background preloader

Social Network Analysis

Social Network Analysis
Brief Description: "Social network analysis is the mapping and measuring of relationships and flows between people, groups, organisations, computers or other information/knowledge processing entities." (Valdis Krebs, 2002). Social Network Analysis (SNA) is a method for visualizing our people and connection power, leading us to identify how we can best interact to share knowledge. A related practice is Network Mapping. History: When to use: How to use: From the UK's NHS KM Library: "In the context of knowledge management, social network analysis (SNA) enables relationships between people to be mapped in order to identify knowledge flows: who do people seek information and knowledge from? Informal Face to Face Network Mapping To highlight the value of our social networks, at a face to face gathering create an informal map using Post-it notes on a large piece of paper. Tools and Software for SNA Highly recommend. Training on SNA Tips and Lessons Learnt Examples & Stories (add yours) Tags

Related:  daflorezbSocial Network Systemst3alphaConceptData Science and LA

Why is a minute divided into 60 seconds, an hour into 60 minutes, yet there are only 24 hours in a day? Michael A. Lombardi, a metrologist in the Time and Frequency Division at the National Institute of Standards and Technology in Boulder, Colo., takes the case. In today's world, the most widely used numeral system is decimal (base 10), a system that probably originated because it made it easy for humans to count using their fingers. The civilizations that first divided the day into smaller parts, however, used different numeral systems, specifically duodecimal (base 12) and sexagesimal (base 60). Thanks to documented evidence of the Egyptians' use of sundials, most historians credit them with being the first civilization to divide the day into smaller parts.

The Emerging Science of Superspreaders (And How to Tell If You're One Of Them) Who are the most influential spreaders of information on a network? That’s a question that marketers, bloggers, news services and even governments would like answered. Not least because the answer could provide ways to promote products quickly, to boost the popularity of political parties above their rivals and to seed the rapid spread of news and opinions. So it’s not surprising that network theorists have spent some time thinking about how best to identify these people and to check how the information they receive might spread around a network. Indeed, they’ve found a number of measures that spot so-called superspreaders, people who spread information, ideas or even disease more efficiently than anybody else.

Fritz Springmeier & Cisco Wheeler Fritz Springmeier & Cisco Wheeler (Linda Johnson). Back "Fritz is definitely the realdeal. His books are a must read for understanding how the whole mesh works on the world stage and why." Visualizing Your Facebook Network with Gephi This is a visualization of my own Facebook network that I made using the (free) software Gephi and the Facebook application netvizz. Each node in the network is one of my Facebook friends, and two friends are connected to one another if they are Facebook friends with each other. The size of the node corresponds to the "degree" of the node, which means how many connections it has. In this case, that means how many of my Facebook friends that person is Facebook friends with. (Note: I deleted the names from the nodes to protect my Facebook friends' privacy).

20+ Free and Open Source Social Network Analysis Software - Butler Analytics Social network analysis software generally uses network and graph theory to investigate social structures both analytically and visually. The main constructs are nodes (the entities we are interested in – typically people), and the ties or edges that connect them. Many of the products listed here are open source with a license that permits free use in commercial settings. Cuttlefish is a network workbench application that visualizes the networks with some of the best known layout algorithms. It allows detailed visualizations of the network data, interactive manipulation of the layout, graph edition and process visualization as well as different input methods and outputs in tex using Tikz and PSTricks. It is developed by the Chair of Systems Design of ETH Zürich , a research group that applies a complex system approach to investigate economic and social networks.

The science world is freaking out over this 25-year-old's answer to antibiotic resistance A 25-year-old student has just come up with a way to fight drug-resistant superbugs without antibiotics. The new approach has so far only been tested in the lab and on mice, but it could offer a potential solution to antibiotic resistance, which is now getting so bad that the United Nations recently declared it a "fundamental threat" to global health. Antibiotic-resistant bacteria already kill around 700,000 people each year, but a recent study suggests that number could rise to around 10 million by 2050. In addition to common hospital superbug, methicillin-resistant Staphylococcus aureus (MRSA), scientists are now also concerned that gonorrhoea is about to become resistant to all remaining drugs. But Shu Lam, a 25-year-old PhD student at the University of Melbourne in Australia, has developed a star-shaped polymer that can kill six different superbug strains without antibiotics, simply by ripping apart their cell walls.

Measuring Large-Scale Social Networks with High Resolution This paper describes the deployment of a large-scale study designed to measure human interactions across a variety of communication channels, with high temporal resolution and spanning multiple years—the Copenhagen Networks Study. Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1 000 individuals, using state-of-the-art smartphones as social sensors. Here we provide an overview of the related work and describe the motivation and research agenda driving the study. Additionally, the paper details the data-types measured, and the technical infrastructure in terms of both backend and phone software, as well as an outline of the deployment procedures. We document the participant privacy procedures and their underlying principles.

The Illuminati Formula 10:. Spiritual Control Techniques, Possession, Trances, Etc [back] The Illuminati Formula Chapter 10: The 10th Science - Using Spiritual Things To Control A Person 8-1.gif Saving this chapter for last (of the mind, body, spirit chapters) is like saving the best wine for last. Complexity and the networked society learning + networked society + dossiers + extra home + what's new + index + comments + rss feed With the title "Living and Working in the Information Society", IST98 took place in Vienna from November 30th to December 2nd 1998. One of the highlights of the event was a panel about "The Networked Society" with the Nobel Peace Prize Winner, Ilya Prigogine. Two books are quoted in the following article.

Related:  Network mapping