Structural Holes & Weak Ties

Slides:



Advertisements
Similar presentations
Social Network Analysis (in 10 minutes) Nick Crossley.
Advertisements

SOCIAL CAPITAL Social Capital Resources accruing to an ego actor through direct and indirect relations with its alters that facilitate ego’s attainment.
Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale Network Theory: Computational Phenomena and Processes Social Network.
Network Matrix and Graph. Network Size Network size – a number of actors (nodes) in a network, usually denoted as k or n Size is critical for the structure.
Fast Algorithms For Hierarchical Range Histogram Constructions
Transportation Problem (TP) and Assignment Problem (AP)
Social Network Analysis
Λ14 Διαδικτυακά Κοινωνικά Δίκτυα και Μέσα Strong and Weak Ties Chapter 3, from D. Easley and J. Kleinberg book.
CONNECTIVITY “The connectivity of a network may be defined as the degree of completeness of the links between nodes” (Robinson and Bamford, 1978).
Correlation and Autocorrelation
Centrality and Prestige HCC Spring 2005 Wednesday, April 13, 2005 Aliseya Wright.
E E Module 18 M.H. Clouqueur and W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Analysis of Path Availability in Span-Restorable.
Chapter 9 Graph algorithms Lec 21 Dec 1, Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
Using Social Networks to Analyze Sexual Relations by Amanda Dargie.
Graph: Relations There are many kinds of social relations. For example: Role-based : brother of, father of, sister of, etc. : friend of, acquaintance of,
Chapter 3 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 1 Slide © 2000 South-Western College Publishing/ITP Slides Prepared by JOHN LOUCKS.
Network Measures Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Measures Klout.
Standard Error and Research Methods
Social Networks Lecture 4: Collection of Network Data & Calculation of Network Characteristics U. Matzat.
Social Network Analysis Tutorial
Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’? Burt: Structural Holes What are they? What do they do? How do.
Sunbelt XXIV, Portorož, Pajek Workshop Vladimir Batagelj Andrej Mrvar Wouter de Nooy.
Market Structures and Transaction Costs in Commercial Real Estate Investment: a multi-method approach David Scofield Department of Town and Regional Planning.
Mehdi Kargar Aijun An York University, Toronto, Canada Discovering Top-k Teams of Experts with/without a Leader in Social Networks.
Slides are based on Negnevitsky, Pearson Education, Lecture 12 Hybrid intelligent systems: Evolutionary neural networks and fuzzy evolutionary systems.
Social Network Analysis: A Non- Technical Introduction José Luis Molina Universitat Autònoma de Barcelona
Study Questions: 1) Define biology and science.. Study Questions: 1)Define biology and science. - Biology: The scientific study of living systems - Science:
Connectivity and the Small World Overview Background: de Pool and Kochen: Random & Biased networks Rapoport’s work on diffusion Travers and Milgram Argument.
Chapter 9 : SOCIAL NETWORKS Learning Objectives  Understand the social network vocabulary  Know why social networks and networking are valuable  Learn.
Principles of Social Network Analysis. Definition of Social Networks “A social network is a set of actors that may have relationships with one another”
Assignment 2: remarks FIRST PART Please don’t make a division of labor so blatantly obvious! 1.1 recode - don't just delete everything that looks suspicious!
Centrality in undirected networks These slides are by Prof. James Moody at Ohio State.
Chapter 3 Sec 3.3 With Question/Answer Animations 1.
Local Networks Overview Personal Relations: GSS Network Data To Dwell Among Friends Questions to answer with local network data Mixing Local Context Social.
Digital Image Processing CCS331 Relationships of Pixel 1.
Multivariate Statistics Matrix Algebra I W. M. van der Veld University of Amsterdam.
Notes 5IE 3121 Knapsack Model Intuitive idea: what is the most valuable collection of items that can be fit into a backpack?
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
3 & 4 1 Chapters 3 and 4 Drawing ERDs October 16, 2006 Week 3.
Susan O’Shea The Mitchell Centre for Social Network Analysis CCSR/Social Statistics, University of Manchester
SOCIAL CAPITAL Social Capital Resources accruing to an ego actor through direct & indirect relations with its alters that facilitate ego’s attainment of.
1 1 © 2003 Thomson  /South-Western Slide Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
Social Sub-groups Overview Substantive papers: Wayne Baker Social structure in a place where there should be none Scott Feld What causes clustering in.
Data Structures & Algorithms Graphs
Centrality in Social Networks Background: At the individual level, one dimension of position in the network can be captured through centrality. Conceptually,
1 Network Models Transportation Problem (TP) Distributing any commodity from any group of supply centers, called sources, to any group of receiving.
Hierarchy Overview Background: Hierarchy surrounds us: what is it? Micro foundations of social stratification Ivan Chase: Structure from process Action.
Using network analysis in community development evaluation: Potential and Pitfalls Australian Evaluation Society NT Branch Seminar 2013 Dr Gretchen Ennis.
Learning Objectives for Section 4.5 Inverse of a Square Matrix
11 Network Level Indicators Bird’s eye view of network Image matrix example of network level Many network level measures Some would argue this is the most.
OPTIMAL CONNECTIONS: STRENGTH AND DISTANCE IN VALUED GRAPHS Yang, Song and David Knoke RESEARCH QUESTION: How to identify optimal connections, that is,
Introduction to Matrices and Statistics in SNA Laura L. Hansen Department of Sociology UMB SNA Workshop July 31, 2008 (SOURCE: Introduction to Social Network.
Social network analysis
1 Innovation networks and alliance management Lecture 4 Collection of Network Data & Calculation of Network Characteristics.
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
Review Design of experiments, histograms, average and standard deviation, normal approximation, measurement error, and probability.
COMESA MONETARY INSTITUTE TRAINING ON MACROPRUDENTIAL POLICY TOOLS RELEVANT FOR COMESA MEMBER COUNTRIES WORKSHOP III: NETWORK ANALYSIS USING BANK-LEVEL.
Week 2 Normal Distributions, Scatter Plots, Regression and Random.
How do organizations interact with each other?
Local Networks Overview Personal Relations: Core Discussion Networks
Network analysis.
Graph Operations And Representation
Network Science: A Short Introduction i3 Workshop
Graph Operations And Representation
Structural Holes & Weak Ties
Entity-Relationship Diagram (ERD)
(Social) Networks Analysis II
Graph Operations And Representation
Chapter 9 Graph algorithms
Presentation transcript:

Structural Holes & Weak Ties Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’? Burt: Structural Holes What are they? What do they do? How do they work? Methods & Measures: 1) Go Over assignment 1 2) Moving data around SAS Data steps 3) Calculating Ego-Network Measures From Ego-network modules From Global Networks

The Strength of Weak Ties Granovetter argues that, under many circumstances, strong ties are less useful than weak ties. Why? Redundancy Local Density, Global Fragmentation

The Strength of Weak Ties What are the implications? For individuals? For Communities?

Structural Holes & Weak Ties Burt. Structural Holes Similar idea to SWT: Your ties matter because of who your connects are not connected to. What is (for Burt) Social Capital? Relationships with other players Why does it matter? “Social capital is as important as competition is imperfect and investment capital is abundant.”

Structural Holes & Weak Ties A structural Hole is a buffer: a space between the people you are connected to. 2 ways: Cohesion Structural Equivalence

Structural Holes & Weak Ties Efficiency Maximize the number of non-redundant contacts Effectiveness Draw your primary contacts from different social worlds

Structural Holes & Weak Ties Maximum Efficiency Decreasing Efficiency Number of Non-Redundant Contacts Increasing Efficiency Minimum Efficiency Number of Contacts

Structural Holes & Weak Ties Difference between SWT & SH: Burt’s claim is that he focuses directly on the causal agent active in Granovetter.

Structural Holes & Weak Ties Calculating the measures Burt discusses 4 related aspects of a network: 1) Effective Size 2) Efficiency 3) Constraint 4) Hierarchy

Structural Holes & Weak Ties Effective Size Conceptually the effective size is the number of people ego is connected to, minus the redundancy in the network, that is, it reduces to the non-redundant elements of the network. Effective size = Size - Redundancy

Structural Holes & Weak Ties Effective Size Burt’s measures for effective size is: Where j indexes all of the people that ego i has contact with, and q is every third person other than i or j. The quantity (piqmjq) inside the brackets is the level of redundancy between ego and a particular alter, j.

Structural Holes & Weak Ties Effective Size: Piq is the proportion of actor i’s relations that are spent with q. 3 2 Adjacency 1 2 3 4 5 1 0 1 1 1 1 2 1 0 0 0 1 3 1 0 0 0 0 4 1 0 0 0 1 5 1 1 0 1 0 P 1 2 3 4 5 1 .00 .25 .25 .25 .25 2 .50 .00 .00 .00 .50 3 1.0 .00 .00 .00 .00 4 .50 .00 .00 .00 .50 5 .33 .33 .00 .33 .00 1 5 4

Structural Holes & Weak Ties Effective Size: mjq is the marginal strength of contact j’s relation with contact q. Which is j’s interaction with q divided by j’s strongest interaction with anyone. For a binary network, the strongest link is always 1 and thus mjq reduces to 0 or 1 (whether j is connected to q or not - that is, the adjacency matrix). The sum of the product piqmjq measures the portion of i’s relation with j that is redundant to i’s relation with other primary contacts.

Structural Holes & Weak Ties Effective Size: 3 2 Working with 1 as ego, we get the following redundancy levels: 1 P 1 2 3 4 5 1 .00 .25 .25 .25 .25 2 .50 .00 .00 .00 .50 3 1.0 .00 .00 .00 .00 4 .50 .00 .00 .00 .50 5 .33 .33 .00 .33 .00 PM1jq 1 2 3 4 5 1 --- --- --- --- --- 2 --- .00 .00 .00 .25 3 --- .00 .00 .00 .00 4 --- .00 .00 .00 .25 5 --- .25 .00 .25 .00 5 4 Sum=1, so Effective size = 4-1 = 3.

Structural Holes & Weak Ties Effective Size: 3 2 When you work it out, redundancy reduces to the average degree, not counting ties with ego of ego’s alters. 1 5 4 Node Degree 2 1 3 0 4 1 5 2 Mean: 4/4 = 1

Structural Holes & Weak Ties Effective Size: 3 2 Since the average degree is simply another way to say density, we can calculate redundancy as: 2t/n where t is the number of ties (not counting ties to ego) and n is the number of people in the network (not counting ego). Meaning that effective size = n - 2t/n 1 5 4

Structural Holes & Weak Ties Efficiency is the effective size divided by the observed size. 3 2 Effective Node Size Size: Efficiency 1 4 3 .75 2 2 1 .5 3 1 1 1.0 4 2 1 .5 5 3 1.67 .55 1 5 4

Structural Holes & Weak Ties Constraint Conceptually, constraint refers to how much room you have to negotiate or exploit potential structural holes in your network. 3 2 1 5 4 “..opportunities are constrained to the extent that (a) another of your contacts q, in whom you have invested a large portion of your network time and energy, has (b) invested heavily in a relationship with contact j.” (p.54)

Structural Holes & Weak Ties Constraint 3 2 1 5 4 P 1 2 3 4 5 1 .00 .25 .25 .25 .25 2 .50 .00 .00 .00 .50 3 1.0 .00 .00 .00 .00 4 .50 .00 .00 .00 .50 5 .33 .33 .00 .33 .00

q i j Structural Holes & Weak Ties Constraint pij piq pqj Cij = Direct investment (Pij) + Indirect investment

Structural Holes & Weak Ties 3 2 Constraint 1 5 4 Given the p matrix, you can get indirect constraint (piqpqj) with the 2-step path distance. P*P 1 2 3 4 5 1 ... .083 .000 .083 .250 2 .165 ... .125 .290 .125 3 .000 .250 ... .250 .250 4 .165 .290 .125 ... .125 5 .330 .083 .083 .083 ... P 1 2 3 4 5 1 .00 .25 .25 .25 .25 2 .50 .00 .00 .00 .50 3 1.0 .00 .00 .00 .00 4 .50 .00 .00 .00 .50 5 .33 .33 .00 .33 .00

Structural Holes & Weak Ties Constraint Total constraint between any two people then is: C = (P + P2)##2 Where P is the normalized adjacency matrix, and ## means to square the elements of the matrix.

Structural Holes & Weak Ties Constraint P+P2 Cij C .00 .33 .25 .33 .50 .00 .11 .06 .11 .25 .53 .67 .00 .13 .29 .63 .44 .00 .02 .08 .39 1.0 .25 .00 .25 .25 1.0 .06 .00 .06 .06 .67 .29 .13 .00 .63 .44 .08 .02 .00 .39 .66 .41 .08 .41 .00 .44 .17 .01 .17 .00

Structural Holes & Weak Ties Hierarchy Conceptually, hierarchy (for Burt) is really the extent to which constraint is concentrated in a single actor. It is calculated as:

Structural Holes & Weak Ties Hierarchy 3 2 1 2 3 4 5 C C: .11 .06 .11 .25 .53 .83 .46 .83 1.9 5 4 H=.514

Homework The solution program for assignment 1 can be found on the course data programs page, called ‘solutions1.sas’ Look at this for the answers. http://www.soc.sbs.ohio-state.edu/jwm/s884/data.htm Common things people did: Typos in the original data matrix. Wrong data in, wrong answer out.

Homework Common things people did: Typos in the original data matrix. Wrong data in, wrong answer out. Adjacency lists should include a row for every node, even if they do not send any ties in the network What is the longest possible path in a network? How would you write a program to stop automatically? Many of you were able to identify the symmetric / asymmetric relations. But you left them as ‘2’ in the matrix. Usually you would add one more line (or use a slightly different syntax) to change them to ‘1’ as well.

Playing with data: Getting information from one program to another If our data are in one format (SAS, for example) how do we get it into a program like PAJEK or UCINET? 1) Type it in by hand. Too slow, error prone, impossible for very large networks 2) Write a program that moves data around for you automatically SPAN contains programs that write to: PAJEK UCINET NEGOPY STRUCTURE

Playing with data: Using SAS to move data. Basic Elements: SAS is a language: Data Steps = Nouns Procedures = Verbs Data needs: Creation / Read Organization Transformation Manipulation Procedures: Summarize Analyze Communicate Manipulate Back-up: 1) How does SAS store & move data? 2) How do you store & use programs over again? http://wks.uts.ohio-state.edu/sasdoc/

SAS The procedure we have been using is IML or the Interactive Matrix Language.

Data Libraries: Links to where data are stored Datasets: the actual data You refer to a data set by a two-level name: library.data