Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
42045 Ergebnisse
Sortierung:
SSRN
Working paper
In: Bloomsbury Research Methods Series
Intro -- Cover -- Half-Title -- Series -- Title -- Contents -- List of Figures -- Series Editors' Foreword -- 1 Introduction -- 2 History of social network analysis -- 3 Key concepts and measures -- 4 Applications of network analysis -- 5 Criticisms and frequently asked questions -- 6 Software for social network analysis -- 7 Looking back and looking forward -- References -- Index -- Copyright.
In: Political studies, Band 49, Heft 3, S. 542-550
ISSN: 0032-3217
The author assesses the theoretical & methodological utility of concepts of policy network analysis. He focuses on David Marsh & Martin J. Smith's (2001) dialectical approach to policy study, which aspires to resolve the limitations of overly abstract megalevel theories as well as those of microlevel theories that tend to overly localize policy study. However, Marsh & Smith's approach has its own limitations in that, primarily, it is insufficiently dialectical. The author endorses the dynamic, pluralistic, & nontotalizing potential of the dialectical model & urges its further theoretic refinement. 2 Figures, 16 References. K. Coddon
Authored by military and intelligence professionals, this book introduces the new and emerging topic of social network analysis. Focusing on models and methods for the analysis of organizational risk, the book provides easily accessible yet comprehensive coverage of networks basics, basic centrality measures, social links, subgroup analysis, data sources, and more. Examples of mathematical calculations and formulas for social network measures are also included. It is an excellent resource for practitioners in management, intelligence, and law enforcement wishing to apply social network analysis in their fields.
In: International Organization, Band 63, Heft 3
SSRN
In: Policy studies journal: the journal of the Policy Studies Organization, Band 40, Heft 3, S. 375-401
ISSN: 1541-0072
To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs), and stochastic actor‐oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach has much to offer in analyzing the policy process.
In: The 'What is?' Research Methods Series
This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. This book introduces the non-specialist reader to the principal ideas, nature and purpose of social network analysis. Social networks operate on many levels, from families up to the level of nations, and play a critical role in determining the way problems are solved, organizations are run, and the degree to which individuals achieve their goals. Social network theory maps these relationships between individual actors. Though relatively new on the scene it has become hugely influential across the social sciences. Assuming no prior knowledge of quantitative sociology, this book presents the key ideas in context through examples and illustrations. Using a structured approach to understanding work in this area, John Scott signposts further reading and online sources so readers can develop their knowledge and skills to become practitioners of this research method. A series of Frequently Asked Questions takes the reader through the main objections raised against social network analysis and answers the various queries that will come up once the reader has worked their way through the book.
In: Lecture notes in social networks
Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of 'big data' and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches.
SSRN
Cover -- Half Title -- Title -- Copyright -- Contents -- Introduction -- I. Network Representations -- Chapter 1. Social Networks and the Structure Experiment -- Chapter 2. A Formal Unification of Anthropological Kinship and Social Network Methods -- II. Network Boundaries -- Chapter 3. The Boundary Specification Problem in Network Analysis -- III. The Structure of Relations -- Chapter 4. Inferring Meaningful Global Network Properties from Individual Actor's Measurement Scales -- Chapter 5. Stochastic Modeling and the Analysis of Structural Data -- Chapter 6. Relational Contents in Multiple Network Systems -- Chapter 7. Social Semigroups and Green Relations -- IV. Implications of Relational Structure -- Chapter 8. What Is a Homomorphism? -- Chapter 9. Models of Network Effects on Social Actors -- V. Clustering and Positioning of Actors -- Chapter 10. Algorithms and Network Analysis: A Test of Some Analytical Procedures on Kapferer's Tailor Shop Material -- Chapter 11. Conceptions of Overlap in Social Structure -- Chapter 12. Empirical Blocking Methods -- Chapter 13. Rethinking the Role Concept: Homomorphisms on Social Networks -- Chapter 14. Methods for the Characterization of Role Structures in Network Analysis
In: International organization, Band 63, Heft 3, S. 559-592
ISSN: 1531-5088
International relations research has regarded networks as a particular mode of organization, distinguished from markets or state hierarchies. In contrast, network analysis permits the investigation and measurement of network structures—emergent properties of persistent patterns of relations among agents that can define, enable, and constrain those agents. Network analysis offers both a toolkit for identifying and measuring the structural properties of networks and a set of theories, typically drawn from contexts outside international relations, that relate structures to outcomes. Network analysis challenges conventional views of power in international relations by defining network power in three different ways: access, brokerage, and exit options. Two issues are particularly important to international relations: the ability of actors to increase their power by enhancing and exploiting their network positions, and the fungibility of network power. The value of network analysis in international relations has been demonstrated in precise description of international networks, investigation of network effects on key international outcomes, testing of existing network theory in the context of international relations, and development of new sources of data. Partial or faulty incorporation of network analysis, however, risks trivial conclusions, unproven assertions, and measures without meaning. A three-part agenda is proposed for future application of network analysis to international relations: import the toolkit to deepen research on international networks; test existing network theories in the domain of international relations; and test international relations theories using the tools of network analysis.
In: New directions for evaluation: a publication of the American Evaluation Association, Band 2005, Heft 107, S. 5-13
ISSN: 1534-875X
AbstractThe application of social network analysis methodologies is relatively new for mainstream evaluation and has yet to be fully explored in this discipline. This chapter discusses how and why SNA is appropriate for evaluation practice.
In: Springer Tracts in Natural Philosophy 16
1. Connected Networks -- 1.0 Introduction -- 1.1 Set Theory -- 1.2 Sets with Two or Less Elements -- 1.3 Generalized Union -- 1.4 Relations and Functions -- 1.5 Superpositions and Inverses -- 1.6 Restrictions -- 1.7 Cartesian Products -- 1.8 Some Special Symbols -- 1.9 Finite Sequences -- 1.10 Networks -- 1.11 Geometrical Realization of a Network -- 1.12 Subnetworks -- 1.13 Degree of a Vertex -- 1.14 Path in a Network -- 1.15 Proper Path in a Network -- 1.16 Reduction of a Path to a Proper Path -- 1.17 Connected Networks -- 1.18 Isolated Vertices -- 1.19 Connected Sets of Branches -- 1.20 Path Connected Set of Branches -- 1.21 Union of Connected Sets of Branches -- 1.22 Connectedness of Paths -- 1.23 Component of a Set of Branches -- 1.24 Existence of Components -- 1.25 Partition into Components -- 1.26 Removal of a Branch -- 2. Loops, Trees, and Cut Sets -- 2.0 Introduction -- 2.1 Loop in a Network -- 2.2 Loops -- 2.3 Subloops of a Loop -- 2.4 Branches and Vertices of a Loop -- 2.5 Paths in a Loop -- 2.6 Removal of a Branch from a Loop -- 2.7 Tree in a Network -- 2.8 Trees -- 2.9 Connected Subset of a Tree -- 2.10 Branches and Vertices of a Tree -- 2.11 Number of Vertices of a Connected Set of Branches -- 2.12 Addition of a Branch to a Tree -- 2.13 Existence of Maximal Trees -- 2.14 Cut Set in a Network -- 2.15 Existence of Cut Sets -- 2.16 Alternate Characterization of Cut Sets -- 3. Incidence Functions and Incidence Matrices -- 3.0 Introduction -- 3.1 Incidence Functions -- 3.2 Matrices and Arrays -- 3.3 Submatrices -- 3.4 Determinants -- 3.5 Incidence Matrices -- 3.6 Square Submatrices of an Incidence Matrix -- 3.7 Unimodular Matrices -- 3.8 Laplacian Expansion of a Determinant -- 3.9 Reduced Incidence Matrix of a Tree -- 3.10 Incidence Matrix of a Loop -- 4. Linear Algebra Review -- 4.0 Introduction -- 4.1 The Field of Scalars -- 4.2 Addition and Scalar Multiplication of Functions -- 4.3 Linear Space of 0-Chains -- 4.4 Canonical Base of the Space of 0-Chains -- 4.5 Inner Product -- 4.6 Linear Maps -- 4.7 Transpose of a Linear Map -- 4.8 Direct Sum Decomposition -- 4.9 Dimension and Direct Sum Decomposition -- 5. Boundary Operator and Coboundary Operator -- 5.0 Introduction -- 5.1 Assumptions of This Chapter -- 5.2 Chain Spaces -- 5.3 The Boundary Operator -- 5.4 Boundaries and Cycles -- 5.5 Summation Over Finite Sets -- 5.6 The Coboundary Operator -- 5.7 Coboundaries and Cocycles -- 5.8 Boundaries, Coboundaries, and Inner Products -- 5.9 Orthogonality of Cycles and Coboundaries -- 5.10 Orthogonality of Boundaries and Cocycles -- 5.11 Decomposition of ?(K) into Cycles and Coboundaries -- 5.12 Decomposition of ? (V) into Boundaries and Cocycles -- 5.13 Isomorphism of Coboundaries and Boundaries -- 5.14 Dimension of the Space of Cocycles -- 6. Axioms of Network Analysis -- 6.0 Introduction -- 6.1 Assumptions of This Chapter -- 6.2 Resistive Networks -- 6.3 Currents and Voltages -- 6.4 Ohm's Law -- 6.5 Sources -- 6.6 Kirchhoff's Laws for Voltage Sources -- 6.7 Kirchhoff's Laws for Current Sources -- 7. Existence and Uniqueness of Solutions -- 7.0 Introduction -- 7.1 Assumptions of This Chapter -- 7.2 Linearity of L and H -- 7.3 Existence and Uniqueness with Voltage Sourcess -- 7.4 Existence and Uniqueness with Current Sources -- 7.5 Current Variables -- 7.6 Voltage Variables -- 8. Kirchhoff's Third and Fourth Laws -- 8.0 Introduction -- 8.1 Assumptions of This Chapter -- 8.2 The Cycle Map -- 8.3 The Chord Map -- 8.4 The Sum of Tree Chord Products -- 8.5 The Current Chain with Voltage Sources -- 8.6 The Coboundary Map -- 8.7 The Tree Branch Map -- 8.8 The Sum of Tree Branch Products -- 8.9 The Voltage Chain with Current Sources -- 8.10 Invariance Under Change of Incidence -- References.