Mon, 02 Jan 2017 in Revista publicaciones e Investigación
State of art: utilizing social network analysis in diverse fields
ABSTRACT
This paper shows an overview of the different concepts and techniques that are been used in social network analysis; also it shows new uses of SNA and different challenges that it is facing.In a first moment, it illustrates the way of representing the social networks through graphs of matrices, highlighting the importance of nodes in the graphi- cal method and the wider application of the second method, due to the mathematical thechniques used there. The importance of nodes is deepened, the different techniques for analysis; and they are defined, their influence is es- tablished and the disadvantage of their use is mentioned. Similarly, a comparison of the techniques used to analyze the strength of ties that unite these nodes, defined as the combination of a series of characteristics of these relation- ships, is presented. In addition, an analysis of the new uses of SNA and the challenges that it faces, oriented to the verification of the accuracy of the information, is made.As a conclusión, it can be observed that the Social Network Analysis, SNA, can be applied in many fields and that is a need the research and development of new systems, tech- niques and analytical tools in this áre. In this process it is important to take into account the basic role played by engineers, mathematicians and sociologists in predicting the behavior of different social networks and in the design and generation of these new techniques.
Main Text
Introduction
In the last decade social networks such as Facebook, Twitter, Google and many others, have become part of daily life; it has a major impact on people, since 22% of the time spent online is dedicated to social networks (Mindjumpers 2012). But what is defined as a social network? Basically, it is a social structure between ac- tors, individuals or organizations, which indicate the ways in which they get connected throughout a range of familiarities from simple acquaintances to people with close ties (Hanneman & Riddle 2005). Many of us based on the definition, could claim that social network analysis should be conducted by sociologists and experts in social areas and indeed, some authors define it as “an important branch of western sociology and a new way to study social science” (Ding, 2011) (Mao Ping, 2011), (Wei, 2011) Due to the magnitude of the amount of users and the complexity of social networks, interdisciplinary groups between sociologists, mathematicians and engineers, have been established to achieve the creation of methods of social network analysis what is known today as Social Network Analysis (SNA).
SNA is defined as: “the mapping and measuring of relationships and flows between people, groups, organizations, animals, and computers or other information / knowledge processing entities” (Jamali & Abolhassan 2006). Through the analysis of social networks, we observe in the market how social applications are created such as disease modeling (Eubank et al. 2004), marketing Carrasco et al. 2003), recommender systems (Palau et al. 2004), (Mao Ping, 2011) and propagation of influence in social network (Goyal, Bonchi & Lakshmanan 2008; Chen et al. 2009). Therefore, the analysis of social net- works has become the subject of many research efforts.
The objective of this report is to analyze the use of SNA in different scenarios of people’s daily lives. As a result, this report is divided into four sections: Section II is a summary of the most common definitions and techniques for analyzing social networks, which are illustrated with examples; then in section III a series of articles are analyzed to show the different applications of SNA, in section IV the challenges of SNA are mentioned to create a more complete and accurate analysis, and finally the conclusions of this analysis are stated.
Analysis of the definitions and techniques used in SNA
This section is a summary of the techniques used in SNA and how these are reflected in current social networks.
Social networks are commonly represented in two ways: graphically modeling social networks using graphs, as well as, being represented with matrices (Jamali & Abolhassan 2006). With graphs, each user is represented as a nodes and relationships are represented by edges. We must mention that the relationship between users can be direct. For example, on Facebook when you add a friend the two people share information, meaning that the communication is reciprocal and also indirect; Twitter allows a person to have many followers and he/she may follow different people. Not requiring this person to follow someone who is following him/her. Facebook also gives the opportunity to subscribe to these people. The second form of repre sentation used to model social networks is the adjacent matrix. This method is applied mostly because of the use of mathematical techniques to analyze social net- works (Lei & Huan 2010). Figure 1 shows an example of the two types of representation.
Due to the huge number of users in social networks, these are classified as Large-Scale network, and re- searchers have identified a number of common proper- ties such as size, density, degree, reachability, distance, diameter, and geodesic distance (Hanneman & Riddle 2005). Similarly, Ties and Influence have been agreed to be the set of techniques for analyzing social networks based on the nodes and each is summarized below.
- Importance of the Nodes
The summary of the techniques is shown in table 1.
The disadvantage of these techniques in order to analysis social networks, is that there are different types of relationships between nodes. For example, If you look at the number of Facebook friends you have, you would see that this is, in most cases, a large number. In my case, I have 600 friends; yet that does not indicate the closeness I have with them. This fact takes away the support for an analysis supposing that we were based it only on these techniques.
Since we are talking about social networks, the term social comes from the Latin socus, which means a group of humans. Hence, we should analyze the social networks as a group rather than an individual, and that is why other analysis techniques have been created and shall be explained later.
- Strengths of Ties
According to Granovetter, strength of ties is defined as: “a combination of the amount of time, the emotional intensity, the intimacy, and the reciprocal services which characterize the tie” (Lei & Huan 2010).
Similar to the importance of nodes, there are three techniques to evaluate the strength of the connections which are summarized in table 2.
One can see that these techniques are commonly applied within social networks. For example, the first technique is used to suggest friends, looking at Figure 2, on the right of the Linkedin page, we find the op tion of suggested friends.
Note that the algorithms used in social networks like MySpace, Facebook, Linkedin etc, are modified to achieve better results but are not revealed (Quora 2010).
The Attributes and Interactions technique can be found in Facebook when we observe the home section which shows current news from our friends. Usually, this is news from the people you interact, share photos or exchange messages, as shown in figure 3.
The last technique, Sequence of User Activities is used by the marketing people to analyze how nodes influence others. On Amazon, for example, when you search for a book, a series of suggested books appears as well, which are based on books that were seen by other people who bought the same book that you’re interested in. This is shown in Figure 4.
This technique has brought a major challenge for en gineers and mathematicians in order to define a model to analyze the influence of a node onto other. Table 3 shows two models that are generally used for this.
In order to conclude this section, community detection and evaluation will be explained based on the events whenever groups of users form into communities and social networks are targeted to certain types of users. Some examples are: Flickr is aimed at amateur photographers, SoundCloud allows exchanges between music lovers, and LinkedIn for business contacts and others.
- Community
We found that the nodes (users) in social networks tend to interact between different groups, which lead to the challenge of identifying these groups and make a further analysis in each group (Jamali & Abolhassan 2006). Table 4 shows a comparison of approaches to define groups and subgroups in the social networks.
The technique to find these groups within social net- works is still a challenge for the SNA. Some of these proposed techniques are summarized in Table 5.
As for the detection of communities and subgroups within the social networking world, is a very complex and difficult task to structure. Therefore, we can see how more websites are specialized for specific groups of people in the market of social networks, reducing its size so it can provide better analysis and a bet ter experience for the user. Such examples are Sound Cloud for musicians and Flickr for photographers, among others.
With all this we see the complexity of social networks and how they are structured in a general way.
Analysis of new uses of SNA
In the previous section, we saw the different SNA tech niques and how they are applied to some examples. Therefore, it was observed that most of these techniques are used in common social networks like Face- book, My Space, Google and others, but the concept of social networks is broader than just social networks field and shows how SNA can be applied in other fields. Next, we will examine four different cases used.
The first one is entitled “Multi-factor analysis of Terror ist Activities based on social network” (Julei et al.2012), which presents a method for identify the nucleus of a terrorist organization, possible attacks, slipping and lo cation of the organization. So as, to test this, the techniques proposed in section 2 are applied as: Degree Centrality, Closeness Centrality, Betweenness Central ity, and other new elements of analysis such as Cohesive Subgroup Analysis, Spatial Correlation Analysis and Invulnerability Analysis. All this was applied to an empir ical test called “East Turkistan” Terrorist Activities since the founding of the People’s Republic of China and the results shown at the end are the important for some ter rorists based on the importance of node techniques. In addition, the different groups have their influence and importance within the graph and the variation of such importance during different years, which can show a view of the behavior of these terrorist networks.
On the other hand, we have seen how social networks play an important role in the case of emergencies such as tornadoes, earthquakes, floods, as a means of dissem ination of the events. Therefore, the second article we want to exhibit is “Research on Emergency Information Management Based on the Social Network Analysis: A Case Analysis of Panic Buying of Salt” (Ding, 2011) where SNA techniques are applied to study the characteristics and effects of broadcasting emergen cies, specifically in the case of “panic buying of salt” in China. Based on the collected data, they are showing the graphical representation of the network, which is directional and models the adjacent matrix in order to perform the analysis of the importance of the nodes already discussed in the previous section. After data analysis, we concluded that when an emergency occurs, and the network is very unstable and constantly chang ing, the stronger nodes, in this case the government and the media, should be attentive to the information being disseminated and for it not to be altered or changed. Also, the information has to be shared within different cities to generate peace to others and for these not to spread false information.
Another outstanding example is presented in “The Ap plication of SNA in IT-Based BRP” (Zhu et al. 2009), where the SNA is used for the reorganization of IT company to ensure better service to the end user. To accomplish this, first we perform the modeling of the structure of the company and then apply SNA techniques to see which entities play an important role in the company in order to propose a reorganization of the structure and new processes to reduce the time; it takes to dispatch an order by almost 160 %.
Finally, the last article is: “Social Network Analysis Ap- plication in Bulletin Board Systems” (Kou & Zhang 2003), which is an analysis of a BBS (Bulletin Board Systems) an electronic message center. For the case of the example, SMTH was used as a bulletin board be- longing to Tsinghua University, the largest in China (Baruah & Angelov 2012). With this information the graph is obtained and the degree of importance of the nodes are calculated; based on these nodes they can de- fine who are the best BBS moderators.
In this section, we can conclude that the SNA is a pow erful tool for engineers because of its vast scope of work, managing cases from criminal structure analysis to the reorganization of a company, since the SNA can deter- mine the current network structure and its behavior and can improve this structure based on its results.
Challenges faced by SNA
There are some challenges that the SNA must over- come. These are explained below:
- Social networks change in real time, means that whenever new nodes are made and connections appear as seen in section II and III, the techniques used can be applied to the network instantaneously or at any given moment in time, and due to the large amount of data, it is difficult to maintain the information in real time. Therefore, techniques for scalability in this analysis are being proposed, as the proposed article “Dynamic Social Network Analysis using Latent Space Model and an Integrated Clustering Algorithm” (Xu & Zheng 2009).
- It is observed that most techniques focus on the elements of a network regardless of the in- formation distributed, but as in some cases, false information can be spread just like in the case of the announcement of Justin Bieber having cancer and many of his fans shaving their heads to show support, turned out to be false (Crook 2012); or when famous bloggers who can influence thousands of people spreading rumors that can result in the loss of millions of dollars as in the case of South Korean blogger Minerva (Glionna & Park 2009). There- fore, the SNA should also adopt techniques to analyze the information or add parameters to verify the accuracy of the information.
- The SNA is applied to the personal data of people, in consequence this is an intrusive action and is often done without the consent of the user, who does not read the security policies when sharing information. In regards to this matter, laws should be created to regulate companies where this type of information is shared, in order to maintain privacy.
Conclusions
It is observed that the techniques that are used mostly for the analysis of social networks are the ones based on the importance of the node, whose disadvantages we indicated in Section 2, when it doesn’t consider the interaction between the nodes or the closeness be- tween them. This issue arises due to other techniques being more complicated mathematically; therefore, the development of software tools is needed to implement the other techniques and thus provide better in- formation to sociologists for different analysis.
The SNA can be applied in many fields as noted in Section III, and it’s very important to continue the development of applications that facilitate daily life. These tools are so strong; you can analyze complex cases, such dealing with terrorism, or simplest cases.
Due to the complexity of social networks, the SNA still has a long way to go in development since each time new elements are analyzed, and these are not easily formable as we explained in Section IV. Mechanisms are needed to predict the behavior of social networks and where engineers, mathematicians and sociologists play an important role in developing such models and new techniques for analysis.
ABSTRACT
Main Text
Introduction
Analysis of the definitions and techniques used in SNA
Analysis of new uses of SNA
Challenges faced by SNA
Conclusions