge Management... What Else? Change Management
The Key Success Factor in Knowledge Management... What Else? Change Management
Patti Anklam
 
Harnessing the Potential of Social Networks: The ABCs of using social network...
Harnessing the Potential of Social Networks: The ABCs of using social network...Harnessing the Potential of Social Networks: The ABCs of using social network...
Harnessing the Potential of Social Networks: The ABCs of using social network...
Institute for Reproductive Health Georgetown University
 
Social Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked ProblemsSocial Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked Problems
Simon Buckingham Shum
 
Is connectivism real v 19th
Is connectivism real v 19thIs connectivism real v 19th
Is connectivism real v 19th
frazil
 
Equity and KT: Insights from the 2021 Knowledge Translation (KT) Student Awar...
Equity and KT: Insights from the 2021 Knowledge Translation (KT) Student Awar...Equity and KT: Insights from the 2021 Knowledge Translation (KT) Student Awar...
Equity and KT: Insights from the 2021 Knowledge Translation (KT) Student Awar...
The National Collaborating Centre for Methods and Tools
 
Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)
Katy Jordan
 
AoA Presentation.v.6Feb2024.pptx
AoA Presentation.v.6Feb2024.pptxAoA Presentation.v.6Feb2024.pptx
AoA Presentation.v.6Feb2024.pptx
klaus110316
 
Qualitative research lecture-shortened
Qualitative research lecture-shortenedQualitative research lecture-shortened
Qualitative research lecture-shortened
Aiden Yeh
 
Network awareness tool & SocialLearn: Visualising relations that matter
Network awareness tool & SocialLearn: Visualising relations that matter Network awareness tool & SocialLearn: Visualising relations that matter
Network awareness tool & SocialLearn: Visualising relations that matter
Maarten de Laat, LOOK, Open Universiteit, The Netherlands
 
Tsrc rep
Tsrc repTsrc rep
Tsrc rep
Drew Mackie
 
Tsrc rep
Tsrc repTsrc rep
Tsrc rep
Drew Mackie
 
Everyone's An Influencer: Quantifying Influence on Twitter
Everyone's An Influencer: Quantifying Influence on TwitterEveryone's An Influencer: Quantifying Influence on Twitter
Everyone's An Influencer: Quantifying Influence on Twitter
Path of the Blue Eye Project
 
Field book 2010
Field book 2010Field book 2010
Field book 2010
GavunJohnston
 
KT
KTKT
The Complexity of Data: Computer Simulation and “Everyday” Social Science
The Complexity of Data: Computer Simulation and “Everyday” Social ScienceThe Complexity of Data: Computer Simulation and “Everyday” Social Science
The Complexity of Data: Computer Simulation and “Everyday” Social Science
Edmund Chattoe-Brown
 
Social Network Analysis (SNA) Made Easy
Social Network Analysis (SNA) Made EasySocial Network Analysis (SNA) Made Easy
Social Network Analysis (SNA) Made Easy
Jeff Mohr
 
Affective relationships between users & libraries in times of economic stress
Affective relationships between users & libraries in times of economic stressAffective relationships between users & libraries in times of economic stress
Affective relationships between users & libraries in times of economic stress
Giannis Tsakonas
 
2014.02.26 Network Data Analytics ..Organizing intra-organizational networks ...
2014.02.26 Network Data Analytics ..Organizing intra-organizational networks ...2014.02.26 Network Data Analytics ..Organizing intra-organizational networks ...
2014.02.26 Network Data Analytics ..Organizing intra-organizational networks ...
NUI Galway
 

Similar to SNA (20)

Social Network Analysis & an Introduction to Tools
Social Network Analysis & an Introduction to ToolsSocial Network Analysis & an Introduction to Tools
Social Network Analysis & an Introduction to Tools
 
Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012
 
The Key Success Factor in Knowledge Management... What Else? Change Management
The Key Success Factor in Knowledge Management... What Else? Change ManagementThe Key Success Factor in Knowledge Management... What Else? Change Management
The Key Success Factor in Knowledge Management... What Else? Change Management
 
Harnessing the Potential of Social Networks: The ABCs of using social network...
Harnessing the Potential of Social Networks: The ABCs of using social network...Harnessing the Potential of Social Networks: The ABCs of using social network...
Harnessing the Potential of Social Networks: The ABCs of using social network...
 
Social Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked ProblemsSocial Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked Problems
 
Is connectivism real v 19th
Is connectivism real v 19thIs connectivism real v 19th
Is connectivism real v 19th
 
Equity and KT: Insights from the 2021 Knowledge Translation (KT) Student Awar...
Equity and KT: Insights from the 2021 Knowledge Translation (KT) Student Awar...Equity and KT: Insights from the 2021 Knowledge Translation (KT) Student Awar...
Equity and KT: Insights from the 2021 Knowledge Translation (KT) Student Awar...
 
Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)
 
AoA Presentation.v.6Feb2024.pptx
AoA Presentation.v.6Feb2024.pptxAoA Presentation.v.6Feb2024.pptx
AoA Presentation.v.6Feb2024.pptx
 
Qualitative research lecture-shortened
Qualitative research lecture-shortenedQualitative research lecture-shortened
Qualitative research lecture-shortened
 
Network awareness tool & SocialLearn: Visualising relations that matter
Network awareness tool & SocialLearn: Visualising relations that matter Network awareness tool & SocialLearn: Visualising relations that matter
Network awareness tool & SocialLearn: Visualising relations that matter
 
Tsrc rep
Tsrc repTsrc rep
Tsrc rep
 
Tsrc rep
Tsrc repTsrc rep
Tsrc rep
 
Everyone's An Influencer: Quantifying Influence on Twitter
Everyone's An Influencer: Quantifying Influence on TwitterEveryone's An Influencer: Quantifying Influence on Twitter
Everyone's An Influencer: Quantifying Influence on Twitter
 
Field book 2010
Field book 2010Field book 2010
Field book 2010
 
KT
KTKT
KT
 
The Complexity of Data: Computer Simulation and “Everyday” Social Science
The Complexity of Data: Computer Simulation and “Everyday” Social ScienceThe Complexity of Data: Computer Simulation and “Everyday” Social Science
The Complexity of Data: Computer Simulation and “Everyday” Social Science
 
Social Network Analysis (SNA) Made Easy
Social Network Analysis (SNA) Made EasySocial Network Analysis (SNA) Made Easy
Social Network Analysis (SNA) Made Easy
 
Affective relationships between users & libraries in times of economic stress
Affective relationships between users & libraries in times of economic stressAffective relationships between users & libraries in times of economic stress
Affective relationships between users & libraries in times of economic stress
 
2014.02.26 Network Data Analytics ..Organizing intra-organizational networks ...
2014.02.26 Network Data Analytics ..Organizing intra-organizational networks ...2014.02.26 Network Data Analytics ..Organizing intra-organizational networks ...
2014.02.26 Network Data Analytics ..Organizing intra-organizational networks ...
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

SNA

  • 1. Social Network Analysis ‘...a central Jack or a periphery Bob?’ -Alcott & Christopoulos
  • 2. Network Type Example: Ego-Centric • Ties in these networks are defined by a single central actor/node (including perceived ties between other actors). • Ego-centric networks ...provide network analysts and researchers with interesting and useful data about the roles individuals adopt… -Fisher Alternatives: • Socio-centric • One Mode • Two Mode
  • 3. Network Density Example: Sparse • Ego-centric networks are vulnerable if the central node is removed and you are unable to recruit any other actor who is structurally equivalent. Alternatives: • Dense – networks where the majority of nodes are directly linked to each other are more resilient as there is little/no disruption to communication flows if an actor is removed.
  • 4. Cliques Example: 16, 7, 8 • A clique is a subgroup of actors who are all directly connected to one another and no additional network member exists who is also connected to all members of the subgroup. -Hawe, Webster & Shiell
  • 5. Brokers Good or bad? • Described as …individuals who are the glue that holds a social network together … • In most cases, knowledge brokers are good, but there are times when they are hoarders of information or power brokers. -Tennant
  • 6. Peripherals Not necessarily out-on-a-limb... Remember: ...some organisations within an inter-organisational network can exercise power by refusing to lend their credibility to the network. They remain on the periphery structurally, but are able to influence the direction the network takes entirely because of their size, reputation, or through the power of sanctions. -Hawe, Webster & Shiell
  • 7. Advantages of SNA • Key actors identified by the network are often missed by hierarchical/organisational related approaches. • Visual impact: From a good visualization, the observer can begin to understand communication patterns, including who on the nursing unit may influence the flow of information (e.g., act as a gatekeeper) or who has more or authority due to their coordination role in the network. -Effken & Benham-Hutchins
  • 8. Limitations of SNA • Identifying isolates in the workplace/school setting etc must be approached with caution • Findings tend to represent ‘snapshots’; follow-up investigation often recommended to spot trends over time • Often survey-based; vulnerable to low response rate and inaccuracies Image credit: spaceodissey via flickr
  • 9. SNA in action: business connectivity in Bristol • ‘Engaging with this project, individual actors have been able to discern weaknesses in their network position and detect opportunities in those that reciprocate a collaboration interest. • At the same time they have been able to gain an overview of the structure of interactions among others and potentially determine an optimal strategy for their own network interactions. • By improving on their cognitive map of the network they are effectively improving their horizon and making an informed decision on whether it is best for them to meet a central Jack or a peripheral Bob. ‘ -Alcott & Christopoulos
  • 10. Bibliography • ALCOTT, T. and CHRISTOPOULOS, D.C . (2011). Is it important to know Jack? Using social network analysis to assess regional business connectivity in Bristol. [online]. Procedia - Social and Behavioral Sciences, 10, 90-97. Last accessed 15 July 2012 at: http://www.sciencedirect.com/science/article/pii/S1877042811000139 • EFFKEN , J. and BENHAM-HUTCHINS, M. (2011). Technology-Enhanced Social Network Analysis: An Old Idea Whose Time Has Come—Again. (Issues, Impacts and Insights Column). [online]. Online Journal of Nursing Informatics (OJNI),15 (1). Last accessed 15 July 2012 at: http://ojni.org/issues/?p=326 • FISHER, D. (2005). Egocentric Networks To Understand Communication. [online]. IEEE Internet Computing. 9(5). Last accessed 15 July 2012 at: http://research.microsoft.com/pubs/69319/ieee_egocentric.pdf • HAWE, P., WEBSTER, C. and SHIELL, A. (2004). A glossary of terms for navigating the field of social network analysis. [online] Journal of Epidemiol Community Health. 58:971-975. Last accessed 15 July 2012 at: http://jech.bmj.com/content/58/12/971.full • TENNANT, N. (2012). Social Networks for Talent Identification: Is the 9-Box Dead? [online]. Management Innovation eXchange. 24/04/12. Last accessed 15 July 2012 at: http://www.managementexchange.com/story/social-networks-talent- identification-9-box-dead