Analyses of the structure of social-personality psychology as manifest in bibliometric couplings within the Journal of Personality and Social Psychology for selected years between 1981 and 2014
This is a colloquium that I presented on 4/22/21: Stockholm University, Nordic Institute for Theoretical Physics (NORDITA), WINQ–AlbaNova Colloquium
Here is a video of my talk: http://video.albanova.se/ALBANOVA20210422/video.mp4
Paper Writing in Applied Mathematics (slightly updated slides)Mason Porter
Here are my slides (which I have updated very slightly) in writing papers in applied mathematics.
There will be an accompanying oral presentation and discussion on Friday 20 April. I am recording the video for that and plan to post it along with these (or a further updated version of these) slides.
4C13 J.15 Larson "Twitter based discourse community"rhetoricked
This document summarizes Brian Larson's research examining Twitter discourse communities among composition scholars. It outlines the motivation for studying whether certain Twitter practices constitute genres. It then discusses challenges in sampling the large Twitter population and proposes using hashtags and follower networks as a starting point. The document presents network analysis concepts and provides an example analysis of tweets from the 2012 CCCCs conference. It stresses the need for qualitative research to understand how users experience online communities and outlines next steps such as studying smaller hashtag datasets and collaborating with other researchers.
This document discusses considerations for collecting social network data through surveys. It addresses research design elements like defining the relevant population boundaries and sampling approaches. For surveys specifically, it covers informed consent, name generator questions to identify social ties, response formats, and balancing depth of network detail collected versus sample size. The key challenges are defining the theoretical population of interest, collecting a sufficiently large and representative network sample, and designing survey questions that accurately capture social ties within time and resource constraints.
The document provides information about social network visualization and analysis. It includes contact information for librarians at UT Austin who can assist with data visualization. It discusses how to structure network data, including examples of node and edge files. Different types of networks like undirected, directed, and weighted networks are described. Centrality measures and applications of network analysis like Gephi software are also mentioned.
09 Respondent Driven Sampling and Network Sampling with Memorydnac
RDS and network sampling methods aim to sample hidden populations for which traditional sampling frames do not exist. The document discusses issues with sampling hidden populations and evaluates Respondent Driven Sampling (RDS) and a new method called Network Sampling with Memory (NSM). It finds that RDS estimates can be biased when its assumptions are violated. A new data collection method called Inverse Preferential RDS (IP-RDS) and the NSM method show promise in improving estimation through modifications to the sampling process and collection of network data. Field testing is still needed to validate these innovative approaches.
The document discusses network diffusion and peer influence. It covers compartmental models of diffusion, how network structure affects diffusion through factors like distance, clustering, and highly connected nodes. Simulation studies show networks with shorter path distances, more independent paths between nodes, and higher clustering coefficients diffuse ideas and behaviors more quickly. The regression analysis finds these network structural characteristics strongly predict a network's relative diffusion ratio compared to random networks.
The document discusses different types of network experiments and interventions. It describes (1) assigning roommates randomly to manipulate networks and assess peer effects, (2) using natural experiments to manipulate exposure over existing networks, and (3) interventions that use networks to affect change. Specifically, it covers exogenous network experiments that randomly assign relationships, issues with experimental assignment, and four types of interventions: targeting individuals, segmentation, induction, and alteration.
This is a colloquium that I presented on 4/22/21: Stockholm University, Nordic Institute for Theoretical Physics (NORDITA), WINQ–AlbaNova Colloquium
Here is a video of my talk: http://video.albanova.se/ALBANOVA20210422/video.mp4
Paper Writing in Applied Mathematics (slightly updated slides)Mason Porter
Here are my slides (which I have updated very slightly) in writing papers in applied mathematics.
There will be an accompanying oral presentation and discussion on Friday 20 April. I am recording the video for that and plan to post it along with these (or a further updated version of these) slides.
4C13 J.15 Larson "Twitter based discourse community"rhetoricked
This document summarizes Brian Larson's research examining Twitter discourse communities among composition scholars. It outlines the motivation for studying whether certain Twitter practices constitute genres. It then discusses challenges in sampling the large Twitter population and proposes using hashtags and follower networks as a starting point. The document presents network analysis concepts and provides an example analysis of tweets from the 2012 CCCCs conference. It stresses the need for qualitative research to understand how users experience online communities and outlines next steps such as studying smaller hashtag datasets and collaborating with other researchers.
This document discusses considerations for collecting social network data through surveys. It addresses research design elements like defining the relevant population boundaries and sampling approaches. For surveys specifically, it covers informed consent, name generator questions to identify social ties, response formats, and balancing depth of network detail collected versus sample size. The key challenges are defining the theoretical population of interest, collecting a sufficiently large and representative network sample, and designing survey questions that accurately capture social ties within time and resource constraints.
The document provides information about social network visualization and analysis. It includes contact information for librarians at UT Austin who can assist with data visualization. It discusses how to structure network data, including examples of node and edge files. Different types of networks like undirected, directed, and weighted networks are described. Centrality measures and applications of network analysis like Gephi software are also mentioned.
09 Respondent Driven Sampling and Network Sampling with Memorydnac
RDS and network sampling methods aim to sample hidden populations for which traditional sampling frames do not exist. The document discusses issues with sampling hidden populations and evaluates Respondent Driven Sampling (RDS) and a new method called Network Sampling with Memory (NSM). It finds that RDS estimates can be biased when its assumptions are violated. A new data collection method called Inverse Preferential RDS (IP-RDS) and the NSM method show promise in improving estimation through modifications to the sampling process and collection of network data. Field testing is still needed to validate these innovative approaches.
The document discusses network diffusion and peer influence. It covers compartmental models of diffusion, how network structure affects diffusion through factors like distance, clustering, and highly connected nodes. Simulation studies show networks with shorter path distances, more independent paths between nodes, and higher clustering coefficients diffuse ideas and behaviors more quickly. The regression analysis finds these network structural characteristics strongly predict a network's relative diffusion ratio compared to random networks.
The document discusses different types of network experiments and interventions. It describes (1) assigning roommates randomly to manipulate networks and assess peer effects, (2) using natural experiments to manipulate exposure over existing networks, and (3) interventions that use networks to affect change. Specifically, it covers exogenous network experiments that randomly assign relationships, issues with experimental assignment, and four types of interventions: targeting individuals, segmentation, induction, and alteration.
I. The document discusses ego networks and how they can be used to study personal networks and relationships. Ego networks combine traditional survey data with network data by collecting information about respondents (egos) and their social ties (alters).
II. Ego network data can be used to examine the effects of network structure and alter characteristics on outcomes of interest. It can also provide insights into diffusion processes within personal networks.
III. While ego network data is useful for studying local network phenomena, global network data is needed to analyze higher-level structural effects, mechanisms of tie formation and diffusion across an entire network. Statistical techniques like randomization and the Quadratic Assignment Procedure are used to analyze ego and global network data
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Denis Parra Santander
- First version was a guest lecture about Network Visualization in the class "Data Visualization" taught by Dr. Sharon Hsiao in the QMSS program at Columbia University http://www.columbia.edu/~ih2240/dataviz/index.htm
- This updated version was delivered in our class on SNA at PUC Chile in the MPGI master program.
The document discusses network diffusion and peer influence. It begins by defining diffusion and compartment models used to model disease spread. It then discusses how network structure, including topology, timing of connections, and structural transmission, can impact diffusion. Simulation is proposed to test how network features like distance, clustering, redundancy, and high-degree nodes influence spread. The relationships between contact networks, exposure networks based on timing, and actual transmission networks are also introduced.
This document summarizes research on social contagion using social network data. It describes analyzing the Framingham Heart Study network data (FHS-Net) of over 12,000 individuals connected through family, friendship, coworkers and neighbors over 30+ years. The researchers have also analyzed other datasets like the National Longitudinal Study of Adolescent Health. Their research has found evidence that behaviors, states and traits like obesity, smoking, happiness and depression show clustering within social networks, suggesting the spread of influence through network ties. The researchers acknowledge limitations of current methods and hope to help develop new statistical approaches for analyzing network data.
Graph and language embeddings were used to analyze user data from Reddit to predict whether authors would post in the SuicideWatch subreddit. Metapath2vec was used to generate graph embeddings from subreddit and author relationships. Doc2vec was used to generate document embeddings based on language similarity between submissions and subreddits. Combining the graph and document embeddings in a logistic regression achieved 90% accuracy in predicting SuicideWatch posters, reducing both false positives and false negatives compared to using the embeddings separately. Next steps proposed using the embeddings to better understand similarities between related subreddits and predict risk factors in posts.
This document discusses modeling networks using regression analysis with additive and multiplicative effects. It introduces network modeling and describes some common network regression models, including the social relations model (SRM) which captures sender and receiver effects. The document discusses incorporating covariates into these models and using multiplicative effects to better capture triadic behavior and homophily in networks. It also briefly mentions generalizing these models to ordinal outcomes.
This document discusses diffusion and peer influence through networks. It begins by defining diffusion and compartment models used to model disease spread. It then discusses how network structure, including topology, timing of connections, and clustering, can impact diffusion compared to random mixing. Key network features that influence diffusion speed and reach include distance between actors, number of alternate paths, presence of highly connected "star" nodes, and assortative mixing. The document concludes by exploring how different degree distributions in emergent low-density networks can impact the formation of large connected components.
This document discusses ego network analysis and its advantages over sociocentric network analysis. It begins with an overview of ego networks and sociocentric networks. Ego networks have several practical advantages, including flexibility in data collection, broader inference potential, and the ability to examine overlapping social circles. However, ego networks also have disadvantages like inability to measure reciprocated ties and map broader social structure. The document then reviews common measures used in ego network analysis, including measures of network size, tie strength, composition, and homophily. It provides examples of how to operationalize these concepts.
This document provides an overview of ego network analysis. It defines ego networks as consisting of a focal individual (ego) and the people they are connected to (alters). Various measures of ego network composition, structure, and properties can be analyzed, such as size, density, and homophily. These measures provide insight into an individual's social support and influence, and can be used to study health-related questions by examining the characteristics and behaviors present in one's social network. Ego network data is relatively easy to collect and can offer information about both individuals and inferred properties of broader social networks.
This document discusses different types of network experiments and interventions. It describes (1) using roommate assignments to make social connections exogenous, assessing peer effects on outcomes like GPA. It also discusses (2) natural experiments that manipulate exposure over existing networks, like popularity or voter turnout. Finally, it outlines (3) different types of network interventions, including targeting influential individuals, segmenting groups, inducing new connections, and altering network structure. The conclusion is that evidence from these experiments shows peer influence is real and we can now focus on how to leverage networks most effectively.
Adaptive network models of socio-cultural dynamicsHiroki Sayama
H. Sayama (2018) Adaptive network models of socio-cultural dynamics, an invited talk at the APCTP International Workshop on Theoretical Perspectives in Network Science, December 7-9, 2018, Seoul, Korea.
Networks provide connections and positions that influence health outcomes. Social network analysis examines relationships between actors to understand how networks impact behavior. Networks matter through both connectionist mechanisms like diffusion, and positional mechanisms like social roles. Network data can be analyzed at different levels from individual ego networks to global networks, and can involve one or multiple types of relationships between nodes. Social network data is commonly represented through matrices and lists to encode network structure and allow computational analysis.
Complexity Explained: A brief intro to complex systemsHiroki Sayama
This document provides an introduction to complex systems. It defines complex systems as networks of many interacting components that can self-organize and show emergent behaviors. Examples of complex systems include ecosystems, economies, and the human brain. Research methods for studying complex systems include computer simulations, network modeling, and machine learning. Key concepts are interactions between parts, emergence of unexpected behaviors, dynamics and adaptation over time, and self-organization without centralized control. Both discovering patterns in data and building mechanistic models are important for understanding complex systems.
This document discusses considerations for collecting social network data. It addresses network sampling approaches including ego network designs, complete network designs, and partial network designs. It also covers network measurement including name generators and interpreters. Additional topics include the number of name generators to use, whether to cap the number of alters elicited, specificity of relationship questions, and binary versus valued versus nested response options. The document aims to provide an overview of key issues to consider when gathering social network data.
Self-organization of society: fragmentation, disagreement, and how to overcom...Hiroki Sayama
This document summarizes a presentation on self-organization of society. It discusses how social fragmentation, disagreement and extremism can emerge from decentralized interactions between individuals seeking conformity and homophily. Three recent papers are summarized that show how social networks can become polarized through adaptive dynamics, how enhanced information gathering can intensify disagreement, and how behavioral diversity among individuals can allow for both cultural diversity and network connectivity in society. The key messages are that individual and collective outcomes may not align, and behavioral heterogeneity presents opportunities for diverse yet cohesive social outcomes.
This document discusses using social network analysis to design and implement behavior change interventions. It begins by outlining key network concepts like diffusion of innovations and mathematical models of diffusion. It then discusses how social networks influence behaviors through concepts like network exposure, tie strength, and thresholds. The document concludes by describing how to use social network analysis at different stages of intervention including needs assessment, program design, implementation, and monitoring through approaches like network ethnography, identifying opinion leaders, and using network diagnostics.
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Lauri Eloranta
Fourth lecture of the course CSS01: Introduction to Computational Social Science at the University of Helsinki, Spring 2015.(http://blogs.helsinki.fi/computationalsocialscience/).
Lecturer: Lauri Eloranta
Questions & Comments: https://twitter.com/laurieloranta
Gaining, retaining and losing influence in online communitiesjoinson
My keynote presentation: 'Gaining, retaining and losing influence in online communities' from a conference at Kings College, London on the topic of 'social influence in the information age'
People are generally inaccurate at recalling their own social networks and communications. Across seven experiments, participants could only accurately recall about 50% of their actual communications on average. Both over-reporting and under-reporting were issues, with people who communicate less tending to over-report and people who communicate more tending to under-report. While the inaccuracies cannot be entirely explained by factors like timing or reporting biases, they provide insight into cognitive processes and how perceptions of social networks are formed.
This document summarizes a study that used a stochastic actor-oriented model to analyze data from a randomized controlled trial in Tanzania. The trial examined how social networks influenced HIV testing rates among young men. Survey data on men's friendship networks and HIV testing behaviors were collected at three time points. The model estimated the effects of descriptive and injunctive social norms within friendship networks and across camps on changes in men's HIV testing from the second to third time points, while accounting for selection effects. The results provide insight into how social influence spreads within networks and impacts health behaviors over time.
Personality is defined as a relatively stable set of characteristics that influence behavior and interactions with others. It is determined by heredity, environment, situation, culture, and family background. Major theories of personality include trait theory, psychodynamic theory, humanistic theory, and the integrative approach. The Myers-Briggs Type Indicator assesses four traits to classify individuals into one of 16 personality types. The Big Five model describes five broad personality traits: extroversion, agreeableness, conscientiousness, emotional stability, and openness to experience. Trait theories posit that personality traits are stable over time and across situations and can be used to predict behavior.
Psych 24 history of personality assessmentMaii Caa
The document discusses various methods used in psychological assessment, including both objective measures like standardized tests and projective tests, as well as clinical interviews. It outlines the advantages and disadvantages of different assessment approaches and how assessments are used to better understand individuals and their behavior. The document also provides examples of specific assessment tools like the MMPI-2, TAT, and astrology.
I. The document discusses ego networks and how they can be used to study personal networks and relationships. Ego networks combine traditional survey data with network data by collecting information about respondents (egos) and their social ties (alters).
II. Ego network data can be used to examine the effects of network structure and alter characteristics on outcomes of interest. It can also provide insights into diffusion processes within personal networks.
III. While ego network data is useful for studying local network phenomena, global network data is needed to analyze higher-level structural effects, mechanisms of tie formation and diffusion across an entire network. Statistical techniques like randomization and the Quadratic Assignment Procedure are used to analyze ego and global network data
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Denis Parra Santander
- First version was a guest lecture about Network Visualization in the class "Data Visualization" taught by Dr. Sharon Hsiao in the QMSS program at Columbia University http://www.columbia.edu/~ih2240/dataviz/index.htm
- This updated version was delivered in our class on SNA at PUC Chile in the MPGI master program.
The document discusses network diffusion and peer influence. It begins by defining diffusion and compartment models used to model disease spread. It then discusses how network structure, including topology, timing of connections, and structural transmission, can impact diffusion. Simulation is proposed to test how network features like distance, clustering, redundancy, and high-degree nodes influence spread. The relationships between contact networks, exposure networks based on timing, and actual transmission networks are also introduced.
This document summarizes research on social contagion using social network data. It describes analyzing the Framingham Heart Study network data (FHS-Net) of over 12,000 individuals connected through family, friendship, coworkers and neighbors over 30+ years. The researchers have also analyzed other datasets like the National Longitudinal Study of Adolescent Health. Their research has found evidence that behaviors, states and traits like obesity, smoking, happiness and depression show clustering within social networks, suggesting the spread of influence through network ties. The researchers acknowledge limitations of current methods and hope to help develop new statistical approaches for analyzing network data.
Graph and language embeddings were used to analyze user data from Reddit to predict whether authors would post in the SuicideWatch subreddit. Metapath2vec was used to generate graph embeddings from subreddit and author relationships. Doc2vec was used to generate document embeddings based on language similarity between submissions and subreddits. Combining the graph and document embeddings in a logistic regression achieved 90% accuracy in predicting SuicideWatch posters, reducing both false positives and false negatives compared to using the embeddings separately. Next steps proposed using the embeddings to better understand similarities between related subreddits and predict risk factors in posts.
This document discusses modeling networks using regression analysis with additive and multiplicative effects. It introduces network modeling and describes some common network regression models, including the social relations model (SRM) which captures sender and receiver effects. The document discusses incorporating covariates into these models and using multiplicative effects to better capture triadic behavior and homophily in networks. It also briefly mentions generalizing these models to ordinal outcomes.
This document discusses diffusion and peer influence through networks. It begins by defining diffusion and compartment models used to model disease spread. It then discusses how network structure, including topology, timing of connections, and clustering, can impact diffusion compared to random mixing. Key network features that influence diffusion speed and reach include distance between actors, number of alternate paths, presence of highly connected "star" nodes, and assortative mixing. The document concludes by exploring how different degree distributions in emergent low-density networks can impact the formation of large connected components.
This document discusses ego network analysis and its advantages over sociocentric network analysis. It begins with an overview of ego networks and sociocentric networks. Ego networks have several practical advantages, including flexibility in data collection, broader inference potential, and the ability to examine overlapping social circles. However, ego networks also have disadvantages like inability to measure reciprocated ties and map broader social structure. The document then reviews common measures used in ego network analysis, including measures of network size, tie strength, composition, and homophily. It provides examples of how to operationalize these concepts.
This document provides an overview of ego network analysis. It defines ego networks as consisting of a focal individual (ego) and the people they are connected to (alters). Various measures of ego network composition, structure, and properties can be analyzed, such as size, density, and homophily. These measures provide insight into an individual's social support and influence, and can be used to study health-related questions by examining the characteristics and behaviors present in one's social network. Ego network data is relatively easy to collect and can offer information about both individuals and inferred properties of broader social networks.
This document discusses different types of network experiments and interventions. It describes (1) using roommate assignments to make social connections exogenous, assessing peer effects on outcomes like GPA. It also discusses (2) natural experiments that manipulate exposure over existing networks, like popularity or voter turnout. Finally, it outlines (3) different types of network interventions, including targeting influential individuals, segmenting groups, inducing new connections, and altering network structure. The conclusion is that evidence from these experiments shows peer influence is real and we can now focus on how to leverage networks most effectively.
Adaptive network models of socio-cultural dynamicsHiroki Sayama
H. Sayama (2018) Adaptive network models of socio-cultural dynamics, an invited talk at the APCTP International Workshop on Theoretical Perspectives in Network Science, December 7-9, 2018, Seoul, Korea.
Networks provide connections and positions that influence health outcomes. Social network analysis examines relationships between actors to understand how networks impact behavior. Networks matter through both connectionist mechanisms like diffusion, and positional mechanisms like social roles. Network data can be analyzed at different levels from individual ego networks to global networks, and can involve one or multiple types of relationships between nodes. Social network data is commonly represented through matrices and lists to encode network structure and allow computational analysis.
Complexity Explained: A brief intro to complex systemsHiroki Sayama
This document provides an introduction to complex systems. It defines complex systems as networks of many interacting components that can self-organize and show emergent behaviors. Examples of complex systems include ecosystems, economies, and the human brain. Research methods for studying complex systems include computer simulations, network modeling, and machine learning. Key concepts are interactions between parts, emergence of unexpected behaviors, dynamics and adaptation over time, and self-organization without centralized control. Both discovering patterns in data and building mechanistic models are important for understanding complex systems.
This document discusses considerations for collecting social network data. It addresses network sampling approaches including ego network designs, complete network designs, and partial network designs. It also covers network measurement including name generators and interpreters. Additional topics include the number of name generators to use, whether to cap the number of alters elicited, specificity of relationship questions, and binary versus valued versus nested response options. The document aims to provide an overview of key issues to consider when gathering social network data.
Self-organization of society: fragmentation, disagreement, and how to overcom...Hiroki Sayama
This document summarizes a presentation on self-organization of society. It discusses how social fragmentation, disagreement and extremism can emerge from decentralized interactions between individuals seeking conformity and homophily. Three recent papers are summarized that show how social networks can become polarized through adaptive dynamics, how enhanced information gathering can intensify disagreement, and how behavioral diversity among individuals can allow for both cultural diversity and network connectivity in society. The key messages are that individual and collective outcomes may not align, and behavioral heterogeneity presents opportunities for diverse yet cohesive social outcomes.
This document discusses using social network analysis to design and implement behavior change interventions. It begins by outlining key network concepts like diffusion of innovations and mathematical models of diffusion. It then discusses how social networks influence behaviors through concepts like network exposure, tie strength, and thresholds. The document concludes by describing how to use social network analysis at different stages of intervention including needs assessment, program design, implementation, and monitoring through approaches like network ethnography, identifying opinion leaders, and using network diagnostics.
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Lauri Eloranta
Fourth lecture of the course CSS01: Introduction to Computational Social Science at the University of Helsinki, Spring 2015.(http://blogs.helsinki.fi/computationalsocialscience/).
Lecturer: Lauri Eloranta
Questions & Comments: https://twitter.com/laurieloranta
Gaining, retaining and losing influence in online communitiesjoinson
My keynote presentation: 'Gaining, retaining and losing influence in online communities' from a conference at Kings College, London on the topic of 'social influence in the information age'
People are generally inaccurate at recalling their own social networks and communications. Across seven experiments, participants could only accurately recall about 50% of their actual communications on average. Both over-reporting and under-reporting were issues, with people who communicate less tending to over-report and people who communicate more tending to under-report. While the inaccuracies cannot be entirely explained by factors like timing or reporting biases, they provide insight into cognitive processes and how perceptions of social networks are formed.
This document summarizes a study that used a stochastic actor-oriented model to analyze data from a randomized controlled trial in Tanzania. The trial examined how social networks influenced HIV testing rates among young men. Survey data on men's friendship networks and HIV testing behaviors were collected at three time points. The model estimated the effects of descriptive and injunctive social norms within friendship networks and across camps on changes in men's HIV testing from the second to third time points, while accounting for selection effects. The results provide insight into how social influence spreads within networks and impacts health behaviors over time.
Personality is defined as a relatively stable set of characteristics that influence behavior and interactions with others. It is determined by heredity, environment, situation, culture, and family background. Major theories of personality include trait theory, psychodynamic theory, humanistic theory, and the integrative approach. The Myers-Briggs Type Indicator assesses four traits to classify individuals into one of 16 personality types. The Big Five model describes five broad personality traits: extroversion, agreeableness, conscientiousness, emotional stability, and openness to experience. Trait theories posit that personality traits are stable over time and across situations and can be used to predict behavior.
Psych 24 history of personality assessmentMaii Caa
The document discusses various methods used in psychological assessment, including both objective measures like standardized tests and projective tests, as well as clinical interviews. It outlines the advantages and disadvantages of different assessment approaches and how assessments are used to better understand individuals and their behavior. The document also provides examples of specific assessment tools like the MMPI-2, TAT, and astrology.
Sigmund Freud developed the psychosexual stages of development theory which proposed that personality develops through a series of childhood stages - oral, anal, phallic, latency, and genital. Each stage focuses on pleasure from a different part of the body and can result in fixations that influence adult personality if unresolved. The theory describes psychosexual development from birth to adolescence.
This document discusses psychosexual development and the factors that influence it. It outlines the typical stages of development from childhood through adulthood, including the sexual unawareness stage from birth to 1 year old, the sexual awakening stage from 3-7 years old, and the sexual preoccupation stage of adolescence from 13-20 years old. It notes that healthy psychosexual development does not occur in a vacuum and is influenced by predisposing factors like pregnancy/birth experience, temperament, attachment styles, and family competence/attitudes. The document also describes potential "modes of psychosexual fixation" where development is arrested at a stage, such as fixation in childhood resulting in feelings of inadequacy and perceiving relationships as threatening.
Freud believed that adult personality problems stem from early childhood experiences passing through five stages of psychosexual development. At each stage, pleasure is focused on a different part of the body. Adult personality is determined by how well one resolves conflicts between these early pleasure sources and reality's demands. Erikson's psychosocial theory outlines eight stages from childhood through adulthood where challenges must be faced and succeeded through. Kohlberg's theory examined moral development as involving thoughts on right and wrong through intrapersonal and interpersonal dimensions.
This document outlines key concepts in psychoanalytic approaches developed by Freud, including his emphasis on determinism, conflict, and the unconscious mind. It describes Freud's theories of personality development being driven by early childhood experiences and instincts, with the mind structured into the conscious, preconscious, and unconscious. Freud proposed psychosexual stages of development and defense mechanisms. The document also briefly discusses Freud's therapeutic techniques like case studies, free association, and dream analysis aimed at providing insight.
Psycho Sexual Evaluation Risk Assessment of Sexual Offenders - 2014Health Easy Peasy
This document provides information about psychosexual evaluations and risk assessments of sexual offenders. It discusses that sexual offenses can involve coercive or nonconsensual sexual acts that lack consent due to factors like youth, cognitive limitations, intoxication, or threats of violence. Risk assessments are used to estimate an offender's risk of reoffending and identify treatment needs in order to reduce recidivism. Actuarial risk assessment tools that use statistical factors linked to recidivism are more accurate than unstructured clinical judgment alone. The document also covers diagnostic issues like pedophilic disorder and treating child sexual offenders.
This document discusses Freud's structural model of the psyche and various defense mechanisms. It explains that Freud believed the psyche is composed of the id, ego, and superego. The id operates on the pleasure principle, the ego operates on the reality principle, and the superego contains our moral values. It then defines and provides examples of common defense mechanisms like repression, regression, displacement, denial, projection, rationalization, and sublimation that the ego uses to reduce anxiety. The document concludes with an activity instructing groups to create and act out a scenario demonstrating different defense mechanisms.
Freud's Psychosexual development Group 4Claire Pepito
Sigmund Freud was an Austrian neurologist who developed psychoanalysis in the late 19th and early 20th centuries. He developed theories around the unconscious mind, dream interpretation, and the psychosexual development of humans. Freud's theory of psychosexual development proposed that adult personality is shaped by early childhood experiences through five psychosexual stages - oral, anal, phallic, latency, and genital. Each stage focused pleasure and gratification in different erogenous zones of the body. Fixations during these stages could lead to neuroses in adulthood.
Sigmund Freud was an influential psychiatrist and scholar who developed psychoanalytic theory. His theory proposed that personality has three parts - the id, ego, and superego. The id operates at an unconscious level driven by instincts and desires, the ego mediates between the id and reality, and the superego incorporates social morals and ideals. Freud also proposed that personality develops through five psychosexual stages from infancy to adulthood, and that unconscious drives and desires can influence behavior.
Freud's theory of psychosexual development proposed that personality develops through a series of stages focused on different erogenous zones. At each stage, the id seeks gratification in different ways. Fixation at a stage due to too little or too much gratification can result in adult behaviors associated with that stage. The stages include oral, anal, phallic, latency, and genital. Successful resolution of conflicts at each stage, especially the Oedipus complex, allows progression to the next stage and full psychosexual maturity.
Psychosexual Development by Sigmund FreudMark Peralta
Freud proposed that personality develops through a series of psychosexual stages in childhood, where pleasure-seeking energies become focused on different erogenous zones. These stages include oral, anal, phallic, latency, and genital stages. If issues are not resolved at the appropriate stage, fixation can occur, resulting in unhealthy personality development. The document then provides details on Freud's psychosexual stages of development, including typical ages, points of interest, potential conflicts, and outcomes of successful or unsuccessful completion of each stage.
Freud's psychoanalytic theory of personality has two parts: dynamics and structure. The dynamics involve three levels of consciousness - conscious, preconscious, and unconscious. The unconscious contains urges and desires we are unaware of but influence our behavior. Personality is determined by suppressed experiences in the unconscious. The structure consists of the id, ego, and superego. The id operates on the pleasure principle, the ego balances id and reality, and the superego works from a moral perspective based on lessons from parents and society. A balanced relationship between these three leads to a healthy, integrated personality.
Psychoanalytic theories explain human behaviour in terms of the interaction of various components of personality. Sigmund Freud was the founder of this school.
Freud drew on the physics of his day (thermodynamics) to coin the term psycho-dynamics. Based on the idea of converting heat into mechanical energy, he proposed psychic energy could be converted into behaviour.
Freud's theory places central importance on dynamic, unconscious psychological conflicts.
Id, Ego, Superego. By Theresa Lowry-Lehnen. Lecturer of PsychologyTheresa Lowry-Lehnen
Freud proposed that the human psyche is composed of three parts: the id, ego, and superego. The id is the impulsive, unconscious part that demands immediate gratification. The ego develops to mediate between the id and reality. It works to satisfy the id's demands in realistic ways. The superego incorporates social values and morals, controlling the id's impulses. It causes feelings of guilt when urges are acted on and pride when behaving properly. These parts develop at different stages and allow the psyche to balance internal needs with external demands.
this presentation is to show to everyone how do psyhoanalytic works or it explain how did sigmun freud describe the developmental growth of each person.
The document discusses ego and defense mechanisms. It defines defense mechanisms as involuntary patterns of thoughts, feelings, or behaviors that arise in response to psychic danger or unexpected changes. Some common defense mechanisms include denial, displacement, rationalization, reaction formation, regression, and identification. Understanding defense mechanisms can help nurses identify maladaptive behaviors and better understand a patient's personality development and how they cope with anxiety.
Defense mechanisms are techniques used by individuals to reduce anxiety and resolve conflicts. They range from normal and successful mechanisms like repression and rationalization to less adaptive unsuccessful ones like denial and projection. Successful mechanisms help deal with reality while unsuccessful ones can create emotional problems if used excessively. Defense mechanisms originate from different developmental periods, and understanding them helps nurses support patients and their families cope with difficult diagnoses and end-of-life situations.
Psychoanalytic theory By sigmund freud Hammad Bashir
Sigmund Freud developed psychoanalytic theory and proposed that personality has three parts: the id, ego, and super-ego. The id operates on the pleasure principle, seeking immediate gratification. The super-ego learns morality and tries to restrict the id. The ego acts as a mediator between the id and super-ego using the reality principle to satisfy id impulses in a way that considers social norms. Freud believed this three-part structure explained human behavior and development from childhood through adulthood.
Network analyses of psychological scienceKevin Lanning
The document analyzes citation networks in psychology using network science methods. It finds that (1) citation networks form small worlds where ideas spread rapidly, (2) different centrality measures reveal influential individuals and ideas as well as scholarly communities, and (3) while proximity in networks is ambiguous, distance provides clearer insights. The analysis is preliminary and larger datasets/advanced methods may provide deeper understanding of influence and relationships in psychological scholarship.
An empirical examination of the structure of scholarship in the Society for the Psychological Study of Social Issues (SPSSI) grounded in network analyses of shared citations (bibliographic couplings)
The document discusses correlating scholarly networks derived from citations and social networks derived from tweets mentioning academic papers. It presents the motivation to study this correlation and describes collecting over 17,000 tweets referencing papers from ArXiv.org. Networks are constructed connecting papers mentioned by the same users, with edge weights based on time between tweets. Several network analysis metrics and case studies are discussed, finding multi-disciplinary papers are most discussed in both networks and core-periphery community structures. Areas for further work include integrating multiple social networks and modeling network dynamics over time.
The document discusses non-textual ranking approaches in digital libraries. It describes ranking based on bibliometrics like Bradfordizing, which re-ranks search results based on core journals. It also describes author centrality ranking, which re-ranks results based on central authors in co-authorship networks. Evaluation found Bradfordizing improved precision by placing core journals higher. Author centrality provided additional relevant documents not in top textual rankings, adding value. A prototype demonstrated the approaches. Non-textual ranking was found to structure large document sets and enhance retrieval over textual approaches alone.
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...Christian Bokhove
This document describes a study that uses social network analysis to analyze the development of communication networks among mathematics pre-service teacher trainees over time. The study collected longitudinal network data on support networks from trainees in 4 waves over 8 months. It used multiple regression quadratic assignment procedures (MRQAP) to test whether attributes like gender, training program, trust, and self-efficacy predicted the development of networks. The results found that the training program was a negative predictor of network development, and that trust was a positive predictor later in the training period. Visualizing the network changes also showed networks shifting from tight-knit to some trainees going their own way.
Centrality in Time- Dependent NetworksMason Porter
My slides for my keynote talk at the NetSci 2018 (#NetSci2018) conference in Paris, France (June 2018). This talk will take place on Thursday 13 June in the morning.
This is a presentation I gave in a workshop on "Language, concepts, history" organized by historian Joanna Innes. It took place on Friday 4/22/16 in Somerville College, Oxford.
I was one of the only people present who was not from the humanities, so it was a rather different-than-usual audience and set of participants for me.
I drew some of these slides from other presentations to rather different audiences. I emphasized rather different parts of some of those slides, so I am not sure if the slides on their own give an accurate reflection of the difference between this presentation and some of my other ones.
I thought the presentation went rather well.
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...Charalampos Chelmis
This document discusses generative models for tripartite graphs in social media that model users, resources, and tags. It presents three models:
1) The User-Concept model that models users based on their tag usage but ignores resources and social aspects.
2) The User-Resource model that models resources as vocabulary terms but ignores tags and social aspects.
3) The User-Resource-Concept model that models both resources and users' interests using a topic-based representation and models the social generation of annotations.
The models are evaluated on their ability to predict tags/resources for new users, recommend social ties, and compare to baseline similarity metrics, with the ensemble approach achieving the best performance.
"Where Far Can Be Close": Finding Distant Neighbors In Recommendation SystemsVikas Kumar
Location is more than an utility. Along with context, we explore what else we can learn from location. We show how distant locations are similar and that nearby neighbors in recommendation system only captures one half of the story. We also discuss about the improvements in recommendation accuracy and cold start.
This document provides an overview of social network analysis and the Sylva software. It begins with key concepts in social network analysis including social structure, social networks, nodes, linkages, and additional terminology. It then discusses what makes social network analysis unique and provides examples of ego-centered and community-centered network analysis. Finally, it describes the features and capabilities of the Sylva software for collecting, storing, visualizing, and analyzing social network data.
Opinion Dynamics on Generalized NetworksMason Porter
This is a talk on opinion dynamics (especially bounded-confidence models) on generalized networks.
It is part of the MIX-NEXT III (Multiscale & Integrative compleX Networks: EXperiments & Theories) satellite at NetSci 2022.
(Thursday 14 July 2022)
This document summarizes a presentation on using bibliographic couplings to analyze the structure of a large public university. The presentation analyzed co-citation networks between university scholars and the papers they cited to identify overlapping intellectual communities across disciplines. It identified key individuals who bridge communities and act as knowledge conduits. The analysis found that the network of engaged scholars bears little resemblance to the existing academic units, suggesting opportunities to restructure the university to better support interdisciplinary work.
Broad altmetric analysis of Mendeley readerships through the ‘academic status...Zohreh Zahedi
This study explores the readerships in Mendeley across 5 major fields of science in Leiden Ranking 2013 for a data set of 1,107,917 Web of Science (WoS) publications (reviews and articles) from all disciplines published in 2011 with DOI available. The main objective is to know if there are different patterns in terms of readership and citation impact depending on the different ‘Academic Status’ of Mendeley readers. In case of finding different pattern, this could help to introduce the possibility of considering the different users as potential predicting elements of citations.
The current study is built upon the previous study of analyzing Mendeley users with focus on the types of the different Mendeley users (known users) in order to explore their patterns of saving publications in terms of subject fields, citation and readership impact. Particular attention has been paid to the extent to which the readerships of the publications saved by the different types of users in Mendeley correlate with their citation indicators and across 5 major fields of science in the Leiden Ranking (LR); also, the potential of identifying highly cited papers by different user types in Mendeley has been investigated. For this reason, we present an exploratory analysis of the patterns of reading of the different types of users in Mendeley and we study their relationship with citations and across LR fields.
01 Introduction to Networks Methods and Measuresdnac
This document provides an introduction to social network analysis. It discusses how networks matter through two fundamental mechanisms: connections and positions. Connections refer to the flow of things through networks, viewing networks as pipes. Positions refer to relational patterns and networks capturing role behavior, viewing networks as roles. The document also covers basic network data structures including nodes, edges, directed/undirected ties, binary/valued ties, and different levels of analysis such as ego networks and complete networks. It provides examples of one-mode and two-mode network data.
This document provides an introduction to social network analysis. It discusses how network analysis allows us to understand social connections and positions. There are two key mechanisms through which networks can impact outcomes: connections, where networks matter because of what flows through them, and positions, where networks capture roles and social exchange. Network analysis provides tools to empirically study patterns of social structure by mapping relationships between actors.
Evolving and emerging scholarly communication services in libraries: public a...Claire Stewart
This document provides an overview of a guest lecture about evolving scholarly communication services in libraries and their role in supporting public access compliance and assessing research impact. It discusses challenges libraries face in helping researchers comply with public access policies from funders. It also explores metrics and indicators used to measure research impact, noting limitations, and how libraries can help address this complex issue by leveraging their expertise in managing scholarly information and data.
Learning to Classify Users in Online Interaction NetworksSymeon Papadopoulos
Presentation given at ICCSS 2015, Helsinki, Finland. It illustrates an approach for classifying users of OSNs solely based on their interactions with other users.
This document provides an overview of different measures for analyzing social networks, including centrality measures, connectivity and cohesion measures, and roles. It discusses centrality measures like degree, closeness, betweenness, and eigenvector centrality for individual nodes. It also covers whole network measures like degree distribution, density, and centralization. The document describes local connectivity and cohesion measures including reciprocity, triad census, transitivity, and clustering coefficients. It discusses how these measures can be applied and interpreted for one-mode projections of two-mode networks.
Mining and analyzing social media part 2 - hicss47 tutorial - dave kingDave King
This document provides an overview and introduction to social network analysis metrics and techniques for analyzing social media data. It discusses common social network analysis concepts like degrees of separation, centrality measures to identify influential users, and cohesion measures to understand how well connected a network is. It also presents examples analyzing Facebook networks and techniques for identifying cohesive subgroups within large social networks. The document demonstrates how social network analysis can be used to systematically study relationships and information flow within social systems.
PPT on Alternate Wetting and Drying presented at the three-day 'Training and Validation Workshop on Modules of Climate Smart Agriculture (CSA) Technologies in South Asia' workshop on April 22, 2024.
Evidence of Jet Activity from the Secondary Black Hole in the OJ 287 Binary S...Sérgio Sacani
Wereport the study of a huge optical intraday flare on 2021 November 12 at 2 a.m. UT in the blazar OJ287. In the binary black hole model, it is associated with an impact of the secondary black hole on the accretion disk of the primary. Our multifrequency observing campaign was set up to search for such a signature of the impact based on a prediction made 8 yr earlier. The first I-band results of the flare have already been reported by Kishore et al. (2024). Here we combine these data with our monitoring in the R-band. There is a big change in the R–I spectral index by 1.0 ±0.1 between the normal background and the flare, suggesting a new component of radiation. The polarization variation during the rise of the flare suggests the same. The limits on the source size place it most reasonably in the jet of the secondary BH. We then ask why we have not seen this phenomenon before. We show that OJ287 was never before observed with sufficient sensitivity on the night when the flare should have happened according to the binary model. We also study the probability that this flare is just an oversized example of intraday variability using the Krakow data set of intense monitoring between 2015 and 2023. We find that the occurrence of a flare of this size and rapidity is unlikely. In machine-readable Tables 1 and 2, we give the full orbit-linked historical light curve of OJ287 as well as the dense monitoring sample of Krakow.
Embracing Deep Variability For Reproducibility and Replicability
Abstract: Reproducibility (aka determinism in some cases) constitutes a fundamental aspect in various fields of computer science, such as floating-point computations in numerical analysis and simulation, concurrency models in parallelism, reproducible builds for third parties integration and packaging, and containerization for execution environments. These concepts, while pervasive across diverse concerns, often exhibit intricate inter-dependencies, making it challenging to achieve a comprehensive understanding. In this short and vision paper we delve into the application of software engineering techniques, specifically variability management, to systematically identify and explicit points of variability that may give rise to reproducibility issues (eg language, libraries, compiler, virtual machine, OS, environment variables, etc). The primary objectives are: i) gaining insights into the variability layers and their possible interactions, ii) capturing and documenting configurations for the sake of reproducibility, and iii) exploring diverse configurations to replicate, and hence validate and ensure the robustness of results. By adopting these methodologies, we aim to address the complexities associated with reproducibility and replicability in modern software systems and environments, facilitating a more comprehensive and nuanced perspective on these critical aspects.
https://hal.science/hal-04582287
Signatures of wave erosion in Titan’s coastsSérgio Sacani
The shorelines of Titan’s hydrocarbon seas trace flooded erosional landforms such as river valleys; however, it isunclear whether coastal erosion has subsequently altered these shorelines. Spacecraft observations and theo-retical models suggest that wind may cause waves to form on Titan’s seas, potentially driving coastal erosion,but the observational evidence of waves is indirect, and the processes affecting shoreline evolution on Titanremain unknown. No widely accepted framework exists for using shoreline morphology to quantitatively dis-cern coastal erosion mechanisms, even on Earth, where the dominant mechanisms are known. We combinelandscape evolution models with measurements of shoreline shape on Earth to characterize how differentcoastal erosion mechanisms affect shoreline morphology. Applying this framework to Titan, we find that theshorelines of Titan’s seas are most consistent with flooded landscapes that subsequently have been eroded bywaves, rather than a uniform erosional process or no coastal erosion, particularly if wave growth saturates atfetch lengths of tens of kilometers.
HUMAN EYE By-R.M Class 10 phy best digital notes.pdf
JPSPstructure2015
1. The structure of (personality and)
social psychology:
An empirical investigation
using social network analysis
Kevin Lanning
SPSP social dynamics preconference
Long Beach, CA
February 2015
Slides posted at
www.slideshare.net/lanningk/JPSPstructure2015
2. Overview
•Networks, citations, bibliometrics
•JPSP and the structure of social (&,/,- personality)
psychology
•Foretelling which papers will get cited
•Communities and the category structure of
scholarship
• (omitted from presentation due to time constraints)
•The problem of Big Data Reduction
4. Why networks?
•Community as a level of analysis
•The reciprocal relevance of social psychology and
network science
•Historical: Lewin, Heider, Milgram, …
•Contemporary: Inequality in complex systems
•The power of empiricism
•The availability of new tools for network analysis
5. Why scholarly networks?
• Science as a social endeavor
• A citation is a dyadic, directed act which occurs in a
cultural context
• The need for a better map of scholarship
• From arbitrary keywords
to a tool for fostering
social and intellectual
capital
6. Levels of analysis in citation networks
Level of analysis Concept / parameter Relevance / interpretation
Network (dynamic)
Preferential
attachment
Developmental trajectories of
topics, scholars
Network (static)
Giant component,
density
Connectedness of a research
area
Community Modules, cliques
Topics, subdisciplines,
categories
Path
Diameter, path
length
Distance and proximity of
nodes
Node: Author, paper,
journal, department Degree, centrality
Forms of influence, impact,
eminence
7. Two types of scholarly network
The citation network
• Source -> Reference
• Directed, biphasic,
large, sparse
… here, a loss of older
(no doi) cites
The structural network
• Source <-> Source
• Bibliometric couplings
• Undirected, single mode, small, dense
Smith,
2014
Thomas,
2014
Abe, 2011 Baker, 1971 Coe, 2009 Davis, 1999
Reed,
2014
Smith,
2014
Thomas,
2014
Abe, 2011 Coe, 2009 Davis, 1999
Reed,
2014
Reed,
2014
Smith,
2014
Thomas,
2014
9. How many tribes in social-personality psychology?
‘SSP’
A singular social psychology
‘SPSP’
At the very least, an ‘&’ rather than a ‘/’ or ‘-’
‘SAIPP’
The three sections of JPSP as a valid model
Weak vs. strong forms of hypothesis.
Method
Develop and examine JPSP 2014 structural network
nb: The procedure for culling references from PsycInfo is posted at
https://github.com/kevinlanning/StructureOfSocialPsychology/blob/master/ParsefromPsycInfo.Rmd
10. Properties of the JPSP 2014 -> reference
(citation) network
Biphasic, directed
6159 Nodes
• 118 articles
• 10024 citations
• 7248 with doi
• 6041 unique references
(cited in 1 or more papers)
7248 Edges
• Sparse: Density rounds to 0 (7248/(6159 * 6158))
Average path = 3.7, diameter is 6 (undirected)
All articles are linked in a giant component
11. Results from the citation network:
Papers most frequently cited in JPSP 2014
cites reference
19 Preacher, K. J. Hayes, A. F. (2008). … indirect effects in ... mediator models. BRM, 40, 879-891.
14
Buhrmester, M. Kwang, T. Gosling, S. D. (2011). Amazon's Mechanical Turk. Pers. Psych Sci, 6, 3-
5.
13
Blanz, M. (1999). Accessibility & fit determine salience of social categoriz. EJ Social Psych, 29,
43-74
10
Baumeister, R. F. Leary, M. R. (1995). The need to belong: attachments … Psych Bull, 117, 497-
529.
10
Altemeyer, B. (1998). The other “authoritarian personality”. In M. Zanna (Ed.), Adv in Exper. Soc
Psy. .
10
Simmons, J. P. Nelson, L. D. Simonsohn, U. (2011). False-positive psychology Psych Sci, 22, 1359-
66.
9
Franco, F. M. Maass, A. (1999). Intentional control over prejudice: When the choice of the measure matters. European Journal of Social
Psychology, 29, 469-477.
9 Watson, D. Clark, L. A. Tellegen, A. (1988). The PANAS Scales. JPSP, 54, 1063-1070.
8 Preacher, K. J. Hayes, A. F. (2004). SPSS and SAS … mediation models, BRM, 36, 717-731.
8 Shiner, R. Caspi, A. Goldberg, L. R. (2007). The power of personality. Pers. on Psych Sci, 2, 313-345.
12. Properties of the JPSP <-> JPSP
structural network
Single mode, undirected, small
118 Nodes (articles)
1421 Edges
Edges are weighted by number of
common citations
The network is dense
The average paper is directly linked to 24 others
(20.6% of all possible links)
Average path is 1.9, diameter is 4
13. Connections within/between JPSP sections
JPSP Section(s) Papers
(nodes)
Edges Density Density between
sections
Attitudes 30 170 39.1% --
Interpersonal 43 243 26.9 --
Personality 45 241 24.3 --
Attitudes & Interpers 73 686 26.1 21.2
Attitudes & Personality 75 605 21.8 14.4
Interpers & Personality 88 784 20.5 15.5
All sections 118 1421 20.6 16.8
Greater density within than between sections: The typical ‘Attitudes’ paper
shares refs with ~ 40% of papers in Attitudes, ~ 20% in the other sections
14. So what?
• Relative homogeneity provides support for the weak form
of validity of the three areas
• But unclear just how distinct the areas are
15. A longitudinal approach
• Are the three areas, or personality and social, growing
more separate?
• Method
• Analysis of 1981*, 1994, 1999, 2004, 2009 and 2014
volumes
• Comparison of citations within areas to citations
between areas over time
16. JPSP connectedness over time: Detail
1981 1994 1999 2004 2009 2014
w/in Attitudes 11.5% 21.0% 30.9% 27.8% 21.9% 39.1%
Interpersonal 2.9% 6.5% 15.8% 24.1% 20.1% 26.9%
Personality 4.6% 16.4% 14.1% 15.2% 19.8% 24.3%
bet A & I 2.0% 7.2% 14.7% 19.6% 16.1% 21.2%
A & P 3.4% 6.4% 11.3% 6.5% 12.0% 14.4%
I & P 1.9% 7.1% 9.8% 9.3% 12.9% 15.5%
The Attitudes and Interpersonal sections are closer to each other
than either is to the Personality section
17. JPSP connectedness over time: Summary
1981 1994 1999 2004 2009 2014
Within sections 6% 16.3% 17.3% 22.4% 20.4% 28%
Between 2.7% 6.8% 11.4% 11.4% 13.6% 16.8%
Within/between 2.3 2.4 1.5 2.0 1.5 1.7
in 2014, a paper in JPSP was ~ 70% more likely to share
a reference with a paper in the same section than in
one of the other sections
18. JPSP connectedness over time:
‘Controlling’ for network size
1981 1994 1999 2004 2009 2014
N edges 2879 4938 4551 4761 6880 7248
Within/between 2.3 2.39 1.52 1.95 1.49 1.68
N selected edges 4547 4551 4550 4551 4547
Within/between 2.44 1.52 2.02 1.52 1.70
Relative homogeneity of discrete areas holds up
after randomly slicing ~ 35% of references.
20. Predicting citations
•Does the location of a paper in a network
predict future citations?
•Concepts of network centrality
•A second use of the longitudinal data
•Prospective analyses
•1994, 1999, 2004, 2009 properties ->
citations to 2014
21. Different forms of network
centrality
Degree and weighted degree: Number of
direct links, possibly weighted by total
shared cites
PR (Page Rank, Eigenvector Centrality):
Recursive measures in which the
importance of a paper is dependent upon
the importance of the papers which refer to
it
BC (Betweenness Centrality): Extent to which a
node bridges different areas of scholarship,
introduces work to a new audience, etc.
22. Most central papers in JPSP 2014 on 3 metrics
Id source.title BC WD PR
Rauthmann_J.p.107.677 The Situational Eight DIAMONDS 1 3 1
Gebauer_J.p.107.1064 Cross-cultural variations in Big Five r religiosity 2 2 7
Wakslak_C.a.107.41 Using abstract language signals power. 3 11 2
Barasch_A.a.107.393 Selfish or selfless? On the signal value of emotion in altruism 4 18 9
McClure_M.i.106.89 …attachment anxiety hurts relational opportunities. 5 7 4
Frimer_J.i.106.790 Moral actor, selfish agent. 8 13 5
Dunning_D.i.107.122 Trust at 0 acquaintance: respect not expectation of reward. 9 9 3
Lemay_Jr._E.i.106.37
Diminishing self-disclosure to maintain security in partners'
care. 16 1 8
Lemay_Jr._E.i.107.638
Accuracy/bias in self-perceived responsiveness -> security in
romantic rs. 18 5 22
Hui_C.i.106.546
When relationship commitment fails to promote partners'
interests. 24 3 16
23. Nodes graded by Betweenness, Weighted
degree, and (unweighted) PageRank
26. The challenge of communities
Partitioning a continuous universe
Three approaches
• A priori
• Three JPSP areas
• Top down (divisive)
• Modularity assessment of whole graph
• All inclusive, too Procrustean
• Bottom up (agglomerative)
• Begin with cliques
• May allow for overlapping categories
• Not all inclusive, may be too selective
27. Modularity analyses of JPSP 2014
• Results not robust
• Number of communities is dependent upon random seed
• A 7 community solution is representative
• 2 primarily attitudes
• 2 primarily interpersonal
• 1 personality
• 2 mixed
Community Att Int Pers
I 7 2 0
II 10 2 1
III 0 16 2
IV 4 10 3
V 0 2 26
VI 4 2 3
VII 5 9 10
28. Modularity in SPSSI
journals: Allport & Lewin
Lewin community includes authors with 5 or
more cites; Allport includes authors with 13+
cites. Nodes ranked by eigenvector centrality
29. A complex systems view
(Palla et al, 2005)
Communities as cliques
• Each node is linked to
at least k other nodes
• Family resemblance
Nodes (papers) may belong
to multiple communities
Overlapping communities
also constitute a network
• Multiple levels of
categorization
Open source software at Cfinder.org
30. Exploring community structure
in the JPSP 2014 data
• Explore thresholds for filtering data
• Here, minimum edge weight of 2
• Investigate network structure for various
values of k
• Here, k > = 5
• Communities are groups in which each paper is connected
by at least 2 common citations to at least 4 other papers within
the community
• Here, 8 communities in two separate components