Another refers to methods used to analyze social networks, social structures made up of individuals , which are connected by one or more specific types.
Social network analysis views social relationships in terms of network theory consisting of nodes and ties . Nodes are the individual actors within the networks, and ties are the relationships between the actors. In its simplest form, a social network is a map of specified ties, such as friendship, between the nodes being studied. The nodes to which an individual is thus connected are the social contacts of that individual.
So, when it comes to the question in the example, we first briefly describe the simple social network in the following chart:
Alice
|
Bob
|
Carol
|
David
|
Eva
| |
Alice
|
-
|
1
|
1
|
1
|
0
|
Bob
|
1
|
-
|
0
|
1
|
0
|
Carol
|
1
|
0
|
-
|
1
|
0
|
David
|
1
|
1
|
1
|
-
|
1
|
Eva
|
0
|
0
|
0
|
1
|
-
|
Within the question about who is the most influential point, we can easily see that from the picture and chart that David is, but what is the standard to do the determine?
We have several methods to measure a social network, different methods give us different point of view about that special social network. We learned from the lecture that we have degree, density, geodesic distance and centrality to measure the social network.
Define influence range of ni as the set of actors who are reachable from ni
Define Ji as the number of actors in the influence range of actor i (excluding i itself)
An “improved” actor-level centrality closeness index considers how proximate ni is to the actors in its influence range
A refined closeness centrality (for both directional and nondirectional) is
This index is a ratio of the fraction of the actors in the group who are reachable, to the average distance that these actors are from the actor ni
So, we can easily computing the results in the following chart:
Alice
|
0.75
|
Bob
|
0.5
|
Carol
|
0.5
|
David
|
1
|
Eva
|
0.25
|
From the result, we take David as the most influence node in this social network.
But we should also keep in mind is that: is it a good way to measure this example in that way? The answer is no!
we have one reason that in this example, we have no distance meaning, so the computing result may have not show the result correctly.
So we turn to other ways to do the research: centrality.
We have three centralities: Degree, Betweenness,Closeness. To define which to use, we first see the differences between them:
Degree Centrality:It signifies activity or popularity
Betweenness Centrality: It is a measure of the potential for control as an actor who is high in “betweenness” is able to act as a gatekeeper controlling the flow of resources (information, money, power, e.g.) between the alters that he or she connects.
Closeness Centrality: Can be understood as how long does it take for a message to spread inside the network from a particular node
Backing to our question, we found that the degree centrality is the best to fit the question, so using this to compute, we have the following results:
Alice
|
3
|
Bob
|
2
|
Carol
|
2
|
David
|
4
|
Eva
|
1
|
According to the above resulted are obtained, I found the following findings:
1. Different social networks may have different characteristics, if we want to know furture about it, the metheds we use to do the research should follow the special characteristics, though sometimes the results maybe the same.
2.One same social network, using different methods may lead to different results, this is quiet normal.
3.Due to the limition of one social network, some notion of the methods may have no meaning, such as the distance in the example.
4. We can do one research in the social netork by using different assumptions, may have differnet results, this is the same as view one thing in differnet views.
5. As we can easily see that the cutpoint is David and the bridge is the tie between David and Eva, so we can draw a conclusion: the most influence point maybe or near the cutpoint or the bridge.
Reference:
http://www.orgnet.com/sna.html
http://en.wikipedia.org/wiki/Social_network_analysis


I think your result of closeness centrality is wrong, I guess you have a mistake of influence range; in this case, the influence range of all are 4. My result is: A: 4/5; B: 2/3; C: 2/3; D: 1; E: 4/7
回覆刪除Thanks for your advise, you may not read the article all, so you miss my rules about the picture.The result is according to my assumptions. How you compute the result may have reasones with your opinion.
刪除But considering the typical circumstance, I think your assumption can hardly be tenable. If Alice and Eva both know David, there could not be no connection between them, especially the example is a very small group.
回覆刪除Maybe I should made a more detail about the picture, and I think the picture may have different results if we take different views.Thanks for your adivses.
刪除yeah, it is a good blog. you not only give us the formulas, but also their principles, the most important thing is that you give us the descriptions behind those numbers.
回覆刪除But I think you may make some mistakes in your calculation.Ji=4 for every node, so the numerator of the formula should equals 1 always. And the Ji in the denominator makes your result 4 times to the result of Wu donghao. So they should be 16/5, 8/3, 8/3, 4 and 16/7,respectively.
Thanks for your advise,and I think I have already introduced to you in face, so you may already konw the concept. If there is any pother mistakes, please let me know.
刪除Yes,I strongly agree that it will lead different results and opinions if we use different ways to analysis it and seen from different social aspects even with the same social network.Social network is the reflection of the real society,we can get knowledge or inspirations from SNA.We can use what we know about the social network to improve or design new social network or to help solve real problems in society.
回覆刪除That's a great idea, but actually in reality, the world is not running to this approach. You know password management is a indeed headache to many company and users. The world trend is going to a single sign on approach, one id for all accounts. Therefore, well you can of cox add an application password, but a password is still a password which is crackable. Therefore instead, may be the approach is to create a user identifiable authentication method to this, say like some biometric feature authentication methods instead of lower the user experience in using the social network
回覆刪除It is great to see a different view to consider the problem. You attempt makes sense.
回覆刪除you not only use degree centrality to draw the conclusion,and explained why you choose the method.Although not fully agree,I'm inspired a lot.
回覆刪除