Welcome~

Welcome to my Ojibi house~

2012年3月15日星期四

Social Network Analysis


1. Describe briefly what is social network analysis(SNA)
A social network is a group of collaborating individuals or entities that are related to each other.
SNA(Social Network Analysis) is the study of the pattern of interaction between actors which focuses on the social actor and the relationship between the actors.
In SNA, Social network is formally defined as a set of social actors, or nodes, members that are connected by one or more types of relations. The units are most commonly individuals, groups or organizations, but in principle any units that can be connected to other units can be studied as nodes, such as web pages, blogs, emails, instant messages, families, journal articles, neighborhoods, classes, sectors within organizations, positions, or nations.

2. Example to explain the social network analysis
The following is a social network formed by 5 students.
(a). Describe the above social network according to your best knowledge.
It seems to be one mode network since the five people are of the same type. And this graph is a undirected graph. It consists a set of nodes and links. And the direction of a link is not presented, in which case the existence of a link between Alice and David necessarily implies the existence of a link from David to Alice.
I think acquaintances or friends can be the relation between them.
Alice knows Bob, Carol and David.
Bob knows Alice and David.
Carol knows Alice and David.
David knows Alice, Bob, Carol and Eva.
Eva only knows David.
The two people linked with each other know each other or they are friends or acquaintances.
Of course, the network or links can be some other kinds of relations which are undirected in social network.
(b). Within this social network, who is the most influential?
1). Present the network in a matrix:

Alice
Bob
Carol
David
Eva
Alice
-
1
1
1
0
Bob
1
-
0
1
0
Carol
1
0
-
1
0
David
1
1
1
-
1
Eva
0
0
0
1
-
It seems that David have the most connection in this network.
2). Density:
Density of the network:
3). Centrality
Centrality identify which nodes are in the center of the network.
Degree Centrality: Degree centrality is the sum of all other actors who are directly connected to the actor in concern.
According to the definition:


Degree Centrality
Alice
0.75
Bob
0.5
Carol
0.5
David
1
Eva
0.25
Closeness Centrality: Closeness represents the mean of the geodesic distances between some particular node and all other nodes connected with in. Describes the average distances between one node and all other nodes connected with it.
According to the definition:

Closeness Centrality
Alice
0.8
Bob
0.67
Carol
0.67
David
1
Eva
0.57
Betweenness Centrality: It is a measure of the potential for control as an actor who is high in betweenness is able to act as a gatekeeper controlling the flow of resources (information, money, power, e.g.) between the alters that he or she connects.
According to the definition:

Betweenness Centrality
Alice
0.17
Bob
0
Carol
0
David
0.83
Eva
0
After the comparison, we can find that the value for David whether it is in the degree centrality, closeness centrality or betweenness centrality is bigger than the other four people. David has the most connections with the other four people. If you want to transmit some information in this network, the best way is to transmit the information through David in most case. Besides, David functions as a gatekeeper who can control the flow of information etc in this network. If you want to control this network, the best way is to control David.
(c). Findings and implications based on the data.
Except the information that David is the key node in this network, we can find Eva is almost an isolate node except the connection with David. Information etc can be transmitted without passing through Bob, Carol and Eva. Bob and Carol seem to be not so important in this network except Eva.
If this is a relationship network, we can find that David and Alice might be more outgoing and easygoing. They have more friends and they can get more information. David might be the head of the group. Eva might be shy who will not make friends with strangers easily.
If this is a social network on the Internet, twitter for instance, we can guess the information on David’s or Alice’s homepage must be more interesting than the others. They have higher reputation than the others. And they must log on the website frequently. Eva might just simply register on the website and forget about it after that. David and Alice is more active in this social network. And you can get more information about all the five people and even make friends with them through David if you also have connection with David. This is the fastest way to get into this network.

6 条评论:

  1. Your blog is very clear. I think if you put the table in the middle it will be better. I like your comments of section c. That means you know what SNA is and what SNA can do. And this promote me to think another thing, the security of social networking. For we can have so much information with SNA, the security seems to face more challenge than ever.What is about your opion?

    回复删除
  2. Yes, I have got your advice. Thanks a lot!
    About the security, I think the surfers should have more ethic concepts and related laws should be set. Technical methods should be carried out by both the website and the users to protect the privacy or something. But the most important thing is surfers are required to protect themselves. Not all the things about himself/herself can be posted on the Internet. We cannot stop the propagation of the information since it is already a information age. But everyone should take responsible for himself/herself.
    About the SNA, I have read many more information at another blog http://wudonghao.blogspot.com/.
    And I have just found out that the mouse can add food for the fish and the fish will get concentrate after talking with you yesterday. Ya~It's really funny and cute.

    回复删除
  3. It's really hard to post the equations, right? Anyway, you have done a good job. The security issues are very impressive. Also about your comment, it's really interesting~~~~

    回复删除
    回复
    1. Thank you for your praise. With a tool named Mathtype, equations can also be easily to post just for a recommendation.^^

      删除
  4. Thanks for your sharing many tips. The Facebook Application Password is a new thing to me, but I think we shouldn't just rely on the sites to help us. I think the most important way to handle social networking threats is to raise the user awareness like following the tips you have mentioned. I think there is totally no way to get the security awareness currently in many places like Hong Kong. Perhaps more education should have been done.

    回复删除
  5. well calculations and if there's the compare of the 3 method,will be better.

    回复删除