Abstract
The last chapter has shown that there are different problems concerning the data itself and the definition of the set of entities represented in the network. In this chapter various fallacies with respect to the relations represented in a network are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Newman states that the edge betweenness centrality can be computed by computing the edge betweenness centrality on the simplified graph (i.e., unweighted graph) and then, for each edge, derived by dividing the corresponding value by the weight of the edge. Note that the algorithm described by Newman does not compute the same edge betweenness than if the multi-edges are kept as separate entities. The latter version will in general increase the number of shortest paths between two nodes (s. Exercise 9.10).
- 2.
The weight on an edge was defined as the geometric average \(\sqrt{w_{ij}w_{ji}}\) where \(w_{ij}\) denotes the average number of messages sent per year from person i to person j over some multi-year span.
- 3.
The article of Bearman and Parigi is called: “Cloning Headless Frogs and Other Important Matters: Conversation Topics and Network Structure” for a reason ;-).
- 4.
They note that their results are robust with respect to other choices of a threshold for excluding emails. They argue for their choice of 5 as follows: “Mass mailings typically consist of factual information that must be broadcast to multiple people simultaneously; as such, they are unlikely to contain socially meaningful interpersonal interactions. The choice of a particular threshold is inherently arbitrary; we chose a threshold of four because it eliminates the most obvious mass mailings while preserving over \(93\,\%\) of e-mails in our sample and because it is similar to choices made by other scholars” [37]. They also discuss the second, more implicit threshold, the requirement that one interaction in a three month period is enough to establish a connection between two persons: “In the organization we study, three months appears to offer the optimal balance between stability and fluidity [of interactions]” [37].
- 5.
Of course, also in digital data there are errors. For example, not every sent email is successfully delivered and logs might get lost before they are stored on a permanent server.
- 6.
Note, however, in a combination of qualitative and quantitative analysis, Padgett and Ansell use network analysis on marriages between important Florentine families to understand the position of the Medici family in Florentine [34]. Thus, the individual level is aggregated to the level of families. The authors also embed this analysis into the analyses of other important relationships such as patronage and economic connections.
- 7.
Possibly and most likely, the words will be stemmed, i.e., all derived or inflected words are represented by the associated word stem or root word.
- 8.
Please refrain from sending me sentences in which “political contact lens” makes totally sense, I beg you, dear reader! I am sure one can come up with such a monstrous sentence.
- 9.
However, describing the paths on which this happens will in general not boil down to “all shortest paths between any two vertices”. It is thus most likely that an analysis of such a network still requires new tools and methods than, e.g., classic network centralities.
- 10.
Thanks to Valdis Krebs for pointing me to this paper when I asked him for his choice of the most undercited paper in social network analysis.
- 11.
Numbers are estimated from Fig. 1a in [26].
- 12.
Note that the email contact network is used as a proxy for personal face-to-face communication. Kossinets and Watts argue that in a closed social environment as a university this is quite likely to be true such that not many false-positive or false-negative edges are to be expected.
- 13.
The part in bold is by Krishnamurty et al., the explanation after that clarifies the original statement from my point of view.
References
Barabási A-L (2005) The origin of bursts and heavy tails in human dynamics. Nature 435:207–211
Barrat A, Barthélemy M, Pastor-Satorras R, Vespignani A (2004) The architecture of complex weighted networks. PNAS 101(11):3747–3753
Bearman P, Parigi P (2004) Cloning headless frogs and other important matters: conversation topics and network structure. Soc Forces 83(2):535–557
Bockholt M, Zweig KA (2015) Why is this so hard? Insights from the state space of a simple board game. In: Proceedings of the 1st joint international conference on serious games, pp 147–157
boyd D, Crawford K (2011) Six provocations for big data. In: A decade in internet time: symposium on the dynamics of the internet and society, September 2011
Brandes U, Robins G, McCranie A, Wasserman S (2013) What is network science? Netw Sci 1(1):Editorial
Burt RS (1997) A note on social capital and network content. Soc Netw 19:355–373
Butts CT (2009) Revisiting the foundations of network analysis. Science 325(5939):414–416
De Choudhury M, Mason WA, Hofman JM, Watts DJ (2010) Inferring relevant social networks from interpersonal communication. In: Proceedings of the World Wide Web conference 2010
Colizza V, Barrat A, Barthélemy M, Vespignani A (2005) The role of the airline transportation network in the prediction and predictability of global epidemics. Proc Natl Acad Sci 103(7):2015–2020
Conlan AJK, Eames KTD, Gage JA, von Kirchbach JC, Ross JV, Saenz RA, Gog JR (2011) Measuring social networks in British primary schools through scientific engagement. Proc R Soc Lond B 278(1711):1467–1475
Dall’Asta L, Barrat A, Barthélemy M (2006) Vulnerability of weighted networks. J Stat Mech: Theory Exp 4:P04006
Dorn I, Lindenblatt A, Zweig KA (2012) The trilemma of network analysis. In: Proceedings of the 2012 IEEE/ACM international conference on advances in social network analysis and mining, Istanbul
Fortunato S (2010) Community detection in graphs. Phys Rep 486:75–174
Friedkin NE (1983) Horizons of observability and limits of informal control in organizations. Soc Forces 62:54–77
Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99:7821–7826
Grannis R (2010) Six degrees of “who cares?”. Amer J Soc 115(4):991–1017
Granovetter MS (1973) The strength of weak ties. Amer J Soc 78(6):1360–1380
Han J-DJ, Dupuy D, Bertin N, Cusick ME, Vidal M (2005) Effect of sampling on topology predictions of protein-protein interaction networks. Nat Bioetchnol 23(7):839–844
Holme P, Saramäki J (2011) Temporal networks. Phys Rep 519(3):97–125
Horvát E-Á, Hanselmann M, Hamprecht FA, Zweig KA (2012) One plus one makes three (for social networks). PLoS ONE 7(4):e34740
Horvát E-Á, Zhang JD, Uhlmann S, Sahin Ö, Zweig KA (2013) A network-based method to assess the statistical significance of mild co-regulation effects. PLOS ONE 8(9):e73413
Huberman BA, Romero DM, Wu F (2008) Social networks that matter: Twitter under the microscope. First Monday [Online]. http://firstmonday.org/ojs/index.php/fm/article/view/2317/2063, December 2008
Jeong H, Tombor B, Albert R, Oltvai ZN, BarabÃąsi A-L (2000) The large-scale organization of metabolic networks. Nature 400:107
Karsai M, Kivela M, Pan RK, Kaski K, Kertész J, Barabási A-L, Saramäki J (2011) Small but slow world: how network topology and burstiness slow down spreading. Phys Rev E 83:articleID: 025102(R)
Kossinets G, Watts DJ (2006) Empirical analysis of an evolving social network. Science 311:88–90
Krishnamurty B, Willinger W, Gill P, Arlitt M (2011) A Socratic method for validation of measurement-based network research. Comput Commun 34(1):43–53
Marsden PV (1990) Network data and measurement. Annu Rev Soc 16:435–463
Milo R, Itzkovitz S, Kashtan N, Levitt R, Alon U (2004) Response to comment on “Network motifs: simple building blocks of complex networks” and “Superfamilies of evolved and designed networks”. Science 305:1107d
Milo R, Itzkovitz S, Kashtan N, Levitt R, Shen-Orr S, Ayzenshtat I, Sheffer M, Alon U (2004) Superfamilies of evolved and designed networks. Science 303:1538–1542
Morris M (1993) Telling tails explain the discrepancy in sexual partner reports. Nature 365:437–440
Newman MEJ (2004) Analysis of weighted networks. Phys Rev E 70(5):056131
Newman MEJ, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E 69(2):026113
Padgett JF, Ansell CK (1993) Robust action and the rise of the medici, 1400–1434. Amer J Sociol 98(6):1259–1319
Pastor-Satorras R, Vespignani A (2001) Epidemic spreading in scale-free networks. Phys Rev Lett 86(4):3200–3203
Pfitzner R, Scholtes I, Garas A, Tessone CJ, Schweitzer F (2013) Betweenness preference: quantifying correlations in the topological dynamics of temporal networks. Phys Rev Lett 110(19):198701
Quintane E, Kleinbaum AM (2011) Matter over mind? e-mail data and the measurement of social networks. Connections 31:22–46
Rocha LEC, Liljeros F, Holme P (2011) Simulated epidemics in an empirical spatiotemporal network of 50,185 sexual contacts. PLOS Comput Biol 7(3):e1001109
Russell Bernard H, Killworth PD, Sailer L (1981) Summary of research on informant accuracy in network data. Connections 4(3):11–25
Russell Bernard H, Shelley GA, Killworth P (1987) How much of a network does the GSS and RSW dredge up? Soc Netw 9:49–61
Uzzi B, Spiro J (2005) Collaboration and creativity: the small world problem. AJS 111(2):447–504
Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In: Proceedings of the 2nd ACM workshop on online social networks (WOSN’09)
Willinger W, Alderson D, Doyle JC (2009) Mathematics and the internet: a source of enormous confusion and great potential. Not AMS 56(5):586–599
Wilson C, Boe B, Sala A, Puttaswamy KPN, Zhao BY (2009) User interactions in social networks and their implications. In: Proceedings of the 4th ACM European conference on computer systems, pp 205–218
Zweig KA (2011) Good versus optimal: why network analytic methods need more systematic evaluation. Open Comput Sci 1:137–153
Zweig KA (2016) Towards a theoretical framework for analyzing complex linguistic networks. Are word-adjacency networks networks? Springer, Heidelberg, pp 153–163
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer-Verlag GmbH Austria
About this chapter
Cite this chapter
Zweig, K.A. (2016). Literacy: Relationships and Relations. In: Network Analysis Literacy. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0741-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0741-6_11
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0740-9
Online ISBN: 978-3-7091-0741-6
eBook Packages: Computer ScienceComputer Science (R0)