SlideShare a Scribd company logo
Social Network Analysis
(SNA)
Background
• Network analysis concerns itself with the
formulation and solution of problems that
have a network structure; such structure is
usually captured in a graph.
• Graph theory provides a set of abstract
concepts and methods for the analysis of
graphs.
• Social Science
SNA
•SNA is not just a methodology; it is a unique
perspective on how society functions.
•Instead of focusing on individuals and their
attributes, or on macroscopic social structures, it
centers on relations between individuals,
groups, or social institutions.
Practical Applications
• Businesses
– improve communication flow in the organization
• Law enforcement
– identify criminal and terrorist networks
– key players in these network
• Social Network
– identify and recommend potential friends based on
friends-of-friends
• Network operators (telephony, cable, mobile)
– optimize the structure and capacity of their networks
Why and When to use SNA
• Unlimited possibilities
• To improve the effectiveness of the network to
visualize your data so as to uncover patterns
in relationships or interactions
• To follow the paths that information follows in
social networks
• Quantitative research & qualitative research
Basic Concepts
• How to represent various
social networksNetworks
• How to identify strong/weak
ties in the networkTie Strength
• How to identify key/central
nodes in networkKey Players
• Measures of overall network
structureCohesion
• How to represent various
social networksNetworks
Representing relations as networks
Communication
• Anne: Jim, tell the Murrays they’re invited
• Jim: Mary, you and your dad should come for dinner!
• Jim: Mr. Murray, you should both come for dinner
• Anne: Mary, did Jim tell you about the dinner? You must come.
• John: Mary, are you hungry?
1 2
3 4
Vertex
(node)
Edge
(link)
Graph1 432
Directed Graph
Undirected Graph
Ego and Whole Network
• How to identify strong/weak
ties in the networkTie Strength
Weights to the Edges
(Directed/Undirected Graphs)
Homophily, Transitivity, Bridging
Homophily
• Tendency to relate to people with
similar characteristics (status, beliefs, etc.)
• Ties can either be strong or weak.
• Leads to formation of clusters.
Transitivity
• Transitivity is evidence to Existence of strong ties.
• Transitivity and homophily lead to formation of
cliques.
Bridging
• They are nodes and edges connected across groups.
• How to identify key/central
nodes in networkKey Players
Degree Centrality
Betweenness Centrality
Closeness Centrality
Eigenvector Centrality
Paths and Shortest Path
Interpretation of Measures(1)
Interpretation of Measures(2)
Identifying set of Key Players
• Measures of overall network
structureCohesion
Reciprocity (degree of)
• The ratio of the number of relations
which are reciprocated (i.e. there is an edge
in both directions) over the total number of
relations in the network.
• where two vertices are said to be related
if there is at least one edge between them
• In the example to the right this would be
2/5=0.4 (whether this is considered high or
low depends on the context)
Density
• A network’s density is the ratio of the
number of edges in the network over
the total number of possible edges
between all pairs of nodes (which is n(n-1)/2,
where n is the number of vertices, for an
undirected graph)
• In the example network to the
right density=5/6=0.83
Clustering
• A node’s clustering coefficient is the
density of its neighborhood (i.e. the
network consisting only of this node
and all other nodes directly connected
to it)
• E.g., node 1 to the right has a value
Of 1 because its neighbors are 2 and 3
and the neighborhood of nodes 1, 2
and 3 is perfectly connected (i.e. it is a
‘clique’)
Average and Longest Distance
• The longest shortest path (distance)
between any two nodes in a network
is called the network’s diameter
• The diameter of the network on
the right is 3
Small world
• A small world is a network that
looks almost random but exhibits a
significantly high clustering coefficient
(nodes tend to cluster locally) and a
relatively short average path length
(nodes can be reached in a few steps)
Preferential Attachment
THANK YOU

More Related Content

What's hot

Network centrality measures and their effectiveness
Network centrality measures and their effectivenessNetwork centrality measures and their effectiveness
Network centrality measures and their effectiveness
emapesce
 
Community detection in graphs
Community detection in graphsCommunity detection in graphs
Community detection in graphs
Nicola Barbieri
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systemskaran2190
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
Full Stack Developer at Electro Mizan Andisheh
 
Content Delivery Networks (CDN)
Content Delivery Networks (CDN)Content Delivery Networks (CDN)
Content Delivery Networks (CDN)
Dilum Bandara
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 
Network measures used in social network analysis
Network measures used in social network analysis Network measures used in social network analysis
Network measures used in social network analysis
Dragan Gasevic
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IV
pkaviya
 
Community Detection in Social Media
Community Detection in Social MediaCommunity Detection in Social Media
Community Detection in Social Media
Symeon Papadopoulos
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Grid computing
Grid computing Grid computing
Grid computing
Safayet Hossain
 
Web Usage Pattern
Web Usage PatternWeb Usage Pattern
Web Usage Pattern
Shreyansh Kejriwal
 
06 Community Detection
06 Community Detection06 Community Detection
06 Community Detection
Duke Network Analysis Center
 
Lecture 2 more about parallel computing
Lecture 2   more about parallel computingLecture 2   more about parallel computing
Lecture 2 more about parallel computing
Vajira Thambawita
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
Ankit Gupta
 
Data Mining: Data cube computation and data generalization
Data Mining: Data cube computation and data generalizationData Mining: Data cube computation and data generalization
Data Mining: Data cube computation and data generalization
DataminingTools Inc
 
2.5 backpropagation
2.5 backpropagation2.5 backpropagation
2.5 backpropagation
Krish_ver2
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
mustafa aadel
 
Clusters techniques
Clusters techniquesClusters techniques
Clusters techniques
rajshreemuthiah
 

What's hot (20)

Network centrality measures and their effectiveness
Network centrality measures and their effectivenessNetwork centrality measures and their effectiveness
Network centrality measures and their effectiveness
 
Community detection in graphs
Community detection in graphsCommunity detection in graphs
Community detection in graphs
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
Content Delivery Networks (CDN)
Content Delivery Networks (CDN)Content Delivery Networks (CDN)
Content Delivery Networks (CDN)
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
Network measures used in social network analysis
Network measures used in social network analysis Network measures used in social network analysis
Network measures used in social network analysis
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IV
 
Community Detection in Social Media
Community Detection in Social MediaCommunity Detection in Social Media
Community Detection in Social Media
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Grid computing
Grid computing Grid computing
Grid computing
 
Web Usage Pattern
Web Usage PatternWeb Usage Pattern
Web Usage Pattern
 
06 Community Detection
06 Community Detection06 Community Detection
06 Community Detection
 
4 Cliques Clusters
4 Cliques Clusters4 Cliques Clusters
4 Cliques Clusters
 
Lecture 2 more about parallel computing
Lecture 2   more about parallel computingLecture 2   more about parallel computing
Lecture 2 more about parallel computing
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
 
Data Mining: Data cube computation and data generalization
Data Mining: Data cube computation and data generalizationData Mining: Data cube computation and data generalization
Data Mining: Data cube computation and data generalization
 
2.5 backpropagation
2.5 backpropagation2.5 backpropagation
2.5 backpropagation
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Clusters techniques
Clusters techniquesClusters techniques
Clusters techniques
 

Viewers also liked

NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSIS
rathnaarul
 
Community detection
Community detectionCommunity detection
Community detection
Scott Pauls
 
NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSIS
rathnaarul
 
Group and Community Detection in Social Networks
Group and Community Detection in Social NetworksGroup and Community Detection in Social Networks
Group and Community Detection in Social Networks
Kent State University
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreWael Elrifai
 

Viewers also liked (6)

NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSIS
 
Community detection
Community detectionCommunity detection
Community detection
 
NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSIS
 
Group and Community Detection in Social Networks
Group and Community Detection in Social NetworksGroup and Community Detection in Social Networks
Group and Community Detection in Social Networks
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 

Similar to Social network analysis basics

02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
Duke Network Analysis Center
 
4. social network analysis
4. social network analysis4. social network analysis
4. social network analysis
Lokesh Ramaswamy
 
Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012CameliaN
 
Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)
Katy Jordan
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Social Network, Metrics and Computational Problem
Social Network, Metrics and Computational ProblemSocial Network, Metrics and Computational Problem
Social Network, Metrics and Computational Problem
Andry Alamsyah
 
Network Modeling 101 - Applications to the banking industry
Network Modeling 101 - Applications to the banking industryNetwork Modeling 101 - Applications to the banking industry
Network Modeling 101 - Applications to the banking industryunceterisparibus
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
Arsalan Khan
 
Networks in their surrounding contexts
Networks in their surrounding contextsNetworks in their surrounding contexts
Networks in their surrounding contexts
Vamshi Vangapally
 
4.1 network analysis basic
4.1 network analysis basic4.1 network analysis basic
4.1 network analysis basicjilung hsieh
 
Personal network analysis september 18
Personal network analysis september 18Personal network analysis september 18
Personal network analysis september 18
Eduardo Mattos
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Dave King
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
dnac
 
01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)
Duke Network Analysis Center
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
Duke Network Analysis Center
 
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
Marc Smith
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
Duke Network Analysis Center
 
2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial
Alexander Pico
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
HashannaLockhart
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
HashannaLockhart
 

Similar to Social network analysis basics (20)

02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
 
4. social network analysis
4. social network analysis4. social network analysis
4. social network analysis
 
Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012
 
Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)Social Network Analysis - an Introduction (minus the Maths)
Social Network Analysis - an Introduction (minus the Maths)
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
 
Social Network, Metrics and Computational Problem
Social Network, Metrics and Computational ProblemSocial Network, Metrics and Computational Problem
Social Network, Metrics and Computational Problem
 
Network Modeling 101 - Applications to the banking industry
Network Modeling 101 - Applications to the banking industryNetwork Modeling 101 - Applications to the banking industry
Network Modeling 101 - Applications to the banking industry
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
Networks in their surrounding contexts
Networks in their surrounding contextsNetworks in their surrounding contexts
Networks in their surrounding contexts
 
4.1 network analysis basic
4.1 network analysis basic4.1 network analysis basic
4.1 network analysis basic
 
Personal network analysis september 18
Personal network analysis september 18Personal network analysis september 18
Personal network analysis september 18
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
 
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
 
2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial2016 Cytoscape 3.3 Tutorial
2016 Cytoscape 3.3 Tutorial
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Social network analysis basics

  • 2. Background • Network analysis concerns itself with the formulation and solution of problems that have a network structure; such structure is usually captured in a graph. • Graph theory provides a set of abstract concepts and methods for the analysis of graphs. • Social Science
  • 3. SNA •SNA is not just a methodology; it is a unique perspective on how society functions. •Instead of focusing on individuals and their attributes, or on macroscopic social structures, it centers on relations between individuals, groups, or social institutions.
  • 4. Practical Applications • Businesses – improve communication flow in the organization • Law enforcement – identify criminal and terrorist networks – key players in these network • Social Network – identify and recommend potential friends based on friends-of-friends • Network operators (telephony, cable, mobile) – optimize the structure and capacity of their networks
  • 5. Why and When to use SNA • Unlimited possibilities • To improve the effectiveness of the network to visualize your data so as to uncover patterns in relationships or interactions • To follow the paths that information follows in social networks • Quantitative research & qualitative research
  • 6. Basic Concepts • How to represent various social networksNetworks • How to identify strong/weak ties in the networkTie Strength • How to identify key/central nodes in networkKey Players • Measures of overall network structureCohesion
  • 7. • How to represent various social networksNetworks
  • 8. Representing relations as networks Communication • Anne: Jim, tell the Murrays they’re invited • Jim: Mary, you and your dad should come for dinner! • Jim: Mr. Murray, you should both come for dinner • Anne: Mary, did Jim tell you about the dinner? You must come. • John: Mary, are you hungry? 1 2 3 4 Vertex (node) Edge (link) Graph1 432
  • 11. Ego and Whole Network
  • 12. • How to identify strong/weak ties in the networkTie Strength
  • 13. Weights to the Edges (Directed/Undirected Graphs)
  • 14. Homophily, Transitivity, Bridging Homophily • Tendency to relate to people with similar characteristics (status, beliefs, etc.) • Ties can either be strong or weak. • Leads to formation of clusters. Transitivity • Transitivity is evidence to Existence of strong ties. • Transitivity and homophily lead to formation of cliques. Bridging • They are nodes and edges connected across groups.
  • 15. • How to identify key/central nodes in networkKey Players
  • 23. Identifying set of Key Players
  • 24. • Measures of overall network structureCohesion
  • 25. Reciprocity (degree of) • The ratio of the number of relations which are reciprocated (i.e. there is an edge in both directions) over the total number of relations in the network. • where two vertices are said to be related if there is at least one edge between them • In the example to the right this would be 2/5=0.4 (whether this is considered high or low depends on the context)
  • 26. Density • A network’s density is the ratio of the number of edges in the network over the total number of possible edges between all pairs of nodes (which is n(n-1)/2, where n is the number of vertices, for an undirected graph) • In the example network to the right density=5/6=0.83
  • 27. Clustering • A node’s clustering coefficient is the density of its neighborhood (i.e. the network consisting only of this node and all other nodes directly connected to it) • E.g., node 1 to the right has a value Of 1 because its neighbors are 2 and 3 and the neighborhood of nodes 1, 2 and 3 is perfectly connected (i.e. it is a ‘clique’)
  • 28. Average and Longest Distance • The longest shortest path (distance) between any two nodes in a network is called the network’s diameter • The diameter of the network on the right is 3
  • 29. Small world • A small world is a network that looks almost random but exhibits a significantly high clustering coefficient (nodes tend to cluster locally) and a relatively short average path length (nodes can be reached in a few steps)
  • 31.