"This book introduces the non-specialist reader to the principal ideas, nature and purpose of social network analysis. Assuming no prior knowledge of quantitative sociology, this book presents the key ideas in context through examples and illustrations. Using a structured approach to understanding work in this area, John Scott signposts further reading and online sources so that readers can develop their knowledge and skills to become practitioners of this research method. A series of Frequently Asked Questions takes the reader through the main objections raised against social network analysis"--
In: Nonprofit and voluntary sector quarterly: journal of the Association for Research on Nonprofit Organizations and Voluntary Action, Band 46, Heft 3, S. 469-487
Nonprofit sector organizations tackle intractable problems by seeking support from external funding agencies, resulting in funders holding power through resource control. Nonprofits also access resources and coordinate activities through building networks with other nonprofits. Such networks have been viewed as emergent with an underlying assumption that the nonprofits determine when and with whom to partner. Given the power of funders, however, how much control do the nonprofits have in determining whether or not to partner? Document analysis of 83 application packets used by funders in the United States to collect and assess nonprofit suitability for funding shows significant differences between private- and public-sector control over nonprofits decisions to network. Unlike private-sector foundations, public-agency funding documents mandate awardees to network, which has practical and theoretical implications. Although the idea of building a network implies autonomous acts on the part of nonprofits, some are prone to hierarchical influences through grant-making policy.
Purpose – The purpose of this paper is to illustrate how accountability is expressed in contractual arrangements found in network governance structures that provide public transport services and to raise discussion of how to understand contracting accountability in network governance contexts. Design/methodology/approach – The paper is rooted in two research traditions: contracting studies and studies of accountability in government/governance contexts. Content analysis is used in examining contracts from two cases. These contracts are of five types: contracts between public organizations, contracts within a public organization, contracts between public organizations and private firms, and contracts between political parties within a municipality and contracts within a network. Various contracting approaches are identified within these types. Findings – The paper concludes that the contracts' functions differ between the cases. The first case did not have an overall contract that defined the network, relying on different two-party contracts instead. In the other case, an incentive-based contract was used to link the organizations. From an accountability perspective, the latter contracting structure clarifies the roles and responsibilities of the actors and increases the possibility of accountability to citizens. Originality/value – The paper brings new insights to the field of contracting and accountability by focusing on the role of contracts in network governance structures, taking account of various accountability relationships. It also contributes new theoretical categories usable when analysing contracting accountability in a network context
Social network data are often prohibitively expensive to collect, limiting empirical network research. We propose an inexpensive and feasible strategy for network elicitation using Aggregated Relational Data (ARD): responses to questions of the form "how many of your links have trait k ?" Our method uses ARD to recover parameters of a network formation model, which permits sampling from a distribution over node- or graph-level statistics. We replicate the results of two field experiments that used network data and draw similar conclusions with ARD alone. (JEL C81, C93, D85, Z13)
Based on a comparative study of socio-political networks and state strategies in Northern Norway and Southern Italy, this article argues that state strategies and capacity play an important role in determining the structure and impact of social networks on regional development. Similar in their choice of policy regimes and active distribution of resources to their lagging peripheries, Italy and Norway display very different informal networks between socio-political actors as well as development characteristics. These differences in social networks and development can be traced back to the willingness and ability of state actors to entrench themselves at the centre of the socio-political networks in the regions. Their ability is constrained by the social networks themselves, hemmed in by past history of nation-building and is in essence a picture of the legitimacy of the state. State openness towards mobilising social groups enables it to keep control over the mobilisation process and build for itself a central role in social networks. State closeness towards mobilising social groups brings with it the danger that alternative elites will build alternative social networks on the different territories they control -- networks in which the state will play a less central role. The cases illustrate the pros and cons of both types of state strategies, and form a good basis for a discussion of the optimal mix of state intervention and local social organisation in development. Adapted from the source document.
With the implementation of "one Air Force, one network" under way it is important to look at how the Air Force plans to incorporate the medical field and its unique systems, networks, and mission. The medical field presents distinctive problems not seen in other areas. Open network vulnerabilities in the medical information systems not only pose a problem for the individual, but to the military service also. Possible security holes provide both access to vital military & personal information (end strength numbers, current status of personnel, social security), and a door way into the "network". Intruders now can possibly access command & control systems and other weapon systems. This research provides insight into the current & future information initiatives dealing with the Air Force's medical field and the Department of Defense's approach to system security. This research additionally looks at the laws and regulations dealing with privacy and ethical issues. This purview starts with the recently enacted Healthcare Insurance Portability and Accountability ACT (HIPPA), and concludes with the Laws of Armed Conflict. The research questions were answered through the use of a Case Study and a comprehensive literature review. The medical and network support teams from two Air Force medical facilities were the basis of this study.
AbstractBelief network analysis (BNA) refers to a class of methods designed to detect and outline structural organizations of complex attitude systems. BNA can be used to analyze attitude-structures of abstract concepts such as ideologies, worldviews, and norm systems that inform how people perceive and navigate the world. The present manuscript presents a formal specification of the Response-Item Network (or ResIN), a new methodological approach that advances BNA in at least two important ways. First, ResIN allows for the detection of attitude asymmetries between different groups, improving the applicability and validity of BNA in research contexts that focus on intergroup differences and/or relationships. Second, ResIN's networks include a spatial component that is directly connected to item response theory (IRT). This allows for access to latent space information in which each attitude (i.e. each response option across items in a survey) is positioned in relation to the core dimension(s) of group structure, revealing non-linearities and allowing for a more contextual and holistic interpretation of the attitudes network. To validate the effectiveness of ResIN, we develop a mathematical model and apply ResIN to both simulated and real data. Furthermore, we compare these results to existing methods of BNA and IRT. When used to analyze partisan belief-networks in the US-American political context, ResIN was able to reliably distinguish Democrat and Republican attitudes, even in highly asymmetrical attitude systems. These results demonstrate the utility of ResIN as a powerful tool for the analysis of complex attitude systems and contribute to the advancement of BNA.
We present an examination of informal network structure within the sales division of a global manufacturing organization. Sociometric Badges were used to collect data on face-to-face interactions over a total of 8 weeks, the latter half of which was spent in a redesigned workspace. These data were supplemented by employees' e-mail and instant messaging log activity. The allocation of an individual's communication among colleagues reflected the company's structure as a post-bureaucratic organization. The observed interteam communication patterns differed from those expected to arise based on the various functions performed by each team throughout the sales cycle, suggesting that the communication needs of each team were not wholly provided for by the available media. A subset of workers who were encouraged to utilize flexible seating arrangements in a remodeled space had a higher proportion of face-to-face interactions with colleagues outside of their team, while employees seated far away from each other were less likely to exchange e-mail. This research has implications for companies hoping to understand the structure of informal networks within their organization as well as those considering workplace redesign as a method of stimulating communication within these networks.
The present volume provides?a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health.?With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development,?Social Network Analysis gained in importance as a research field, while opening up many opportunities in different application domains. Forming a bridge between theory and applications makes this work appealing to both academics and practitioners as well as graduate students.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext: