skip to main content
Skip header Section
Exploratory Social Network Analysis with PajekSeptember 2011
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-17480-0
Published:30 September 2011
Pages:
442
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

This is an extensively revised and expanded second edition of the successful textbook on social network analysis integrating theory, applications, and network analysis using Pajek. The main structural concepts and their applications in social research are introduced with exercises. Pajek software and data sets are available so readers can learn network analysis through application and case studies. Readers will have the knowledge, skill, and tools to apply social network analysis across the social sciences, from anthropology and sociology to business administration and history. This second edition has a new chapter on random network models, for example, scale-free and small-world networks and Monte Carlo simulation; discussion of multiple relations, islands, and matrix multiplication; new structural indices such as eigenvector centrality, degree distribution, and clustering coefficients; new visualization options that include circular layout for partitions and drawing a network geographically as a 3D surface; and using Unicode labels. This new edition also includes instructions on exporting data from Pajek to R software. It offers updated descriptions and screen shots for working with Pajek (version 2.03).

Cited By

  1. Wang S and Liu W (2023). Enhancing the robustness of influential seeds towards structural failures on competitive networks via a Memetic algorithm, Knowledge-Based Systems, 275:C, Online publication date: 5-Sep-2023.
  2. Wang S and Tan X (2023). A Memetic algorithm for determining robust and influential seeds against structural perturbances in competitive networks, Information Sciences: an International Journal, 621:C, (389-406), Online publication date: 1-Apr-2023.
  3. Wang S and Tan X (2023). Finding robust influential seeds from networked systems against structural failures using a niching memetic algorithm, Applied Soft Computing, 136:C, Online publication date: 1-Mar-2023.
  4. ACM
    Ruiz-Martin C, Wainer G and Lopez-Paredes A (2020). Discrete-Event Modeling and Simulation of Diffusion Processes in Multiplex Networks, ACM Transactions on Modeling and Computer Simulation, 31:1, (1-32), Online publication date: 1-Feb-2021.
  5. Martínez V, Berzal F, Cubero J and Bueno A (2021). An Automorphic Distance Metric and Its Application to Node Embedding for Role Mining, Complexity, 2021, Online publication date: 1-Jan-2021.
  6. Huang D, Yang L, Yang X, Zhong X, Tang Y and Stamovlasis D (2020). Evaluating the Performance of a Static Patching Strategy against Computer Viruses, Complexity, 2020, Online publication date: 1-Jan-2020.
  7. Mathieu E, Lan C, Maddison C, Tomioka R and Teh Y Continuous hierarchical representations with poincaré variational auto-encoders Proceedings of the 33rd International Conference on Neural Information Processing Systems, (12565-12576)
  8. ACM
    Ghawi R, Schönfeld M and Pfeffer J Extracting Ego-Centric Social Networks from Linked Open Data IEEE/WIC/ACM International Conference on Web Intelligence, (471-477)
  9. ACM
    Beer A and Seidl T Graph Ordering and Clustering Proceedings of the 31st International Conference on Scientific and Statistical Database Management, (185-188)
  10. ACM
    Pelofske E, Hahn G and Djidjev H Solving large minimum vertex cover problems on a quantum annealer Proceedings of the 16th ACM International Conference on Computing Frontiers, (76-84)
  11. ACM
    Anastopoulos V and Katsikas S Design of a dynamic log management infrastructure using risk and affiliation network analysis Proceedings of the 22nd Pan-Hellenic Conference on Informatics, (52-57)
  12. Cheong S and Si Y (2018). CWBound, The Journal of Supercomputing, 74:10, (5558-5577), Online publication date: 1-Oct-2018.
  13. Cheng N and Dong K (2018). Knowledge communication on social media, Scientometrics, 116:3, (1749-1770), Online publication date: 1-Sep-2018.
  14. Bhattacharya A and Goswami R (2018). Community Based Feature Selection Method for Detection of Android Malware, Journal of Global Information Management, 26:3, (54-77), Online publication date: 1-Jul-2018.
  15. Khanna G and Chaturvedi S (2018). A Comprehensive Survey on Multi-hop Wireless Networks, Wireless Personal Communications: An International Journal, 101:2, (677-722), Online publication date: 1-Jul-2018.
  16. ACM
    Burd R, Espy K, Hossain M, Kobourov S, Merchant N and Purchase H GRAM Proceedings of the 2018 International Conference on Advanced Visual Interfaces, (1-9)
  17. ACM
    Singh D, Lisle L, Murali T and Luther K CrowdLayout Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-14)
  18. Wang X, Song J, Lu K and Wang X (2017). Community detection in attributed networks based on heterogeneous vertex interactions, Applied Intelligence, 47:4, (1270-1281), Online publication date: 1-Dec-2017.
  19. Huang Y, Zhu D, Qian Y, Zhang Y, Porter A, Liu Y and Guo Y (2017). A hybrid method to trace technology evolution pathways, Scientometrics, 111:1, (185-204), Online publication date: 1-Apr-2017.
  20. Leydesdorff L and Nerghes A (2017). Co-word maps and topic modeling, Journal of the Association for Information Science and Technology, 68:4, (1024-1035), Online publication date: 1-Apr-2017.
  21. Fronzetti Colladon A and Remondi E (2017). Using social network analysis to prevent money laundering, Expert Systems with Applications: An International Journal, 67:C, (49-58), Online publication date: 1-Jan-2017.
  22. Leydesdorff L and Nooy W (2017). Can "hot spots" in the sciences be mapped using the dynamics of aggregated journal-journal citation Relations?, Journal of the Association for Information Science and Technology, 68:1, (197-213), Online publication date: 1-Jan-2017.
  23. Bornmann L and Haunschild R (2016). Overlay maps based on Mendeley data, Journal of the Association for Information Science and Technology, 67:12, (3064-3072), Online publication date: 1-Dec-2016.
  24. Bauer J, Leydesdorff L and Bornmann L (2016). Highly cited papers in Library and Information Science LIS, Journal of the Association for Information Science and Technology, 67:12, (3095-3100), Online publication date: 1-Dec-2016.
  25. Wu Y, Cao N, Gotz D, Tan Y and Keim D (2016). A Survey on Visual Analytics of Social Media Data, IEEE Transactions on Multimedia, 18:11, (2135-2148), Online publication date: 1-Nov-2016.
  26. Zhou Q and Leydesdorff L (2016). The normalization of occurrence and Co-occurrence matrices in bibliometrics using Cosine similarities and Ochiai coefficients, Journal of the Association for Information Science and Technology, 67:11, (2805-2814), Online publication date: 1-Nov-2016.
  27. Leydesdorff L, Moya-Anegón F and Nooy W (2016). Aggregated journal-journal citation relations in scopus and web of science matched and compared in terms of networks, maps, and interactive overlays, Journal of the Association for Information Science and Technology, 67:9, (2194-2211), Online publication date: 1-Sep-2016.
  28. ACM
    Maivizhi R, Sendhilkumar S and Mahalakshmi G A Survey of Tools for Community Detection and Mining in Social Networks Proceedings of the International Conference on Informatics and Analytics, (1-8)
  29. Kim J and Diesner J (2015). Coauthorship networks, Journal of the Association for Information Science and Technology, 66:12, (2685-2696), Online publication date: 1-Dec-2015.
  30. ACM
    Domínguez-Rodríguez R, Santana J and Royo E Monitoring technologies in Suricata model for the formal and informal learning areas Proceedings of the 3rd International Conference on Technological Ecosystems for Enhancing Multiculturality, (125-129)
  31. Batistič S and Kaše R (2015). The organizational socialization field fragmentation, Scientometrics, 104:1, (121-146), Online publication date: 1-Jul-2015.
  32. Bornmann L, Wagner C and Leydesdorff L (2015). BRICS countries and scientific excellence, Journal of the Association for Information Science and Technology, 66:7, (1507-1513), Online publication date: 1-Jul-2015.
  33. ACM
    Jankowski K, Knutas A, Ikonen J and Porras J Automated social network analysis of online student collaboration activity Proceedings of the 16th International Conference on Computer Systems and Technologies, (326-333)
  34. ACM
    Silva T, Jian M and Chen Y (2014). Process Analytics Approach for R&D Project Selection, ACM Transactions on Management Information Systems, 5:4, (1-34), Online publication date: 21-Mar-2015.
  35. Bornmann L and Leydesdorff L (2015). Topical connections between the institutions within an organisation (institutional co-authorships, direct citation links and co-citations), Scientometrics, 102:1, (455-463), Online publication date: 1-Jan-2015.
  36. Cerinšek M and Batagelj V (2015). Network analysis of Zentralblatt MATH data, Scientometrics, 102:1, (977-1001), Online publication date: 1-Jan-2015.
  37. ACM
    Mankad S, Michailidis G and Brunetti C Visual Analytics for Network-Based Market Surveillance Proceedings of the International Workshop on Data Science for Macro-Modeling, (1-6)
  38. Bannister M, Eppstein D and Simons J Fixed Parameter Tractability of Crossing Minimization of Almost-Trees Revised Selected Papers of the 21st International Symposium on Graph Drawing - Volume 8242, (340-351)
  39. McConvell P and Dousset L Tracking the dynamics of kinship and social category terms with AustKin II Proceedings of the EACL 2012 Joint Workshop of LINGVIS & UNCLH, (98-107)
  40. Tseng Y, Chang C, Rundgren S and Rundgren C (2010). Mining concept maps from news stories for measuring civic scientific literacy in media, Computers & Education, 55:1, (165-177), Online publication date: 1-Aug-2010.
Contributors
  • HSE University

Recommendations

Reviews

Yousri ElFattah

The authors claimed in the first edition of this book that it was "the first textbook on social network analysis [SNA] integrating theory, applications, and professional software for performing network analysis" [1]. Pajek is a computer program for SNA that plays a central role in the book's examples and illustrations. The content of this second edition differs from the first edition in that it has additional Pajek updates, expanded references and listings for further reading, and a new chapter 13 on random graph models. This book is divided into five parts. Part 1 is a foundational introduction to exploratory SNA using Pajek. Parts 2 to 5 focus on specific network topics. Part 2, "Cohesion," has chapters on cohesive subgroups, sentiments and friendship, and affiliation. Part 3, "Brokerage," includes chapters on center and periphery, brokers and bridges, and diffusion. Part 4, "Ranking," has chapters on prestige, ranking, genealogies, and citations. Part 5, "Roles," has chapters on block models and random graph models. Each chapter ends with assignments and exercises with their answers, as well as recommendations for further reading with bibliographical notes. The chapters are interspersed with application sections, which include examples that can be run using Pajek; such hands-on experience reinforces learning. SNA is a formal methodical analysis that deals with the exploration and visualization of social network structure and data, as well as with the testing of hypotheses by means of statistical models. This book is focused on exploratory analysis, as reflected in its title, and considers statistical analysis outside of its scope. The input data for exploratory SNA is expressed formally with annotated graphs (directed or undirected) consisting of nodes (representing individual actors within the network) and ties (representing social relationships between the actors, which are social entities such as people, organizations, business units, and countries). Examples of social relations include kinship, affection, interaction, and affiliation. Pajek is a network drawing tool with network analysis capabilities that include calculating centrality measures, identifying structural holes, and visualizing block models. Centrality measures indicate the concentration of ties on a limited number of actors in the network. Structural holes indicate the extent to which an actor connects other actors that are not connected directly. Block models group or block entities into types and analyze the network structure with respect to types rather than individual actors. I view Pajek more as an experimental tool for academic use and less as a polished tool suitable for commercial or business use. It lacks an application programming interface (API) or a scripting language to customize performance. Pajek is a menu-driven graphical user interface (GUI) requiring many manual steps to transition from input data to analysis results. The menus offer the user basic graph operations on one or two networks that need to be stitched together for custom analysis, which requires a steep learning curve. Macros can be recorded to perform repetitive tasks, but this is not much help. Pajek has a feature to send data directly to the statistical analysis tools R or SPSS, but the linkage with statistical models is not sufficiently elaborated on in the book. Pajek has graph drawing capabilities for network visualization, but users can view only one network at a time. This makes it difficult to visualize the effect of network manipulations, as one cannot see the networks side by side, before and after being operated upon. Also, the content of the input file cannot be viewed or edited from within Pajek. This is a significant limitation because the encoding network has many syntax varieties, adding cognitive burdens on the user to keep track of the types of networks loaded and the queries supported by their structures and data models. The treatment of the topics in the book is very informal and more oriented to social science readers than computing professionals. There is little mention of data structures and algorithmic aspects of SNA, and there are hardly any computational complexity statements and empirical evaluations of various social analysis tasks on varying random graphs. It would be useful to identify what structural parameters in a social network impact the various analysis tasks. The authors boast that "Pajek can handle networks up to 999,999,997 vertices" (Appendix A, p. 381). They should substantiate or qualify such a statement and explain what "handle" means in this context. This book is clearly intended as a textbook for a classroom setting, but its relevance to a wider audience could be enhanced if the application sections included motivating real-life use cases with sample real-life queries. I view the book more as a tutorial for a graphical and analytical tool (Pajek) than as a general resource for gaining experience and insight in the important field of SNA. Overall, the book is an important resource on exploratory social analysis techniques in general, and I recommend it as a textbook for a course on the topic. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.