Social Network Analysis with Applications

Wiley, 2013年6月6日 - 320 頁
0 書評
評論未經驗證,但 Google 會查證並移除遭檢舉的不實內容
A comprehensive introduction to social network analysis that hones in on basic centrality measures, social links, subgroup analysis, data sources, and more

Written by military, industry, and business professionals, this book introduces readers to social network analysis, the new and emerging topic that has recently become of significant use for industry, management, law enforcement, and military practitioners for identifying both vulnerabilities and opportunities in collaborative networked organizations.

Focusing on models and methods for the analysis of organizational risk, Social Network Analysis with Applications provides easily accessible, yet comprehensive coverage of network basics, centrality measures, social link theory, subgroup analysis, relational algebra, data sources, and more. Examples of mathematical calculations and formulas for social network measures are also included.

Along with practice problems and exercises, this easily accessible book covers:

  • The basic concepts of networks, nodes, links, adjacency matrices, and graphs
  • Mathematical calculations and exercises for centrality, the basic measures of degree, betweenness, closeness, and eigenvector centralities
  • Graph-level measures, with a special focus on both the visual and numerical analysis of networks
  • Matrix algebra, outlining basic concepts such as matrix addition, subtraction, multiplication, and transpose and inverse calculations in linear algebra that are useful for developing networks from relational data
  • Meta-networks and relational algebra, social links, diffusion through networks, subgroup analysis, and more

An excellent resource for practitioners in industry, management, law enforcement, and military intelligence who wish to learn and apply social network analysis to their respective fields, Social Network Analysis with Applications is also an ideal text for upper-level undergraduate and graduate level courses and workshops on the subject.

讀者評論 - 撰寫評論


關於作者 (2013)

IAN McCULLOH, PhD, holds academic appointments at several institutions to include Curtin University Business School. He consults industry to increase collaboration in knowledge-intensive organizations and educates military intelligence professionals to more ethically and effectively target enemy networks. He has supported the U.S. Military with network analysis to include service in Afghanistan and Iraq.

HELEN ARMSTRONG, PhD, is an Associate Professor in the School of Information Systems at Curtin University in Perth, Australia. She has more than twenty years' experience teaching and conducting research in ICT network security, analyses of networks and systems, information systems strategy, and management and problem solving in business environments. She works closely with industry in the application of network analyses for business problem solving and risk analyses.

ANTHONY JOHNSON, PhD, is an Associate Professor in the Department of Mathematical Sciences at the United States Military Academy at West Point. He has served in a variety of positions ranging from Fiber Optic Cable Network Engineer for the White House Communications Agency to the Chief of Counter Improvised Explosive Device (CIED) Operations in Iraq where he applied linear algebra and graph theory to exploit terrorist networks.