摘要 :
This is a summary of Sociological Concepts Related to Social Network and Its Techniques for Quantifying Social Cohesion, Social Position, Social Distance. Hopefully, they will be useful for designing search algorithms in more sociological sense.
摘要 :
The focus of the research project was on developing an interdisciplinary, analytical approach to dimensionality reduction, information dissemination, aggregation and monitoring over complex networks. In the course of the project's...
展开
The focus of the research project was on developing an interdisciplinary, analytical approach to dimensionality reduction, information dissemination, aggregation and monitoring over complex networks. In the course of the project's development, the following system solutions were proposed, analyzed and implemented: (1) A novel approach to combating physical and network layer communication errors through the novel framework of network coding, termed Hybrid Network Coding; (2) An algorithmic solution for compressive sensing with side information, termed Sparsely Corrupted Information Bottleneck; (3) A family of distributed vote (ordinal data) aggregation methods over networks, with applications in social choice theory and bioinformatics.
收起
摘要 :
Social media is a new model of interaction that is having an unanticipated and rapidly evolving effect on the political and social landscape of the world. Emphasis on and discussion about the use and role of social media accompani...
展开
Social media is a new model of interaction that is having an unanticipated and rapidly evolving effect on the political and social landscape of the world. Emphasis on and discussion about the use and role of social media accompanies many of todays ongoing debates, introducing a new variable into the policy-making process. The widespread impression is that the growth of social media can play an influential role in the policy-making process. But while extensive research continuously monitors the effects of social media, a closer review of current statistics and analysis suggests the need to reevaluate its relation to the policy-making process. Audiences are largely becoming more and more skeptical about information carried by social networks. The lack of trust reveals and reflects the same attitude generally reserved for traditional media, relegating social media to a mere gauge of public opinion. The direct value of and effects between social media and the policy-making process are extremely difficult to assess, because of both the complexity of interactions and the number of concurring factors. Ultimately, despite the emphasis on the phenomenon, social medias role in the policy-making process appears to be generally overstated as social networks seem unable to bring a dramatic change in its dynamics. However, because of the lack of definite evidence and given the magnitude of the phenomenon, the effects of social media cannot be discarded a priori. Innovation brought by social media is likely to increase the tendency to scrutinize every aspect of the public policy-making process, which might eventually induce policy makers to face the necessity of engaging social networks in their deliberative process.
收起
摘要 :
My primary research question is: can social networks assist analysts fight terrorism. My secondary research questions are as follows. First, how does social networking create linkages. Second, how have social networks been used to...
展开
My primary research question is: can social networks assist analysts fight terrorism. My secondary research questions are as follows. First, how does social networking create linkages. Second, how have social networks been used to solve small problems. Third, how have social networks been used to enact large-scale changes. My literature review incorporates theories concerning the growth of organizations and the power of focused applications of mass input. Ori Brafman and Rod A. Beckstrom describe the power of leaderless organizations. Clay Shirky champions the power of crowdsourcing to solve large complex problems. David Meerman Scott demonstrates how to cause world-changing reactions via social media. My methodology is a collective case study. My research incorporates the prevailing ideas, best practices, and real-world examples of applications of social networks to produce a desired effect. My research is very reliant upon real-world examples. While still under review, my initial conclusion is quite definitive. Social networks can assist analysts fight terrorism. While most evolutionary changes are impossible to see by the affected population due to its slow-moving, imperceptible growth, one only has to look at Tunisia, Egypt, and Libya to see the immediate effects of social networks.
收起
摘要 :
Modern criminal networks are constantly changing to maintain secrecy, recruit members, and coordinate activities. Attempts to uncover important elements of these networks need to incorporate dynamic trends to provide useful findin...
展开
Modern criminal networks are constantly changing to maintain secrecy, recruit members, and coordinate activities. Attempts to uncover important elements of these networks need to incorporate dynamic trends to provide useful findings and disrupt harmful plans. Our research provides a promising approach whereby analysts can forecast network behavior and stay a step ahead of their adversaries. This report explores the theoretical background of dynamic networks and uses the network measures of degree, closeness, betweenness, and eigenvector centrality over time to conduct network trend analysis. As a case study, I examined the Ali Baba data set that provides messages from a fictitious terrorist cell over a seven-month period. The force-directed Fruchterman-Reingold algorithm was used to visualize the Ali Baba network each month to identify structure, distinguish key players, and understand behavioral roles. Despite the low density of interactions, results revealed the ranking of eigenvector centrality to match the terrorist attack cycle. Several methods for centrality measure prediction are also evaluated, including regression and moving average. Lastly, the results of the removal of a key node from a scale- free criminal network are examined. These examples are an important step in the continuing effort to predict terrorist network behavior.
收起