Towards An Algorithm For Fitting Event‐based ModelsStadtfeld, Christoph; Robins, Garry; Pattison, PhilippaEvent‐based networksDynamic <strong>Network</strong> Analysis, Event Data, Algorithms, Model selectionFRI.AM2Researchers conducting explorative analysis of social network data with structural models like event‐based models, cross‐sectional (ERGM) or longitudinal(SIENA) models are usually confronted with finding a good model fit. On the one hand, there are many potential structures that have a significant effect on thedependent network and hence improve the model. On the other hand, an exploratory model should not be overspecified but quickly identified and easy tointerpret. The model of interest, which is supposed to describe the observed data appropriately, can be retrieved algorithmically. A brute‐<strong>for</strong>ce algorithm canhelp finding the best model solution. However, even <strong>for</strong> simple classes of models (e.g., those only including triadic structural effects) such an algorithm is oftencomputationally inefficient. From a graph‐theoretical point of view, the different substructures in a network are interdependent. In a directed network, <strong>for</strong>example, a reciprocal dyad consists of two single arcs. If the test of those two single arcs returns no significant effect, a test of the full dyad is redundantbecause it will also be insignificant and hence has no added value. It generally makes sense to start model fitting of exploratory analyses with simple single‐arcstructures. The estimates of these structures give hints on which of these structures should be combined or removed from the model. Some ideas towards afaster algorithm <strong>for</strong> fitting event‐based models are discussed.Twitter, A Medium For <strong>Social</strong> Mobilizing?: An Exploratory Study On The Use Of Twitaddons.com In South KoreaChoi, Sujin; Park, Jiyoung; Park, Han WooOnline <strong>Social</strong> <strong>Network</strong>sTwitter, <strong>Social</strong> Media, Civil Society, media useFRI.AM1Twitaddons.com, launched in March, 2010 in South Korea, allows Twitter users to organize a thematic party (“dang” in Korean) and discuss any specific topicswith the followers of that party. With its growing adoption, some parties are organized <strong>for</strong> civic engagement in political and social issues on Twitaddons.com.Observing this movement which has been rarely discussed by previous studies, whose focuses were mainly on Twitter’s social networking function, the presentstudy addresses the use of Twitter <strong>for</strong> social mobilization in our daily life. This study attempts to explore i) what attributes party organizers have, ii) whethertheir relationships with general Twitter users and with party members are different from each other, and iii) how party organizers’ attributes and relationshipswith members have affected the <strong>for</strong>mation of shared values of the party. These questions are examined through measuring the ego‐profiles of party organizersand their conversational and content‐sharing activities as well as conducting a semantic network analysis on parties. 12 parties — classified as politically,socially, and commercially oriented groups — are selected <strong>for</strong> these analyses, based on the number of members, activeness, and social and ideological stances.The data gathering period is from March, when Twitaddon.com was introduced, to the end of September, 2010. Additionally, a case study of ‘Cho‐pae‐gongsa,’a party which explicitly claims <strong>for</strong> the closure of the Chosun Ilbo — the main Korean daily newspaper, well known <strong>for</strong> its conservative and pro‐governmenteditorial status — is conducted <strong>for</strong> better understanding of the party’s innate dynamics <strong>for</strong> mobilization.
Two‐mode Projection And Data LossEverett, M G.; Borgatti, S P.Mathematical and Statistical <strong>Network</strong> ModelsTwo‐mode <strong>Network</strong>s, Data, ProjectionFRI.PM2The standard projections take a two‐mode binary matrix A and construct AAT and/or ATA and then analyze these. If our matrix A is an actor by event matrixthen the <strong>for</strong>mer is an actor by actor matrix in which the entries are the number of events pairs of actors attended together, and the latter is an event by eventmatrix of the number of actors common to both events. The projections are actually similarity matrices derived from the rows and columns of the data matrixA. In the binary case these are counts of the number of times the rows (or columns) have a one in common. One of the criticisms of using projections is thatthere is a loss of structural in<strong>for</strong>mation and it is true that using either AAT or ATA alone does lose structural in<strong>for</strong>mation. However, it is not clear how muchin<strong>for</strong>mation is actually still embedded in the projections and to what extent data is actually lost. A closer examination of this issue suggests that relatively littlein<strong>for</strong>mation is lost and even less is lost if we consider both projections together. This suggests a different approach to analyzing two‐mode data namely toanalyze both projections and combine the solutions.Unconventional Weapons And Drug Smuggling: A Dual‐network Configurational Analysis Of Terrorist OrganizationsSchoon, Eric; Asal, Victor; Breiger, Ronald; Melamed, David; Milward, H. B.; Rethemeyer, R. K.Criminals, Gangs, Terrorists, and <strong>Network</strong>sOrganizations, QCA, Covert, Dark <strong>Network</strong>sSAT.AM1Terrorist organizations are violent and often motivated politically—but this does not make them drug smugglers. Drug smuggling is an activity that many see asimmoral and problematic <strong>for</strong> organizations trying to claim moral superiority over their opponents and who are likely to see themselves as “the good guys.”Indeed, most terrorist organizations do not engage in drug smuggling. In this paper we focus on chemical, biological, radiological , or nuclear weapons (CBRN)acquisition or use, drug smuggling, and terrorist action. We examine how these activities intersect across 395 terrorist groups. To begin, we assess how keyorganizational attributes influence the probability of these organizations engaging in drug smuggling using logistic regression. However, in this paper we argue<strong>for</strong> moving beyond these conventional analytic methods, by linking actors and attribute data to two‐mode network analysis, configurational methods (as inCharles Ragin’s QCA framework), and barycentric correspondence analysis (as recently proposed by Ronald Breiger). Using our methods we provide a visualmap of the intersection of all the variables, and simultaneously all the actors in our study, while identifying key conjunctures of variables that enable us topredict drug smuggling. A key finding is that, while the (degree) centrality of terrorist organizations within a network of inter‐organizational alliances clearly hasan impact on their involvement in drug smuggling, this connectivity must be combined with other variables, in the multiple paths that we identify that are mostlikely to lead to drug smuggling.
- Page 1:
Sunbelt XXXIInternational Network f
- Page 5 and 6:
A Mixed‐method Approach To Subgro
- Page 7 and 8:
A Novel Hybrid Egocentric‐archiva
- Page 9 and 10:
A Social Network Analysis Of Tsiman
- Page 11 and 12:
A Technique For Analyzing Ergm Beha
- Page 13 and 14:
Actor Heterogeneity In Dynamic Infl
- Page 15 and 16:
An Agent‐based Approach To Evalua
- Page 17 and 18:
Anxious Solitude And Social Disinte
- Page 19 and 20:
Are You Getting What You Came For?
- Page 21 and 22:
Association Of Social Networks, Psy
- Page 23 and 24:
Birds Of The Feather Flock Together
- Page 25 and 26:
Building Political Echo Chambers: H
- Page 27 and 28:
Centrality, Structural Holes And St
- Page 29 and 30:
Coalitions In Exchange Networks: So
- Page 31 and 32:
Collaborating Through Networks: The
- Page 33 and 34:
Collaboration For Collective Action
- Page 35 and 36:
Collaborators Or Friends: Longitudi
- Page 37 and 38:
Comparing Local Configurations In S
- Page 39:
Cooperation Dynamics In Networks Cu
- Page 42:
Cross‐sectional Approximations To
- Page 45 and 46:
Designing Policy Tools For Building
- Page 47 and 48:
Discovering Jewish NetworksKadushin
- Page 49 and 50:
Dyadic Reciprocity And The Emergenc
- Page 51 and 52:
Dynamics Of Scientific Collaboratio
- Page 53 and 54:
Efficient Structures For Innovative
- Page 55 and 56:
Entrepreneurship And Local Embedded
- Page 57 and 58:
Exploring Knowledge Transfer In Vir
- Page 59 and 60:
Extracting Leadership And Influence
- Page 61 and 62:
Failing To See Or Failing To Seize
- Page 63 and 64:
Flows Of Cultural Consecration: Who
- Page 65 and 66:
Fostering Support For Innovative Pr
- Page 67 and 68:
From Whitehall To Leadenhall: Busin
- Page 69 and 70:
Game Modeling In Public Organizatio
- Page 71 and 72:
Generosity As A Public Good: Hetero
- Page 73 and 74:
Harvard Catalyst Profiles: An Open
- Page 75 and 76:
Homophily And Propinquity In Social
- Page 77 and 78:
How Far Our Network Perceptions Are
- Page 79 and 80:
Impact Of Team Faultlines On Socio
- Page 81 and 82:
Individualization As Driving Force
- Page 83 and 84:
Influences Of Return Migration On I
- Page 85 and 86:
Innovation Through ImitationGladsto
- Page 87 and 88:
Interplay Between Individual And Gr
- Page 89 and 90:
Is It Just Me, Or Are You Stressed?
- Page 91 and 92:
Knowledge Sharing In Non‐knowledg
- Page 93 and 94:
Link‐trace Sampling For Social Ne
- Page 95 and 96:
Lotico The Semantic Social NetworkN
- Page 97 and 98:
Mapping Networks: Spatial Visualiza
- Page 99 and 100:
Markets Or Networks: Rural Househol
- Page 101 and 102:
Measurement Error In Network Analys
- Page 103 and 104:
Micro‐mobilization In A Scientifi
- Page 105 and 106:
Mixing In Large Populations: Some N
- Page 107 and 108:
Modeling Real World Interpersonal N
- Page 109 and 110:
Multilevel Longitudinal Analysis Fo
- Page 111 and 112:
Multiplexity, Heterogeneity And Ove
- Page 113 and 114:
Network Centralization And The Diss
- Page 115 and 116:
Network Influence On Adolescent Alc
- Page 117 and 118:
Network Structure And A Proposed
- Page 119 and 120:
Networked Play For Health: Promotin
- Page 121 and 122:
Networks, Collective Action, And St
- Page 123 and 124:
Online And Offline Ego‐centered N
- Page 125 and 126:
Organizational Embeddedness And Str
- Page 127 and 128:
Peer Effects In Migrants’ Remitta
- Page 129 and 130:
Personal Influence Among Core Ties
- Page 131 and 132:
Perspectives To Soldiers' Professio
- Page 133 and 134:
Predicting Survival From Social Net
- Page 135 and 136: R&D Networks, Knowledge Transfer An
- Page 137 and 138: Reasoning About Large‐scale Socia
- Page 139 and 140: Relational Compensation In Entrepre
- Page 141 and 142: Representation Of Complex Cognitive
- Page 143 and 144: Road Networks And Insurgent Violenc
- Page 145 and 146: School/community Policing‐‐mixe
- Page 147 and 148: Sex And Drug HIV‐risk Networks Am
- Page 149 and 150: Small EU Member States' Export Patt
- Page 151 and 152: Social Constraints, Agency, And Ins
- Page 153 and 154: Social Network Analysis In Multiple
- Page 155 and 156: Social Network Resilience Given Inf
- Page 157 and 158: Social Networks And Sustainability
- Page 159 and 160: Social Snacking: Friends’ Influen
- Page 161 and 162: Static Visualization Of Network Dyn
- Page 163 and 164: Structure And Consistency: Assessme
- Page 165 and 166: Teaching Undergraduates Social Netw
- Page 167 and 168: The Development Of Japanese Interlo
- Page 169 and 170: The Effects Of Social Networks, Pro
- Page 171 and 172: The Formation Of Social Capital And
- Page 173 and 174: The Impact Of Different Non‐respo
- Page 175 and 176: The Influential Power Of eWOM Distr
- Page 177 and 178: The Paradox Of Connection: Social N
- Page 179 and 180: The Return Of Quality Of Social Cap
- Page 181 and 182: The Small World Phenomena Of Patent
- Page 183 and 184: The Structure Of Consensus: Cohesio
- Page 185: Time Heterogeneity In Stochastic Ac
- Page 189 and 190: Understanding The Different Facets
- Page 191 and 192: Using A Web‐based Survey To Elici
- Page 193 and 194: Using Social Network Analysis To Ma
- Page 195 and 196: Using Weak‐ties For Problem Solvi
- Page 197 and 198: Viable And Non‐viable Models Of C
- Page 199 and 200: Voting Power CentralityCarnegie, Je
- Page 201 and 202: Who Shares? Exploration Of Manageri
- Page 203 and 204: Worlds Apart ‐ Network Emergence
- Page 205 and 206: Aupetit, Michael ‐ CEA LIST ‐ m
- Page 207 and 208: Borgatti, Steve ‐ U of Kentucky,
- Page 209 and 210: Chiang, Yen‐sheng ‐ University
- Page 211 and 212: De salabert, Arturo ‐ Universidad
- Page 213 and 214: Everett, Martin ‐ University of M
- Page 215 and 216: Garayev, Vener ‐ University of Ce
- Page 217 and 218: Hahn, Christian stadil ‐ Enso Con
- Page 219 and 220: Houtman, Leonie ‐ VU University,
- Page 221 and 222: Kaminski, Jermain ‐ Massachusetts
- Page 223 and 224: La pointe, Allison ‐ Minnesota De
- Page 225 and 226: Luque, John ‐ Georgia Southern Un
- Page 227 and 228: Mo, Guang ying ‐ University of To
- Page 229 and 230: Oh, Yoon ‐ USC ‐ yoonkyuo@usc.e
- Page 231 and 232: Portales, Luis ‐ Tecnológico de
- Page 233 and 234: Samila, Sampsa ‐ Brock University
- Page 235 and 236: Shoham, David ‐ Loyola University
- Page 237 and 238:
Strully, Kate ‐ University at Alb
- Page 239 and 240:
Valente, Annie ‐ UC‐San Francis
- Page 241 and 242:
Welch, Eric ‐ University of Illin
- Page 243:
Zhu, Jonathan ‐ City University o