Social and Information Networks

Total Page:16

File Type:pdf, Size:1020Kb

Social and Information Networks Social and Information Networks University of Toronto CSC303 Winter/Spring 2019 Week 2: January 14,16 (2019) 1 / 42 Todays agenda Last weeks lectures and tutorial: a number of basic graph-theoretic concepts: I undirected vs directed graphs I unweighted and vertex/edge weighted graphs I paths and cycles I breadth first search I connected components and strongly connected components I giant component in a graph I bipartite graphs This lecture: Chapter 3 of the textbook on \Strong and Weak Ties". But let's first briefly return to the \romantic relations" table to see how graph structure may or may not align with our understanding of sociological phenomena. 2 / 42 The dispersion of edge In their paper, Backstrom and Kleinberg introduce various dispersion measures for an edge. The general idea of the dispersion of an edge (u; v) is that mutual neighbours of u and v should not be well \well-connected" to one another. They consider dense subgraphs of the Facebook network (where a known relationship has been stated) and study how well certain dispersion measures work in predicting a relationship edge (marriage, engagement, relationship) when one is known to exist. Another problem is to discover which individuals have a romantic relationship. Note that discovering the romantic edge or if one exists raises questions of the privacy of data. They compare their dispersion measures against the embeddedmess of an edge (to be defined) and also against certain semantic interaction features (e.g., appearance together in a photo, viewing the profile of a neighbour). 3 / 42 Performance of (Dispersion + b)^a/(Embededness + c) type embed rec.disp. photo prof.view. 0.51 all 0.391 0.688 0.528 0.389 0.505 Precision@1 married 0.462 0.758 0.561 0.319 Some experimental 0.5 results for the fractionmarried of (fem) correct0.488 0.764 0.538 0.350 0.495 0.49 married (male) 0.435 0.751 0.586 0.287 0.485 engaged 0.335 0.652 0.553 0.457 predictions 0.48 engaged (fem) 0.375 0.674 0.536 0.492 0.475 Recall that we argued(since 0.47 the median number of friendsengaged was (male) 200), that0.296 0.630 0.568 0.424 0.465 relationship 0.277 0.572 0.460 0.498 Precision at first position 0.46 relationship (fem) 0.318 0.600 0.440 0.545 the fraction might bearound 0.455 .005 when randomly choosing an edge to be 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 relationship (male) 0.239 0.546 0.479 0.455 the edge to be link to the significantExponent partner. alpha Do you findFigure anything 5. The performance of the four measures from Figure 4 when the goal is to identify the partner or a family member in the first position Figure 3. Performance of (disp(u, v)+b)↵/(emb(u, v)+c) as a func- of the ranked list. The difference in performance between the genders surprising in this table?tion of ↵, when choosing optimal values of b and c. has largely vanished, and in some cases is inverted relative to Figure 4. type embed rec.disp. photo prof.view. plying the idea of dispersion recursively — identifying nodes all 0.247 0.506 0.415 0.301 v for which the u-v link achieves a high normalized disper- married 0.321 0.607 0.449 0.210 sion based on a set of common neighbors Cuv who, in turn, married (fem) 0.296 0.551 0.391 0.202 also have high normalized dispersion in their links with u.To married (male) 0.347 0.667 0.511 0.220 carry out this recursive idea, we assign values to the nodes engaged 0.179 0.446 0.442 0.391 reflecting the dispersion of their links with u, and then update engaged (fem) 0.171 0.399 0.386 0.401 these values in terms of the dispersion values associated with engaged (male) 0.185 0.490 0.495 0.381 other nodes. Specifically, we initially define xv =1for all relationship 0.132 0.344 0.347 0.441 neighbors v of u, and then iteratively update each xv to be relationship (fem) 0.139 0.316 0.290 0.467 2 w C xw +2 s,t C dv(s, t)xsxt relationship (male) 0.125 0.369 0.399 0.418 2 uv 2 uv . Figure 4. The performance of different measures for identifying spouses P embP(u, v) and romantic partners: the numbers in the table give the precision at the Note that after the first iteration, x is 1+2 norm(u, v), and first position — the fraction of instances in which the user ranked first by v · the measuretype is in fact themax. true partner.max. Averagedall. over allall. instances,comb. re- hencewhere ranking we nodesdivide by (c)x byv after total the number first iteration of friends is equiv- a user has. cursive dispersion performsstruct. approximatelyinter. twicestruct. as wellinter. as the standard alentThus, to ranking the input nodes to byournorm machine(u, v) learning. We find algorithms the highest has 480 notionall of embeddedness,0.506 and also0.415 better overall0.531 than measures0.560 based0.705 on performance when we rank nodes by the values of x after profile viewing and presence in the same photo. features derived from 120 values per instance. Inv addition to married 0.607 0.449 0.624 0.526 0.716 the thirdthe full iteration. set of features, For purposes we also of later compute discussion, performance we will using engaged 0.446 0.442 0.472 0.615 0.708 callonly this value the structuralxv in the features, third iteration and only the therecursive interaction disper- features. of non-neighboring nodes in Cub that have no neighbors in sion rec(u, v), and will focus on this as the main examplar commonrelationship in G 0.344u, b . 0.441 0.377 0.605 0.682 u − { } fromWe our performed family of related initial dispersion-based experiments with measures. different (See machine Figure 10. The performance of methods based on machine learning learning algorithms and found that gradient tree boosting [13] Strengtheningsthat combine sets of of Dispersion. features. The first two columns show the highest the Appendix for further mathematical properties of the re- out-performed logistic4 regression,/ 42 as well as other tree-based Weperforming can learn individual a function structural that and predicts interaction whether features; ornot the thirdv is and cursive dispersion.) fourth columns show the highest performance of machine learning clas- methods. Thus, all of our in-depth analysis is conducted with thesifiers partner that combine of u in structural terms andof the interaction two variables features respectively;disp(u, v) and and emb(u, v), where the latter denotes the embeddedness PERFORMANCEthis algorithm. OF In ourSTRUCTURAL experiments, AND we divide INTERACTION the data so that the fifth column shows the performance of a classifier that combines all 50% of the users go into a training set and 50% go into a test ofstructural the u-v andlink. interaction We find features that together. performance is highest for MEASURES functions that are monotonically increasing in disp(u, v) and Weset. summarize We perform the performance 12 such divisions of our methodsinto sets inA andFigure B; 4.for each links over their time on Facebook, and it is also correlated monotonically decreasing in emb(u, v): for a fixed value of Lookingdivision initially we train at just on the set first A two and columns test on B, in theand top then row train of on B dispwith(u, the v) time, increased since the embeddedness relationship is was in fact first a reported. negative pre-(As we numbersand test (‘all’), on A. we For have each the user overallu, we performance average over ofembed- the 12 runs in dictorwill see of whetherlater in Figurev is the 11, partner performance of u. A variessimple as combina- a function dednesswhich andu recursivewas a test dispersion user to get — a the final fraction prediction. of instances tionof this of these latter two quantity quantities as well.) that comes To understand within a few whether percent there on which the highest-ranked node under these measures is ofis more any effectcomplicated of a user’s functional time forms on site can beyond be obtained its relation by the to in factPerformance the partner. of As Machine we will Learning see below Methods. in the discussion expressionthese otherdisp parameters,(u, v)/emb we(u, consider v), which a we subset term of the usersnormal- where aroundWe Figure find (Figure 6, recursive 10) that dispersion by using also boosted has higher decision perfor- trees to izedwerestrict dispersion thenorm neighborhood(u, v) since size it to normalizes lie between the 100 absolute and 150, mancecombine than a allwide ofrange the 48 ofstructural other basic features structural we measures.analyzed, we can dispersionand the time by since the embeddedness. the relationship Predicting was reportedu’s to partner lie between to increase performance from 50.8% to 53.1%. We can use the We can also compare these structural measures to features de- be100 the and individual 200 days.v maximizing Figure 9 showsnorm that(u, forv) gives this subset, the correct there is same technique to predict relationships based on interaction rived from a variety of different forms of real-time interaction answera weak in increase48.0% of in all performance instances. as a function of time on site; features.
Recommended publications
  • Why Do Academics Use Academic Social Networking Sites?
    International Review of Research in Open and Distributed Learning Volume 18, Number 1 February – 2017 Why Do Academics Use Academic Social Networking Sites? Hagit Meishar-Tal1 and Efrat Pieterse2 1Holon institute of Technology (HIT), 2Western Galilee College Abstract Academic social-networking sites (ASNS) such as Academia.edu and ResearchGate are becoming very popular among academics. These sites allow uploading academic articles, abstracts, and links to published articles; track demand for published articles, and engage in professional interaction. This study investigates the nature of the use and the perceived utility of the sites for academics. The study employs the Uses and Gratifications theory to analyze the use of ASNS. A questionnaire was sent to all faculty members at three academic institutions. The findings indicate that researchers use ASNS mainly for consumption of information, slightly less for sharing of information, and very scantily for interaction with others. As for the gratifications that motivate users to visit ASNS, four main ones were found: self-promotion and ego-bolstering, acquisition of professional knowledge, belonging to a peer community, and interaction with peers. Keywords: academic social-networking sites, users' motivation, Academia.edu, ResearchGate, uses and gratifications Introduction In the past few years, the Internet has seen the advent of academic social-networking sites (ASNS) such as Academia.edu and ResearchGate. These sites allow users to upload academic articles, abstracts, and links to published articles; track demand for their published articles; and engage in professional interaction, discussions, and exchanges of questions and answers with other users. The sites, used by millions (Van Noorden, 2014), constitute a major addition to scientific media.
    [Show full text]
  • Adam Stier, Ties That Bind.Pdf
    Ties That Bind: American Fiction and the Origins of Social Network Analysis DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Adam Charles Stier, M.A. Graduate Program in English The Ohio State University 2013 Dissertation Committee: Dr. David Herman, Advisor Dr. Brian McHale Dr. James Phelan Copyright by Adam Charles Stier 2013 Abstract Under the auspices of the digital humanities, scholars have recently raised the question of how current research on social networks might inform the study of fictional texts, even using computational methods to “quantify” the relationships among characters in a given work. However, by focusing on only the most recent developments in social network research, such criticism has so far neglected to consider how the historical development of social network analysis—a methodology that attempts to identify the rule-bound processes and structures underlying interpersonal relationships—converges with literary history. Innovated by sociologists and social psychologists of the late nineteenth and early twentieth centuries, including Georg Simmel (chapter 1), Charles Horton Cooley (chapter 2), Jacob Moreno (chapter 3), and theorists of the “small world” phenomenon (chapter 4), social network analysis emerged concurrently with the development of American literary modernism. Over the course of four chapters, Ties That Bind demonstrates that American modernist fiction coincided with a nascent “science” of social networks, such that we can discern striking parallels between emergent network-analytic procedures and the particular configurations by which American authors of this period structured (and more generally imagined) the social worlds of their stories.
    [Show full text]
  • Chap. 3 Strong and Weak Ties
    Chap. 3 Strong and weak ties • 3.1 Triadic closure • 3.2 The strength of weak ties • 3.3 Tie Strength and Network Structure in Large- Scale Data • 3.4 Tie Strength, Social Media, and Passive Engagement • 3.5 Closure, Structural Holes, and Social Capital • 3.6 Advanced Material: Betweenness Measures and Graph Partitioning 3.1 Triadic Closure • Grundidee von Triadic Closure ist: Wenn 2 Leute einen gemeinsamen Freund haben, dann sind sie mit größer Wahrscheinlichkeit, dass sie mit einander befreundet sind. 3.1 Triadic Closure 3.1 Triadic Closure • Clustering Coefficient : – The clustering coefficient of a node A is defined as the probability that two randomly selected friends of A are friends with each other. 3.1 Triadic Closure • Betrachten wir Node A • Freunde von A : B,C,D,E • Es gibt 6 Möglichkeiten, um solche Nodes zu verbinden, gibt aber nur eine Kante (C,D) => Co(A) = 1/6 3.1 Triadic Closure • Reasons for Triadic Closure: – Opportunity • B, C have chances to meet when they both know A – Basis for Trusting • When B, C both know A, they can trust each other better then unconnected people – Incentive • A wanted to bring B, C together to avoid relationship’s problems 3.2 The Strength of Weak Tie • Bridges: – An edge (A,B) is a Bridge if deleting it would cause A,B to lie in 2 different components • Means there is only one route between A,B • Bridge is extremely rare in real social network 3.2 The Strength of Weak Tie • Local Bridge: – An edge (A,B) is a local Bridge if its endpoints have no friends in common (if deleting the edge would increase the distance between A and B to a value strictly more than 2.) • Span: – span of a local bridge is the distance its endpoints would be from each other if the edge were deleted 3.2 The Strength of Weak Tie 3.2 The Strength of Weak Tie • The Strong Triadic Closure Property.
    [Show full text]
  • Music As a Bridge: an Alternative for Existing Historical Churches in Reaching Young Adults David B
    Digital Commons @ George Fox University Doctor of Ministry Theses and Dissertations 1-1-2012 Music as a bridge: an alternative for existing historical churches in reaching young adults David B. Parker George Fox University This research is a product of the Doctor of Ministry (DMin) program at George Fox University. Find out more about the program. Recommended Citation Parker, David B., "Music as a bridge: an alternative for existing historical churches in reaching young adults" (2012). Doctor of Ministry. Paper 24. http://digitalcommons.georgefox.edu/dmin/24 This Dissertation is brought to you for free and open access by the Theses and Dissertations at Digital Commons @ George Fox University. It has been accepted for inclusion in Doctor of Ministry by an authorized administrator of Digital Commons @ George Fox University. GEORGE FOX UNIVERSTY MUSIC AS A BRIDGE: AN ALTERNATIVE FOR EXISTING HISTORICAL CHURCHES IN REACHING YOUNG ADULTS A DISSERTATION SUBMITTED TO THE FACULTY OF GEORGE FOX EVANGELICAL SEMINARY IN CANDIDACY FOR THE DEGREE OF DOCTOR OF MINISTRY BY DAVID B. PARKER PORTLAND, OREGON JANUARY 2012 Copyright © 2012 by David B. Parker All rights reserved. The Scripture quotations contained herein are from the New International Version Bible, copyright © 1984. Used by permission. All rights reserved. ii George Fox Evangelical Seminary George Fox University Newberg, Oregon CERTIFICATE OF APPROVAL ________________________________ D.Min. Dissertation ________________________________ This is to certify that the D.Min. Dissertation of DAVID BRADLEY PARKER has been approved by the Dissertation Committee on March 13, 2012 as fully adequate in scope and quality as a dissertation for the degree of Doctor of Ministry in Semiotics and Future Studies Dissertation Committee: Primary Advisor: Deborah Loyd, M.A.
    [Show full text]
  • Social Network Analysis: Homophily
    Social Network Analysis: homophily Donglei Du ([email protected]) Faculty of Business Administration, University of New Brunswick, NB Canada Fredericton E3B 9Y2 Donglei Du (UNB) Social Network Analysis 1 / 41 Table of contents 1 Homophily the Schelling model 2 Test of Homophily 3 Mechanisms Underlying Homophily: Selection and Social Influence 4 Affiliation Networks and link formation Affiliation Networks Three types of link formation in social affiliation Network 5 Empirical evidence Triadic closure: Empirical evidence Focal Closure: empirical evidence Membership closure: empirical evidence (Backstrom et al., 2006; Crandall et al., 2008) Quantifying the Interplay Between Selection and Social Influence: empirical evidence—a case study 6 Appendix A: Assortative mixing in general Quantify assortative mixing Donglei Du (UNB) Social Network Analysis 2 / 41 Homophily: introduction The material is adopted from Chapter 4 of (Easley and Kleinberg, 2010). "love of the same"; "birds of a feather flock together" At the aggregate level, links in a social network tend to connect people who are similar to one another in dimensions like Immutable characteristics: racial and ethnic groups; ages; etc. Mutable characteristics: places living, occupations, levels of affluence, and interests, beliefs, and opinions; etc. A.k.a., assortative mixing Donglei Du (UNB) Social Network Analysis 4 / 41 Homophily at action: racial segregation Figure: Credit: (Easley and Kleinberg, 2010) Donglei Du (UNB) Social Network Analysis 5 / 41 Homophily at action: racial segregation Credit: (Easley and Kleinberg, 2010) Figure: Credit: (Easley and Kleinberg, 2010) Donglei Du (UNB) Social Network Analysis 6 / 41 Homophily: the Schelling model Thomas Crombie Schelling (born 14 April 1921): An American economist, and Professor of foreign affairs, national security, nuclear strategy, and arms control at the School of Public Policy at University of Maryland, College Park.
    [Show full text]
  • Using Strong Triadic Closure to Characterize Ties in Social Networks
    Using Strong Triadic Closure to Characterize Ties in Social Networks Stavros Sintos Panayiotis Tsaparas Department of Computer Science and Department of Computer Science and Engineering Engineering University of Ioannina University of Ioannina Ioannina, Greece Ioannina, Greece [email protected] [email protected] ABSTRACT 1. INTRODUCTION In the past few years there has been an explosion of social The past few years have been marked by the emergence networks in the online world. Users flock these networks, and explosive growth of online social networks. Facebook, creating profiles and linking themselves to other individuals. LinkedIn, and Twitter are three prominent examples of such Connecting online has a small cost compared to the physi- online networks, which have become extremely popular, en- cal world, leading to a proliferation of connections, many of gaging hundreds of millions of users all over the world. On- which carry little value or importance. Understanding the line social networks grow much faster than physical social strength and nature of these relationships is paramount to networks since the \cost" of creating and maintaining con- anyone interesting in making use of the online social net- nections is much lower. The average user in Facebook has a work data. In this paper, we use the principle of Strong few hundreds of friends, and a sizeable fraction of the net- Triadic Closure to characterize the strength of relationships work has more than a thousands friends [20]. The social cir- in social networks. The Strong Triadic Closure principle cle of the average user contains connections with true friends, stipulates that it is not possible for two individuals to have but also with forgotten high-school classmates, distant rel- a strong relationship with a common friend and not know atives, and acquaintances made through brief encounters.
    [Show full text]
  • Strong and Weak Ties
    From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World. By David Easley and Jon Kleinberg. Cambridge University Press, 2010. Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/ Chapter 3 Strong and Weak Ties One of the powerful roles that networks play is to bridge the local and the global — to offer explanations for how simple processes at the level of individual nodes and links can have complex effects that ripple through a population as a whole. In this chapter, we consider some fundamental social network issues that illustrate this theme: how information flows through a social network, how different nodes can play structurally distinct roles in this process, and how these structural considerations shape the evolution of the network itself over time. These themes all play central roles throughout the book, adapting themselves to different contexts as they arise. Our context in this chapter will begin with the famous “strength of weak ties” hypothesis from sociology [190], exploring outward from this point to more general settings as well. Let’s begin with some backgound and a motivating question. As part of his Ph.D. thesis research in the late 1960s, Mark Granovetter interviewed people who had recently changed employers to learn how they discovered their new jobs [191]. In keeping with earlier research, he found that many people learned information leading to their current jobs through personal contacts. But perhaps more strikingly, these personal contacts were often described
    [Show full text]
  • Predicting Triadic Closure in Networks Using Communicability Distance Functions
    PREDICTING TRIADIC CLOSURE IN NETWORKS USING COMMUNICABILITY DISTANCE FUNCTIONS ERNESTO ESTRADA† AND FRANCESCA ARRIGO ‡ Abstract. We propose a communication-driven mechanism for predicting triadic closure in complex networks. It is mathematically formulated on the basis of communicability distance func- tions that account for the “goodness” of communication between nodes in the network. We study 25 real-world networks and show that the proposed method predicts correctly 20% of triadic closures in these networks, in contrast to the 7.6% predicted by a random mechanism. We also show that the communication-driven method outperforms the random mechanism in explaining the clustering coefficient, average path length, average communicability, and degree heterogeneity of a network. The new method also displays some interesting features toward its use for optimizing communication and degree heterogeneity in networks. Key words. network analysis; triangles; triadic closure; communicability distance; adjacency matrix; matrix functions; quadrature rules. AMS subject classifications. 05C50, 15A16, 91D30, 05C82, 05C12. 1. Introduction. Complex networks are ubiquitous in many real-world scenar- ios, ranging from the biomolecular—those representing gene transcription, protein interactions, and metabolic reactions—to the social and infrastructural organization of modern society [12, 18, 44]. Mathematically, these networks are represented as graphs, where the nodes represent the entities of the system and the edges represent the “relations” among those entities. A vast accumulation of empirical evidence has left little doubts about the fact that most of these real-world networks are dissimilar from their random counterparts in many structural and functional aspects [18]. In particular, it is well-documented nowadays that the relative number of triangles is significantly higher in those networks arising in natural or man-made contexts that what one would expect from a random wiring of nodes [44].
    [Show full text]
  • Triadic Analysis of Affiliation Networks
    ZU064-05-FPR triadic-arxiv 27 June 2016 0:25 Under consideration for publication in Network Science 1 Triadic analysis of affiliation networks JASON CORY BRUNSON Center for Quantitative Medicine, UConn Health, Farmington, CT 06030 (e-mail: [email protected]) Abstract Triadic closure has been conceptualized and measured in a variety of ways, most famously the clus- tering coefficient. Existing extensions to affiliation networks, however, are sensitive to repeat group attendance, which manifests in bipartite models as biclique proliferation. Whereas this sensitivity does not reflect common interpretations of triadic closure in social networks, this paper proposes a measure of triadic closure in affiliation networks designed to control for it. To avoid arbitrariness, the paper introduces a triadic framework for affiliation networks, within which a range of measures can be defined; it then presents a set of basic axioms that suffice to narrow this range to the one measure. An instrumental assessment compares the proposed and two existing measures for reliability, validity, redundancy, and practicality. All three measures then take part in an investigation of three empirical social networks, which illustrates their differences. 1 Introduction Triadic analysis, which emphasizes the interactions within subsets of three nodes, has long been central to network science. Meanwhile, affiliation (or co-occurrence) data have long been a major source of empirical networks. Most triadic analyses of affiliation networks either collapse their higher-order structure or focus on relations among triples of nodes, often of mixed type. This paper, building upon some recent contributions, focuses instead on triples of actors, together with the non-actor structure that establishes relations among them.
    [Show full text]
  • Abstract Applying the Concept of Triadic Closure to Coauthorship
    This is a pre-print of a paper published in Social Network Analysis and Mining. Kim, J., & Diesner, J. (2017). Over-time measurement of triadic closure in coauthorship networks. Social Network Analysis and Mining, 7(1), 1-12. Abstract Applying the concept of triadic closure to coauthorship networks means that scholars are likely to publish a joint paper if they have previously coauthored with the same people. Prior research has identified moderate to high (20% to 40%) closure rates; suggesting that this mechanism is a reasonable explanation for tie formation between future coauthors. We show how calculating triadic closure based on prior operationalizations of closure, namely Newman’s measure for one-mode networks (NCC) and Opsahl’s measure for two-mode networks (OCC), may lead to higher amounts of closure as compared to measuring closure over time via a metric that we introduce and test in this paper. Based on empirical experiments using four large-scale, longitudinal datasets, we find a lower bound of about 1~3% closure rates and an upper bound of about 4~7%. These results motivate research on new explanatory factors for the formation of coauthorship links. Keywords: clustering coefficient, transitivity, triadic closure, scientific collaboration networks 1. Introduction and Background In the field of collaboration networks research, scholars aim to understand the mechanisms that underlie the formation of relationships between authors, which result in coauthorship ties and networks. One of these mechanisms is homophily (McPherson, Smith-Lovin, & Cook, 2001), i.e., the tendency of scholars to be more likely to collaborate with each other if they share personal, behavioral, sociodemographic or other attributes.
    [Show full text]
  • Myspace, Facebook, and the Strength of Internet Ties
    MYSPACE, FACEBOOK, AND THE STRENGTH OF INTERNET TIES: ONLINE SOCIAL NETWORKING AND BRIDGING SOCIAL CAPITAL A Thesis Presented to The Graduate Faculty of The University of Akron In Partial Fulfillment of the Requirements for the Degree Master of Arts Angela M. Adkins May, 2009 May, 2009 MYSPACE, FACEBOOK, AND THE STRENGTH OF INTERNET TIES: ONLINE SOCIAL NETWORKING AND BRIDGING SOCIAL CAPITAL Angela M. Adkins Thesis Approved: Accepted: ______________________________ ______________________________ Advisor Dean of the College Dr. Rebecca J. Erickson Dr. Chand Midha ______________________________ ______________________________ Faculty Reader Dean of the Graduate School Dr. Clare L. Stacey Dr. George R. Newkome ______________________________ ______________________________ Department Chair Date Dr. John F. Zipp ii ABSTRACT Online social networking sites seem particularly well-suited to forming the loose connections between diverse social networks, or weak ties, associated with bridging social capital, but is using one site the same as using another? This study explores the user and usage characteristics of two popular social networking websites, Myspace and Facebook, and then investigates the relationship between online social networking and bridging social capital using survey data from 929 university students and faculty members. Myspace users tend to have less education and be more racially diverse, have lower incomes, and focus more on forming new social ties online. Conversely, Facebook users tend to be better educated, have higher income, and focus more on maintaining relationships with their existing offline ties. A positive association exists between the degree of online social networking and bridging capital, although there was no meaningful difference in bridging capital between those who used Myspace only and those who used Facebook only.
    [Show full text]
  • Social and Information Network Analysis Strong and Weak Ties
    Social and Information Network Analysis Strong and Weak Ties Cornelia Caragea Department of Computer Science and Engineering University of North Texas Acknowledgement: Jure Leskovec June 13, 2016 Announcements Class notes: http://www.cse.unt.edu/∼ccaragea/kdsin16.html Lab sessions: Wednesdays, June 15 and 22, 4:30pm - 6:00pm. Homework assignment available at: http://www.cse.unt.edu/∼ccaragea/kdsin16/assignments.html Project topic presentations: Monday June 20, 4:30pm - 6:00pm. Exam: Tuesday June 21, 4:30pm - 6:00pm. To Recap What is the structure of a network? How to characterize a network structure? Connectivity Path length Small world phenomenon Node degree and degree distribution Clustering coefficient For Today’s Class We look at some fundamental social network issues: How information flows through a social network How different nodes can play structurally distinct roles in this process How these structural considerations shape the evolution of the network itself over time Networks and Communities How do we often think of networks? “Looking" which way? Networks: Flow of Information Networks play powerful roles in “bridging the local and the global" Specifically, in offering explanations for how simple processes at the level of individual nodes and links can have complex effects on a population as a whole. Motivating Question How people find out about new jobs? Mark Granovetter, as part of his PhD in 1960s, interviewed people who had recently changed employers to learn how they discovered their new jobs People find the information through personal
    [Show full text]