Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Network theory
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Social network analysis=== [[File:Social Network Analysis Visualization.png|thumb|right|Visualization of social network analysis<ref>{{Cite journal | volume = 10| issue = 3| vauthors = Grandjean M | title = La connaissance est un réseau| journal =Les Cahiers du Numérique| access-date = 2014-10-15| date = 2014| pages = 37–54| url = http://www.cairn.info/resume.php?ID_ARTICLE=LCN_103_0037| doi=10.3166/lcn.10.3.37-54}}</ref>]]'''[[Social network analysis]]''' examines the structure of relationships between social entities.<ref>[[Wasserman, Stanley]] and Katherine Faust. 1994. ''Social Network Analysis: Methods and Applications.'' Cambridge: Cambridge University Press. Rainie, Lee and [[Barry Wellman]], ''Networked: The New Social Operating System.'' Cambridge, MA: [[MIT]] Press, 2012. </ref> These entities are often persons, but may also be [[Group (sociology)|groups]], [[organizations]], [[nation states]], [[web sites]], or [[scientometrics|scholarly publications]]. Since the 1970s, the empirical study of networks has played a central role in social science, and many of the [[Mathematics|mathematical]] and [[Statistics|statistical]] tools used for studying networks have been first developed in [[sociology]].<ref name="Newman">Newman, M.E.J. ''Networks: An Introduction.'' Oxford University Press. 2010</ref> Amongst many other applications, social network analysis has been used to understand the [[diffusion of innovations]], news and rumors.<ref name="Al-Taie">{{cite book | vauthors = Al-Taie MZ, Kadry S |chapter=Information Diffusion in Social Networks |title=Python for Graph and Network Analysis |series=Advanced Information and Knowledge Processing |date=2017 |pages=165–184 |doi=10.1007/978-3-319-53004-8_8 |pmc=7123536 |isbn=978-3-319-53003-1 }}</ref> Similarly, it has been used to examine the spread of both [[epidemiology|diseases]] and [[Medical sociology|health-related behaviors]].<ref name="Luke">{{cite journal | vauthors = Luke DA, Harris JK | title = Network analysis in public health: history, methods, and applications | journal = Annual Review of Public Health | volume = 28 | issue = 1 | pages = 69–93 | date = April 2007 | pmid = 17222078 | doi = 10.1146/annurev.publhealth.28.021406.144132 | doi-access = free }}</ref> It has also been applied to the [[Economic sociology|study of markets]], where it has been used to examine the role of trust in [[Social exchange|exchange relationships]] and of social mechanisms in setting prices.<ref name="Odabaş">{{cite journal | vauthors = Odabaş M, Holt TJ, Breiger RL |title=Markets as Governance Environments for Organizations at the Edge of Illegality: Insights From Social Network Analysis |journal=American Behavioral Scientist |date=October 2017 |volume=61 |issue=11 |pages=1267–1288 |doi=10.1177/0002764217734266 |hdl=10150/631238 |s2cid=158776581 |hdl-access=free }}</ref> It has been used to study recruitment into [[political movement]]s, armed groups, and other social organizations.<ref name="Larson">{{cite journal | vauthors = Larson JM |title=Networks of Conflict and Cooperation |journal=Annual Review of Political Science |date=11 May 2021 |volume=24 |issue=1 |pages=89–107 |doi=10.1146/annurev-polisci-041719-102523 |doi-access=free }}</ref> It has also been used to conceptualize scientific disagreements<ref name="Leng">{{cite journal | vauthors = Leng RI | title = A network analysis of the propagation of evidence regarding the effectiveness of fat-controlled diets in the secondary prevention of coronary heart disease (CHD): Selective citation in reviews | journal = PLOS ONE | volume = 13 | issue = 5 | pages = e0197716 | date = 24 May 2018 | pmid = 29795624 | pmc = 5968408 | doi = 10.1371/journal.pone.0197716 | doi-access = free | bibcode = 2018PLoSO..1397716L }}</ref> as well as academic prestige.<ref name="Burris">{{cite journal | vauthors = Burris V |title=The Academic Caste System: Prestige Hierarchies in PhD Exchange Networks |journal=American Sociological Review |date=April 2004 |volume=69 |issue=2 |pages=239–264 |doi=10.1177/000312240406900205 |s2cid=143724478 |url=https://journals.sagepub.com/doi/10.1177/000312240406900205 |access-date=22 September 2021|url-access=subscription }}</ref> More recently, network analysis (and its close cousin [[traffic analysis]]) has gained a significant use in military intelligence,<ref name="Roberts">{{cite journal | vauthors = Roberts N, Everton SF |title= Strategies for Combating Dark Networks |journal=Journal of Social Structure |volume=12 |url=https://www.cmu.edu/joss/content/articles/volume12/RobertsEverton.pdf |access-date=22 September 2021}}</ref> for uncovering insurgent networks of both hierarchical and [[leaderless resistance|leaderless]] nature.{{citation needed|date=July 2015}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)