際際滷

際際滷Share a Scribd company logo
Module: 55-7626-00N-A-20123  Social Media Use in Organisations (A-2012/3)
Social Network Analysis
of M2M Organisations
Lee James Cox
B0049872
MA in Technical Communication
1
First some definitions
Social Network Analysis (SNA) is the study of structure1. It is the mapping and
measuring of relationships and flows (ties) between members (nodes) within a
network.
Machine to Machine (M2M) refers to the technology that connects:
a. a device (such as a sensor or meter) to capture an event (such as temperature,
inventory level, etc.)
b. which is relayed through a network (wireless, wired)
c. to an application (software program), that translates the captured event into
meaningful information (for example, items need to be restocked).
M2M Organisations include device, network and application providers; as well as:
 Enterprise Customers: provide the services to end-users, e.g. Coca Cola, British Gas
 Platform Providers: equipment and solution providers to operators and others
 System Integrators: build solutions to join up incompatible systems
2
Node Node
Tie
Five things to first consider about SNA
3
1. The first endeavour should always be to define what the Nodes and Ties mean.[2] For
our M2M analysis, the nodes are organisations and ties are contractual relationships.
2. Nodes can have different weightings of importance, e.g.
 Size (revenue/subscribers)
 Geography
 Track record
 Associations
 Other segmentation attributes
3. Ties have characteristics that matter when it comes to identifying things like leadership,
influence and strength e.g.
 Direction (one-way, both)
 Quantity
 Contract date
 Value
 Frequency
4. Matrix, graphs and other visualization tools are important for analysis and measurement.
 Tools like NodeXL will be required for any network of reasonable size
 Considerable time is usually required to capture and keep the data up to date.
 The M2M example in later slides shows just a few of the tens of thousands of Enterprises, 200+ Operators &
300+ Application Providers that Jasper, Vodafone & Ericsson have as M2M partners!
5. The perspective of the analysis can centre on the complete network (socio) or an
individuals personal network (ego).
Social-centric or Ego-centric SNA?
Social-centric (complete network)
a. Allows analysis of nodes and ties in comparison to wider
network, e.g.
 Are Operator relationships tightly bonded, diversified or
constricted?
 Is there density/clustering of contracts within a geography
such as Europe, or are there more cross-continent?
b. Identifies behaviours affected by positions and
connections, e.g.
 Does the number of application provider ties influence the
number of ties a platform provider has?
 Does the distance between application and platform nodes
affect the number of operator relationships?
Ego-centric (personal network)
a. Only ties directly with the focal organisation (Jasper)
plus those Jasper is aware of are included.
b. Perception is reality and opinions count. Subjective
attributes are likely to have weight in many business
matters
4
Figure 1 Socio-centric view of the sample M2M Eco-System
Figure 2  Ego-centric view of Jasper M2M Network
Visualization[3] can also reveal positional relationships
 Operators have the highest degree
centrality. AT&T is most central of the
operators and is the longest established
with largest customer base.
 Application Providers have the highest
closeness centrality. They work with
multiple operators but rarely direct with
Enterprise customers.
 Device/SIM and Platform Providers are
structurally equivalent nodes.
 System Integrators are the most peripheral,
having the smallest number of connections.
 Enterprise Customers has the highest
betweeness centrality providing the only
path to System Integrations
 No groups of nodes are connected to each
other (cliques). However if the definition of
ties were extended beyond contractual
then informal or personal relationships
would show all nodes in this extracted view
as being connected.
Operators
Enterprise Customers
Device/SIM
Application Providers
Platform
System Integrators
5
Benefits & Limitations of SNA
Benefits Limitations
Provides framework to describe any complex
network.
Collecting and maintaining source data can be
difficult
Identifies important individuals and the influence
they have
Does not describe meanings, motives or explain
why actions happen, e.g. why a contract was won.
A typological analysis is more suitable.
Can identify previously unrecognised sub-groups
through visual clusters
Little examination of important attributes such as
attitudes, opinions and behaviours that may be
helping or hindering relationships
Highlights areas for further inquiry and possible
improvement, e.g. gaps
More sensitive to data omissions than other
surveys. >75% sampling is required.[4]
Even weak ties may be revealed as important for
bridging disparate groups
Privacy can be ignored when views of others
contribute to the analysis.
Useful for track changes over time to reveal paths. Visualization can lead to over simplification and
misreading of results. E.g. Network measures such
as density can be easily misrepresented when
networks of different sizes are compared.
6
Other take away learnings from SNA
1. Social Network Analysis is not necessarily restricted to connections from
tools such as Facebook or LinkedIn. SNA can be applied to a wide range
of network subjects, such as how diseases spread, mapping films and
interaction of characters, influence of language throughout the world,
etc.
2. SNA focusses on relationships rather than attributes of the nodes for
their own sake, or the ideation behind the relationship.
3. A Social Network does not in itself encourage co-operation or collective
action. Community tools such as Online Forums lend themselves better
to co-ordination of action.
4. Connections within business networks often reveal companies tied to
competitors. This has implications for trust and potential leaks within a
social network.
7
References
[1] Wellman B, Berkowitz SD (1977). Social structures: a network approach. Greenwich: JAI Press.
[2] Pinheiro, C. (2011). Social Network Analysis in Telecommunications. John Wiley & Sons.
[3] Based on Davies R (2011). Network Visualisation and Analysis, Cambridge.
[4] Borgatti, Carley & Krackhardt (2006).
8
Ad

Recommended

Types of communication networks
Types of communication networks
Damaashaad
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
BAINIDA
An innovative approach to solve the network design problem concerning intelli...
An innovative approach to solve the network design problem concerning intelli...
alienaimi
Graph Theoretic Model for Community Wireless Networks
Graph Theoretic Model for Community Wireless Networks
ABDELAAL
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
iosrjce
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
IJECEIAES
Intelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
IJCSIS Research Publications
Comprehensive Analysis on the Vulnerability and Efficiency of P2P Networks un...
Comprehensive Analysis on the Vulnerability and Efficiency of P2P Networks un...
ijp2p
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Claudia Acosta
An Agent Future For Network Control
An Agent Future For Network Control
Sara Alvarez
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
reshma reshu
Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network Context
IRJET Journal
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
CSEIJJournal
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
IJCNC
Do4301690695
Do4301690695
IJERA Editor
Dv31821825
Dv31821825
IJERA Editor
Determine Best Fit Topology unit-2.pptx
Determine Best Fit Topology unit-2.pptx
nahomtilahun29
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
Susan Cox
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IJCSEA Journal
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IJCSEA Journal
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
Network Effects
Network Effects
a16z
Booysen machine 2012
Booysen machine 2012
Sreekrishna Das
MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...
Vagner Santana
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
IJNSA Journal
B1802030511
B1802030511
IOSR Journals
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
IRJET Journal
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays

More Related Content

Similar to SNA of M2M Organisations (20)

Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Claudia Acosta
An Agent Future For Network Control
An Agent Future For Network Control
Sara Alvarez
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
reshma reshu
Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network Context
IRJET Journal
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
CSEIJJournal
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
IJCNC
Do4301690695
Do4301690695
IJERA Editor
Dv31821825
Dv31821825
IJERA Editor
Determine Best Fit Topology unit-2.pptx
Determine Best Fit Topology unit-2.pptx
nahomtilahun29
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
Susan Cox
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IJCSEA Journal
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IJCSEA Journal
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
Network Effects
Network Effects
a16z
Booysen machine 2012
Booysen machine 2012
Sreekrishna Das
MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...
Vagner Santana
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
IJNSA Journal
B1802030511
B1802030511
IOSR Journals
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
IRJET Journal
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Claudia Acosta
An Agent Future For Network Control
An Agent Future For Network Control
Sara Alvarez
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
reshma reshu
Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network Context
IRJET Journal
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
CSEIJJournal
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
IJCNC
Determine Best Fit Topology unit-2.pptx
Determine Best Fit Topology unit-2.pptx
nahomtilahun29
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
Susan Cox
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IJCSEA Journal
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IJCSEA Journal
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
Network Effects
Network Effects
a16z
MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...
Vagner Santana
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
IJNSA Journal
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
IRJET Journal

Recently uploaded (20)

FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
Ad

SNA of M2M Organisations

  • 1. Module: 55-7626-00N-A-20123 Social Media Use in Organisations (A-2012/3) Social Network Analysis of M2M Organisations Lee James Cox B0049872 MA in Technical Communication 1
  • 2. First some definitions Social Network Analysis (SNA) is the study of structure1. It is the mapping and measuring of relationships and flows (ties) between members (nodes) within a network. Machine to Machine (M2M) refers to the technology that connects: a. a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) b. which is relayed through a network (wireless, wired) c. to an application (software program), that translates the captured event into meaningful information (for example, items need to be restocked). M2M Organisations include device, network and application providers; as well as: Enterprise Customers: provide the services to end-users, e.g. Coca Cola, British Gas Platform Providers: equipment and solution providers to operators and others System Integrators: build solutions to join up incompatible systems 2 Node Node Tie
  • 3. Five things to first consider about SNA 3 1. The first endeavour should always be to define what the Nodes and Ties mean.[2] For our M2M analysis, the nodes are organisations and ties are contractual relationships. 2. Nodes can have different weightings of importance, e.g. Size (revenue/subscribers) Geography Track record Associations Other segmentation attributes 3. Ties have characteristics that matter when it comes to identifying things like leadership, influence and strength e.g. Direction (one-way, both) Quantity Contract date Value Frequency 4. Matrix, graphs and other visualization tools are important for analysis and measurement. Tools like NodeXL will be required for any network of reasonable size Considerable time is usually required to capture and keep the data up to date. The M2M example in later slides shows just a few of the tens of thousands of Enterprises, 200+ Operators & 300+ Application Providers that Jasper, Vodafone & Ericsson have as M2M partners! 5. The perspective of the analysis can centre on the complete network (socio) or an individuals personal network (ego).
  • 4. Social-centric or Ego-centric SNA? Social-centric (complete network) a. Allows analysis of nodes and ties in comparison to wider network, e.g. Are Operator relationships tightly bonded, diversified or constricted? Is there density/clustering of contracts within a geography such as Europe, or are there more cross-continent? b. Identifies behaviours affected by positions and connections, e.g. Does the number of application provider ties influence the number of ties a platform provider has? Does the distance between application and platform nodes affect the number of operator relationships? Ego-centric (personal network) a. Only ties directly with the focal organisation (Jasper) plus those Jasper is aware of are included. b. Perception is reality and opinions count. Subjective attributes are likely to have weight in many business matters 4 Figure 1 Socio-centric view of the sample M2M Eco-System Figure 2 Ego-centric view of Jasper M2M Network
  • 5. Visualization[3] can also reveal positional relationships Operators have the highest degree centrality. AT&T is most central of the operators and is the longest established with largest customer base. Application Providers have the highest closeness centrality. They work with multiple operators but rarely direct with Enterprise customers. Device/SIM and Platform Providers are structurally equivalent nodes. System Integrators are the most peripheral, having the smallest number of connections. Enterprise Customers has the highest betweeness centrality providing the only path to System Integrations No groups of nodes are connected to each other (cliques). However if the definition of ties were extended beyond contractual then informal or personal relationships would show all nodes in this extracted view as being connected. Operators Enterprise Customers Device/SIM Application Providers Platform System Integrators 5
  • 6. Benefits & Limitations of SNA Benefits Limitations Provides framework to describe any complex network. Collecting and maintaining source data can be difficult Identifies important individuals and the influence they have Does not describe meanings, motives or explain why actions happen, e.g. why a contract was won. A typological analysis is more suitable. Can identify previously unrecognised sub-groups through visual clusters Little examination of important attributes such as attitudes, opinions and behaviours that may be helping or hindering relationships Highlights areas for further inquiry and possible improvement, e.g. gaps More sensitive to data omissions than other surveys. >75% sampling is required.[4] Even weak ties may be revealed as important for bridging disparate groups Privacy can be ignored when views of others contribute to the analysis. Useful for track changes over time to reveal paths. Visualization can lead to over simplification and misreading of results. E.g. Network measures such as density can be easily misrepresented when networks of different sizes are compared. 6
  • 7. Other take away learnings from SNA 1. Social Network Analysis is not necessarily restricted to connections from tools such as Facebook or LinkedIn. SNA can be applied to a wide range of network subjects, such as how diseases spread, mapping films and interaction of characters, influence of language throughout the world, etc. 2. SNA focusses on relationships rather than attributes of the nodes for their own sake, or the ideation behind the relationship. 3. A Social Network does not in itself encourage co-operation or collective action. Community tools such as Online Forums lend themselves better to co-ordination of action. 4. Connections within business networks often reveal companies tied to competitors. This has implications for trust and potential leaks within a social network. 7
  • 8. References [1] Wellman B, Berkowitz SD (1977). Social structures: a network approach. Greenwich: JAI Press. [2] Pinheiro, C. (2011). Social Network Analysis in Telecommunications. John Wiley & Sons. [3] Based on Davies R (2011). Network Visualisation and Analysis, Cambridge. [4] Borgatti, Carley & Krackhardt (2006). 8