Definition: Implications: Analysis:

Size: px
Start display at page:

Download "Definition: Implications: Analysis:"

Transcription

1 Analyzing Two mode Network Data Definition: One mode networks detail the relationship between one type of entity, for example between people. In contrast, two mode networks are composed of two types of entities. These entities could be people and teams or people and organizations. Two mode networks summarize the association between one entity and another, for example, the teams that individuals are members of. For this reason, two mode networks are often called affiliation networks. They can also be called bipartite networks. Implications: Gathering data on two mode networks, such as people and teams, can be a quick way of understanding the web of relationships in an organization. You can use this data as a proxy for employee employee relationships. However, caution must be taken when using two mode data in large teams or teams that evolve over time because not every person on a given team may know one another. In addition, individuals have ties that are outside their teams. Data comprising employee affiliations with teams can be useful in itself. It can highlight which teams (and the individuals in the teams) are central in the network and hence influential. It can also highlight which teams and individuals are playing broker roles within an organization. Analysis: Two mode data can be visualized and analyzed in several ways. It can be visualized so that ties between an individual and teams make up the structure of the network. UCINET also has some specific analysis routines for two mode data. Two mode data can be made into square matrices called bipartite networks, which allows for all the analysis routines in UCINET to be used. Finally two mode networks can be reduced to one mode of teams teams or employees employees. Each of these options is detailed in the following sections.

2 Visualizing Two mode Networks Visualizing two mode data in Netdraw In this analysis, we are going to visually examine our two mode network. The Excel spreadsheet below shows individuals who are members of teams. Notice the names of the respondents are in the first column and the team names are along the first row. Step 1. Load the network into UCINET the same way that you would any network. Name the file Teams. In Netdraw, File > Open > UCINET dataset > 2 Mode network. Then select the Teams file and press OK. In the network diagram, the teams are the blue squares and the individuals are the red circles. There is obvious clustering by team, with Team 6 connecting the two subgroups together.

3 Analyzing Two mode Networks Analyzing two mode data in UCINET Step 1. Network > 2 Mode networks > 2 Mode Centrality. Step 2. Select the Teams network and press OK. This routine produces normalized scores based upon the maximum possible value. The people with scores of have the most ties. The most central team is team 5, with Note that Team 6 (the one on the center of the network diagram) has the highest betweenness score.

4 Analyzing Two mode Networks Analyzing two mode data in UCINET We cannot run all the analytical measures in UCINET on two mode data because the matrix is not square. To create a square matrix, we need to run the bipartite function. This function adds the names of the teams to the rows and the names of the people to the columns. Step 1. Transform > Graph Theoretic > Bipartite Step 2. Select the Teams network and press OK. Step 3. Once you have constructed your bipartite dataset, you can analyze it the same way as other networks. The interpretation of the findings, however, needs to take into account that the data has two modes. Analysis 1. Degree centrality. Network > Centrality and Power > Degree. In the input network box type Teams Bip or click and select the Teams Bip network. Analysis 2. Brokerage (betweenness). Network > Centrality and Power > Freeman Betweenness > Node Betweenness. Degree Centrality Betweenness

5 Creating One mode Networks from Two mode Networks Creating one mode networks from two mode data Sometimes it may be useful to transform two mode data into one mode data. For example in our teams network, you can create a one mode network of ties between individuals where the ties represent being part of the same team. Step 1. Data > Affiliations (2 mode to 1 mode) Step 2. Select the Teams network, then under mode select the rows button, then press OK. In the new network, each value represents the number of teams each pair of people works on together. For most of the analysis in UCINET, you would need to dichotomize the data. You can also visualize the data in Netdraw in the usual way. In the diagram on the right, the width of the ties indicates the number of shared teams each pair of people are on using the properties > lines > size > tie strength option.

6 Bibliography Methodological papers and books: Borgatti, S. P., & Everett, M. G Network analysis of 2 mode data. Social Networks, 19(3), Borgatti, S. P., Everett, M. G., & Johnson, J. C Analyzing Social Networks. Los Angeles, CA: Sage. Borgatti, S. P., & Halgin, D. S Analyzing affiliation networks. The SAGE Handbook of Social Network Analysis, Hanneman, R. A., & Riddle, M Introduction to social network methods. University of California, Riverside. Published in digital form at Wasserman, S., & Faust, K Social Network Analysis: Methods and Applications. Cambridge, United Kingdom: Cambridge University Press. Empirical and conceptual papers: Breiger, R The duality of persons and groups. Social Forces 53: Cattani, G., Ferriani, S., Negro, G., & Perretti, F The structure of consensus: Network ties, legitimation, and exit rates of US feature film producer organizations. Administrative Science Quarterly, 53(1), Davis, A., B. B. Gardner and M. R. Gardner Deep South: A Social Anthropological Study of Caste and Class. Chicago: University of Chicago Press. Hoppe, B., & Reinelt, C Social network analysis and the evaluation of leadership networks. Leadership Quarterly, 21(4), Robins, G., & Alexander, M Small worlds among interlocking directors: Network structure and distance in bipartite graphs. Computational & Mathematical Organization Theory, 10(1), Snijders, T. A., Lomi, A., & Torló, V. J A model for the multiplex dynamics of two mode and one mode networks, with an application to employment preference, friendship, and advice. Social Networks, 35(2), Andrew Parker, PhD, is a visiting professor at the University of Kentucky. He has conducted network analysis in over 100 multinational organizations and government agencies. He was a Senior Consultant at IBM s Institute for Knowledge Management, a research fellow at the Network Roundtable at the University of Virginia as well as an advisor to the Knowledge and Innovation Network at Warwick Business School. His research has appeared in Science, Organization Studies, Journal of Applied Psychology, Journal of Applied Behavioral Science, Social Networks, Management Communication Quarterly, Sloan Management Review, Organizational Dynamics and California Management Review. He is also the co author of The Hidden Power of Social Networks. He received his PhD from Stanford University.

Two mode Network. PAD 637, Lab 8 Spring 2013 Yoonie Lee

Two mode Network. PAD 637, Lab 8 Spring 2013 Yoonie Lee Two mode Network PAD 637, Lab 8 Spring 2013 Yoonie Lee Lab exercises Two- mode Davis QAP correlation Multiple regression QAP Types of network data One-mode network (M M ) Two-mode network (M N ) M1 M2

More information

UCINET Quick Start Guide

UCINET Quick Start Guide UCINET Quick Start Guide This guide provides a quick introduction to UCINET. It assumes that the software has been installed with the data in the folder C:\Program Files\Analytic Technologies\Ucinet 6\DataFiles

More information

Study of Data Mining Algorithm in Social Network Analysis

Study of Data Mining Algorithm in Social Network Analysis 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Study of Data Mining Algorithm in Social Network Analysis Chang Zhang 1,a, Yanfeng Jin 1,b, Wei Jin 1,c, Yu Liu 1,d 1

More information

Rockefeller College University at Albany

Rockefeller College University at Albany Rockefeller College University at Albany Problem Set #7: Handling Egocentric Network Data Adapted from original by Peter V. Marsden, Harvard University Egocentric network data sometimes known as personal

More information

Integrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention

Integrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention Integrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention Ian Holloway, PhD, MSW, MPH Assistant Professor Department of Social Welfare

More information

Blockmodels/Positional Analysis : Fundamentals. PAD 637, Lab 10 Spring 2013 Yoonie Lee

Blockmodels/Positional Analysis : Fundamentals. PAD 637, Lab 10 Spring 2013 Yoonie Lee Blockmodels/Positional Analysis : Fundamentals PAD 637, Lab 10 Spring 2013 Yoonie Lee Review of PS5 Main question was To compare blockmodeling results using PROFILE and CONCOR, respectively. Data: Krackhardt

More information

A Short Introduction To Social Network Analysis Dr. Mishari Alnahedh Kuwait University College of Business Administration

A Short Introduction To Social Network Analysis Dr. Mishari Alnahedh Kuwait University College of Business Administration A Short Introduction To Social Network Analysis Dr. Kuwait University College of Business Administration Introduction A network is a collection of points linked through some type of association. These

More information

3. LABOR CATEGORY DESCRIPTIONS

3. LABOR CATEGORY DESCRIPTIONS 3. LABOR CATEGORY DESCRIPTIONS 001 - Consulting Systems Advisor Fifteen or more (15+) years of experience within the industry. The Consulting System Advisor develops and applies advanced methods, theories,

More information

University of Kentucky Gatton College of Business. Archival Data. Scott Soltis 2016 Links Workshop Lexington, Kentucky

University of Kentucky Gatton College of Business. Archival Data. Scott Soltis 2016 Links Workshop Lexington, Kentucky Archival Data Scott Soltis (scott.m.soltis@gmail.com) 2016 Links Workshop Lexington, Kentucky Goals for this mini-module Demonstrate how useful and rewarding the use of archival data can be Generate ideas

More information

Clique Graphs and Overlapping Communities

Clique Graphs and Overlapping Communities Clique Graphs and Overlapping Communities T.S. Evans Theoretical Physics, and the Institute for Mathematical Sciences, Imperial College London, SW7 2AZ, U.K. Abstract. It is shown how to construct a clique

More information

Mathematical Concepts and Representation of Social Networking Health Site

Mathematical Concepts and Representation of Social Networking Health Site Mathematical Concepts and Representation of Social Networking Health Site Abhishek Burli, Archit, Mandar Chitale and Prof Anupama Phakatkar Abstract A social network is mathematically defined as set of

More information

Advancement Application

Advancement Application Advancement Application for Senior Member and Fellow Member status Philosophy The purpose of the advancement program is to recognize those members who have provided substantial service and contributions

More information

Analysis and visualization with v isone

Analysis and visualization with v isone Analysis and visualization with v isone Jürgen Lerner University of Konstanz Egoredes Summerschool Barcelona, 21. 25. June, 2010 About v isone. Visone is the Italian word for mink. In Spanish visón. visone

More information

arxiv:cond-mat/ v1 [cond-mat.other] 2 Feb 2004

arxiv:cond-mat/ v1 [cond-mat.other] 2 Feb 2004 A measure of centrality based on the network efficiency arxiv:cond-mat/0402050v1 [cond-mat.other] 2 Feb 2004 Vito Latora a and Massimo Marchiori b,c a Dipartimento di Fisica e Astronomia, Università di

More information

1 of :22

1 of :22 1 of 1 30.11.2005 12:22 Attribution-NonCommercial-NoDerivs 2.5 You are free: to copy, distribute, display, and perform the work Under the following conditions: Attribution. You must attribute the work

More information

BUILT FOR THE STORM. AND THE NORM.

BUILT FOR THE STORM. AND THE NORM. BUILT FOR THE STORM. AND THE NORM. Data volumes are overwhelming. Stakes are sky-high. Time frames are shorter than ever. GET ANSWERS NOW. EM[URGENT]CY EXIT In a world where the routine can quickly become

More information

[Rani, 5(7): July 2018] ISSN DOI /zenodo Impact Factor

[Rani, 5(7): July 2018] ISSN DOI /zenodo Impact Factor GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES SOCIAL NETWORK ANALYSIS SURVEY ON DATA COLLECTION METHODS, DATA FORMATS AND ANALYSIS TOOLS Soja Rani S *1 & Tinu N S 2 *1&2 Assistant professor, Dept

More information

PROFESSIONAL MASTER S IN

PROFESSIONAL MASTER S IN I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY

More information

2.2. Data Format Save as UCINET files in Netdraw Import from VNA format Node Level Analysis Degree...

2.2. Data Format Save as UCINET files in Netdraw Import from VNA format Node Level Analysis Degree... Contents 0. Processing the Tie Data and Create a VNA File for Binary Network... 2 1. Appearance of UCINET... 4 2. UCINET dataset... 5 2.1 Set Default Folder... 5 2.2. Data Format... 5 2.3 Save as UCINET

More information

Creating a Cybersecurity Culture: (ISC)2 Survey Responses

Creating a Cybersecurity Culture: (ISC)2 Survey Responses 10/3/18 Creating a Cybersecurity Culture: (ISC)2 Survey Responses Dr. Keri Pearlson (ISC)2 Conference October 8, 2018 CAMS - (IC)3 https://cams.mit.edu 1 200,000Security events The average company handles

More information

ECO ECONOMICS DEPARTMENT CURRICULUM MAP Page 1

ECO ECONOMICS DEPARTMENT CURRICULUM MAP Page 1 ECO ECONOMICS DEPARTMENT CURRICULUM MAP Page LO a: Understand and apply the basic principles of micro and ECO05 ECO0 ECO ECO22 ECO222 ECO300 ECO 30 ECO305 ECO30 ECO307 ECO 3 ECO32 ECO33 ECO 325 ECO32 macroeconomics

More information

Community Detection in Bipartite Networks:

Community Detection in Bipartite Networks: Community Detection in Bipartite Networks: Algorithms and Case Studies Kathy Horadam and Taher Alzahrani Mathematical and Geospatial Sciences, RMIT Melbourne, Australia IWCNA 2014 Community Detection,

More information

Blackboard 9 - Creating Categories in the Grade Center

Blackboard 9 - Creating Categories in the Grade Center University of Southern California Marshall Information Services Blackboard 9 - Creating Categories in the Grade Center Categories allow you to place Blackboard data columns (i.e. non-calculated columns)

More information

A Complement-Derived Centrality Index for Disconnected Graphs 1

A Complement-Derived Centrality Index for Disconnected Graphs 1 CONNECTIONS 26(2): 70-81 2005 INSNA http://www.insna.org/connections-web/volume26-2/7.cornwell.pdf A Complement-Derived Centrality Index for Disconnected Graphs 1 Benjamin Cornwell University of Chicago,

More information

Two-Level Designs. Chapter 881. Introduction. Experimental Design. Experimental Design Definitions. Alias. Blocking

Two-Level Designs. Chapter 881. Introduction. Experimental Design. Experimental Design Definitions. Alias. Blocking Chapter 881 Introduction This program generates a 2 k factorial design for up to seven factors. It allows the design to be blocked and replicated. The design rows may be output in standard or random order.

More information

Efficient Mining Algorithms for Large-scale Graphs

Efficient Mining Algorithms for Large-scale Graphs Efficient Mining Algorithms for Large-scale Graphs Yasunari Kishimoto, Hiroaki Shiokawa, Yasuhiro Fujiwara, and Makoto Onizuka Abstract This article describes efficient graph mining algorithms designed

More information

On the Robustness of Centrality Measures under Conditions of Imperfect Data

On the Robustness of Centrality Measures under Conditions of Imperfect Data On the Robustness of Centrality Measures under Conditions of Imperfect Data Stephen P. Borgatti Carroll School of Management Boston College borgatts@bc.edu Tel: (617) 552-0450 Fax: (617) 552-4230 Kathleen

More information

Alessandro Del Ponte, Weijia Ran PAD 637 Week 3 Summary January 31, Wasserman and Faust, Chapter 3: Notation for Social Network Data

Alessandro Del Ponte, Weijia Ran PAD 637 Week 3 Summary January 31, Wasserman and Faust, Chapter 3: Notation for Social Network Data Wasserman and Faust, Chapter 3: Notation for Social Network Data Three different network notational schemes Graph theoretic: the most useful for centrality and prestige methods, cohesive subgroup ideas,

More information

Qualitative Data Analysis Software. A workshop for staff & students School of Psychology Makerere University

Qualitative Data Analysis Software. A workshop for staff & students School of Psychology Makerere University Qualitative Data Analysis Software A workshop for staff & students School of Psychology Makerere University (PhD) January 27, 2016 Outline for the workshop CAQDAS NVivo Overview Practice 2 CAQDAS Before

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

RKWard: IRT analyses and person scoring with ltm

RKWard: IRT analyses and person scoring with ltm Software Corner Software Corner: RKWard: IRT analyses and person scoring with ltm Aaron Olaf Batty abatty@sfc.keio.ac.jp Keio University Lancaster University In SRB 16(2), I introduced the ever-improving,

More information

ACCOUNTING. Iowa State University

ACCOUNTING. Iowa State University Iowa State University 2016-2017 1 ACCOUNTING For undergraduate curriculum in business, major in The curriculum in accounting is accredited by AACSB International, the Association to Advance Collegiate

More information

Solving Systems of Equations Using Matrices With the TI-83 or TI-84

Solving Systems of Equations Using Matrices With the TI-83 or TI-84 Solving Systems of Equations Using Matrices With the TI-83 or TI-84 Dimensions of a matrix: The dimensions of a matrix are the number of rows by the number of columns in the matrix. rows x columns *rows

More information

California Core Performance Overview

California Core Performance Overview California Core Performance Overview 1. Generate a list of learners to follow-up using the TOPSpro Enterprise California Core Performance Wizard. a. In TE, go to Tools and click California Core Performance

More information

Application for Advancement to Senior Member and Fellow Status

Application for Advancement to Senior Member and Fellow Status Philosophy Application for Advancement to Senior Member and Fellow Status The purpose of the advancement program is to recognize those members who have provided substantial service and contributions to,

More information

ENGINEERING AND TECHNOLOGY MANAGEMENT

ENGINEERING AND TECHNOLOGY MANAGEMENT Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU

More information

Factors Affecting Adoption of Cloud Computing Technology in Educational Institutions (A Case Study of Chandigarh)

Factors Affecting Adoption of Cloud Computing Technology in Educational Institutions (A Case Study of Chandigarh) American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-7, Issue-3, pp-358-364 www.ajer.org Research Paper Open Access Factors Affecting Adoption of Cloud Computing

More information

MHPE 494: Data Analysis. Welcome! The Analytic Process

MHPE 494: Data Analysis. Welcome! The Analytic Process MHPE 494: Data Analysis Alan Schwartz, PhD Department of Medical Education Memoona Hasnain,, MD, PhD, MHPE Department of Family Medicine College of Medicine University of Illinois at Chicago Welcome! Your

More information

Random Generation of the Social Network with Several Communities

Random Generation of the Social Network with Several Communities Communications of the Korean Statistical Society 2011, Vol. 18, No. 5, 595 601 DOI: http://dx.doi.org/10.5351/ckss.2011.18.5.595 Random Generation of the Social Network with Several Communities Myung-Hoe

More information

Basics: How to Calculate Standard Deviation in Excel

Basics: How to Calculate Standard Deviation in Excel Basics: How to Calculate Standard Deviation in Excel In this guide, we are going to look at the basics of calculating the standard deviation of a data set. The calculations will be done step by step, without

More information

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov Algorithms and Applications in Social Networks 2017/2018, Semester B Slava Novgorodov 1 Lesson #1 Administrative questions Course overview Introduction to Social Networks Basic definitions Network properties

More information

Facilitating Social Network Studies of FLOSS using the OSSNetwork Environment

Facilitating Social Network Studies of FLOSS using the OSSNetwork Environment Facilitating Social Network Studies of FLOSS using the OSSNetwork Environment Marco A. Balieiro, Samuel F. de Sousa Júnior, and Cleidson R. B. de Souza Faculdade de Computação Universidade Federal do Pará

More information

Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations

Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations EURO 2016 POZNAN POLAND, 4 JULY 2016 Duncan A. Robertson and Leroy White Loughborough University, UK; Warwick Business

More information

Handling Weighted, Asymmetric, Self-Looped, and Disconnected Networks in ORA

Handling Weighted, Asymmetric, Self-Looped, and Disconnected Networks in ORA Handling Weighted, Asymmetric, Self-Looped, and Disconnected Networks in ORA Wei Wei, Jürgen Pfeffer, Jeffrey Reminga, and Kathleen M. Carley August, 2011 CMU-ISR-11-113 Institute for Software Research

More information

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation

More information

2 days. Certified UX & Usability Professional User Experience & Interaction Design with Lean UX & Agile UX

2 days. Certified UX & Usability Professional User Experience & Interaction Design with Lean UX & Agile UX 2 days Certified UX & Usability Professional User Experience & Interaction Design with Lean UX & Agile UX Description What to expect User experience has become the most important factor for designing successful

More information

Compound OR Probability

Compound OR Probability Compound OR Probability If two events, A and B are mutually exclusive, then P(A or B) = P(A) + P(B) If two events, A and B are inclusive, then P(A or B) = P(A) + (B) P(A and B) Where (A and B) are outcomes

More information

Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion

Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion References Social Network Social Network Analysis Sociocentric

More information

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017 THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS Summer semester, 2016/2017 SOCIAL NETWORK ANALYSIS: THEORY AND APPLICATIONS 1. A FEW THINGS ABOUT NETWORKS NETWORKS IN THE REAL WORLD There are four categories

More information

Social networks, social space, social structure

Social networks, social space, social structure Social networks, social space, social structure Pip Pattison Department of Psychology University of Melbourne Sunbelt XXII International Social Network Conference New Orleans, February 22 Social space,

More information

Package manet. September 19, 2017

Package manet. September 19, 2017 Package manet September 19, 2017 Title Multiple Allocation Model for Actor-Event Networks Version 1.0 Mixture model with overlapping clusters for binary actor-event data. Parameters are estimated in a

More information

Advance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP.

Advance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP. 2019 Advance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP. Get Started Today Be recognized as an industry leader. Distinguishing yourself

More information

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA What is GUIRR? Joint body of the NAS, NAE, and IOM Created in 1984 to convene senior-most representatives

More information

Rethinking Preferential Attachment Scheme: Degree centrality versus closeness centrality 1

Rethinking Preferential Attachment Scheme: Degree centrality versus closeness centrality 1 CONNECTIONS 27(3): 53-59 2007 INSNA http://www.insna.org/connections-web/volume27-3/ko.pdf Rethinking Preferential Attachment Scheme: Degree centrality versus closeness centrality 1 Kilkon Ko 2 University

More information

Generalized blockmodeling of sparse networks

Generalized blockmodeling of sparse networks Metodološki zvezki, Vol. 10, No. 2, 2013, 99-119 Generalized blockmodeling of sparse networks Aleš Žiberna 1 Abstract The paper starts with an observation that the blockmodeling of relatively sparse binary

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

Threat and Vulnerability Assessment Tool

Threat and Vulnerability Assessment Tool TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...

More information

Rockefeller College University at Albany

Rockefeller College University at Albany Rockefeller College University at Albany Problem Set #3: Visualizing Networks This problem set covers portions of the UCINET and related packages that are used to visualize network data. The following

More information

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE Second International Conference World of Construction Project Management 2007 Shin, Jae Won, Ryu, Han-Guk, Lee, Dong-Ryul CSRI, HanmiParsons Co., Ltd. INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 11/13/17 Jure Leskovec, Stanford CS224W: Analysis of Networks, http://cs224w.stanford.edu 2 Observations Models

More information

Using the NIST Framework for Metrics 5/14/2015

Using the NIST Framework for Metrics 5/14/2015 Using the NIST Framework for Metrics 5/14/2015 ITD - Public Safety Safety improvements reduced total crashes by 29% and injury crashes by 41% in corridors after GARVEE projects were completed Ads / Commercials

More information

Major Program Selection Information. Information Systems An enriching path of study and career

Major Program Selection Information. Information Systems An enriching path of study and career Major Program Selection Information Information Systems An enriching path of study and career BBA in Information Systems BBA-IS Our IS Alumni Chris Kam BBA(IS) Class of 2007 Graduate, HKUST Senior Manager,

More information

Two-dimensional Totalistic Code 52

Two-dimensional Totalistic Code 52 Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable

More information

Election Analysis and Prediction Using Big Data Analytics

Election Analysis and Prediction Using Big Data Analytics Election Analysis and Prediction Using Big Data Analytics Omkar Sawant, Chintaman Taral, Roopak Garbhe Students, Department Of Information Technology Vidyalankar Institute of Technology, Mumbai, India

More information

Fatigue Reliability Analysis of Dynamic Components with Variable Loadings without Monte Carlo Simulation 1

Fatigue Reliability Analysis of Dynamic Components with Variable Loadings without Monte Carlo Simulation 1 Fatigue Reliability Analysis of Dynamic Components with Variable Loadings without Monte Carlo Simulation 1 Carlton L. Smith., Chief Engineer, Structures and Materials Division, US Army, AMRDEC Redstone

More information

Network Topology Optimization Using Social Network Analysis

Network Topology Optimization Using Social Network Analysis Network Topology Optimization Using Social Network Analysis Prof. Dr. Siddeeq Y. Ameen Com puters & Information Technology Eng. Dept. University of Technology, Bag hdad, Iraq Asst. Lect. Alaa N. Al-Qeicy

More information

APES step-by-step manual Version 1.1.8; by Chantal Vögeli

APES step-by-step manual Version 1.1.8; by Chantal Vögeli APES step-by-step manual Version 1.1.8; by Chantal Vögeli Dear APES User This step-by-step manual is designed as an introduction to APES and is mainly aimed at beginners using APES for the first time.

More information

List of figures List of tables Acknowledgements

List of figures List of tables Acknowledgements List of figures List of tables Acknowledgements page xii xiv xvi Introduction 1 Set-theoretic approaches in the social sciences 1 Qualitative as a set-theoretic approach and technique 8 Variants of QCA

More information

1 Degree Distributions

1 Degree Distributions Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 3: Jan 24, 2012 Scribes: Geoffrey Fairchild and Jason Fries 1 Degree Distributions Last time, we discussed some graph-theoretic

More information

CHAPTER 4 METHODOLOGY AND TOOLS

CHAPTER 4 METHODOLOGY AND TOOLS CHAPTER 4 METHODOLOGY AND TOOLS 4.1 RESEARCH METHODOLOGY In an effort to test empirically the suggested data mining technique, the data processing quality, it is important to find a real-world for effective

More information

Decision Making Procedure: Applications of IBM SPSS Cluster Analysis and Decision Tree

Decision Making Procedure: Applications of IBM SPSS Cluster Analysis and Decision Tree World Applied Sciences Journal 21 (8): 1207-1212, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.21.8.2913 Decision Making Procedure: Applications of IBM SPSS Cluster Analysis

More information

PRINCE2 Practitioner Course Outline

PRINCE2 Practitioner Course Outline PRINCE2 Practitioner Course Outline 1 PRINCE2 Practitioner Program Overview PRINCE2 provides an easily tailored and scalable method for the management of all types of projects. This method is the de facto

More information

10. Documents and Data Models... and Modeling

10. Documents and Data Models... and Modeling 10. Documents and Data Models... and Modeling INFO 202-1 October 2008 Bob Glushko Plan for INFO Lecture #10 Modeling across the "Document Type Spectrum" Document models {and,or,vs} data models "Berkeley

More information

Dynamically Motivated Models for Multiplex Networks 1

Dynamically Motivated Models for Multiplex Networks 1 Introduction Dynamically Motivated Models for Multiplex Networks 1 Daryl DeFord Dartmouth College Department of Mathematics Santa Fe institute Inference on Networks: Algorithms, Phase Transitions, New

More information

Assessing Metadata Utilization: An Analysis of MARC Content Designation Use

Assessing Metadata Utilization: An Analysis of MARC Content Designation Use Assessing Metadata Utilization: An Analysis of MARC Content Designation Use William E. Moen , Penelope Benardino School of Library and Information Sciences, Texas Center

More information

The DataDude (MS Excel) and Documentation for users are available at: Contents

The DataDude (MS Excel) and Documentation for users are available at:   Contents 1 Dude, Where s My Data? UCB DataDude (v. 0.6.7) User Guide Center for Social Services Research University of California at Berkeley http://cssr.berkeley.edu/ Dude, Where s My Data? The University of California,

More information

VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk

VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18 ocr.org.uk Contents Introduction 1 Key to forms of assessment 1 Version control 2 1 Skills for Business 3 1.1 Administration (Business Professional) 3 1.2

More information

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems. Bachelor of Science in Information Technology At Purdue Global, we employ a method called Course-Level Assessment, or CLA, to determine student mastery of Course Outcomes. Through CLA, we measure how well

More information

Adapted and expanded from: Hanneman, Robert Introduction to Social Network Methods.

Adapted and expanded from: Hanneman, Robert Introduction to Social Network Methods. 1 UCINet Quick Guide Alicia Wassink LING534 Adapted and expanded from: Hanneman, Robert Introduction to Social Network Methods. http://faculty.ucr.edu/~hanneman/nettext/ Sections in this guide: 1. Getting

More information

Center for Effective Organizations

Center for Effective Organizations Center for Effective Organizations ORGANIZATIONAL COMMUNICATION NETWORKS CEO PUBLICATION G 07-15 (525) PETER MONGE Annenberg School for Communication Marshall School of Business University of Southern

More information

Discovering Roles and Anomalies in Graphs: Theory and Applications

Discovering Roles and Anomalies in Graphs: Theory and Applications Discovering Roles and Anomalies in Graphs: Theory and Applications Part 1: Theory Tina Eliassi-Rad (Rutgers) Christos Faloutsos (CMU) SDM'12 Tutorial Overview Features Roles Anomalies = rare roles Patterns

More information

Slide 1. Slide 2. The Need. Using Microsoft Excel

Slide 1. Slide 2.   The Need. Using Microsoft Excel Slide 1 Using Microsoft Excel to Collect and Analyze Using Microsoft Excel to Collect and Analyze California California Standards Standards Text Data Test Data Presented by: Michael Nunn CTAP Region 11

More information

Research on Social Relationship Network System based on MongoDB

Research on Social Relationship Network System based on MongoDB Research on Social Relationship Network System based on MongoDB Yingyan Long School of Educational Sciences Shaanxi University of Technology Han Zhong, Shaanxi, China Abstract The relationship between

More information

Making Tables and Figures

Making Tables and Figures Making Tables and Figures Don Quick Colorado State University Tables and figures are used in most fields of study to provide a visual presentation of important information to the reader. They are used

More information

Transitivity and Triads

Transitivity and Triads 1 / 32 Tom A.B. Snijders University of Oxford May 14, 2012 2 / 32 Outline 1 Local Structure Transitivity 2 3 / 32 Local Structure in Social Networks From the standpoint of structural individualism, one

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

PDF hosted at the Radboud Repository of the Radboud University Nijmegen PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is an author's version which may differ from the publisher's version. For additional information about this

More information

Making Privacy Operational

Making Privacy Operational Making Privacy Operational Introduction to the Privacy Management Reference Model John Sabo Director, Global Government relations CA, Inc. and President, ISTPA john.t.sabo@ca.com Michael Willett President,

More information

GETTING STARTED WITH THE STUDENT EDITION OF LISREL 8.51 FOR WINDOWS

GETTING STARTED WITH THE STUDENT EDITION OF LISREL 8.51 FOR WINDOWS GETTING STARTED WITH THE STUDENT EDITION OF LISREL 8.51 FOR WINDOWS Gerhard Mels, Ph.D. mels@ssicentral.com Senior Programmer Scientific Software International, Inc. 1. Introduction The Student Edition

More information

Sage Canadian SMB Survey on Mobile Devices March 2013

Sage Canadian SMB Survey on Mobile Devices March 2013 Sage Canadian SMB Survey on Mobile Devices March 2013 Summary Report Introduction Sage North America, a leading provider of business management software and services to more than 6 million small and midsized

More information

A Road Map for Advancing Your Career. Distinguish yourself professionally. Get an edge over the competition. Advance your career with CBIP.

A Road Map for Advancing Your Career. Distinguish yourself professionally. Get an edge over the competition. Advance your career with CBIP. TDWI Certification A Road Map for Advancing Your Career Distinguish yourself professionally. Get an edge over the competition. Advance your career with CBIP. www.tdwi.org/cbip TDWI s Certified Business

More information

The Network Analysis Five-Number Summary

The Network Analysis Five-Number Summary Chapter 2 The Network Analysis Five-Number Summary There is nothing like looking, if you want to find something. You certainly usually find something, if you look, but it is not always quite the something

More information

ABOUT PIVOTTABLES TABLE OF CONTENTS

ABOUT PIVOTTABLES TABLE OF CONTENTS University of Southern California Academic Information Services Excel 2007 - PivotTables ABOUT PIVOTTABLES PivotTables provide an excellent means of analyzing data stored in database format by rearranging

More information

1. All team members must be on record in the state and national offices as having paid dues by February 6.

1. All team members must be on record in the state and national offices as having paid dues by February 6. E-BUSINESS One critical element in a business success in today s global market is the ability to sell products and services to the consumer via the Internet. This event recognizes FBLA members who have

More information

Pilot Study for the WHOIS Accuracy Reporting System: Preliminary Findings

Pilot Study for the WHOIS Accuracy Reporting System: Preliminary Findings Pilot Study for the WHOIS Accuracy Reporting System: Preliminary Findings About the Pilot Study On 8 November 2012, in response to the Recommendations of the WHOIS Review Team convened under the Affirmation

More information

Sage ERP Accpac U.S. Payroll Versions, 5.5Q, 5.6M, and 6.0H Tax Update for January 31, 2012

Sage ERP Accpac U.S. Payroll Versions, 5.5Q, 5.6M, and 6.0H Tax Update for January 31, 2012 Sage ERP Accpac U.S. Payroll Versions, 5.5Q, 5.6M, and 6.0H Tax Update for January 31, 2012 Before You Install... 1 Important Update Installation Process Change... 1 Critical Product Update Requirements...

More information

Advisor Workstation Training Manual: Working in the Research Module

Advisor Workstation Training Manual: Working in the Research Module Advisor Workstation Training Manual: Working in the Research Module Overview of the Research module - - - - - - - - - - - - - - - - 1 What you will learn in this section - - - - - - - - - - - - - - - -

More information

Independent Assurance Statement

Independent Assurance Statement Independent Assurance Statement Scope and Objectives DNV GL Business Assurance USA, Inc. (DNV GL) was commissioned by Lockheed Martin Corporation (Lockheed Martin) to conduct independent assurance of its

More information

Analyzing Social Networks Detailed Instructions on the Examples in the Text. Section 2.2 Graphs Section 2.4 Adjacency Matrix...

Analyzing Social Networks Detailed Instructions on the Examples in the Text. Section 2.2 Graphs Section 2.4 Adjacency Matrix... Analyzing Social Networks Detailed Instructions on the Examples in the Text This gives the detailed commands required to reproduce all the examples in the text created using UCINET, E-Net and Netdraw.

More information

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased

More information