Encyclopedia of Social Network Analysis and Mining

Living Edition
| Editors: Reda Alhajj, Jon Rokne

Sociograph Representations, Concepts, Data, and Analysis

  • Elie Raad
  • Richard Chbeir
Living reference work entry
DOI: https://doi.org/10.1007/978-1-4614-7163-9_402-1

Synonyms

Glossary

A graph

Is usually used to represent networks and consist of nodes to represent actors, and edges to represent relationship.

A network

A structure that consists of a set of actors.

Social network data

Data available on online social networks.

Sociograph analysis

Graph-based analysis of social networks, their concepts, and their data.

Introduction

With the proliferation of online social networks, information sharing on these networks is gaining an ever-increasing importance. Obviously, online social networks have found ingenious ways to collect data as users socialize. Not surprisingly, when socializing users communicate, interact, and tend to freely reveal personal information in line with their perceptions and preferences. Understanding the characteristics of social networks is of considerable importance. Namely the structure of the...

This is a preview of subscription content, log in to check access.

References

  1. Adamic L, Adar E (2005) How to search a social network. Soc Networks 27(3):187–203CrossRefGoogle Scholar
  2. Bachi G, Coscia M, Monreale A, Giannotti F (2012) Classifying trust/distrust relationships in online social networks. In: Privacy, security, risk and trust (PASSAT), 2012 international conference on and 2012 international conference on social computing (SocialCom), Amsterdam, pp 552–557Google Scholar
  3. Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang D-U (2006) Complex networks: structure and dynamics. Phys Rep 424(4–5):175–308CrossRefzbMATHMathSciNetGoogle Scholar
  4. Borgatti S, Mehra A, Brass D, Labianca G (2009) Network analysis in the social sciences. Science 323(5916):892–895CrossRefGoogle Scholar
  5. Boyd D, Ellison N (2007) Social network sites: definition, history, and scholarship. J Comput-Mediat Commun 13(1):210–230CrossRefGoogle Scholar
  6. Brams S, Mutlu H, Ramirez S (2006) Influence in terrorist networks: from undirected to directed graphs. Stud Conflict Terrorism 29(7):703–718CrossRefGoogle Scholar
  7. Carminati B, Ferrari E, Perego A (2009) Enforcing access control in web-based social networks. ACM Trans Inf Syst Secur 13(1):1–38Google Scholar
  8. Cranshaw J, Toch E, Hong J, Kittur A, Sadeh N (2010) Bridging the gap between physical location and online social networks. In: UbiComp’10 – Proceedings of the 2010 ACM conference on ubiquitous computing. ACM, New York, pp 119–128Google Scholar
  9. Diesner J, Frantz T, Carley K (2005) Communication networks from the enron email corpus: “it’s always about the people. Enron is no different”. Comput Math Organ Theory 11(3):201–228CrossRefzbMATHGoogle Scholar
  10. Dunbar RIM (2012) Social cognition on the internet: testing constraints on social network size. Philos Trans R Soc B Biol Sc 367(1599):2192–2201CrossRefGoogle Scholar
  11. Ellison N, Steinfield C, Lampe C (2011) Connection strategies: social capital implications of facebook-enabled communication practices. New Media Soc 13(6):873–892CrossRefGoogle Scholar
  12. Faust K (1997) Centrality in affiliation networks. Soc Networks 19(2):157–191CrossRefGoogle Scholar
  13. Fortunato S (2010) Community detection in graphs. Phys Rep 486(3–5):75–174CrossRefMathSciNetGoogle Scholar
  14. Freeman L (1978) Centrality in social networks conceptual clarification. Soc Networks 1(3):215–239CrossRefGoogle Scholar
  15. Gentile B, Twenge J, Freeman E, Campbell W (2012) The effect of social networking websites on positive self-views: an experimental investigation. Comput Hum Behav 28(5):1929–1933CrossRefGoogle Scholar
  16. Gilbert E (2012) Predicting tie strength in a new medium. In: Proceedings of the ACM 2012 conference on computer supported cooperative work, CSCW’12. ACM, New York, pp 1047–1056Google Scholar
  17. Granovetter MS (1973) The strength of weak ties. Am J Sociol 78(6):1360–1380CrossRefGoogle Scholar
  18. Haythornthwaite C (1996) Social network analysis: an approach and technique for the study of information exchange. Libr Inf Sci Res 18(4):323–342CrossRefGoogle Scholar
  19. Heidemann J, Klier M, Probst F (2012) Online social networks: a survey of a global phenomenon. Comput Netw 56(18):3866–3878CrossRefGoogle Scholar
  20. Hua W, Wellman B (2010) Social connectivity in America: changes in adult friendship network size from 2002 to 2007. Am Behav Sci 53(8):1148–1169CrossRefGoogle Scholar
  21. Koschtzki D, Lehmann K, Peeters L, Richter S, Tenfelde-Podehl D, Zlotowski O (2005) Centrality indices. In: Brandes U Erlebach T (eds) Network analysis. Lecture notes in computer science, 3418. Springer, Berlin/Heidelberg, pp 16–61Google Scholar
  22. Luke D, Harris J (2007) Network analysis in public health: history, methods, and applications. Annu Rev Public Health 28:69–93CrossRefGoogle Scholar
  23. McAuley J, Leskovec J (2012) Learning to discover social circles in ego networks. Adv Neural Inf Proces Syst 25:548–556Google Scholar
  24. Morselli C, Gigure C, Petit K (2007) The efficiency/security trade-off in criminal networks. Soc Networks 29(1):143–153CrossRefGoogle Scholar
  25. Musial K, Kazienko P (2013) Social networks on the internet. World Wide Web 16(1):31–72CrossRefGoogle Scholar
  26. Newman M (2003) The structure and function of complex networks. SIAM Rev 45(2):167–256CrossRefzbMATHMathSciNetGoogle Scholar
  27. Raad E, Chbeir R, Dipanda A (2010) User profile matching in social networks. In: Proceedings – 13th international conference on network-based information systems, NBiS 2010, Takayama, pp 297–304Google Scholar
  28. Raad E, Chbeir R, Dipanda A (2013) Discovering relationship types between users using profiles and shared photos in a social network. Multimed Tools Appl 64(1):141–170CrossRefGoogle Scholar
  29. Ryan T, Xenos S (2011) Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage. Comput Hum Behav 27(5):1658–1664CrossRefGoogle Scholar
  30. Schneider F, Feldmann A, Krishnamurthy B, Willinger W (2009) Understanding online social network usage from a network perspective. In: Proceedings of the 9th ACM SIGCOMM conference on internet measurement conference, IMC’09, Chicago. ACM, New York, pp 35–48Google Scholar
  31. Schneier B (2010) A taxonomy of social networking data. IEEE Secur Priv 8(4):88CrossRefGoogle Scholar
  32. Tang L, Liu H (2009) Scalable learning of collective behavior based on sparse social dimensions. In: Proceedings of the 18th ACM conference on information and knowledge management, CIKM’09. ACM, New York, pp 1107–1116Google Scholar
  33. Thelwall M (2008) Social networks, gender, and friending: an analysis of mySpace member profiles. J Am Soc Inf Sci Technol 59(8):1321–1330CrossRefGoogle Scholar
  34. Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, CambridgeCrossRefzbMATHGoogle Scholar
  35. Wilson C, Sala A, Puttaswamy KPN, Zhao BY (2012) Beyond social graphs: user interactions in online social networks and their implications. ACM Trans Web 6(4):17:1–17:31CrossRefGoogle Scholar
  36. Xiang R, Neville J, Rogati M (2010) Modeling relationship strength in online social networks. In: Proceedings of the 19th international conference on World wide web, WWW’10. ACM, New York, pp 981–990Google Scholar
  37. Zhang C, Sun J, Zhu X, Fang Y (2010) Privacy and security for online social networks: challenges and opportunities. IEEE Netw 24(4):13–18CrossRefGoogle Scholar
  38. Zhang T, Chao H, Tretter D (2011) Dynamic estimation of family relations from photos. In: Lee K-T, Tsai W-H, Liao H-Y, Chen T, Hsieh J-W, Tseng C-C (eds) Advances in multimedia modeling. Lecture notes in computer science, 6524. Springer, Berlin/Heidelberg, pp 65–76Google Scholar
  39. Zheleva E, Terzi E, Getoor L (2012) Privacy in social networks. Synth Lect Data Min Knowl Disc 3(1):1–85CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media LLC 2017

Authors and Affiliations

  1. 1.Faculty of BusinessMemorial University of NewfoundlandSt. John’sCanada
  2. 2.University Pau & Pays AdourLaboratoire LIUPPAAngletFrance

Section editors and affiliations

  • Mick J Ridley
    • 1
  • Richard Chbeir
    • 2
  1. 1.University of BradfordBradfordUK
  2. 2.Laboratoire LIUPPAUniversity of Pau and Adour CountriesAngletFrance