Hierarchy Overview Background: Hierarchy surrounds us: what is it? Micro foundations of social stratification Ivan Chase: Structure from process Action.

Slides:



Advertisements
Similar presentations
Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale Network Theory: Computational Phenomena and Processes Social Network.
Advertisements

Network Matrix and Graph. Network Size Network size – a number of actors (nodes) in a network, usually denoted as k or n Size is critical for the structure.
Introduction to Graph “theory”
Lecture 17 Path Algebra Matrix multiplication of adjacency matrices of directed graphs give important information about the graphs. Manipulating these.
Chapter 8, Part I Graph Algorithms.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
V4 Matrix algorithms and graph partitioning
Centrality and Prestige HCC Spring 2005 Wednesday, April 13, 2005 Aliseya Wright.
Chapter 9 Graph algorithms. Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
Nyhoff, ADTs, Data Structures and Problem Solving with C++, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Graphs.
Graphs.
Social Position & Social Role Lei Tang 2009/02/13.
Graphs. Graph definitions There are two kinds of graphs: directed graphs (sometimes called digraphs) and undirected graphs Birmingham Rugby London Cambridge.
Introduction to Graphs
Introduction to Graphs What is a Graph? Some Example applications of Graphs. Graph Terminologies. Representation of Graphs. –Adjacency Matrix. –Adjacency.
Chapter 9 Graph algorithms Lec 21 Dec 1, Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
A measure of betweenness centrality based on random walks Author: M. E. J. Newman Presented by: Amruta Hingane Department of Computer Science Kent State.
Graphs G = (V,E) V is the vertex set. Vertices are also called nodes and points. E is the edge set. Each edge connects two different vertices. Edges are.
Graph Operations And Representation. Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
CS8803-NS Network Science Fall 2013
Network Measures Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Measures Klout.
Graph. Data Structures Linear data structures: –Array, linked list, stack, queue Non linear data structures: –Tree, binary tree, graph and digraph.
Presentation: Random Walk Betweenness, J. Govorčin Laboratory for Data Technologies, Faculty of Information Studies, Novo mesto – September 22, 2011 Random.
Computer Science 112 Fundamentals of Programming II Introduction to Graphs.
Graph Theoretic Concepts. What is a graph? A set of vertices (or nodes) linked by edges Mathematically, we often write G = (V,E)  V: set of vertices,
GRAPHS CSE, POSTECH. Chapter 16 covers the following topics Graph terminology: vertex, edge, adjacent, incident, degree, cycle, path, connected component,
Principles of Social Network Analysis. Definition of Social Networks “A social network is a set of actors that may have relationships with one another”
Introduction to Graphs. Introduction Graphs are a generalization of trees –Nodes or verticies –Edges or arcs Two kinds of graphs –Directed –Undirected.
Introduction to Graph “theory” Why do we care about graph theory in testing and quality analysis? –The “flow” (both control and data) of a design, within.
Lecture 5: Mathematics of Networks (Cont) CS 790g: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Nyhoff, ADTs, Data Structures and Problem Solving with C++, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Graphs.
Graphs. 2 Graph definitions There are two kinds of graphs: directed graphs (sometimes called digraphs) and undirected graphs Birmingham Rugby London Cambridge.
Online Social Networks and Media
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Social Balance & Hierarchy Overview Background: Basic Balance Theory Extensions to directed graphs Triads Theoretical Implications: Micro foundations of.
Connectivity & Cohesion Overview Background: Small World = Connected What distinguishes simple connection from cohesion? Moody & White Argument Measure.
Centrality in Social Networks Background: At the individual level, one dimension of position in the network can be captured through centrality. Conceptually,
Understanding Network Concepts in Modules Dong J, Horvath S (2007) BMC Systems Biology 2007, 1:24.
Chapter 10 Graph Theory Eulerian Cycle and the property of graph theory 10.3 The important property of graph theory and its representation 10.4.
Graphs & Matrices Todd Cromedy & Bruce Nicometo March 30, 2004.
Université d’Ottawa / University of Ottawa 2001 Bio 8100s Applied Multivariate Biostatistics L10.1 Lecture 10: Cluster analysis l Uses of cluster analysis.
Graphs. Graphs Similar to the graphs you’ve known since the 5 th grade: line graphs, bar graphs, etc., but more general. Those mathematical graphs are.
Graphs A graphs is an abstract representation of a set of objects, called vertices or nodes, where some pairs of the objects are connected by links, called.
Structural Holes & Weak Ties
11 Network Level Indicators Bird’s eye view of network Image matrix example of network level Many network level measures Some would argue this is the most.
Data Structures & Algorithms Graphs Richard Newman based on book by R. Sedgewick and slides by S. Sahni.
Graphs 황승원 Fall 2010 CSE, POSTECH. 2 2 Graphs G = (V,E) V is the vertex set. Vertices are also called nodes and points. E is the edge set. Each edge connects.
GRAPHS. Graph Graph terminology: vertex, edge, adjacent, incident, degree, cycle, path, connected component, spanning tree Types of graphs: undirected,
DM GROUP MEETING PRESENTATION PLAN Eigenvector-based Centrality Measures For Temporal Networks by D Taylor et.al. Uncovering the Small Community.
Graphs Definition: a graph is an abstract representation of a set of objects where some pairs of the objects are connected by links. The interconnected.
An Algorithm for Measuring Optimal Connections in Large Valued Networks Song Yang Henry Hexmoor Sociology Computer Science University of Arkansas Preparation.
Importance Measures on Nodes Lecture 2 Srinivasan Parthasarathy 1.
Main Index Contents 11 Main Index Contents Graph Categories Graph Categories Example of Digraph Example of Digraph Connectedness of Digraph Connectedness.
Lecture 20. Graphs and network models 1. Recap Binary search tree is a special binary tree which is designed to make the search of elements or keys in.
Ranking in social networks
Chapter - 12 GRAPH MATRICES AND APPLICATIONS.
Social Networks Analysis
Social Balance & Transitivity
Graph Operations And Representation
Network Science: A Short Introduction i3 Workshop
Hierarchy Overview Background: Hierarchy surrounds us: what is it?
Graph Operations And Representation
Social Balance & Transitivity
Flow Feasibility Problems
(Social) Networks Analysis II
Graph Algorithms DS.GR.1 Chapter 9 Overview Representation
Graph Operations And Representation
Graphs.
Chapter 9 Graph algorithms
Introduction to Graphs
Presentation transcript:

Hierarchy Overview Background: Hierarchy surrounds us: what is it? Micro foundations of social stratification Ivan Chase: Structure from process Action --> Structure, not attributes David Krackhardt: Deliberate Structure w. in organizations Measures for the extent of hierarchy

Examples of Hierarchical Systems Linear Hierarchy (all triads transitive) Simple Hierarchy Branched Hierarchy Mixed Hierarchy

Examples of “Similar” Non-Hierarchical Systems Acyclic Cycle Line Graph

Chase’s Question: Where does hierarchy come from? Hierarchy surrounds us, in natural (animal and human) and controlled (laboratory, organizations) settings. How do we account for it? Most previous research focuses on the static structure of hierarchy Often consider the attributes of actors: strength, race, gender, education, size, etc.

Chase’s Question: Where does hierarchy come from? The “Correlational Model” Individual’s position in the hierarchy is due to their attributes (physical, social, etc.) Mathematically, for the correlational model to be true, the correspondence between attributes and rank in the hierarchy would have to be extremely high (Pearson correlation of >.9). (See Chase, 1974 for details)

Chase’s Question: Where does hierarchy come from? The “Pairwise interaction” model Pairwise differences in each dyad account for position in the hierarchy. “...it is assumed that each member of a group has a pairwise contest with each other member, that the winner of a contest dominates the loser in the group hierarchy, and that an individual has a particular probability of success in each contest.” Model implies that there be one individual with a.95 probability of beating every other individual, another with a.95 probability of beating everyone but the most dominant, and so forth down the line. The required conditions simply do not hold. As such, this explanation for where the hierarchy comes from cannot hold.

Chase’s Question: Where does hierarchy come from? Chase focuses on the simple mathematical fact: Every linear hierarchy must contain all transitive triads. That is, the triad census for the network must have only 3 T triads. A B C D E Number of Type triads D U C D U T C D U C Sum (2 - 16): 10 What process could generate all 030T triads?

Chase’s Question: Where does hierarchy come from? A CB Transitive (030T) triad A CB Intransitive (030C) triad The elements: Dominance relations must by asymmetric, thus, the set of possible triads is limited.

Why Chase Finds Linear Hierarchy: D 021U 021C 030C 030T p=1. p=.5 p=.25 p=.5 p=1 p=.5 P( 3 C) =.5*.5=.25 P( 3 T)= (.5* *1 +.25*1) =.75 Triad transitions (w/ Random Expectations) for Dominance Relations.

Dominance Strategies That ensure a transitive hierarchy D 030T The “Double Attack” Strategy: The first attacker quickly attacks the bystander. This means we arrive at 21D, and any action on the part of the other two chickens will lead to a transitive triad. The “Double Receive” Strategy: The first attacker dominates B, and then the bystander quickly dominates B as well, leading to 21U, and any dominance between the first and second attacker will lead to a transitive triple U 030T

Dominance Strategies That may not lead to a transitive hierarchy “Attack the Attacker” The bystander attacks the first attacker. This could lead to a cyclic triad, and thus thwart hierarchy C 030C 030T “Pass on the attack” The one who is attacked, attacks the bystander. Again, this could lead to a cycle, and thus thwart hierarchy C 030C 030T

The evidence : 24 Chase Chicken Triads D 021U 021C 030C 030 T (17 stay) Domination Reversal New Domination (1 stays) (6 Fully Transitive) ( 0 stay) Most Common Path

Graph Theoretic Dimensions of Informal Organizations Moving beyond dominance relations in animals, what can SNA tell us about dominance in organizations? Krackhardt argues that an ‘Outree” is the archetype of hierarchy. (what are the allowed triad types for an out-tree?) Krackhardt focuses on 4 dimensions: 1) Connectedness 2) Digraph hierarchic 3) digraph efficiency 4) least upper bound

Graph Theoretic Dimensions of Informal Organizations Connectedness: The digraph is connected if the underlying graph is a component. We can measure the extent of connectedness through reachability. Where V is the number of pairs that are not reachable, and N is the number of people in the network.

Graph Theoretic Dimensions of Informal Organizations How to calculate Connectedness: Digraph: Graph: Reach: V = # of zeros in the upper diagonal of Reach: V = 4. C = 1 - [4/((5*4)/2)] = 1 - 4/1 =.6

Graph Theoretic Dimensions of Informal Organizations How to calculate Connectedness: This is equivalent to the density of the reachability matrix. Reachable:  =  R/(N(N-1)) = 12 /(5*4) =.6 Reach:

Graph Theoretic Dimensions of Informal Organizations Graph Hierarchy: The extent to which people are asymmetrically reachable. Where V is the number of symmetrically reachable pairs in the network. Max(V) is the number of pairs where i can reach j or j can reach i.

Graph Theoretic Dimensions of Informal Organizations Graph Hierarchy: An example Digraph: D reach V = 1 Max(V) = 4 H = 1/4 =.25 D reachable

Graph Theoretic Dimensions of Informal Organizations Graph Efficiency: The extent to which there are extra lines in the graph, given the number of components. Where v is the number of excess links and max(v) is the maximum possible number of excess links

Graph Theoretic Dimensions of Informal Organizations Graph Efficiency: The minimum number of lines in a connected component is N-1 (assuming symmetry, only use the upper half of the adjacency matrix). In this example, the first component contains 4 nodes and thus the minimum required lines is 3. There are 4 lines, and thus V 1 = 4-3 = 1. The second component contains 3 nodes and thus minimum connectivity is = 2, there are 3 so V 2 = 1. Summed over all components V=2. The maximum number of lines would occur if every node was connected to every other, and equals N(N-1)/2. For the first component Max(V 1 ) = (6-3)=3. For the second, Max(V2) = (3-2)=1, so Max(V) = 4. Efficiency = (1- 2/4 ) =.5 1 2

Graph Theoretic Dimensions of Informal Organizations Graph Efficiency: Steps to calculate efficiency: a) identify all components in the graph b) for each component (i) do: i) calculate V i =  (G i )/2 - N i -1; ii) calculate Max(V i ) = N i (N i -1) - (N i -1) c) V =  (V i ), Max(V)=  (Max(V i ) d) efficiency = 1 = V/Max(V) Substantively, this must be a function of the average density of the components in the graph.

Graph Theoretic Dimensions of Informal Organizations Least Upper Boundedness: This condition looks at how many ‘roots’ there are in the tree. The LUB for any pair of actors is the closest person who can reach both of them. In a formal hierarchy, every pair should have at least one LUB. A D B C E In this case, E is the LUB for (A,D), B is the LUB for (F,G), H is the LUB for (D,C), etc. F G H

Graph Theoretic Dimensions of Informal Organizations Least Upper Boundedness: You get a violation of LUB if two people in the organization do not have an (eventual) common boss. Here, persons 4 and 7 do not have an LUB.

Graph Theoretic Dimensions of Informal Organizations Least Upper Boundedness: Calculate LUB by looking at reachability. Distance matrix (Note that I set the diagonal = 1) Reachable matrix A violation occurs whenever a pair is not reachable by at least one common node. We can get common reachability through matrix multiplication

Graph Theoretic Dimensions of Informal Organizations Least Upper Boundedness: Calculate LUB by looking at reachability. Reachable matrix R`*R = CR Reachable Trans X = Common Reach Any place with a zero indicates a pair that does not have a LUB. (R by S)(S by R) (R by R)

Graph Theoretic Dimensions of Informal Organizations Least Upper Boundedness: Calculate LUB by looking at reachability. Where V = number of pairs that have no LUB, summed over all components, and:

Other characteristics of Hierarchy: DAG: Directed, Acyclic, Graph Graph that: contains no cycles at least one node has in-degree Rank Cluster Graph in which some number of nodes are mutually reachable, but asymmetrically reachable between groups. Tree A DAG with only one root Centralization We’ll return to this when we get to centralization

Another method: Approximation based on permutation One characteristic of a hierarchy is that most of the ties fall on the upper triangle of the adjacency matrix. Thus, one way to get an order is by juggling the rows and columns until most of the ties are in the upper triangle

Another method: Approximation based on permutation Re-ordered matrix