Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’? Burt: Structural Holes What are they? What do they do? How do.

Slides:



Advertisements
Similar presentations
Social Network Analysis (in 10 minutes) Nick Crossley.
Advertisements

The two faces of control – Martin Gargiulo Martin Gargiulo INSEAD The Two Faces of Control Network Closure and Bonuses among Investment Bankers.
SOCIAL CAPITAL Social Capital Resources accruing to an ego actor through direct and indirect relations with its alters that facilitate ego’s attainment.
Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale Network Theory: Computational Phenomena and Processes Social Network.
Network Matrix and Graph. Network Size Network size – a number of actors (nodes) in a network, usually denoted as k or n Size is critical for the structure.
Experiments and Variables
Social Network Measures for “Nosduocentered” Networks, their Predictive Power on Performance. Lluís Coromina, Jaume Guia i Germà Coenders Universitat de.
Λ14 Διαδικτυακά Κοινωνικά Δίκτυα και Μέσα Strong and Weak Ties Chapter 3, from D. Easley and J. Kleinberg book.
Introduction to Social Network Analysis Lluís Coromina Departament d’Economia. Universitat de Girona Girona, 18/01/2005.
Using the Crosscutting Concepts As conceptual tools when meeting an unfamiliar problem or phenomenon.
Feb 20, Definition of subgroups Definition of sub-groups: “Cohesive subgroups are subsets of actors among whom there are relatively strong, direct,
CONNECTIVITY “The connectivity of a network may be defined as the degree of completeness of the links between nodes” (Robinson and Bamford, 1978).
Corporate social networks. "The Intranet tends to follow trends from the web, and social networking is no exception" [Nielsen Normal Group 2009]
Psychology 202b Advanced Psychological Statistics, II February 22, 2011.
Correlation and Autocorrelation
Centrality and Prestige HCC Spring 2005 Wednesday, April 13, 2005 Aliseya Wright.
The Simple Regression Model
Food for thought A central problem in organizational change is that “the whole burden of change typically rests on so few people. In other words, the number.
Chapter 3 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Measures Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Measures Klout.
Social Networks Lecture 4: Collection of Network Data & Calculation of Network Characteristics U. Matzat.
Social Networks Corina Ciubuc.
Social Network Analysis Tutorial
Sunbelt XXIV, Portorož, Pajek Workshop Vladimir Batagelj Andrej Mrvar Wouter de Nooy.
Infrastructure of MANETs  MANETS are without a fixed infrastructure  Network Graphs in MANETS are rarely or ever connected  MANET routing protocols.
Chapter Twelve Census: Population canvass - not really a “sample” Asking the entire population Budget Available: A valid factor – how much can we.
Chapter 5 Entity–Relationship Modeling
Wasanthi Madurapperuma Social Network of Entrepreneurs & Small Business Growth Related Literature & Research Gap Unit of Analysis - Small Retail Businesses.
Social Network Analysis: A Non- Technical Introduction José Luis Molina Universitat Autònoma de Barcelona
Study Questions: 1) Define biology and science.. Study Questions: 1)Define biology and science. - Biology: The scientific study of living systems - Science:
Chapter 9 : SOCIAL NETWORKS Learning Objectives  Understand the social network vocabulary  Know why social networks and networking are valuable  Learn.
Principles of Social Network Analysis. Definition of Social Networks “A social network is a set of actors that may have relationships with one another”
1 The Spatial Dimension of Social Capital: An Exploration Zong-Rong Lee 李宗榮 Institute of Sociology Academia Sinica Taipei, Taiwan.
Centrality in undirected networks These slides are by Prof. James Moody at Ohio State.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Local Networks Overview Personal Relations: GSS Network Data To Dwell Among Friends Questions to answer with local network data Mixing Local Context Social.
Digital Image Processing CCS331 Relationships of Pixel 1.
School of Information University of Michigan Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution.
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Example: Network Formation and Strategic Firm Behaviour to Explore and Exploit Müge Özman Institut Telecom Telecom & Management SudParis DIMETIC 2009 Strasbourg.
Susan O’Shea The Mitchell Centre for Social Network Analysis CCSR/Social Statistics, University of Manchester
61 6. Determining IS Strategy Overview of IS planning process Framework for IS planning process Appraise IS relationship to business Determine short-term.
Social Capital and Innovative Performance in Developing Countries. The Case of Ugandan Entrepreneurs Gerrit Rooks Eindhoven University/ Makerere University.
SOCIAL CAPITAL Social Capital Resources accruing to an ego actor through direct & indirect relations with its alters that facilitate ego’s attainment of.
Social Sub-groups Overview Substantive papers: Wayne Baker Social structure in a place where there should be none Scott Feld What causes clustering in.
Online Social Networks and Media
Comparing Counts.  A test of whether the distribution of counts in one categorical variable matches the distribution predicted by a model is called a.
Centrality in Social Networks Background: At the individual level, one dimension of position in the network can be captured through centrality. Conceptually,
Chapter Seventeen. Figure 17.1 Relationship of Hypothesis Testing Related to Differences to the Previous Chapter and the Marketing Research Process Focus.
1 Network Models Transportation Problem (TP) Distributing any commodity from any group of supply centers, called sources, to any group of receiving.
Hierarchy Overview Background: Hierarchy surrounds us: what is it? Micro foundations of social stratification Ivan Chase: Structure from process Action.
Using network analysis in community development evaluation: Potential and Pitfalls Australian Evaluation Society NT Branch Seminar 2013 Dr Gretchen Ennis.
Structural Holes & Weak Ties
OPTIMAL CONNECTIONS: STRENGTH AND DISTANCE IN VALUED GRAPHS Yang, Song and David Knoke RESEARCH QUESTION: How to identify optimal connections, that is,
Introduction to Matrices and Statistics in SNA Laura L. Hansen Department of Sociology UMB SNA Workshop July 31, 2008 (SOURCE: Introduction to Social Network.
Social network analysis
© 2003 McGraw-Hill Ryerson Limited. Production and Cost Analysis I Chapter 9.
1 Innovation networks and alliance management Lecture 4 Collection of Network Data & Calculation of Network Characteristics.
Diane M. Sullivan (2007) Recognizing Opportunities and Generating Ideas Part II Entrepreneurial Networks and Evolutionary Creativity: The Nexus of Opportunity.
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
How do organizations interact with each other?
Social Networks Analysis
How to organizations interact with each other
Local Networks Overview Personal Relations: Core Discussion Networks
Network Science: A Short Introduction i3 Workshop
Graph Operations And Representation
Structural Holes & Weak Ties
Entity-Relationship Diagram (ERD)
(Social) Networks Analysis II
Inference for Two Way Tables
Presentation transcript:

Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’? Burt: Structural Holes What are they? What do they do? How do they work? “Good Ideas” Methods & Measures: 1) Moving data around SAS Data steps 2) Calculating Ego-Network Measures From Ego-network modules From Global Networks Structural Holes & Weak Ties

Granovetter argues that, under many circumstances, strong ties are less useful than weak ties. Why? Redundancy Local Density, Global Fragmentation Structural Holes & Weak Ties

What are the implications? For individuals? For Communities? Structural Holes & Weak Ties The Strength of Weak Ties

Structural Holes & Weak Ties Structural Holes Burt. Structural Holes Similar idea to SWT: Your ties matter because of who your connects are not connected to. What is (for Burt) Social Capital? Relationships with other players Why does it matter? “Social capital is as important as competition is imperfect and investment capital is abundant.”

A structural Hole is a buffer: a space between the people you are connected to. 2 ways: Cohesion Structural Equivalence Structural Holes & Weak Ties Structural Holes

Efficiency Maximize the number of non-redundant contacts Effectiveness Draw your primary contacts from different social worlds Structural Holes & Weak Ties Structural Holes

Number of Contacts Number of Non-Redundant Contacts Maximum Efficiency Minimum Efficiency Decreasing Efficiency Increasing Efficiency Structural Holes & Weak Ties Structural Holes

Difference between SWT & SH: Burt’s claim is that he focuses directly on the causal agent active in Granovetter. (but note the footnote in “good ideas,” where he says the effect is not causal). Structural Holes & Weak Ties Structural Holes

Structural Holes & Weak Ties Good Ideas The hypothesis is that those who broker different groups are exposed to different ideas and thus more likely to have a good idea. Uses data on discussions among managers in a large electronics firm.

Structural Holes & Weak Ties Good Ideas Burt’s idea discussion network

Structural Holes & Weak Ties Good Ideas Burt’s idea discussion network

Structural Holes & Weak Ties Good Ideas Figure 3: Core network in the supply chain With headquarters

Structural Holes & Weak Ties Good Ideas Figure 3: Core network in the supply chain Without headquarters

Structural Holes & Weak Ties Good Ideas The results show a strong effect of network constraint on salary, evaluation and promotion, independent of the job/age characteristics related to human capital explanations.

Structural Holes & Weak Ties Good Ideas The results show a strong effect of network constraint on salary, evaluation and promotion, independent of the job/age characteristics related to human capital explanations.

Structural Holes & Weak Ties Good Ideas

Calculating the measures Burt discusses 4 related aspects of a network: 1) Effective Size 2) Efficiency 3) Constraint 4) Hierarchy Structural Holes & Weak Ties Calculations

Effective Size Conceptually the effective size is the number of people ego is connected to, minus the redundancy in the network, that is, it reduces to the non-redundant elements of the network. Effective size = Size - Redundancy Structural Holes & Weak Ties Calculations

Effective Size Burt’s measures for effective size is: Where j indexes all of the people that ego i has contact with, and q is every third person other than i or j. The quantity (p iq m jq ) inside the brackets is the level of redundancy between ego and a particular alter, j. Structural Holes & Weak Ties Calculations

Effective Size: P iq is the proportion of actor i’s relations that are spent with q Adjacency P Structural Holes & Weak Ties Calculations

Effective Size: m jq is the marginal strength of contact j’s relation with contact q. Which is j’s interaction with q divided by j’s strongest interaction with anyone. For a binary network, the strongest link is always 1 and thus m jq reduces to 0 or 1 (whether j is connected to q or not - that is, the adjacency matrix). The sum of the product p iq m jq measures the portion of i’s relation with j that is redundant to i’s relation with other primary contacts. Structural Holes & Weak Ties Calculations

Effective Size: P Working with 1 as ego, we get the following redundancy levels: PM 1jq Sum=1, so Effective size = 4-1 = 3. Structural Holes & Weak Ties Calculations

Effective Size: When you work it out, redundancy reduces to the average degree, not counting ties with ego of ego’s alters. Node Degree Mean: 4/4 = 1 Structural Holes & Weak Ties Calculations

Effective Size: Since the average degree is simply another way to say density, we can calculate redundancy as: 2t/n where t is the number of ties (not counting ties to ego) and n is the number of people in the network (not counting ego). Meaning that effective size = n - 2t/n Structural Holes & Weak Ties Calculations

Effective Node Size Size: Efficiency Efficiency is the effective size divided by the observed size. Structural Holes & Weak Ties Calculations

Constraint Conceptually, constraint refers to how much room you have to negotiate or exploit potential structural holes in your network. “..opportunities are constrained to the extent that (a) another of your contacts q, in whom you have invested a large portion of your network time and energy, has (b) invested heavily in a relationship with contact j.” (p.54) Structural Holes & Weak Ties Calculations

Constraint P Structural Holes & Weak Ties Calculations

Constraint q i j p ij p iq p qj C ij = Direct investment (P ij ) + Indirect investment Structural Holes & Weak Ties Calculations

Constraint Given the p matrix, you can get indirect constraint (p iq p qj ) with the 2-step path distance. P P*P Structural Holes & Weak Ties Calculations

Constraint Total constraint between any two people then is: C = (P + P 2 )##2 Where P is the normalized adjacency matrix, and ## means to square the elements of the matrix. Structural Holes & Weak Ties Calculations

Constraint P+P 2 C ij C Structural Holes & Weak Ties Calculations

Hierarchy Conceptually, hierarchy (for Burt) is really the extent to which constraint is concentrated in a single actor. It is calculated as: Structural Holes & Weak Ties Calculations

Hierarchy C C: H=.514 Structural Holes & Weak Ties Calculations

Playing with data: Getting information from one program to another If our data are in one format (SAS, for example) how do we get it into a program like PAJEK or UCINET? 1) Type it in by hand. Too slow, error prone, impossible for very large networks 2) Write a program that moves data around for you automatically SPAN contains programs that write to: PAJEK UCINET NEGOPY STRUCTURE

Playing with data: Using SAS to move data. Back-up: 1) How does SAS store & move data? 2) How do you store & use programs over again? Basic Elements: SAS is a language: Data Steps = Nouns Procedures = Verbs Data needs: Creation / Read Organization Transformation Manipulation Procedures: Summarize Analyze Communicate Manipulate

SAS The procedure we have been using is IML or the Interactive Matrix Language.

Data Libraries: Links to where data are stored Datasets: the actual data You refer to a data set by a two-level name: library.data