Definition: Implications: Analysis:
|
|
- Leslie Knight
- 6 years ago
- Views:
Transcription
1 Analyzing Two mode Network Data Definition: One mode networks detail the relationship between one type of entity, for example between people. In contrast, two mode networks are composed of two types of entities. These entities could be people and teams or people and organizations. Two mode networks summarize the association between one entity and another, for example, the teams that individuals are members of. For this reason, two mode networks are often called affiliation networks. They can also be called bipartite networks. Implications: Gathering data on two mode networks, such as people and teams, can be a quick way of understanding the web of relationships in an organization. You can use this data as a proxy for employee employee relationships. However, caution must be taken when using two mode data in large teams or teams that evolve over time because not every person on a given team may know one another. In addition, individuals have ties that are outside their teams. Data comprising employee affiliations with teams can be useful in itself. It can highlight which teams (and the individuals in the teams) are central in the network and hence influential. It can also highlight which teams and individuals are playing broker roles within an organization. Analysis: Two mode data can be visualized and analyzed in several ways. It can be visualized so that ties between an individual and teams make up the structure of the network. UCINET also has some specific analysis routines for two mode data. Two mode data can be made into square matrices called bipartite networks, which allows for all the analysis routines in UCINET to be used. Finally two mode networks can be reduced to one mode of teams teams or employees employees. Each of these options is detailed in the following sections.
2 Visualizing Two mode Networks Visualizing two mode data in Netdraw In this analysis, we are going to visually examine our two mode network. The Excel spreadsheet below shows individuals who are members of teams. Notice the names of the respondents are in the first column and the team names are along the first row. Step 1. Load the network into UCINET the same way that you would any network. Name the file Teams. In Netdraw, File > Open > UCINET dataset > 2 Mode network. Then select the Teams file and press OK. In the network diagram, the teams are the blue squares and the individuals are the red circles. There is obvious clustering by team, with Team 6 connecting the two subgroups together.
3 Analyzing Two mode Networks Analyzing two mode data in UCINET Step 1. Network > 2 Mode networks > 2 Mode Centrality. Step 2. Select the Teams network and press OK. This routine produces normalized scores based upon the maximum possible value. The people with scores of have the most ties. The most central team is team 5, with Note that Team 6 (the one on the center of the network diagram) has the highest betweenness score.
4 Analyzing Two mode Networks Analyzing two mode data in UCINET We cannot run all the analytical measures in UCINET on two mode data because the matrix is not square. To create a square matrix, we need to run the bipartite function. This function adds the names of the teams to the rows and the names of the people to the columns. Step 1. Transform > Graph Theoretic > Bipartite Step 2. Select the Teams network and press OK. Step 3. Once you have constructed your bipartite dataset, you can analyze it the same way as other networks. The interpretation of the findings, however, needs to take into account that the data has two modes. Analysis 1. Degree centrality. Network > Centrality and Power > Degree. In the input network box type Teams Bip or click and select the Teams Bip network. Analysis 2. Brokerage (betweenness). Network > Centrality and Power > Freeman Betweenness > Node Betweenness. Degree Centrality Betweenness
5 Creating One mode Networks from Two mode Networks Creating one mode networks from two mode data Sometimes it may be useful to transform two mode data into one mode data. For example in our teams network, you can create a one mode network of ties between individuals where the ties represent being part of the same team. Step 1. Data > Affiliations (2 mode to 1 mode) Step 2. Select the Teams network, then under mode select the rows button, then press OK. In the new network, each value represents the number of teams each pair of people works on together. For most of the analysis in UCINET, you would need to dichotomize the data. You can also visualize the data in Netdraw in the usual way. In the diagram on the right, the width of the ties indicates the number of shared teams each pair of people are on using the properties > lines > size > tie strength option.
6 Bibliography Methodological papers and books: Borgatti, S. P., & Everett, M. G Network analysis of 2 mode data. Social Networks, 19(3), Borgatti, S. P., Everett, M. G., & Johnson, J. C Analyzing Social Networks. Los Angeles, CA: Sage. Borgatti, S. P., & Halgin, D. S Analyzing affiliation networks. The SAGE Handbook of Social Network Analysis, Hanneman, R. A., & Riddle, M Introduction to social network methods. University of California, Riverside. Published in digital form at Wasserman, S., & Faust, K Social Network Analysis: Methods and Applications. Cambridge, United Kingdom: Cambridge University Press. Empirical and conceptual papers: Breiger, R The duality of persons and groups. Social Forces 53: Cattani, G., Ferriani, S., Negro, G., & Perretti, F The structure of consensus: Network ties, legitimation, and exit rates of US feature film producer organizations. Administrative Science Quarterly, 53(1), Davis, A., B. B. Gardner and M. R. Gardner Deep South: A Social Anthropological Study of Caste and Class. Chicago: University of Chicago Press. Hoppe, B., & Reinelt, C Social network analysis and the evaluation of leadership networks. Leadership Quarterly, 21(4), Robins, G., & Alexander, M Small worlds among interlocking directors: Network structure and distance in bipartite graphs. Computational & Mathematical Organization Theory, 10(1), Snijders, T. A., Lomi, A., & Torló, V. J A model for the multiplex dynamics of two mode and one mode networks, with an application to employment preference, friendship, and advice. Social Networks, 35(2), Andrew Parker, PhD, is a visiting professor at the University of Kentucky. He has conducted network analysis in over 100 multinational organizations and government agencies. He was a Senior Consultant at IBM s Institute for Knowledge Management, a research fellow at the Network Roundtable at the University of Virginia as well as an advisor to the Knowledge and Innovation Network at Warwick Business School. His research has appeared in Science, Organization Studies, Journal of Applied Psychology, Journal of Applied Behavioral Science, Social Networks, Management Communication Quarterly, Sloan Management Review, Organizational Dynamics and California Management Review. He is also the co author of The Hidden Power of Social Networks. He received his PhD from Stanford University.
Two mode Network. PAD 637, Lab 8 Spring 2013 Yoonie Lee
Two mode Network PAD 637, Lab 8 Spring 2013 Yoonie Lee Lab exercises Two- mode Davis QAP correlation Multiple regression QAP Types of network data One-mode network (M M ) Two-mode network (M N ) M1 M2
More informationUCINET Quick Start Guide
UCINET Quick Start Guide This guide provides a quick introduction to UCINET. It assumes that the software has been installed with the data in the folder C:\Program Files\Analytic Technologies\Ucinet 6\DataFiles
More informationStudy of Data Mining Algorithm in Social Network Analysis
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Study of Data Mining Algorithm in Social Network Analysis Chang Zhang 1,a, Yanfeng Jin 1,b, Wei Jin 1,c, Yu Liu 1,d 1
More informationRockefeller College University at Albany
Rockefeller College University at Albany Problem Set #7: Handling Egocentric Network Data Adapted from original by Peter V. Marsden, Harvard University Egocentric network data sometimes known as personal
More informationIntegrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention
Integrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention Ian Holloway, PhD, MSW, MPH Assistant Professor Department of Social Welfare
More informationBlockmodels/Positional Analysis : Fundamentals. PAD 637, Lab 10 Spring 2013 Yoonie Lee
Blockmodels/Positional Analysis : Fundamentals PAD 637, Lab 10 Spring 2013 Yoonie Lee Review of PS5 Main question was To compare blockmodeling results using PROFILE and CONCOR, respectively. Data: Krackhardt
More informationA Short Introduction To Social Network Analysis Dr. Mishari Alnahedh Kuwait University College of Business Administration
A Short Introduction To Social Network Analysis Dr. Kuwait University College of Business Administration Introduction A network is a collection of points linked through some type of association. These
More information3. LABOR CATEGORY DESCRIPTIONS
3. LABOR CATEGORY DESCRIPTIONS 001 - Consulting Systems Advisor Fifteen or more (15+) years of experience within the industry. The Consulting System Advisor develops and applies advanced methods, theories,
More informationUniversity of Kentucky Gatton College of Business. Archival Data. Scott Soltis 2016 Links Workshop Lexington, Kentucky
Archival Data Scott Soltis (scott.m.soltis@gmail.com) 2016 Links Workshop Lexington, Kentucky Goals for this mini-module Demonstrate how useful and rewarding the use of archival data can be Generate ideas
More informationClique Graphs and Overlapping Communities
Clique Graphs and Overlapping Communities T.S. Evans Theoretical Physics, and the Institute for Mathematical Sciences, Imperial College London, SW7 2AZ, U.K. Abstract. It is shown how to construct a clique
More informationMathematical Concepts and Representation of Social Networking Health Site
Mathematical Concepts and Representation of Social Networking Health Site Abhishek Burli, Archit, Mandar Chitale and Prof Anupama Phakatkar Abstract A social network is mathematically defined as set of
More informationAdvancement Application
Advancement Application for Senior Member and Fellow Member status Philosophy The purpose of the advancement program is to recognize those members who have provided substantial service and contributions
More informationAnalysis and visualization with v isone
Analysis and visualization with v isone Jürgen Lerner University of Konstanz Egoredes Summerschool Barcelona, 21. 25. June, 2010 About v isone. Visone is the Italian word for mink. In Spanish visón. visone
More informationarxiv:cond-mat/ v1 [cond-mat.other] 2 Feb 2004
A measure of centrality based on the network efficiency arxiv:cond-mat/0402050v1 [cond-mat.other] 2 Feb 2004 Vito Latora a and Massimo Marchiori b,c a Dipartimento di Fisica e Astronomia, Università di
More information1 of :22
1 of 1 30.11.2005 12:22 Attribution-NonCommercial-NoDerivs 2.5 You are free: to copy, distribute, display, and perform the work Under the following conditions: Attribution. You must attribute the work
More informationBUILT FOR THE STORM. AND THE NORM.
BUILT FOR THE STORM. AND THE NORM. Data volumes are overwhelming. Stakes are sky-high. Time frames are shorter than ever. GET ANSWERS NOW. EM[URGENT]CY EXIT In a world where the routine can quickly become
More information[Rani, 5(7): July 2018] ISSN DOI /zenodo Impact Factor
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES SOCIAL NETWORK ANALYSIS SURVEY ON DATA COLLECTION METHODS, DATA FORMATS AND ANALYSIS TOOLS Soja Rani S *1 & Tinu N S 2 *1&2 Assistant professor, Dept
More informationPROFESSIONAL MASTER S IN
I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY
More information2.2. Data Format Save as UCINET files in Netdraw Import from VNA format Node Level Analysis Degree...
Contents 0. Processing the Tie Data and Create a VNA File for Binary Network... 2 1. Appearance of UCINET... 4 2. UCINET dataset... 5 2.1 Set Default Folder... 5 2.2. Data Format... 5 2.3 Save as UCINET
More informationCreating a Cybersecurity Culture: (ISC)2 Survey Responses
10/3/18 Creating a Cybersecurity Culture: (ISC)2 Survey Responses Dr. Keri Pearlson (ISC)2 Conference October 8, 2018 CAMS - (IC)3 https://cams.mit.edu 1 200,000Security events The average company handles
More informationECO ECONOMICS DEPARTMENT CURRICULUM MAP Page 1
ECO ECONOMICS DEPARTMENT CURRICULUM MAP Page LO a: Understand and apply the basic principles of micro and ECO05 ECO0 ECO ECO22 ECO222 ECO300 ECO 30 ECO305 ECO30 ECO307 ECO 3 ECO32 ECO33 ECO 325 ECO32 macroeconomics
More informationCommunity Detection in Bipartite Networks:
Community Detection in Bipartite Networks: Algorithms and Case Studies Kathy Horadam and Taher Alzahrani Mathematical and Geospatial Sciences, RMIT Melbourne, Australia IWCNA 2014 Community Detection,
More informationBlackboard 9 - Creating Categories in the Grade Center
University of Southern California Marshall Information Services Blackboard 9 - Creating Categories in the Grade Center Categories allow you to place Blackboard data columns (i.e. non-calculated columns)
More informationA Complement-Derived Centrality Index for Disconnected Graphs 1
CONNECTIONS 26(2): 70-81 2005 INSNA http://www.insna.org/connections-web/volume26-2/7.cornwell.pdf A Complement-Derived Centrality Index for Disconnected Graphs 1 Benjamin Cornwell University of Chicago,
More informationTwo-Level Designs. Chapter 881. Introduction. Experimental Design. Experimental Design Definitions. Alias. Blocking
Chapter 881 Introduction This program generates a 2 k factorial design for up to seven factors. It allows the design to be blocked and replicated. The design rows may be output in standard or random order.
More informationEfficient Mining Algorithms for Large-scale Graphs
Efficient Mining Algorithms for Large-scale Graphs Yasunari Kishimoto, Hiroaki Shiokawa, Yasuhiro Fujiwara, and Makoto Onizuka Abstract This article describes efficient graph mining algorithms designed
More informationOn the Robustness of Centrality Measures under Conditions of Imperfect Data
On the Robustness of Centrality Measures under Conditions of Imperfect Data Stephen P. Borgatti Carroll School of Management Boston College borgatts@bc.edu Tel: (617) 552-0450 Fax: (617) 552-4230 Kathleen
More informationAlessandro Del Ponte, Weijia Ran PAD 637 Week 3 Summary January 31, Wasserman and Faust, Chapter 3: Notation for Social Network Data
Wasserman and Faust, Chapter 3: Notation for Social Network Data Three different network notational schemes Graph theoretic: the most useful for centrality and prestige methods, cohesive subgroup ideas,
More informationQualitative Data Analysis Software. A workshop for staff & students School of Psychology Makerere University
Qualitative Data Analysis Software A workshop for staff & students School of Psychology Makerere University (PhD) January 27, 2016 Outline for the workshop CAQDAS NVivo Overview Practice 2 CAQDAS Before
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationRKWard: IRT analyses and person scoring with ltm
Software Corner Software Corner: RKWard: IRT analyses and person scoring with ltm Aaron Olaf Batty abatty@sfc.keio.ac.jp Keio University Lancaster University In SRB 16(2), I introduced the ever-improving,
More informationACCOUNTING. Iowa State University
Iowa State University 2016-2017 1 ACCOUNTING For undergraduate curriculum in business, major in The curriculum in accounting is accredited by AACSB International, the Association to Advance Collegiate
More informationSolving Systems of Equations Using Matrices With the TI-83 or TI-84
Solving Systems of Equations Using Matrices With the TI-83 or TI-84 Dimensions of a matrix: The dimensions of a matrix are the number of rows by the number of columns in the matrix. rows x columns *rows
More informationCalifornia Core Performance Overview
California Core Performance Overview 1. Generate a list of learners to follow-up using the TOPSpro Enterprise California Core Performance Wizard. a. In TE, go to Tools and click California Core Performance
More informationApplication for Advancement to Senior Member and Fellow Status
Philosophy Application for Advancement to Senior Member and Fellow Status The purpose of the advancement program is to recognize those members who have provided substantial service and contributions to,
More informationENGINEERING AND TECHNOLOGY MANAGEMENT
Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU
More informationFactors Affecting Adoption of Cloud Computing Technology in Educational Institutions (A Case Study of Chandigarh)
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-7, Issue-3, pp-358-364 www.ajer.org Research Paper Open Access Factors Affecting Adoption of Cloud Computing
More informationMHPE 494: Data Analysis. Welcome! The Analytic Process
MHPE 494: Data Analysis Alan Schwartz, PhD Department of Medical Education Memoona Hasnain,, MD, PhD, MHPE Department of Family Medicine College of Medicine University of Illinois at Chicago Welcome! Your
More informationRandom Generation of the Social Network with Several Communities
Communications of the Korean Statistical Society 2011, Vol. 18, No. 5, 595 601 DOI: http://dx.doi.org/10.5351/ckss.2011.18.5.595 Random Generation of the Social Network with Several Communities Myung-Hoe
More informationBasics: How to Calculate Standard Deviation in Excel
Basics: How to Calculate Standard Deviation in Excel In this guide, we are going to look at the basics of calculating the standard deviation of a data set. The calculations will be done step by step, without
More informationAlgorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov
Algorithms and Applications in Social Networks 2017/2018, Semester B Slava Novgorodov 1 Lesson #1 Administrative questions Course overview Introduction to Social Networks Basic definitions Network properties
More informationFacilitating Social Network Studies of FLOSS using the OSSNetwork Environment
Facilitating Social Network Studies of FLOSS using the OSSNetwork Environment Marco A. Balieiro, Samuel F. de Sousa Júnior, and Cleidson R. B. de Souza Faculdade de Computação Universidade Federal do Pará
More informationBuilding the Multiplex: An Agent-Based Model of Formal and Informal Network Relations
Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations EURO 2016 POZNAN POLAND, 4 JULY 2016 Duncan A. Robertson and Leroy White Loughborough University, UK; Warwick Business
More informationHandling Weighted, Asymmetric, Self-Looped, and Disconnected Networks in ORA
Handling Weighted, Asymmetric, Self-Looped, and Disconnected Networks in ORA Wei Wei, Jürgen Pfeffer, Jeffrey Reminga, and Kathleen M. Carley August, 2011 CMU-ISR-11-113 Institute for Software Research
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More information2 days. Certified UX & Usability Professional User Experience & Interaction Design with Lean UX & Agile UX
2 days Certified UX & Usability Professional User Experience & Interaction Design with Lean UX & Agile UX Description What to expect User experience has become the most important factor for designing successful
More informationCompound OR Probability
Compound OR Probability If two events, A and B are mutually exclusive, then P(A or B) = P(A) + P(B) If two events, A and B are inclusive, then P(A or B) = P(A) + (B) P(A and B) Where (A and B) are outcomes
More informationIntroduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion
Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion References Social Network Social Network Analysis Sociocentric
More informationTHE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017
THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS Summer semester, 2016/2017 SOCIAL NETWORK ANALYSIS: THEORY AND APPLICATIONS 1. A FEW THINGS ABOUT NETWORKS NETWORKS IN THE REAL WORLD There are four categories
More informationSocial networks, social space, social structure
Social networks, social space, social structure Pip Pattison Department of Psychology University of Melbourne Sunbelt XXII International Social Network Conference New Orleans, February 22 Social space,
More informationPackage manet. September 19, 2017
Package manet September 19, 2017 Title Multiple Allocation Model for Actor-Event Networks Version 1.0 Mixture model with overlapping clusters for binary actor-event data. Parameters are estimated in a
More informationAdvance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP.
2019 Advance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP. Get Started Today Be recognized as an industry leader. Distinguishing yourself
More informationGovernment-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA
Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA What is GUIRR? Joint body of the NAS, NAE, and IOM Created in 1984 to convene senior-most representatives
More informationRethinking Preferential Attachment Scheme: Degree centrality versus closeness centrality 1
CONNECTIONS 27(3): 53-59 2007 INSNA http://www.insna.org/connections-web/volume27-3/ko.pdf Rethinking Preferential Attachment Scheme: Degree centrality versus closeness centrality 1 Kilkon Ko 2 University
More informationGeneralized blockmodeling of sparse networks
Metodološki zvezki, Vol. 10, No. 2, 2013, 99-119 Generalized blockmodeling of sparse networks Aleš Žiberna 1 Abstract The paper starts with an observation that the blockmodeling of relatively sparse binary
More informationROJECT ANAGEMENT PROGRAM AND COURSE GUIDE
ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,
More informationThreat and Vulnerability Assessment Tool
TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...
More informationRockefeller College University at Albany
Rockefeller College University at Albany Problem Set #3: Visualizing Networks This problem set covers portions of the UCINET and related packages that are used to visualize network data. The following
More informationINFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE
Second International Conference World of Construction Project Management 2007 Shin, Jae Won, Ryu, Han-Guk, Lee, Dong-Ryul CSRI, HanmiParsons Co., Ltd. INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE
More informationCS224W: Analysis of Networks Jure Leskovec, Stanford University
CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 11/13/17 Jure Leskovec, Stanford CS224W: Analysis of Networks, http://cs224w.stanford.edu 2 Observations Models
More informationUsing the NIST Framework for Metrics 5/14/2015
Using the NIST Framework for Metrics 5/14/2015 ITD - Public Safety Safety improvements reduced total crashes by 29% and injury crashes by 41% in corridors after GARVEE projects were completed Ads / Commercials
More informationMajor Program Selection Information. Information Systems An enriching path of study and career
Major Program Selection Information Information Systems An enriching path of study and career BBA in Information Systems BBA-IS Our IS Alumni Chris Kam BBA(IS) Class of 2007 Graduate, HKUST Senior Manager,
More informationTwo-dimensional Totalistic Code 52
Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable
More informationElection Analysis and Prediction Using Big Data Analytics
Election Analysis and Prediction Using Big Data Analytics Omkar Sawant, Chintaman Taral, Roopak Garbhe Students, Department Of Information Technology Vidyalankar Institute of Technology, Mumbai, India
More informationFatigue Reliability Analysis of Dynamic Components with Variable Loadings without Monte Carlo Simulation 1
Fatigue Reliability Analysis of Dynamic Components with Variable Loadings without Monte Carlo Simulation 1 Carlton L. Smith., Chief Engineer, Structures and Materials Division, US Army, AMRDEC Redstone
More informationNetwork Topology Optimization Using Social Network Analysis
Network Topology Optimization Using Social Network Analysis Prof. Dr. Siddeeq Y. Ameen Com puters & Information Technology Eng. Dept. University of Technology, Bag hdad, Iraq Asst. Lect. Alaa N. Al-Qeicy
More informationAPES step-by-step manual Version 1.1.8; by Chantal Vögeli
APES step-by-step manual Version 1.1.8; by Chantal Vögeli Dear APES User This step-by-step manual is designed as an introduction to APES and is mainly aimed at beginners using APES for the first time.
More informationList of figures List of tables Acknowledgements
List of figures List of tables Acknowledgements page xii xiv xvi Introduction 1 Set-theoretic approaches in the social sciences 1 Qualitative as a set-theoretic approach and technique 8 Variants of QCA
More information1 Degree Distributions
Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 3: Jan 24, 2012 Scribes: Geoffrey Fairchild and Jason Fries 1 Degree Distributions Last time, we discussed some graph-theoretic
More informationCHAPTER 4 METHODOLOGY AND TOOLS
CHAPTER 4 METHODOLOGY AND TOOLS 4.1 RESEARCH METHODOLOGY In an effort to test empirically the suggested data mining technique, the data processing quality, it is important to find a real-world for effective
More informationDecision Making Procedure: Applications of IBM SPSS Cluster Analysis and Decision Tree
World Applied Sciences Journal 21 (8): 1207-1212, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.21.8.2913 Decision Making Procedure: Applications of IBM SPSS Cluster Analysis
More informationPRINCE2 Practitioner Course Outline
PRINCE2 Practitioner Course Outline 1 PRINCE2 Practitioner Program Overview PRINCE2 provides an easily tailored and scalable method for the management of all types of projects. This method is the de facto
More information10. Documents and Data Models... and Modeling
10. Documents and Data Models... and Modeling INFO 202-1 October 2008 Bob Glushko Plan for INFO Lecture #10 Modeling across the "Document Type Spectrum" Document models {and,or,vs} data models "Berkeley
More informationDynamically Motivated Models for Multiplex Networks 1
Introduction Dynamically Motivated Models for Multiplex Networks 1 Daryl DeFord Dartmouth College Department of Mathematics Santa Fe institute Inference on Networks: Algorithms, Phase Transitions, New
More informationAssessing Metadata Utilization: An Analysis of MARC Content Designation Use
Assessing Metadata Utilization: An Analysis of MARC Content Designation Use William E. Moen , Penelope Benardino School of Library and Information Sciences, Texas Center
More informationThe DataDude (MS Excel) and Documentation for users are available at: Contents
1 Dude, Where s My Data? UCB DataDude (v. 0.6.7) User Guide Center for Social Services Research University of California at Berkeley http://cssr.berkeley.edu/ Dude, Where s My Data? The University of California,
More informationVOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk
VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18 ocr.org.uk Contents Introduction 1 Key to forms of assessment 1 Version control 2 1 Skills for Business 3 1.1 Administration (Business Professional) 3 1.2
More informationBSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.
Bachelor of Science in Information Technology At Purdue Global, we employ a method called Course-Level Assessment, or CLA, to determine student mastery of Course Outcomes. Through CLA, we measure how well
More informationAdapted and expanded from: Hanneman, Robert Introduction to Social Network Methods.
1 UCINet Quick Guide Alicia Wassink LING534 Adapted and expanded from: Hanneman, Robert Introduction to Social Network Methods. http://faculty.ucr.edu/~hanneman/nettext/ Sections in this guide: 1. Getting
More informationCenter for Effective Organizations
Center for Effective Organizations ORGANIZATIONAL COMMUNICATION NETWORKS CEO PUBLICATION G 07-15 (525) PETER MONGE Annenberg School for Communication Marshall School of Business University of Southern
More informationDiscovering Roles and Anomalies in Graphs: Theory and Applications
Discovering Roles and Anomalies in Graphs: Theory and Applications Part 1: Theory Tina Eliassi-Rad (Rutgers) Christos Faloutsos (CMU) SDM'12 Tutorial Overview Features Roles Anomalies = rare roles Patterns
More informationSlide 1. Slide 2. The Need. Using Microsoft Excel
Slide 1 Using Microsoft Excel to Collect and Analyze Using Microsoft Excel to Collect and Analyze California California Standards Standards Text Data Test Data Presented by: Michael Nunn CTAP Region 11
More informationResearch on Social Relationship Network System based on MongoDB
Research on Social Relationship Network System based on MongoDB Yingyan Long School of Educational Sciences Shaanxi University of Technology Han Zhong, Shaanxi, China Abstract The relationship between
More informationMaking Tables and Figures
Making Tables and Figures Don Quick Colorado State University Tables and figures are used in most fields of study to provide a visual presentation of important information to the reader. They are used
More informationTransitivity and Triads
1 / 32 Tom A.B. Snijders University of Oxford May 14, 2012 2 / 32 Outline 1 Local Structure Transitivity 2 3 / 32 Local Structure in Social Networks From the standpoint of structural individualism, one
More informationNEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE
COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:
More informationPDF hosted at the Radboud Repository of the Radboud University Nijmegen
PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is an author's version which may differ from the publisher's version. For additional information about this
More informationMaking Privacy Operational
Making Privacy Operational Introduction to the Privacy Management Reference Model John Sabo Director, Global Government relations CA, Inc. and President, ISTPA john.t.sabo@ca.com Michael Willett President,
More informationGETTING STARTED WITH THE STUDENT EDITION OF LISREL 8.51 FOR WINDOWS
GETTING STARTED WITH THE STUDENT EDITION OF LISREL 8.51 FOR WINDOWS Gerhard Mels, Ph.D. mels@ssicentral.com Senior Programmer Scientific Software International, Inc. 1. Introduction The Student Edition
More informationSage Canadian SMB Survey on Mobile Devices March 2013
Sage Canadian SMB Survey on Mobile Devices March 2013 Summary Report Introduction Sage North America, a leading provider of business management software and services to more than 6 million small and midsized
More informationA Road Map for Advancing Your Career. Distinguish yourself professionally. Get an edge over the competition. Advance your career with CBIP.
TDWI Certification A Road Map for Advancing Your Career Distinguish yourself professionally. Get an edge over the competition. Advance your career with CBIP. www.tdwi.org/cbip TDWI s Certified Business
More informationThe Network Analysis Five-Number Summary
Chapter 2 The Network Analysis Five-Number Summary There is nothing like looking, if you want to find something. You certainly usually find something, if you look, but it is not always quite the something
More informationABOUT PIVOTTABLES TABLE OF CONTENTS
University of Southern California Academic Information Services Excel 2007 - PivotTables ABOUT PIVOTTABLES PivotTables provide an excellent means of analyzing data stored in database format by rearranging
More information1. All team members must be on record in the state and national offices as having paid dues by February 6.
E-BUSINESS One critical element in a business success in today s global market is the ability to sell products and services to the consumer via the Internet. This event recognizes FBLA members who have
More informationPilot Study for the WHOIS Accuracy Reporting System: Preliminary Findings
Pilot Study for the WHOIS Accuracy Reporting System: Preliminary Findings About the Pilot Study On 8 November 2012, in response to the Recommendations of the WHOIS Review Team convened under the Affirmation
More informationSage ERP Accpac U.S. Payroll Versions, 5.5Q, 5.6M, and 6.0H Tax Update for January 31, 2012
Sage ERP Accpac U.S. Payroll Versions, 5.5Q, 5.6M, and 6.0H Tax Update for January 31, 2012 Before You Install... 1 Important Update Installation Process Change... 1 Critical Product Update Requirements...
More informationAdvisor Workstation Training Manual: Working in the Research Module
Advisor Workstation Training Manual: Working in the Research Module Overview of the Research module - - - - - - - - - - - - - - - - 1 What you will learn in this section - - - - - - - - - - - - - - - -
More informationIndependent Assurance Statement
Independent Assurance Statement Scope and Objectives DNV GL Business Assurance USA, Inc. (DNV GL) was commissioned by Lockheed Martin Corporation (Lockheed Martin) to conduct independent assurance of its
More informationAnalyzing Social Networks Detailed Instructions on the Examples in the Text. Section 2.2 Graphs Section 2.4 Adjacency Matrix...
Analyzing Social Networks Detailed Instructions on the Examples in the Text This gives the detailed commands required to reproduce all the examples in the text created using UCINET, E-Net and Netdraw.
More informationChief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.
Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased
More information