Definition: Implications: Analysis:

Similar documents
Two mode Network. PAD 637, Lab 8 Spring 2013 Yoonie Lee

UCINET Quick Start Guide

Study of Data Mining Algorithm in Social Network Analysis

Rockefeller College University at Albany

Integrating Venue-Based Social Network Analysis and Geographic Information System Analysis to Guide Targeted HIV Prevention

Blockmodels/Positional Analysis : Fundamentals. PAD 637, Lab 10 Spring 2013 Yoonie Lee

A Short Introduction To Social Network Analysis Dr. Mishari Alnahedh Kuwait University College of Business Administration

3. LABOR CATEGORY DESCRIPTIONS

University of Kentucky Gatton College of Business. Archival Data. Scott Soltis 2016 Links Workshop Lexington, Kentucky

Clique Graphs and Overlapping Communities

Mathematical Concepts and Representation of Social Networking Health Site

Advancement Application

Analysis and visualization with v isone

arxiv:cond-mat/ v1 [cond-mat.other] 2 Feb 2004

1 of :22

BUILT FOR THE STORM. AND THE NORM.

[Rani, 5(7): July 2018] ISSN DOI /zenodo Impact Factor

PROFESSIONAL MASTER S IN

2.2. Data Format Save as UCINET files in Netdraw Import from VNA format Node Level Analysis Degree...

Creating a Cybersecurity Culture: (ISC)2 Survey Responses

ECO ECONOMICS DEPARTMENT CURRICULUM MAP Page 1

Community Detection in Bipartite Networks:

Blackboard 9 - Creating Categories in the Grade Center

A Complement-Derived Centrality Index for Disconnected Graphs 1

Two-Level Designs. Chapter 881. Introduction. Experimental Design. Experimental Design Definitions. Alias. Blocking

Efficient Mining Algorithms for Large-scale Graphs

On the Robustness of Centrality Measures under Conditions of Imperfect Data

Alessandro Del Ponte, Weijia Ran PAD 637 Week 3 Summary January 31, Wasserman and Faust, Chapter 3: Notation for Social Network Data

Qualitative Data Analysis Software. A workshop for staff & students School of Psychology Makerere University

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

RKWard: IRT analyses and person scoring with ltm

ACCOUNTING. Iowa State University

Solving Systems of Equations Using Matrices With the TI-83 or TI-84

California Core Performance Overview

Application for Advancement to Senior Member and Fellow Status

ENGINEERING AND TECHNOLOGY MANAGEMENT

Factors Affecting Adoption of Cloud Computing Technology in Educational Institutions (A Case Study of Chandigarh)

MHPE 494: Data Analysis. Welcome! The Analytic Process

Random Generation of the Social Network with Several Communities

Basics: How to Calculate Standard Deviation in Excel

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov

Facilitating Social Network Studies of FLOSS using the OSSNetwork Environment

Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations

Handling Weighted, Asymmetric, Self-Looped, and Disconnected Networks in ORA

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

2 days. Certified UX & Usability Professional User Experience & Interaction Design with Lean UX & Agile UX

Compound OR Probability

Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017

Social networks, social space, social structure

Package manet. September 19, 2017

Advance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP.

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA

Rethinking Preferential Attachment Scheme: Degree centrality versus closeness centrality 1

Generalized blockmodeling of sparse networks

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

Threat and Vulnerability Assessment Tool

Rockefeller College University at Albany

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

CS224W: Analysis of Networks Jure Leskovec, Stanford University

Using the NIST Framework for Metrics 5/14/2015

Major Program Selection Information. Information Systems An enriching path of study and career

Two-dimensional Totalistic Code 52

Election Analysis and Prediction Using Big Data Analytics

Fatigue Reliability Analysis of Dynamic Components with Variable Loadings without Monte Carlo Simulation 1

Network Topology Optimization Using Social Network Analysis

APES step-by-step manual Version 1.1.8; by Chantal Vögeli

List of figures List of tables Acknowledgements

1 Degree Distributions

CHAPTER 4 METHODOLOGY AND TOOLS

Decision Making Procedure: Applications of IBM SPSS Cluster Analysis and Decision Tree

PRINCE2 Practitioner Course Outline

10. Documents and Data Models... and Modeling

Dynamically Motivated Models for Multiplex Networks 1

Assessing Metadata Utilization: An Analysis of MARC Content Designation Use

The DataDude (MS Excel) and Documentation for users are available at: Contents

VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.

Adapted and expanded from: Hanneman, Robert Introduction to Social Network Methods.

Center for Effective Organizations

Discovering Roles and Anomalies in Graphs: Theory and Applications

Slide 1. Slide 2. The Need. Using Microsoft Excel

Research on Social Relationship Network System based on MongoDB

Making Tables and Figures

Transitivity and Triads

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

Making Privacy Operational

GETTING STARTED WITH THE STUDENT EDITION OF LISREL 8.51 FOR WINDOWS

Sage Canadian SMB Survey on Mobile Devices March 2013

A Road Map for Advancing Your Career. Distinguish yourself professionally. Get an edge over the competition. Advance your career with CBIP.

The Network Analysis Five-Number Summary

ABOUT PIVOTTABLES TABLE OF CONTENTS

1. All team members must be on record in the state and national offices as having paid dues by February 6.

Pilot Study for the WHOIS Accuracy Reporting System: Preliminary Findings

Sage ERP Accpac U.S. Payroll Versions, 5.5Q, 5.6M, and 6.0H Tax Update for January 31, 2012

Advisor Workstation Training Manual: Working in the Research Module

Independent Assurance Statement

Analyzing Social Networks Detailed Instructions on the Examples in the Text. Section 2.2 Graphs Section 2.4 Adjacency Matrix...

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Transcription:

Analyzing Two mode Network Data Definition: One mode networks detail the relationship between one type of entity, for example between people. In contrast, two mode networks are composed of two types of entities. These entities could be people and teams or people and organizations. Two mode networks summarize the association between one entity and another, for example, the teams that individuals are members of. For this reason, two mode networks are often called affiliation networks. They can also be called bipartite networks. Implications: Gathering data on two mode networks, such as people and teams, can be a quick way of understanding the web of relationships in an organization. You can use this data as a proxy for employee employee relationships. However, caution must be taken when using two mode data in large teams or teams that evolve over time because not every person on a given team may know one another. In addition, individuals have ties that are outside their teams. Data comprising employee affiliations with teams can be useful in itself. It can highlight which teams (and the individuals in the teams) are central in the network and hence influential. It can also highlight which teams and individuals are playing broker roles within an organization. Analysis: Two mode data can be visualized and analyzed in several ways. It can be visualized so that ties between an individual and teams make up the structure of the network. UCINET also has some specific analysis routines for two mode data. Two mode data can be made into square matrices called bipartite networks, which allows for all the analysis routines in UCINET to be used. Finally two mode networks can be reduced to one mode of teams teams or employees employees. Each of these options is detailed in the following sections.

Visualizing Two mode Networks Visualizing two mode data in Netdraw In this analysis, we are going to visually examine our two mode network. The Excel spreadsheet below shows individuals who are members of teams. Notice the names of the respondents are in the first column and the team names are along the first row. Step 1. Load the network into UCINET the same way that you would any network. Name the file Teams. In Netdraw, File > Open > UCINET dataset > 2 Mode network. Then select the Teams file and press OK. In the network diagram, the teams are the blue squares and the individuals are the red circles. There is obvious clustering by team, with Team 6 connecting the two subgroups together.

Analyzing Two mode Networks Analyzing two mode data in UCINET Step 1. Network > 2 Mode networks > 2 Mode Centrality. Step 2. Select the Teams network and press OK. This routine produces normalized scores based upon the maximum possible value. The people with scores of 0.267 have the most ties. The most central team is team 5, with 0.283. Note that Team 6 (the one on the center of the network diagram) has the highest betweenness score.

Analyzing Two mode Networks Analyzing two mode data in UCINET We cannot run all the analytical measures in UCINET on two mode data because the matrix is not square. To create a square matrix, we need to run the bipartite function. This function adds the names of the teams to the rows and the names of the people to the columns. Step 1. Transform > Graph Theoretic > Bipartite Step 2. Select the Teams network and press OK. Step 3. Once you have constructed your bipartite dataset, you can analyze it the same way as other networks. The interpretation of the findings, however, needs to take into account that the data has two modes. Analysis 1. Degree centrality. Network > Centrality and Power > Degree. In the input network box type Teams Bip or click and select the Teams Bip network. Analysis 2. Brokerage (betweenness). Network > Centrality and Power > Freeman Betweenness > Node Betweenness. Degree Centrality Betweenness

Creating One mode Networks from Two mode Networks Creating one mode networks from two mode data Sometimes it may be useful to transform two mode data into one mode data. For example in our teams network, you can create a one mode network of ties between individuals where the ties represent being part of the same team. Step 1. Data > Affiliations (2 mode to 1 mode) Step 2. Select the Teams network, then under mode select the rows button, then press OK. In the new network, each value represents the number of teams each pair of people works on together. For most of the analysis in UCINET, you would need to dichotomize the data. You can also visualize the data in Netdraw in the usual way. In the diagram on the right, the width of the ties indicates the number of shared teams each pair of people are on using the properties > lines > size > tie strength option.

Bibliography Methodological papers and books: Borgatti, S. P., & Everett, M. G. 1997. Network analysis of 2 mode data. Social Networks, 19(3), 243 269. Borgatti, S. P., Everett, M. G., & Johnson, J. C. 2013. Analyzing Social Networks. Los Angeles, CA: Sage. Borgatti, S. P., & Halgin, D. S. 2011. Analyzing affiliation networks. The SAGE Handbook of Social Network Analysis, 417 433. Hanneman, R. A., & Riddle, M. 2005. Introduction to social network methods. University of California, Riverside. Published in digital form at http://faculty.ucr.edu/~hanneman/nettext/. Wasserman, S., & Faust, K. 1994. Social Network Analysis: Methods and Applications. Cambridge, United Kingdom: Cambridge University Press. Empirical and conceptual papers: Breiger, R. 1974. The duality of persons and groups. Social Forces 53:181 190. Cattani, G., Ferriani, S., Negro, G., & Perretti, F. 2008. The structure of consensus: Network ties, legitimation, and exit rates of US feature film producer organizations. Administrative Science Quarterly, 53(1), 145 182. Davis, A., B. B. Gardner and M. R. Gardner. 1941. Deep South: A Social Anthropological Study of Caste and Class. Chicago: University of Chicago Press. Hoppe, B., & Reinelt, C. 2010. Social network analysis and the evaluation of leadership networks. Leadership Quarterly, 21(4), 600 619. Robins, G., & Alexander, M. 2004. Small worlds among interlocking directors: Network structure and distance in bipartite graphs. Computational & Mathematical Organization Theory, 10(1), 69 94. Snijders, T. A., Lomi, A., & Torló, V. J. 2013. A model for the multiplex dynamics of two mode and one mode networks, with an application to employment preference, friendship, and advice. Social Networks, 35(2), 265 276. Andrew Parker, PhD, is a visiting professor at the University of Kentucky. He has conducted network analysis in over 100 multinational organizations and government agencies. He was a Senior Consultant at IBM s Institute for Knowledge Management, a research fellow at the Network Roundtable at the University of Virginia as well as an advisor to the Knowledge and Innovation Network at Warwick Business School. His research has appeared in Science, Organization Studies, Journal of Applied Psychology, Journal of Applied Behavioral Science, Social Networks, Management Communication Quarterly, Sloan Management Review, Organizational Dynamics and California Management Review. He is also the co author of The Hidden Power of Social Networks. He received his PhD from Stanford University.