SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
SOCIAL ROLES IN SOCIAL NETWORKS: Identifying Role Behaviors from Structure
                                                                                                 Eric Gleave              Thomas Lento                              Howard T. Welser            Marc Smith
                                                                                           University of Washington      Cornell University                          Ohio University        Microsoft Research
                                                                                            eric.gleave@gmail.com     thomas.lento@cornell.edu                       htwiii@gmail.com    marc.smith@microsoft.com
Introduction                                                                                                                                                                                                                                                                                    Methods
Moving from individuals to social roles                                                                                                                                                                                                                                                         Roles are identified through direct
simplifies complex social structures.                                                                                                                                                                                                                                                           observation and review of structural data.
Behavioral data identifies important                                                                                                                                                                                                                                                            Local network structures of individuals
social roles in online communities.                                                                                                                                                                               Hello,                                                                        performing key social role behaviors are
Corresponding social network structures                                                                                                                                                                           Yes, it is possible. IIS uses NTFS security, and you can configure the
                                                                                                                                                                                                                  correct NTFS settings on the files. By doing this, your users will be
                                                                                                                                                                                                                  prompted for a password.                                                      generated. Structural role models are
are characteristic of individuals playing                                                                                                                                                                         You can also completely remove the possibility for anonymous users by doing
                                                                                                                                                                                                                  this:
                                                                                                                                                                                                                                                                                                then used to identify additional individuals
specific social roles in computer-mediated
                                                                                                                                                                                                                  In IIS Manager, right click the Website and click Properties


                                                                                                                                                                                                                                                                                                who resemble the role. The models
                                                                                                                                                                                                                  Click on the Directory Security tab.
                                                                                                                                                                                                                  Click the Edit button for “Anonymous Access and authentication control”
                                                                                                                                                                                                                  Remove the check box for “Anonymous access”


interaction spaces.                                                                                                                                                                                               Make sure that “Integrated Windows Authentication” is selected.

                                                                                                                                                                                                                                                                                                are iteratively refined by subsequent
                                                                                                                                                                                                                  If you have further questions in setting this up, the people in the IIS
                                                                                                                                                                                                                  newsgroup will help you (it is easier for us to find your messages if you


                                                                                                                                                                                                                                                                                                observations.
                                                                                                                                                                                                                  post there):

                                                                                                                                                                                                                  microsoft.public.inetserver.iis
                                                                                                                                                                                                                  http://www.microsoft.com/windowsserver2003/community/centers/iis/defa...

                                                                                                                                                                                                                  Good luck!




Data
Since 2000 over two billion messages                                                                                                                                                                                                                                                            Conclusion
have been posted by tens of millions                                                                                                                                                                                                                                                            Traces of social structure are created by
of authors to hundreds of thousands of                                                                                                                                                                                                                                                          individual behaviors and interactions in
threaded conversation newsgroups in                                                                                                                                                                                                                                                             computer-mediated interaction systems.
Usenet. The Netscan Project has collected                                                                                                                                                                                                                                                       These traces reveal the presence of
every message posted to Usenet and built                                                                                                                                                                                                                                                        several distinct social roles. These roles
structural models of every author, thread                                                                                                                                                                                                                                                       are durable patterns of both individual
and newsgroup. Our research shows that                                                                                                                                                                                                                                                          behavior and structural position. The
technical support, social support, and                                                                                                                                                                                                                                                          structural signature of a role can be used
political discussion spaces are habitats in                                                                                                                                                                                                                                                     to rapidly identify additional individuals
which specific stable behaviors, “social                                                                                                                                                                                                                                                        performing defined roles without resorting
roles”, occur. The following are several                                                                                                                                                                                                                                                        to more labor intensive content analysis.
facets of behavior that illustrate key                                                                                                                                                                                                                                                          Communities can be classified on the
social roles in these computer-mediated                                                                                                                                                                                                                                                         basis of the ecology of roles found within
collective action systems.                                                                                                                                                                                                                                                                      them. These measures can also flag
                                                                                            Answer Person                               Discussion Person                               Discussion Catalyst
Microsoft Research Netscan Project                                                                                                                                                                                                                                                              important changes in groups over time as
http://netscan.research.microsoft.com
                                                                                            High Out-Degree                               High Degree                                   High In-Degree                                                                                          the community ecology evolves.
Welser, H.T., Gleave, E., Fisher, D., and Smith, M.A. (2007). “Visualizing the Structure
of Social Roles in Online Discussion Groups”. Journal of Social Structure. Vol. 8 No. 2.    Low In-Degree                                 Alters Highly Connected                       Low Out-Degree
http://www.cmu.edu/joss/content/articles/volume8/Welser
                                                                                            Alters are Unconnected                        High Tie Mutuality                            Alters Highly Connected
Turner, T.C., Smith, M.A., Fisher, D., and Welser, H.T. (2005). “Picturing Usenet:
Mapping Computer-Mediated Collective Action”. JCMC. 10(4), article 7.
                                                                                            Low Tie Strength                              High Tie Strength                             Low tie Strength
http://jcmc.indiana.edu/vol10/issue4/turner.html

Más contenido relacionado

Más de Marc Smith

20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
Marc Smith
 

Más de Marc Smith (20)

How to use social media network analysis for amplification
How to use social media network analysis for amplificationHow to use social media network analysis for amplification
How to use social media network analysis for amplification
 
Think link what is an edge - NodeXL
Think link   what is an edge - NodeXLThink link   what is an edge - NodeXL
Think link what is an edge - NodeXL
 
2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow
 
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
 
20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
 
2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna
 
2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming Skills
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted
 
2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis
 
20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...
 
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
 
2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer
 
20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
 
20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...
 
20111123 mwa2011-marc smith
20111123 mwa2011-marc smith20111123 mwa2011-marc smith
20111123 mwa2011-marc smith
 
20111103 con tech2011-marc smith
20111103 con tech2011-marc smith20111103 con tech2011-marc smith
20111103 con tech2011-marc smith
 
20110830 Introducing the Social Media Research Foundation
20110830 Introducing the Social Media Research Foundation20110830 Introducing the Social Media Research Foundation
20110830 Introducing the Social Media Research Foundation
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

2008 sunbelt - gleave lento welser smith - social roles in social networks

  • 1. SOCIAL ROLES IN SOCIAL NETWORKS: Identifying Role Behaviors from Structure Eric Gleave Thomas Lento Howard T. Welser Marc Smith University of Washington Cornell University Ohio University Microsoft Research eric.gleave@gmail.com thomas.lento@cornell.edu htwiii@gmail.com marc.smith@microsoft.com Introduction Methods Moving from individuals to social roles Roles are identified through direct simplifies complex social structures. observation and review of structural data. Behavioral data identifies important Local network structures of individuals social roles in online communities. Hello, performing key social role behaviors are Corresponding social network structures Yes, it is possible. IIS uses NTFS security, and you can configure the correct NTFS settings on the files. By doing this, your users will be prompted for a password. generated. Structural role models are are characteristic of individuals playing You can also completely remove the possibility for anonymous users by doing this: then used to identify additional individuals specific social roles in computer-mediated In IIS Manager, right click the Website and click Properties who resemble the role. The models Click on the Directory Security tab. Click the Edit button for “Anonymous Access and authentication control” Remove the check box for “Anonymous access” interaction spaces. Make sure that “Integrated Windows Authentication” is selected. are iteratively refined by subsequent If you have further questions in setting this up, the people in the IIS newsgroup will help you (it is easier for us to find your messages if you observations. post there): microsoft.public.inetserver.iis http://www.microsoft.com/windowsserver2003/community/centers/iis/defa... Good luck! Data Since 2000 over two billion messages Conclusion have been posted by tens of millions Traces of social structure are created by of authors to hundreds of thousands of individual behaviors and interactions in threaded conversation newsgroups in computer-mediated interaction systems. Usenet. The Netscan Project has collected These traces reveal the presence of every message posted to Usenet and built several distinct social roles. These roles structural models of every author, thread are durable patterns of both individual and newsgroup. Our research shows that behavior and structural position. The technical support, social support, and structural signature of a role can be used political discussion spaces are habitats in to rapidly identify additional individuals which specific stable behaviors, “social performing defined roles without resorting roles”, occur. The following are several to more labor intensive content analysis. facets of behavior that illustrate key Communities can be classified on the social roles in these computer-mediated basis of the ecology of roles found within collective action systems. them. These measures can also flag Answer Person Discussion Person Discussion Catalyst Microsoft Research Netscan Project important changes in groups over time as http://netscan.research.microsoft.com High Out-Degree High Degree High In-Degree the community ecology evolves. Welser, H.T., Gleave, E., Fisher, D., and Smith, M.A. (2007). “Visualizing the Structure of Social Roles in Online Discussion Groups”. Journal of Social Structure. Vol. 8 No. 2. Low In-Degree Alters Highly Connected Low Out-Degree http://www.cmu.edu/joss/content/articles/volume8/Welser Alters are Unconnected High Tie Mutuality Alters Highly Connected Turner, T.C., Smith, M.A., Fisher, D., and Welser, H.T. (2005). “Picturing Usenet: Mapping Computer-Mediated Collective Action”. JCMC. 10(4), article 7. Low Tie Strength High Tie Strength Low tie Strength http://jcmc.indiana.edu/vol10/issue4/turner.html