Covert Networks: Theories and Applications of Network Analysis Gemma Edwards, Kathryn Oliver, Martin Everett, Nick Crossley, Johan Koskinen, Chiara Broccatelli.

Slides:



Advertisements
Similar presentations
Critical Reading Strategies: Overview of Research Process
Advertisements

Critical Reading Strategies: Overview of Research Process
Social Network Analysis (in 10 minutes) Nick Crossley.
Effect of cellular telephone conversations and other potential interference on reaction time in a braking response Patrick Wesonga Louis Hironem.
Research Methods in Crime and Justice
CHAPTER 1 Practical Business Research. A working definition: Any systematic attempt at collecting and interpreting data and evidence in order to inform.
GROUNDED THEORY © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON.
Literature review Cindy Wee Te Puna Ako Learning centre.
Social Research Methods
Objectives of the meeting Francesc Pedró. 2 Objectives of the NML Project  Demand side:  Define and observe what and who NML are  Compare their emergence.
Covert network data: a typology of effects, processes, practices and structures Kathryn Oliver, Gemma Edwards, Nick Crossley, Johan Koskinen, Martin Everett.
Culture and psychological knowledge: A Recap
METHODOLOGIES EXPLAINED How to Conduct Systematic Political Research 1.
Evaluation Adam Bodnar CPSC 533C Monday, April 5, 2004.
Challenges for the Natural and Social Sciences David Chandler and Wyn Grant Working Together Across Disciplines.
All a Question of Fun How can primary research into how videogames engage support design practice? John Salisbury Interaction Design Centre Middlesex University.
SOCI 380 INSTRUCTIONS RE. RESEARCH PAPER DUE DATE: The research paper is due on the last day of class You are required to write and submit a detailed research.
Genetic Factors Predisposing to Homosexuality May Increase Mating Success in Heterosexuals Written by Zietsch et. al By Michael Berman and Lindsay Tooley.
1 Meta-analysis issues Carolyn Mair and Martin Shepperd Brunel University, UK.
1 Instructor: Vincent Duffy, Ph.D. Associate Professor of IE Lab 1 – Part 1 Review - Lifelong Learning Fri. Feb. 2, 2007 IE 486 Work Analysis & Design.
By the end of this chapter you will be able
©2007 Prentice Hall Organizational Behavior: An Introduction to Your Life in Organizations Chapter 19 OB is for Life.
RESEARCH QUESTIONS, AIMS AND OBJECTIVES
How to Conduct Systematic Political Research
RESEARCH A systematic quest for undiscovered truth A way of thinking
DR. AHMAD SHAHRUL NIZAM ISHA
Evidence-Based Practice Current knowledge and practice must be based on evidence of efficacy rather than intuition, tradition, or past practice. The importance.
Margaret J. Cox King’s College London
Evidence based research in education Cathy Gunn University of Auckland.
Quality school library – how do we find out? Polona Vilar Department of LIS&BS, Faculty of Arts, University of Ljubljana, SLO Ivanka Stričević Department.
Evaluation of software engineering. Software engineering research : Research in SE aims to achieve two main goals: 1) To increase the knowledge about.
Cross-Cultural Research Methods. Methodological concerns with Cross-cultural comparisons  Equivalence  Response Bias  Interpreting and Analyzing Data.
Wasanthi Madurapperuma Social Network of Entrepreneurs & Small Business Growth Related Literature & Research Gap Unit of Analysis - Small Retail Businesses.
Networks & Organization Session 1: Introduction Instructor: Christopher Wheat.
Using SNA to address real-life issues, create impact and engage non- academic stakeholders Daniela D’Andreta Warwick Business School / Mitchell Centre.
ADV RESEARCH DESIGN AND ANALYSIS LAB Reading Scientific Articles.
Johan Brink November 7th Research Methods
The Literature Search and Background of the Problem.
Experimental Research Methods in Language Learning Chapter 1 Introduction and Overview.
MANAGING YOUR LITERATURE CRITICALLY “ A self-reflection on doing research” Dr. Norhalimah Idris D06 – – /013 –
Research Concepts: Principles version 2.0
What grounded theory is not
Dr Anna Tarrant School of Sociology and Social A strategy for exploring men’s care responsibilities in low-income.
Factors Related to Students’ Interest in Science Learning Kostas Dimopoulos, Assistant Professor, Dept of Social and Educational Policy, University of.
Research Concepts. Agenda Research Basics What research is and is not Where research comes from Research deliverables Methodologies Research process Quantitative.
Susan O’Shea The Mitchell Centre for Social Network Analysis CCSR/Social Statistics, University of Manchester
Dr Anna Tarrant School of Sociology and Social A methodological strategy for working effectively across qualitative.
The Research Process.  There are 8 stages to the research process.  Each stage is important, but some hold more significance than others.
Writing a literature review, Stewart McKinney,2008.
Evidence-Based Practice Evidence-Based Practice Current knowledge and practice must be based on evidence of efficacy rather than intuition, tradition,
How to Organize Findings, Results, Conclusions, Summary Lynn W Zimmerman, PhD.
PSY 219 – Academic Writing in Psychology Fall Çağ University Faculty of Arts and Sciences Department of Psychology Inst. Nilay Avcı Week 9.
URBDP 591 A Lecture 16: Research Validity and Replication Objectives Guidelines for Writing Final Paper Statistical Conclusion Validity Montecarlo Simulation/Randomization.
A. Strategies The general approach taken into an enquiry.
What is Research?. Intro.  Research- “Any honest attempt to study a problem systematically or to add to man’s knowledge of a problem may be regarded.
Developing Smart objectives and literature review Zia-Ul-Ain Sabiha.
The application of mixed method in developing a cyber terrorism framework Presented By:- Ajay Kumar Koduri Bhavana Atluri Manasa Sutram Shaayendra Raju.
Studying at a Danish University JANUARY 2011 Henrik Bødker, Phd. Associate Professor, Director Department of Information and Media Studies & Centre for.
Research Methods in Business and Economics3 Jan Brzozowski, PhD.
Comments: CEO hedging opportunities and the weighting of performance measures in compensation.
PSY 405 Week 1 Individual Introduction to Personality Paper Prepare a 1,050- to 1,400-word paper in which you examine personality theory. Address the following.
Introduction paragraph – what looking to investigate.
Academic Writing Skills
The University of Manchester
MASTER’S RESEARCH GUIDELINES
The Steps into creation of research
Self-Critical Writing:
The University of Manchester
Social Research Methods
Features of a Good Research Study
Presentation transcript:

Covert Networks: Theories and Applications of Network Analysis Gemma Edwards, Kathryn Oliver, Martin Everett, Nick Crossley, Johan Koskinen, Chiara Broccatelli Mitchell Centre for Social Network Analysis University of Manchester UK

Collecting and Analyzing Covert Social Network Data (Leverhulme Project, ) Increased interest in studying ‘covert networks’ (dark, underground, clandestine) using SNA, but many unresolved substantive and methodological questions: -Not least questions about the concept itself: ‘secrecy’ as the defining feature, but secrecy of what? From whom? When? -What makes a network ‘covert’, and how covertness is achieved, varies and demands sociological attention -Terrorist networks and criminal networks are prime examples, but many others (from social movements to swingers) Aim to create an archive of covert network datasets and then use it for theoretical exploration, empirical analysis, and methodological development

Why? Accepted that covertness affects network structure. But lack of empirical evidence for many claims made about the structure and dynamics of covert networks: – Importance of pre-existing ties – Networks by design – A secrecy-efficiency trade off (Crossley, Edwards et al 2012) And some of the central structural properties are contended: – (degree) Centralized or decentralized? – Dense or sparse? The variability of claims also suggests that our ability to generalize about covert networks and interpret results from specific datasets is weak, and that there is a further need for comparison with ‘overt’ cases

Centralisation Author’s interpretation

Density

Methodological development and challenges A need to address key methodological questions and challenges posed by covert network data: – If/how different from ‘overt’ networks? – How can data be collected and quality issues be addressed? – Do we need new SNA methods/measures to analyse covert networks? – Can covert networks be identified through certain properties? – How can we deal with acute problems of boundary specification, partial and missing data? – What statistical models could be developed to help academics and practitioners deal with these issues? Hope to provide some answers, but also a useful reflection on, and assessment of, the methodological challenges of working with covert network data

What we have done so far… Started to unpack and operationalize ‘covertness’ as a set of variables that can be used in generating hypotheses about structural properties (absorption, aims, actions, consequences, segregation) Identified over 200 hypotheses in existing literature about covert networks Collated and cleaned over 50 covert network datasets (some our own, most from other studies freely available / provided by authors) SNA on datasets is just beginning…

Thanks! For more information and resources visit our project website: earch/research-centres-and-networks/mitchell- centre/our-research/covert-networks/ The following will shortly be available on the website: Working paper: Oliver. K (2014) ‘Covert network data: a typology of effects, processes, practices and structures’ List of the covert network datasets currently in the archive