Mining Social Networks. Contents  What are Social Networks  Why Analyse Them?  Analysis Techniques.

Slides:



Advertisements
Similar presentations
Twitter Presented by: Keystone Computer Concepts.
Advertisements

Web 2.0: Concepts and Applications 5 Connecting People.
Social Networking: Facebook, Twitter, and Google+ Mary Rotman Publicist, O’Reilly Media.
Social Network Analysis Social Computing Foothill College.
Nicole Burkhard, Nova Scotia Agriculture November 13 th, 2011 ACORN.
How To Protect Your Privacy and Avoid Identity Theft Online.
Department of Computer Science, University of California, Irvine Site Visit for UC Irvine KD-D Project, April 21 st 2004 The Java Universal Network/Graph.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Social Network Analysis
Mining Social Networks Dr Andy Pryke Commercial Programming Lecture October 2011.
Why Use Social Media for Rotary? Peter Borner The Rotary Club of Towcester.
ESCCO Data Security Training David Dixon September 2014.
Advanced Software Engineering PROJECT. 1. MapReduce Join (2 students)  Focused on performance analysis on different implementation of join processors.
DOES SOCIAL TECHNOLOGY MAKE SENSE FOR PROCUREMENT? Joe Walsh Intermountain Healthcare: AVP Procurement Curtis McEntire Mazree: Founder & President.
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
Moral, Social and Ethical issues associated with the Internet
Science: Graph theory and networks Dr Andy Evans.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Social Media 101 An Overview of Social Media Basics.
Getting Started Copyright 2010 Peoplemovers.com, All rights reserved.
1 The Other Kind of Networking: Social Networks on the Web Dr. Jennifer Golbeck University of Maryland, College Park March 20, 2006.
A project from the Social Media Research Foundation: Finding direction in a sea of connection:
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Analyzing Networks. Milgram’s Experiments “Six degrees of Separation” Milgram’s letters to various recruits in Nebraska who were asked to forward the.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Chapter 8: Web Analytics, Web Mining, and Social Analytics
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
Laptop St Mary Star of the Sea College Mathematics Teacher’s Day University of Wollongong 2007 Gerry Sozio.
GRAPH AND LINK MINING 1. Graphs - Basics 2 Undirected Graphs Undirected Graph: The edges are undirected pairs – they can be traversed in any direction.
CRIM6660 Terrorist Networks Lesson 1: Introduction, Terms and Definitions.
INTRODUCTION TO SOCIAL MEDIA. MARKETING TOOL Global Networking 24/7 Building a Following Giving to Others Building Quality Relationships Online Sales.
Communications Sally Williams SI Taunton. Proposed Outline Websites – SIGBI – Members Pages Accounts Social Media – Facebook – Twitter Measure –
Protecting Your Assets By Preventing Identity Theft
Adult Student Match.
Genevieve’s Fundraising
Aberdeen Networking Event Workshop
Keeping Children Safe Online
Emotion propagation in online communities
Social Networks Analysis
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Automated ad placement
5. Social Networks 78.
How to use the internet safely and How to protect my personal data?
Introduction to LinkedIn
More and more pre-schoolers are using their parents’ computers, smartphones or tablets to play games, use apps, and watch their favourite TV shows.  Habits.
Comparison of Social Networks by Likhitha Ravi
Topic 5: Online Communities Press F5 to view!
E-Commerce Theories & Practices
Online Safety.
SOCIAL NETWORKS Amit Sharma INF -38FQ School of Information
SOCIAL MEDIA MARKETING
Open source social network PHP | Social Networking Script | Open Source Social Networking Script
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
Risk of the Internet At Home
Social Media and Communications Training
Why social media matters
Social Network Analysis in Intelligence
Social Media Safety Freshman Seminar.
Smart Portal To Protect Child Online
Social Media and Networking: What it is & why it’s important
SOCIAL NETWORK ANALYSIS
Starting Design: Logical Architecture and UML Package Diagrams
CS 594: Empirical Methods in HCC Social Network Analysis in HCI
Customer Service in a Virtual World
SOCIAL MEDIA: FIRST STEPS
SOCIAL NETWORKS Amit Sharma INF -38FQ School of Information
Graph and Link Mining.
1. A traditional crisis CRISIS
Analyzing Massive Graphs - ParT I
E-safety Presentation
Presentation transcript:

Mining Social Networks

Contents  What are Social Networks  Why Analyse Them?  Analysis Techniques  Example Applications

Social Network Analysis  Also called Organizational Network Analysis  Pre-dates data mining.  Developed by sociologists and anthropologists  Formalise their understanding of family and community relationships.

What is a Network  Referred to technically as a "graph".  Each person (or organisation etc.) is represented as a node.  Visually this is normally a dot or square.  Connections are called “ links ” or “ edges ”  Represented as a line.  Indicates communications (e.g. s), purchases, visits, or less tangible things such as emotional relationships.  Can be “directed” or “undirected” e.g. On Twitter, you follow Stephen Fry, but he doesn’t follow you!

communication Graph Nodes = People Links = s

Applications of Social Network Data Mining Typical applications of social network analysis and data mining:  Detection of criminal activity, Counter terrorism, "homeland security" and intelligence  Analysis of relationships within companies  Sociological and anthropological studies  Reciprocal trust schemes such as e-bay ratings  Recommended friends on Facebook  Filter or recommend social media content  Etc….

Complex Network Example

Complex Network Example

How do we Analyse Networks?

Graph Statistics - Individual Nodes  Degree Centrality  Number of connections to other nodes.  High values means many connections.  Can measure links in and out separately  Applications  Who is most listened to on Twitter?  Who has most contacts within a company?  Which user’s reviews influence others the most?

Graph Statistics - Individual Nodes  Closeness Centrality  The average number of steps required to reach any other node. Communications are easier if you don't have to go through too many people.  Applications  Is this person central to the group?  Is your message likely to reach the audience?

Graph Statistics - Individual Nodes  Betweenness Centrality  How much of a link between other nodes is this node?  Applications  Someone who has a high betweenness centrality is often a broker between others.  What happens if this person leaves the network?

Graph Statistics - Networks as a Whole  Structural holes  Gaps in linkage between groups.  Applications  Bridges across this access information from both, suggesting influence and understanding of an organisation.  Can we create a bridge?  Is there an opportunity to control or influence communications between groups?

Graph Statistics - Networks as a Whole  Degree of centralisation  is the network held together by just a few nodes?  Or is it more cohesive?  Measures include average and variance of degree centrality  Applications  Is a crime network vulnerable to disruption?  What happens to a company if a few key people leave?

Graph Statistics – More…  There are many other measures, for examples see:  

Data Mining Approaches to Networks  Structural Equivalence  Find nodes with similar roles in the network  Cluster Analysis  Identify groups of nodes which are closely connected - and characterise them  Identifying the Most Influential People  Predicting Node Types (e.g. Fraudster)  Profiling Sub-networks (e.g. terrorist cell)

Twitter - Clustered Network To reduce clutter, we can cluster people who reference each other, and only show links within clusters.

Data Mining Social Networks - Challenges  Standard problems  Incompleteness – We don’t know everything  Incorrectness – What we think we know is wrong  Inconsistency – We have contradictions in our data  Data transformation - Getting data into a form acceptable by your tools  Fuzzy Boundaries - Networks do not normally have distinct boundaries  Network Dynamics - Relationships change over time

Software for Social Network Analysis / DM StatNet – R Packages - StatNetTutorial - JUNG – Open Source Java toolkit for SNA - NetMiner - Commercial, Comprehensive SNA - Pajek - Comprehensive Social Network Analysis, free for academic use - Subdue - Graph based data mining tool. Copyright but freely downloadable - More -

Looking Forward  Lots and lots of network data out there  What about:  Applications for individuals  Social Applications  Applications within a University  Applications which makes money

Impact of Computers on SNA The rise in the power and use of computers has had two main impacts. 1.New data is available from logs of conversations, phone calls, chat and website usage, facebook friends, tweets etc... 2.Computers can be employed for analysis and data mining.

Role of computer analysis  Data collected about social networks can be complex and large.  Imagine a network documenting each purchase you've made using a credit/debit card, every phone call and SMS, each etc.  When these kinds of data are collected over large populations, the resulting graphs are much too large to be understood by eye.