Social Network Analysis

From Powerbase
Revision as of 00:24, 19 March 2010 by Claire Robinson (talk | contribs) (War on Terror)
Jump to: navigation, search

Social Network Analysis is a key component of Power Structure Research.

Freamon works out the hidden connection in the network

Background

According to the orgnet.com website:

Social network analysis [SNA] is the mapping and measuring of relationships and flows between people, groups, organizations, computers, web sites, and other information/knowledge processing entities. The nodes in the network are the people and groups while the links show relationships or flows between the nodes. SNA provides both a visual and a mathematical analysis of human relationships. Management consultants use this methodology with their business clients and call it Organizational Network Analysis [ONA].
To understand networks and their participants, we evaluate the location of actors in the network. Measuring the network location is finding the centrality of a node. These measures give us insight into the various roles and groupings in a network -- who are the connectors, mavens, leaders, bridges, isolates, where are the clusters and who is in them, who is in the core of the network, and who is on the periphery?[1]

Uses

War on Terror

According to an article on orgnet.com:

Social Network Analysis [SNA] is a mathematical method for 'connecting the dots'. SNA allows us to map and measure complex, and sometimes covert, human groups and organizations. Early in 2000, the CIA was informed of two terrorist suspects linked to al-Qaeda. Nawaf Alhazmi and Khalid Almihdhar were photographed attending a meeting of known terrorists in Malaysia. After the meeting they returned to Los Angeles, where they had already set up residence in late 1999.
What do you do with these suspects? Arrest or deport them immediately? No, we need to use them to discover more of the al-Qaeda network. Once suspects have been discovered, we can use their daily activities to uncloak their network. Just like they used our technology against us, we can use their planning process against them. Watch them, and listen to their conversations to see...
1. who they call / email
2. who visits with them locally and in other cities
3. where their money comes from
The structure of their extended network begins to emerge as data is discovered via surveillance. A suspect being monitored may have many contacts -- both accidental and intentional. We must always be wary of 'guilt by association'. Accidental contacts, like the mail delivery person, the grocery store clerk, and neighbor may not be viewed with investigative interest. Intentional contacts are like the late afternoon visitor, whose car license plate is traced back to a rental company at the airport, where we discover he arrived from Toronto (got to notify the Canadians) and his name matches a cell phone number (with a Buffalo, NY area code) that our suspect calls regularly. This intentional contact is added to our map and we start tracking his interactions -- where do they lead? As data comes in, a picture of the terrorist organization slowly comes into focus.[2]

Marketing and data mining

Sales, marketing and customer retention campaigns are set to become smarter, more effective and more profitable thanks to a new social network analysis module from data mining automation vendor KXEN. By exploiting the connections between customers of telcos, banks, retailers and others, KXEN’s new KSN module has shown more than 15% lift improvement in campaign results.
KSN identifies the otherwise hidden links – call records or bank transfers for instance – between friends, families, co-workers and other communities and extracts significant social metrics, pinpointing who are the best connected and who plays the most important role in any group. In this way it reveals valuable new customer intelligence that – when added to existing customer information – can strengthen significantly user organisations’ customer acquisition, retention, cross-sell and up-sell campaigns.
Using KSN, companies can increase the accuracy and precision of their campaigns by leveraging the many more customer attributes that the module reveals, allowing them to better predict when customers may be about to churn to another provider, close an account, or buy a new product. A feature unique to KXEN allows the analysis of multiple networks and their evolution over time, exposing specific patterns of behaviors like rotational churn, fraud and identity theft.[3]


Fetishising Social Network Analysis

Bill Domhoff argued in 2005 that many present day adherents of social network analysis have forgotten its important links to questions of power:

those who practice in the burgeoning field of network analysis ignore the early corporate interlock studies and continue to use hypothetical or small-group data for the most part while they hone their methodologies. It is as if these rigorous people are embarrassed by part of their early history.[4]

History

Resources

  • Jiscmail list SNA 'The list will facilitate discussion of social network analysis amongst interested UK academics, and will facilitate organisation of off-line meetings.'

Visualisation

Data sources

Further Reading

See Also

Notes

  1. Social Network Analysis, A Brief Introduction, orgnet.com, accessed 19 Mar 2010
  2. Connecting the Dots Tracking Two Identified Terrorists by Valdis Krebs, Orgnet.com, Original, 2002, updated in 2005, 2006, 2007
  3. New Social Network Analysis Module Strengthens KXEN Automated Data Mining 24.03.2009 | Author: RealWire
  4. Domhoff, G. W. (2005) 'Power Structure Research and the Hope for Democracy' Who Rules America, April.