+ All Categories
Home > Documents > Uncorrected Proofmoreno.ss.uci.edu/90.pdf · The second introduction of the social network ap-244....

Uncorrected Proofmoreno.ss.uci.edu/90.pdf · The second introduction of the social network ap-244....

Date post: 01-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
19
Uncorrected Proof 2008-10-10 Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 1 — le-tex Social Network Visualization, Methods of 1 Social Network Visualization, Methods of LINTON C. FREEMAN 1 Department of Sociology and Institute for Mathematical 2 Behavioral Science, School of Social Sciences, 3 University of California, Irvine, USA 4 Article Outline 5 Glossary 6 Definition of the Subject 7 Introduction 8 Visualization in Social Network Analysis 9 Images Based on one Mode Undirected Relations 10 Images Based on one Mode Directed Relations 11 Images Based on two Mode Relations 12 Images Based on one or two Mode Data Matrices 13 Future Directions 14 Bibliography 15 Glossary 16 Adjacent A node is adjacent to another if there is an edge 17 connecting them. 18 Arrow A line directed from one node to another. 19 Binary relation A two valued yes/no or on/off relation. 20 Bipartite graph A graph, B DhN ; Ei where N is a finite 21 set of nodes and E is a collection of pairs of nodes in 22 which N is partitioned into two disjoint subsets, N 1 23 and N 2 , and no edge in E has both end points in the 24 same subset. 25 Blockmodeling A procedure for clustering actors such 26 that the actors in each cluster share similar patterns of 27 ties both within and between clusters. 28 Connected Any two nodes in a graph are said to be con- 29 nected if there is a path from one to the other; a graph 30 is connected if there is a path connecting every pair of 31 nodes. 32 Cycle Any path that begins and ends at the same node. 33 Digraph A directed graph. 34 Directed graph A graph D DhN ; Ai where N is a finite 35 collection of nodes and A is a set of pairs linked by di- 36 rected lines or arrows. 37 Directed line A line going from a node to another repre- 38 senting a non-reciprocated link. 39 Edge A line connecting two nodes representing a recipro- 40 cated link. 41 Edge labeled graph A graph in which at least two kinds 42 of connections between nodes are identified. 43 Formal concept analysis A method of data analysis based 44 on Galois lattice structure. 45 Galois lattice A dual structure that displays the depen- 46 dencies of both objects and their properties. 47 Geodesic The shortest path between two nodes. 48 Graph A graph G DhN ; Ei where N is a finite set of 49 nodes and E is a collection of pairs of nodes repre- 50 sented as edges. 51 Hyperedge An edge in a hypergraph that can enclose 52 more than two nodes. 53 Hypergraph A hypergraph, F DhN ; Hi, consists of a set 54 of nodes N and a collection of hyperedges, H. 55 Indegree The indegree of a node is the number of directed 56 lines it receives. 57 Irreflexive A relation in which no edge connects any node 58 with itself. 59 Multidimensional scaling A search procedure designed 60 to represent an observed set of proximities or distances 61 in a small number of dimensions. 62 Node A point in a graph. 63 One mode matrix A data matrix in which the rows and 64 columns both represent the same objects. 65 Outdegree The outdegree of a node is the number of di- 66 rected lines it sends out. 67 Path A path is a sequence of nodes and edges beginning 68 with a node that has an edge connecting it to the next 69 node in the sequence and so on. 70 Path length The length of a path connecting two nodes is 71 the number of edges it contains. 72 Permutation A reordering of the rows, columns, or rows 73 and columns of a matrix. 74 Principle diagonal The set of cells in a square matrix that 75 runs from the upper left to the lower right. 76 Relation A collection of ordered or unordered pairs of 77 nodes. 78 Singular value decomposition an algebraic procedure 79 that decomposes a data matrix into its “basic struc- 80 ture”. 81 Sociometry An early version of social network analysis 82 introduced by Jacob Moreno and Helen Jennings. 83 Spring embedder A kind of multidimensional scaling 84 based on a model in which it is assumed that nodes 85 are connected by springs that pull and push on them. 86 Symmetric A relation in which if a node a is adjacent to 87 another, b, then b is adjacent to a. 88 Tree A graph is a tree if it is connected and contains no 89 cycles. 90 Two mode matrix A data matrix in which the rows and 91 columns represent different objects. 92 Please note that the pagination is not final; in the print version an entry will in general not start on a new page. Editor’s or typesetter’s annotations (will be removed before the final T E X run)
Transcript
  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 1 — le-tex��

    �� ��

    Social Network Visualization, Methods of 1

    Social Network Visualization,Methods ofLINTON C. FREEMAN1Department of Sociology and Institute for Mathematical2Behavioral Science, School of Social Sciences,3University of California, Irvine, USA4

    Article Outline5

    Glossary6Definition of the Subject7Introduction8Visualization in Social Network Analysis9Images Based on one Mode Undirected Relations10Images Based on one Mode Directed Relations11Images Based on two Mode Relations12Images Based on one or two Mode Data Matrices13Future Directions14Bibliography15

    Glossary16

    Adjacent A node is adjacent to another if there is an edge17connecting them.18

    Arrow A line directed from one node to another.19Binary relation A two valued yes/no or on/off relation.20Bipartite graph A graph, B D hN; Ei where N is a finite21

    set of nodes and E is a collection of pairs of nodes in22which N is partitioned into two disjoint subsets, N123and N2, and no edge in E has both end points in the24same subset.25

    Blockmodeling A procedure for clustering actors such26that the actors in each cluster share similar patterns of27ties both within and between clusters.28

    Connected Any two nodes in a graph are said to be con-29nected if there is a path from one to the other; a graph30is connected if there is a path connecting every pair of31nodes.32

    Cycle Any path that begins and ends at the same node.33Digraph A directed graph.34Directed graph A graph D D hN;Ai where N is a finite35

    collection of nodes and A is a set of pairs linked by di-36rected lines or arrows.37

    Directed line A line going from a node to another repre-38senting a non-reciprocated link.39

    Edge A line connecting two nodes representing a recipro-40cated link.41

    Edge labeled graph A graph in which at least two kinds42of connections between nodes are identified.43

    Formal concept analysis Amethod of data analysis based 44on Galois lattice structure. 45

    Galois lattice A dual structure that displays the depen- 46dencies of both objects and their properties. 47

    Geodesic The shortest path between two nodes. 48Graph A graph G D hN; Ei where N is a finite set of 49

    nodes and E is a collection of pairs of nodes repre- 50sented as edges. 51

    Hyperedge An edge in a hypergraph that can enclose 52more than two nodes. 53

    Hypergraph A hypergraph, F D hN;Hi, consists of a set 54of nodes N and a collection of hyperedges,H. 55

    Indegree The indegree of a node is the number of directed 56lines it receives. 57

    Irreflexive A relation in which no edge connects any node 58with itself. 59

    Multidimensional scaling A search procedure designed 60to represent an observed set of proximities or distances 61in a small number of dimensions. 62

    Node A point in a graph. 63One mode matrix A data matrix in which the rows and 64

    columns both represent the same objects. 65Outdegree The outdegree of a node is the number of di- 66

    rected lines it sends out. 67Path A path is a sequence of nodes and edges beginning 68

    with a node that has an edge connecting it to the next 69node in the sequence and so on. 70

    Path length The length of a path connecting two nodes is 71the number of edges it contains. 72

    Permutation A reordering of the rows, columns, or rows 73and columns of a matrix. 74

    Principle diagonal The set of cells in a square matrix that 75runs from the upper left to the lower right. 76

    Relation A collection of ordered or unordered pairs of 77nodes. 78

    Singular value decomposition an algebraic procedure 79that decomposes a data matrix into its “basic struc- 80ture”. 81

    Sociometry An early version of social network analysis 82introduced by Jacob Moreno and Helen Jennings. 83

    Spring embedder A kind of multidimensional scaling 84based on a model in which it is assumed that nodes 85are connected by springs that pull and push on them. 86

    Symmetric A relation in which if a node a is adjacent to 87another, b, then b is adjacent to a. 88

    Tree A graph is a tree if it is connected and contains no 89cycles. 90

    Twomode matrix A data matrix in which the rows and 91columns represent different objects. 92

    Please note that the pagination is not final; in the print version an entry will in general not start on a new page.

    Editor’s or typesetter’s annotations (will be removed before the final TEX run)

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 2 — le-tex��

    �� ��

    2 Social Network Visualization, Methods of

    Definition of the Subject93

    Social network visualization refers to the practice of con-94structing pictorial images of the connections linking social95actors. The use of such images provides two benefits. It al-96lows investigators to gain new insights into the patterning97of social connections, and it helps investigators to commu-98nicate their results to others.99

    Introduction100

    Social network analysis did not emerge as a systematic field101of research until early in the twentieth century [1]. But vi-102sual images of social networks were produced more than103a millennium earlier. The earliest of these images that I104have uncovered was produced in Spain in the middle of105the ninth century. That image is attributed to the prolific106writer and Roman Catholic Saint, Isidore de Séville. It is107reproduced here as Fig. 1.108

    The image shown in Fig. 1 displays relationships based109on genealogical descent. From the earliest times, people110have been interested in kinship ties – in who is related to111whom. This interest is evident in the descent lists found112in the Christian bible and in the oral genealogies that were113required to be memorized by Hawaiian nobles [2].114

    The fact that Fig. 1 takes the form of a tree shows that115as early as the ninth century people saw the analogy be-116tween the branching structure of descent and that of trees.117This notion was captured in a mathematical formaliza-118tion in 1857 by Arthur Cayley [3]. Cayley defined a tree119in mathematical graph theoretic terms. Biggs, Lloyd and120Wilson (p. 38 in [4]) characterized Cayley’s definition by121saying that his “. . . use of the word ‘tree’ in this context is122presumably derived from the diagrammatic form of these123graphs, and is akin to the traditional use of the word in124describing genealogical of ‘family’ trees.”125

    The use of trees to depict descent was, of course, con-126tinued. As time passed, however, their form became sim-127plified. Lewis Henry Morgan [5] was an attorney and an128anthropologist. He was interested in comparing how dif-129ferent peoples reckoned kinship and in 1871 he published130a mammoth work containing a collection of kinship trees.131Each tree depicted descent as conceived by a society some-132where in the world. Morgan’s trees are quite simple. Fig-133ure 2 shows descent as it was reckoned in ancient Rome.134

    Twelve years later a mathematician-physicist, Alexan-135der Macfarlane [6], produced a different kind of graphic136image based still on kinship. Macfarlane set out to exam-137ine British marriage prohibitions and he represented them138both algebraically and visually. His visual images depict139males using plus signs (+) and females with circles (o).140Earlier generations he placed higher on the page. Descent141

    is shown by lines connecting points. A short line crossing 142a descent line indicates another person, of either sex, in 143an intermediate generation. And the lowest point is always 144the prohibited offspring. 145

    The illustration shown in Fig. 3 displays all the two- 146step marriage relations that are prohibited by British law. 147The left image shows that a malemay not marry his grand- 148daughter. The middle image shows that he may not marry 149his sister. And the right image shows that he may not 150marry his grandmother. Or, put the other way, a woman 151may not marry her grandfather, her brother or her grand- 152son. 153

    Macfarlane’s paper also included algebraic expressions 154that captured all of the same marriage prohibitions. But 155Sir Francis Galton [7], who attendedMacfarlane’s presen- 156tation, declared that his “diagrammatic form” seemed “the 157most distinctive and self-explanatory” of the two treat- 158ments. 159

    Finally, in 1894, John Hobson [8] produced a visual 160image of a social network that was not based on kin- 161ship. He had collected twomode (corporation by director) 162data on interlocking corporate directorates. He reasoned 163that, to the degree that corporations shared directors, they 164could be expected to cooperate and work together. 165

    Hobson’s illustration was designed to show the inter- 166lock among, as he put it, “the small inner ring of South 167African finance.” Corporations are depicted as circles, and 168interlock is shown by overlapping or by a line connecting 169two circles. Hobson’s image is reproduced here as Fig. 4. 170

    The important feature of this image is that it displays 171a connection linking more than two corporations. Hob- 172son’s data showed that three corporations, Charter, Rand 173and De Beers, all shared directors in common. And, at 174the same time, Rand and De Beers also both shared di- 175rectors with coalmines, telegraphs, rails, and others. The 176overlaps in his image allowed him to display which com- 177panies shared with which others. 178

    It is clear, then, that a concern with connections 179among social actors and the use of visual images have 180a long history of intimate association. It should come as 181no surprise therefore that images played an important part 182in the development of social network analysis when it did 183emerge as an organized field of research. 184

    Visualization in Social Network Analysis 185

    In the book cited above (p. 3 in [1]), I described the mod- 186ern science of social network analysis as possessing four 187defining properties. They were: 188

    linNoteMain entry "descent"

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 3 — le-tex��

    �� ��

    Social Network Visualization, Methods of 3

    Social Network Visualization, Methods of, Figure 1Tree of consanguinity with six degrees of relationship

    1. It embodies ideas about the importance of social ties189linking social actors.190

    2. It collects data reflecting those ties.1913. It involves the use of graphic imagery.1924. It employs mathematical and/or computational mod-193

    els.194

    Pre-network research often included one or two of those195properties, but in the late 1920s each of two independent196research teams came up with efforts that included all four.197

    One took place in the early 1930s. It involved a psychi- 198atrist, Jacob L. Moreno, and a psychologist, Helen H. Jen- 199nings. Together, they developed an approach they called 200“sociometry.” They reported two huge studies, both fo- 201cused on examining the structure of social ties. One was 202conducted among prisoners at Sing Sing Prison in Ossin- 203ing, NewYork [9] and the other among young delinquents 204at the New York State Training School for Girls in Hud- 205son, New York [10]. 206

    Both Moreno–Jennings studies involved the extensive 207use of graphic images. The image shown in Fig. 2.1 TS2 was 208

    TS2 Please check figure, there is no figure with label 2.1.

    Editor’s or typesetter’s annotations (will be removed before the final TEX run)

    linNote2.1 comes from an earlier draft; it should read "5", not "2.1".

    linNoteMarked set by lin

    linNoteMain entry: sociometry

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 4 — le-tex��

    �� ��

    4 Social Network Visualization, Methods of

    Social Network Visualization, Methods of, Figure 2Descent in ancient Rome

    Social Network Visualization, Methods of, Figure 3Macfarlane’s images of two-step marriage prohibitions

    included in their report on the research at Sing Sing prison209(Moreno, 1932). In that figure, individuals or other kinds210of social actors are represented as points or nodes and links211between pairs of social actors are lines or edges connecting212pairs of nodes. In Fig. 5 Moreno was concerned with the213positions of individuals and the patterning of their ties. As214he put it, the individuals at the top and the bottom were215“dominant” and the image showed that those dominant216individuals were linked both “directly” and “indirectly”.

    Social Network Visualization, Methods of, Figure 4Hobson’s image of corporate interlocks

    Social Network Visualization, Methods of, Figure 5Image of a Pattern of Linkages

    Most of the data collected by Moreno and Jennings 217involved asking individuals whom they liked or disliked. 218In data of that sort, choices are seldom reciprocated. So 219Moreno and Jennings drew lines with arrowheads to reveal 220who chose whom. Mutual choices were drawn without ar- 221rowheads and they also included a small line bisecting the 222main line connecting the two nodes. 223

    Moreno and Jennings often required subjects to report 224both their likes and their dislikes. By using different colors, 225red for likes and black for dislikes, a single image could dis- 226play both. The image shown in Fig. 6 was published in the 227

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 5 — le-tex��

    �� ��

    Social Network Visualization, Methods of 5

    Social Network Visualization, Methods of, Figure 6Positive and Negative Choices in a Football Team

    Moreno–Jennings report on the Hudson School (Moreno,2281934). It depicts positive and negative choices among 13229members of an American football team. Moreover, it con-230tains another innovation. The various team members are231placed in the drawing in approximately the same relative232locations that they occupied on the football field. That ar-233rangement shows the players’ positions and permits the234viewer to evaluate the impact of physical proximity on the235patterning of social linkages.236

    Figures of the sort used by Moreno and Jennings had237a major impact on the style of graphic imagery used subse-238quently in social network analysis. For themost part, social239network analysts have represented social actors as nodes240and links between actors as edges or as directed lines with241arrowheads.242

    The second introduction of the social network ap-243proach also occurred in the early 1930s. An anthropol-244ogist, W. Lloyd Warner, and a collection of his col-245leagues and students at Harvard, conducted three elab-246orate network analytic projects. One was a study of an247industrial factory, the Western Electric plant in Cicero,248Illinois [11]. The other two were studies of communi-249ties: one focused on a New England town, Newburyport,250Massachusetts [12], and the other on a southern town,251Natchez, Mississippi [13].252

    The image shown in Fig. 7 was produced as part of the253factory study. It displays observed friendship ties among254pairs of individuals who worked together in the same255workroom. It was drawn using nodes and two-headed256lines instead of edges, but it is very similar to the images257

    Social Network Visualization, Methods of, Figure 7Friendships linking factory workers

    Social Network Visualization, Methods of, Figure 8An idealized pattern of overlapping ‘cliques’

    produced byMoreno and Jennings. In addition, as in Fig. 6 258above, the impact of physical space was displayed; workers 259were placed in the drawing in positions that reflected the 260locations of their workstations. 261

    In reporting their study of Newburyport, Warner and 262Lunt used the kind of drawing of overlapping circles that 263Hobson had used to construct Fig. 4. But here that image 264was introduced, not to describe data, but to propose an 265idea they had about social structure. The diagram in Fig. 8 266represents the investigators’ idealized version of the ex- 267pected structure of overlaps among subgroups in the pres- 268ence of social class. The idea is that only subgroups that 269are close to one another in class ranking are likely to have 270overlapping memberships. 271

    linNoteMain entry: Western Electric research

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 6 — le-tex��

    �� ��

    6 Social Network Visualization, Methods of

    Social Network Visualization, Methods of, Figure 9Stratification, age and overlapping groups

    In their study of Natchez Davis, Gardner and Gard-272ner [13] employed the same diagrammatic form to dis-273play two mode data reflecting on the earlier Newburyport274hypothesis. Figure 9 shows subgroups of black males and275their overlaps. In that image themen are arranged in terms276of both social class and age. Both, it turned out, provided277important bases for grouping.278

    Finally, in that same report, Davis, Gardner and Gard-279ner also introduced an entirely different kind of social net-280work image. Like Hobson, they had collected two mode281data. Eighteen women were designated in the rows of their282datamatrix and fourteen social events were depicted in the283columns. That matrix is reproduced here as Fig. 10.284

    The data shown in Fig. 10 were all collected during285a single year. But, by examining the column headings, it286is clear that Davis and his colleagues did not arrange the287social events according to the dates upon which they took288place. Instead, they listed both the events and the women289who attended them in such a way that the arrangement290itself suggests that these women were organized into two291groups. The two groups overlap, but for the most part292they are distinct. Most of the women in the top half of293the matrix attended the leftmost five events. And most of294the women in the bottom half attended the rightmost five295events. The middle four events apparently brought both296groups of women together.297

    This arrangement of women and events was self-con-298sciously produced by the authors. Davis, Gardner and299Gardner were convinced that these womenwere organized300into two groups and they presented their data matrix in301a way that would illustrate that conclusion. The interest-302

    ing thing is that these authors never commented explicitly 303about how they had rearranged the columns and rows in 304their matrix. They simply organized their display in a way 305that would make the point. 306

    From the outset, then, four kinds of images have 307played important parts in the development of social net- 308work analysis. These first network graphics included draw- 309ings displaying (1) one mode undirected relations, (2) one 310mode directed relations, (3) two mode relations and (4) 311one or two mode data matrices. A few other kinds of net- 312work images have been used since then, but the four orig- 313inals – particularly those based on one mode undirected 314and one mode directed relations – still dominate the field. 315In the next four sections we will examine the four original 316kinds of images and how their use has evolved in the social 317network context. 318

    Images Based on oneMode Undirected Relations 319

    Mathematically speaking, the node and edge images in- 320troduced by Moreno and Jennings in Fig. 5 are graphs. 321A graph G D hN; Ei where N is a finite set of nodes and E 322is a collection of pairs of nodes. In graph visualizations, 323a pair of nodes in E is presented as a line connecting the 324two nodes in question. Two nodes are called adjacent if 325there is an edge directly connecting them to each other. 326A graph embodies a binary (yes/no or on/off) relation that 327is irreflexive (no node is adjacent to itself) and symmetric 328(if a node a is adjacent to another, b, then b is adjacent 329to a). 330

    A path is a sequence of nodes and edges, beginning 331with a node that has an edge connecting it to the next node 332in the sequence. The length of a path between two nodes 333is the number of edges it contains. And the shortest path 334connecting two nodes is called the geodesic. 335

    Any two nodes in N are connected if there is a path 336from one to the other. And a whole graphG is connected if 337every pair of nodes in N is connected. If a path begins and 338ends at the same node, that path is a cycle. Finally, a graph 339is a tree if it is both connected and it contains no cycles. 340

    The image in Fig. 11 is a graph. It is based on data 341recorded by J. Clyde Mitchell [14] on the social ties among 342the 19 individuals involved in the personal network of 343a homeless woman in Britain. I used a program called Net- 344Draw to place the nodes representing individuals in Fig. 11 345in random positions. That calls attention to the impor- 346tance of the locations of points in graphic displays. Given 347the locations of the points in Fig. 11 it is very difficult for 348the viewer to see anything interesting in the patterning of 349this woman’s network. 350

    linNoteMain entry:graph

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 7 — le-tex��

    �� ��

    Social Network Visualization, Methods of 7

    Social Network Visualization, Methods of, Figure 10The Davis, Gardner and Gardner data on women’s attendance at social events

    Social Network Visualization, Methods of, Figure 11Links in the network of a homeless woman I

    Compare the image in Fig. 11 with that in Fig. 12. Fig-351ure 12 was also produced using NetDraw, but this time the352points were placed using a spring embedder [16]. A spring353embedder is a computer algorithm that, in effect, places354a spring of unit length between every pair of adjacent355nodes and a much longer spring between nodes that are356not adjacent. It starts with a random placement of nodes,357then the whole apparatus is set in motion and the various358springs push and pull until they reach an equilibrium.359

    The advantage of using a spring embedder is that it360does not require the investigator to make ad hoc judg-361ments in locating nodes in a graph. It uses a standard com-362puter algorithm to place the nodes automatically. Thus,363every user will get the same result. There are several dif-364

    Social Network Visualization, Methods of, Figure 12Links in the network of a homeless woman II

    ferent spring embedding algorithms. And they are all ex- 365amples of amore general class of computer algorithms that 366search for optimal locations for nodes in relatively few di- 367mensions. This general class of search algorithms is called 368multidimensional scaling [17]. 369

    An alternativemethod for placing nodes automatically 370is grounded in algebra. It is called singular value decom- 371position [18]. Singular value decomposition is not search 372based. Instead, it uses matrix operations to produce a lin- 373

    linNoteMain entry:spring embedder

    linNoteMain entry:multidimensional scaling

    linNotesingular value decomposition

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 8 — le-tex��

    �� ��

    8 Social Network Visualization, Methods of

    Social Network Visualization, Methods of, Figure 13Links in the network of a homeless woman III

    ear transformation of the data, and thus to position the374nodes in one, two or three or more dimensions. There is375no guarantee that it will always be effective, but often sin-376gular value decomposition provides very good placements377of the nodes in few enough dimensions that visualization378is possible [19]. A NetDraw image based on singular value379decomposition of Mitchell’s data is shown in Fig. 13.380

    The images in Figs. 12 and 13 both show that the whole381network is organized into three densely connected groups382that are only loosely linked to one another. That is inter-383esting, but it does not tell us anything about the bases for384the groupings. By adding a little information, and continu-385ing to use NetDraw, we can transform the graph of Fig. 12386into a node labeled graph. See Fig. 14.387

    Given the labels, we can identify the homeless woman,388the “respondent.” We can also see how her network is split389up. One division includes her original family, another her390friends along with her social worker, and the third con-391tains her estranged husband and his family, her in-laws.392

    Mitchell’s report, however, included evenmore details.393It included estimates of the strength of the tie linking each394of the pairs of individuals. He classified each tie as either395strong or weak. We can embody this additional informa-396tion in our NetDraw image by an adding another compo-397nent to our graph. Figure 15, then, was produced using the398spring embedder, it is node labeled, and, in addition, it is399an edge labeled graph.400

    In Fig. 15 strong ties are indicated by wide edges. By401examining their patterning, we learn that the individuals402within each family are linked together mostly by strong403ties, while the homeless woman’s friends have fewer strong404ties linking them together. This result is not surprising, but405it does provide additional insight about the structural po-406

    Social Network Visualization, Methods of, Figure 14Links in the network of a homeless woman IV

    Social Network Visualization, Methods of, Figure 15Links in the network of a homeless woman V

    sition of the woman in question. Clearly, it would be easier 407for either family to achieve consensus and provide support 408than it would be for the respondent’s loosely connected 409collection of friends [20]. 410

    It should be clear, then, that the placement of nodes 411and the labeling of both nodes and edges are critical for the 412ability of a graph to communicate important information. 413Good images can provide investigators with new insights 414about the structural properties of the social networks they 415

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 9 — le-tex��

    �� ��

    Social Network Visualization, Methods of 9

    are studying. And they can, of course, help to communi-416cate the results of social network research to outsiders.417

    Images Based on oneMode Directed Relations418

    It was obvious from the outset that these simple graphs419would not permit many kinds of displays of interest to so-420cial network analysts. Even Moreno and Jennings saw the421need to display the direction of choice in their sociograms.422The direction of connections can be expressed using di-423rected graphs or digraphs.424

    A digraph D D hN;Ai whereN is a finite collection of425nodes and A is a set of pairs shown as directed lines or ar-426rows. When an arrow is directed from node a to node b in427a digraph, then a is the tail of the arrow and b is the head;428a is the immediate predecessor of b and b is the immediate429successor of a. The outdegree of a node is the number of430arrows for which it is the tail and its indegree is its number431for which it is the head.432

    In any study that involves social links that are not sym-433metric, digraphs provide a natural representation. Con-434sider Fig. 16 that was produced by a program called Pa-435jek [21]. In preparing a book on the development of social436network analysis, I interviewed a number of the founders.437Each was asked to name others who had influenced them438to think in network terms. The result is a data set that ob-439viously lacks symmetry.440

    My interest, however, was with clusters, or blocs, of441influentials and nominees. So I placed the nodes using442a spring embedder designed by Kamada and Kawai [22].443The resulting figure shows that there seem to be two fairly444well defined subgroups, one on the left and one on the445right. The two groups are relatively dense but they are only446loosely connected together. The people on the left are al-447most entirely sociologists and those on the right aremostly448from other fields. And from the patterning one can sus-449pect that there was some kind of split between these two450groups.451

    For some kinds of data the search for clusters or groups452is not appropriate. For example, when we are dealing with453data that should embody some sort of ordering, digraph454representations are particularly important. To illustrate455how digraphs can be used to display ordering, consider the456data collected by Forkman and Haskell [23]. They studied457several communities, each made up of six domestic hens.458In five of these communities the hens formed strict peck-459ing orders in which the top hen pecked all the others; the460second pecked all but the top, and so on. Figure 17 shows461a visone [24] image of the data from one of those five462communities. There the nodes are arranged, top down, in463terms of their outdegrees and the pecking order is obvious.464

    Often data approach, but do not achieve, a strict order. 465DavidKrackhardt [25], for example, collected data on who 466sought advice from whom among 14 employees in the in- 467ternal auditing staff of a large company. Krackhardt’s data 468could not be drawn with all the arrows pointing in one di- 469rection. So, in Fig. 18 he arranged the individuals in such 470a way that as many arrows as possible were pointing up. 471The viewer, then, can immediately see there is an impor- 472tant hierarchical element displayed by these data. From 473the image, it appears that Nancy is at the top of the ad- 474vice chain and Bob, Wynn, Carol, Harold and Susan are at 475the bottom. 476

    There is, however, an important limitation in this fig- 477ure. Nancy seeks advice from Donna, Donna seeks advice 478from Manuel and Manuel seeks advice from Nancy. Thus, 479these three form a directed cycle of advice seeking. Given 480such a circular arrangement, no possible hierarchy among 481these three individuals can be established. Any order in 482which they were arranged would be misleading. In addi- 483tion, Stuart and Charles cannot be ordered because they 484chose each other. The same is true for Kathy and Tanya. 485

    The apparent ordering of nodes in Krackhardt’s im- 486age was imposed by human judgment. There are computer 487algorithms that can automatically arrange the nodes into 488a hierarchical form [26]. They are, however, not as well 489grounded or reliable as multidimensional scaling and sin- 490gular value decomposition. 491

    Images Based on twoMode Relations 492

    Any time we deal with a relation that can link more than 493two social actors, we cannot use graphs or directed graphs. 494Both graphs and directed graphs can deal only with links 495between pairs. Two mode data, however, allow for rela- 496tions that link three or more actors. So, whenever we have 497two mode data, like that collected by Hobson [8] or Davis, 498Gardner and Gardner [13] we need another way to con- 499struct images. 500

    There are several ways to construct images of two 501mode data. I will consider three of them in the present 502section, hypergraphs, bipartite graphs and lattices. Then, 503in the next section, I will discuss the use of matrix repre- 504sentations for both one mode and two mode data. 505

    Hobson [8] collected two mode data on corporations 506and their directors. He produced the image shown in Fig. 4 507showing corporate interlocks as overlapping areas. Math- 508ematically, images like Hobson’s are hypergraphs. A hy- 509pergraph, F D hN;Hi, consists of a set of nodes N and 510a collection of hyperedges,H. While an edge in an ordinary 511graph connects two nodes, a hyperedge in a hypergraph 512may link any arbitrary subset of the nodes in N. Pictori- 513

    linNoteMain entry:digraph

    linNoteMain entry:hypergraph

    linNoteMain entry:orderSub entry:dominance

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 10 — le-tex��

    �� ��

    10 Social Network Visualization, Methods of

    Social Network Visualization, Methods of, Figure 16Influences on some founders of social network analysis

    Social Network Visualization, Methods of, Figure 17Dominance among six hens

    ally, hyperedges are represented as boundaries enclosing514sets of nodes.515

    The use of hypergraphs was demonstrated in a recent516report by Estrada and Rodríguez-Velázquez [27]. They517

    Social Network Visualization, Methods of, Figure 18Visone image of advice seeking (from Brandes, Raab and Wag-ner [26])

    began with one mode data that showed the patterning 518of predation among the members of eleven species in 519a Malaysian rain forest. Their graph, showing who preys 520on whom, is shown in Fig. 19. 521

    Figure 19 shows which species preys on which other 522species. But if the investigator is interested, as those who 523study food webs often are, in defining ecological niches in 524

    linNoteMain entry:predation

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 11 — le-tex��

    �� ��

    Social Network Visualization, Methods of 11

    Social Network Visualization, Methods of, Figure 19Who preys on whom in aMalaysian Rain Forest

    Social Network Visualization, Methods of, Figure 20Twomode matrix of co-predation

    terms of co-predation, Fig. 19 makes the overall pattern525less than obvious. As an alternative we can build a hyper-526graph.527

    The matrix shown in Fig. 20 is based on the data in528Fig. 19. It was built by considering each of the species in529turn as prey. Then all of the species that share each given530prey are pooled together. Species 1, 6 and 9 have no prey531in the set. And species 4, 1 and 9 are the targets of co-pre-532dation. So the new matrix is two mode. It has the three533targets of co-predation as columns and the eight predators534as rows.535

    Prey on TS3536That matrix is captured visually by the hypergraph in537

    Fig. 19. It immediately reveals that there are three niches.538The one labeled E1 includes all the species who preyed on539species 4, E2 those who preyed on species 1 and E3 those540

    Social Network Visualization, Methods of, Figure 21Hypergraph of co-predation

    who preyed on 9. Thus, each edge in Fig. 21 encloses a col- 541lection of species that compete directly for at least one 542prey. 543

    There are, however, other ways to picture two mode 544data. In a more recent study of corporate interlocks, Joel 545Levine [29] reported data on the board memberships of 546seven major American corporations. Those corporations 547turned out to have ten directors who appeared on two 548or more of their boards. Levine presented his interlock 549data using a bipartite graph. A bipartite graph, B D hN; Ei 550where N is partitioned into two disjoint subsets, N1 and 551N2, and no edge in E has both end points in the same 552subset. He used singular valued decomposition to place 553the nodes representing both corporations and boardmem- 554bers and produced a bipartite image similar to the one dis- 555played in Fig. 22. I prepared that figure using NetDraw. 556There, the corporations are shown as red circles and the 557board members are blue squares. Thus, both the colors 558and the shapes of the nodes stress the bipartite nature of 559the graph. 560

    There is still another form of graphic display, one 561that reveals even more structural information about a two 562mode data set. It is based on an algebraic procedure 563called Galois lattice analysis or formal concept analy- 564sis [30,31,32,33]. A Galois or formal concept lattice is de- 565fined on an object by property, matrix. Let O be a set 566of objects and A be a set of attributes. The binary ma- 567trix O � ATS4 indicates which objects possess which at- 568tributes. 569

    We can define a pair hOi ;Ai i such that Oi is a subset 570ofO andAi is a subset ofA and every object inOi has every 571attribute in Ai. Moreover, both O and Amust be maximal. 572Thus, for every attribute in A that is not in Ai, there is an 573

    TS3 Please check.TS4 Please confirm notation.

    Editor’s or typesetter’s annotations (will be removed before the final TEX run)

    linNoteThis is correct

    linNoteThis is simply a typo; please delete it.

    linNoteMain entry:bipartite graph

    linNoteMain entry:latticesub entry:GaloisMain entry:formal concept analysis

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 12 — le-tex��

    �� ��

    12 Social Network Visualization, Methods of

    Social Network Visualization, Methods of, Figure 22A NetDraw Image of Levine’s interlock data as a bipartite

    object inOi that does not have that attribute. And for every574object in O that is not in Oi, there is an attribute in Ai that575the object lacks.576

    These pairs are dual and they can be partially ordered577by inclusion. Given two pairs hOi ;Ai i and hOj;Aji we say578that hOi ;Ai i is less than hOj;Aji whenOi is a subset ofOj579or, equivalently, when Aj is a subset of Ai. Since all these580pairs have unique least upper bounds and greatest lower581bounds they form a dual (Galois) lattice.582

    I will illustrate by considering again the woman by583event data collected by Davis, Gardner and Gardner [13].584Let the women (1 through 18) be the objects and the events585(A through N) be the attributes. The data, arranged into586a Galois lattice by a program called GLAD, are shown in587Figure into a lattice in Fig. 23.588

    The lattice displays the same three classes of events589that define the same two groups of women that we saw in590Fig. 10. But, in addition to the classes of events and groups591of women, we can now see the containment structures of592both events and women. To begin with, by following lines593up from the bottom we can see which women attended594which events. When we get to the top we hit the set of all595events and, at the same time, because no woman attended596all 14 events, it is also the null set of women.597

    The uppermost events (E–L) involved the largest sets598of women. Other events are contained in the lower inter-599sections of these events. Event C, for example, is contained600

    in E; everyone who attended C was present at E. And, at 601the next lower level, B and D are both contained in C. The 602events, then, can be seen as varying in their “openness”. 603

    At the same time, the figure shows the upward con- 604tainment structure of the women in terms of their patterns 605of attendance. Because no event attracted all 18 women, 606the lowest point represents the set of all women as well as 607the null set of events. Then, the lowest set of women (1, 2, 6083, 4, 13, 14 and 15) are the “core” attendees, so to speak. 609The next level contains woman 9 who never attended un- 610less woman 3 was also present, and woman 5 whose atten- 611dance depended on that of women 4 and 3. Women 6, 7, 8, 61210, 11, 12, 17 and 18 are also at this second level. In some 613sense, these are all secondary or peripheral participants in 614these events. And, finally, woman 16 turns out to be a third 615level participant; she was extremely peripheral. Woman 16 616attended events only when secondary attendees 8–12 and 617core attendees 1, 3 and 13 were all present. All in all, then, 618the image of the Galois lattice reveals a great deal about the 619internal structure of attendance. 620

    In this section I have shown three ways of visualizing 621two mode data. All three of them, however, share one im- 622portant limitation. That limitation stems from the fact that 623all three of them can only be used for very small data sets. 624As the number of cases grows, they all produce images that 625become increasingly difficult to read. 626

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 13 — le-tex��

    �� ��

    Social Network Visualization, Methods of 13

    Social Network Visualization, Methods of, Figure 23The Davis, Gardner and Gardner data as a Galois lattice

    Images Based on one or twoMode DataMatrices627

    WhenDavis, Davis andGardner [13] first usedmatrix per-628mutation, they did so without calling attention to the pro-629cess. But since that first use a number of contributors have630suggested procedures explicitly designed to rearrange the631rows and columns of matrices. As time has passed, the632overall tendency has been to come up with more effective633procedures. And, with the introduction of computers, it634has become possible to manipulate ever larger matrices.635Presently, there is no end in sight.636

    Matrix permutations, moreover can be used with ei-637ther one mode or two mode data. Five years after Davis,638Gardner and Gardner introduced matrix permutation in639their two mode data set, Elaine Forsyth and Leo Katz [34]640explicitly proposed permuting matrices as a way to un-641cover and display social groups in a one mode data set.642They illustrated using data from one of Moreno’s [10] so-643ciometric studies. The young women in a residence hall644had each been asked to name others in their hall for whom645they had positive feelings and those for whom their feel-646ings were negative. Positive choices were recorded using647plus signs and negative choices were recorded as minus648signs.649

    Forsyth and Katz adopted a brute-force procedure that650involved rearranging rows and columns and redrawing the651

    image again and again until as many of the plus signs fell 652as close to the principle diagonal as possible. At that point, 653cohesive groups become visible as clusters of plus signs 654around the diagonal. Their result is shown in Fig. 24. 655

    Obviously, the Forsyth and Katz procedure was ex- 656tremely cumbersome. But Beum and Brundage [35] soon 657came up with a systematic iterative procedure for find- 658ing groups by rearranging the rows and columns of a one 659mode matrix. And, by the late 1950s, when computers 660emerged on the scene, Coleman and MacRae [36] devel- 661oped a series of Univac programs at the Operations Anal- 662ysis Laboratory at the University of Chicago that were de- 663signed to uncover the groups in large networks. 664

    An entirely different kind matrix permutation proce- 665dure was proposed by Harrison White and his students. 666They introduced the idea of blockmodeling [37]. In so do- 667ing, they provided a theoretical basis for reordering net- 668work data matrices, and they developed a number of algo- 669rithms for doing so. 670

    The aim of this new thrust was to reorder the matrix 671in such a way that it could be partitioned to reveal two 672or more collections of social actors who were not linked 673by some social relation of interest. So, instead of arraying 674actors along the diagonal of a matrix, White et al. sought 675permutations that would define zero blocks – sets of actors 676between which there were no social links. They used their 677

    linNoteMain entry:matrix permutation

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 14 — le-tex��

    �� ��

    14 Social Network Visualization, Methods of

    Social Network Visualization, Methods of, Figure 24The Forsyth and Katz image of sociometric choices

    Social Network Visualization, Methods of, Figure 25Sampson’s data on who was a negative influence on whom

    approach to examine a great many network data sets. One678example is shown in Fig. 25.679

    The data in Fig. 25 were collected by Sampson [38] in680his study of a monastery. Sampson asked each of a collec-681tion of 18 novices to report their relationships with each of682the others. Figure 25 shows an 18 by 18 matrix of their re-683sponses to a question asking the novices about which oth-684ers had negative influences on them. A response of 3 in-685dicated a first choice. A 2 was a second choice and a 1 was686a third choice. White et al. reasoned that only first and sec-687ond choices represented strong responses, so they ignored

    Social Network Visualization, Methods of, Figure 26White, Boorman and Breiger’s partitioning of the negative influ-ence data matrix from Sampson

    the third choices and treated the entries of 1 as if they did 688not exist. 689

    One of the several procedures procedure White et al. 690introduced was called CONCOR. CONCOR is a recursive 691procedure that begins by calculating correlations between 692the rows (or columns) of a network data matrix. Then 693correlations are calculated between the rows of the result- 694ing correlation matrix. That procedure continues until it 695produces a matrix of correlations that uniformly displays 696values of + 1 and � 1. Those positive and negative values 697are used to partition the individuals into two subsets. The 698CONCOR procedure can be repeated using the data con- 699tained within each of the partitions. Thus, the original ma- 700trix can thus be refined to any desired degree. 701

    White and his students used CONCOR on the data 702shown in Fig. 25 in an attempt to uncover blocks that con- 703tained only 0s. They could then use these zero blocks to 704reduce the complexity of the data matrix. That matrix pro- 705duced three zero blocks. They are shown in Fig. 26. 706

    In the reduced model in Fig. 27 each cell represents 707one of the blocks in Fig. 26. Thus, the 18 by 18 matrix is 708reduced to a 3 by 3 array. The reduction is consistent with 709Sampson’s original ethnographic description of subgroups 710among the novices. Moreover, its pattern of zero blocks in 711the principle diagonal indicates that no block member saw 712any fellow block member as having a negative influence. 713But the members of each block saw at least some of the 714members of both of the other blocks as negative influences. 715This makes sense in the light of the ongoing conflict that 716Sampson described in his report. 717

    Since that time, displays based on matrix permutations 718have grown in size, complexity and sophistication. One 719particularly striking example was produced by Richards 720

    linNoteMain entry:CONCOR

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 15 — le-tex��

    �� ��

    Social Network Visualization, Methods of 15

    Social Network Visualization, Methods of, Figure 27The CONCOR reduction of the Sampsonmatrix

    and Seary [39]. Their data were drawn from a study of721participants in a needle exchange program in Baltimore,722Maryland [40]. Richards and Seary examined data on 4259723individuals who picked up and returned needles at each of724four exchange sites over a 30 month period. Each cell in725the matrix is a record of the number of needles picked up726by the individual in that row and returned by the individ-727ual in that column. About a third of all needles fall in the728principle diagonal of the matrix.729

    Richards and Seary used the data from the largest730weak component in the data set. That component in-731volved 100 000 needle exchanges among 36 000 individu-732als. Richards and Seary used their program MultiNet [41]733scaled the data using a form of singular value decomposi-734tion called correspondence analysis [18]. They used the co-735ordinates provided by the first Eigenvector to reorder the736rows and columns of the matrix. They then colored the737entries in terms of frequencies. The color scale is logarith-738mic: gray is 1 needle, blue 2–3, green 4–7, red 8–15, ma-739genta 16–31, yellow 32 and above. Their image is shown in740Fig. 28.741

    Figure 28 dramatically illustrates the utility of images742based on matrix permutation. It shows that there was not743a single community of needle users in Baltimore. Instead,744there were two distinct communities of individuals who745regularly obtain, return and exchange needleswith one an-746other. These two relatively large communities were cen-747tered around two of the four needle exchange sites.748

    Future Directions749

    Overall, the long range the trend in visualizing social net-750works has been to rely on computers to do more and751more of the job. First, computers used a version of sin-752gular value decomposition to locate nodes in two dimen-753sional images [42]. Then, soon thereafter, Coleman and754MacRae [35] programmed a computer both to permute755

    Social Network Visualization, Methods of, Figure 28The largest component in the Baltimore needle exchange data

    Social Network Visualization, Methods of, Figure 29VRML image of friendship among teens in a Dublin suburb

    rows and columns of a matrix and to print out an image of 756the result. And, in the early 1970s, Alba [43] wrote a pro- 757gram that performed calculations to place nodes and then 758went on to draw node and edge images of the results [44]. 759

    Since the 1970s, then, network analysts have increas- 760ingly used computers both for calculations and to draw 761images. And increasingly, multidimensional scaling and 762singular value decomposition have been used to determine 763locations for nodes. Moreover, when two dimensions are 764not enough to display network structure, three dimen- 765sional images are being produced. 766

    Whenmicrocomputers became available it quickly be- 767came possible to produce images that gave the appear- 768ance of being three dimensional. Moreover, with the ad- 769vent of color screens, color images began to be produced. 770

    linNoteMain entry:correspondence analysis

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 16 — le-tex��

    �� ��

    16 Social Network Visualization, Methods of

    Social Network Visualization, Methods of, Figure 30Links among German corporations in 2000

    Figure 29 represents data collected by Kirke [45] on social771links among teenagers in a suburb of Dublin. Nodes were772first located in three dimensions using multidimensional773scaling. And then the virtual reality modeling language774(VRML) was used to produce the appearance of three di-775mensions. Figure 27 was produced as a cover design for776a book [46] and the colors were used simply make the im-777age more attractive.778

    Colors can, however, be used to enhance the ability779of an image to communicate important information. In780Fig. 30 Höpner and Krempel [47] used a spring embed-781der and Krempel’s own programs to arrange the nodes in782two dimensions. The nodes represent the 100 largest Ger-783man corporations in the year 2000. They used color to la-784bel both nodes and directed lines. In their image each com-785pany is represented as a node and an arrow pointing from786one node to another means that the first node holds shares787in the second. The size of a node indicates the number788of connections to other nodes it has. Financial companies789are shown as yellow nodes and industrial companies are790red. Links between financial companies are yellow, those791between industrial companies are red and links between792financial and industrial companies are orange. Bu using793color, then, his directed graph reveals a great deal of in-794formation about the organization of German industry and795finance.796

    The image in Fig. 31 was made using a program797called MAGE [48]. MAGE was written by Richardson and798

    Richardson [49]. It is designed as a display on computer 799screens, and it allows the viewer to move into the picture 800as well as to spin and rotate it. It is useful, then, for ex- 801ploring the patterning of structural data in three apparent 802dimensions. 803

    In Fig. 31 students in a university professional school 804program reported who their friends in their class were. 805Nodes were placed using a multidimensional scaling pro- 806gram and then they were colored according to their pro- 807gram in the school. It turned out that most of their friend- 808ship choices linked those that shared a program. 809

    Richards and Seary’s [50] program, Multinet, pro- 810duces a wide range of graphic images. Included are im- 811ages that actually can be viewed in three dimensions using 812anaglyphic glasses in which one lens is red and one is blue. 813Obviously, I cannot illustrate their program here, but any- 814one who wants to see real 3D images should exploreMulti- 815net. 816

    Themost recent development in visualizing social net- 817works involves the production of animated graphics. As 818more andmore process data are collected and asmore pro- 819cess models are constructed, animated images are a natu- 820ral development. A group at Stanford University has writ- 821ten a Java program, SoNIA [51], that makes it quite sim- 822ple to produce animated node and edge and node and di- 823rected line images [52,53]. These images allow users to ex- 824plore the changing structural forms generated by process 825data. 826

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 17 — le-tex��

    �� ��

    Social Network Visualization, Methods of 17

    Social Network Visualization, Methods of, Figure 31MAGE image of friendship among classmates

    Overall then, in the period between Moreno’s hand827drawn ad hoc images and the latest animations of dynamic828network processes, there has been a dramatic growth in829our ability to visualize social network structure. The major830contribution has come from computers. Today we can use831a wide variety of readily available computer programs to832both design images and to produce screen images and/or833printed output.834

    But, as the job of producing images becomes easier, we835must be careful not to lose our sense of why we are pro-836ducing then in the first place. From the very beginning,837the important point has always been that the visual images838of social networks are not produced simply to be decora-839tive. In every case, the early images were drawn in order840to dramatize some feature of social structure. Moreno pro-841duced Fig. 5 to illustrate the importance of considering the842number of connections in evaluating the structural posi-843tion of an individual. In Fig. 6 the number of negative ties844received by one of the running backs showed, as Moreno845(p. 213 in [10]) put it, “It is easy to see that when 5/RB is846running with the ball he is not apt to get the maximum of847cooperation in interference and blocking.”848

    Figure 7 was a pictorial statement byWarner and Lunt849that when cohesive subgroups overlap, they should not be850expected to bridge wide differences in social class. Fig-851ure 8, from Davis, Gardner and Gardner, demonstrated852that the Warner–Lunt hypothesis was supported by data853with respect to both social class and age. And, finally,854

    Fig. 9 illustrated the presence of cohesive groups and of 855the variation of different individuals in their involvement 856in those groups. In every case each of these early authors 857had a point to make, and in every case the image helped 858to make that point. That is the key to the effective use of 859visual materials in social network analysis. 860

    In future we can expect to see continued development 861of computer programs designed to aid in visualizing social 862network networks. We can look forward to continued re- 863finement of algorithms for displaying group structure that 864are based on multidimensional scaling, particularly spring 865embedding. We can anticipate better algorithms for dis- 866playing hierarchies and approximate hierarchies. We can 867expect to have more powerful programs for animation. 868And, at the same time, we can expect to be able to pro- 869duce higher quality and more refined visual displays of all 870sorts. 871

    Bibliography 872

    Primary Literature 8731. Freeman LC (2004) The development of social network anal- 874

    ysis: A study in the sociology of science. Empirical Press, Van- 875couver, BC 876

    2. Schweitzer VS (1998) Words of power. Coffee Times, Fall 8773. Cayley A (1857) On the theory of the analytical forms called 878

    trees. Philos Mag 13:19–30 8794. Biggs NL, Lloyd EK, Wilson RJ (1977) Graph theory 1736–1936. 880

    Oxford University Press, Oxford 8815. Morgan LH (1871/1997) Systems of Consanguinity and Affinity 882

    in the Human Family. University of Nebraska Press, Lincoln 8836. Macfarlane A (1883) Analysis of relationships of consanguinity 884

    and affinity. J R Anthropol Inst Great Britain Ireland 12:46–63 8857. Appendix to Macfarlane A (1883) Analysis of relationships of 886

    consanguinity and affinity. J R Anthropol Inst Great Britain Ire- 887land 12:46–63 888

    8. Hobson JA (1884) The evolution of modern capitalism; A study 889of machine production. Allen & Unwin, Macmillan, London, 890New York 891

    9. Moreno JL (1932) Application of the group method to classifi- 892cation. National Committee on Prisons and Prison Labor, New 893York 894

    10. Moreno JL (1934) Who shall survive? Nervous and Mental Dis- 895ease Publishing Company, Washington 896

    11. Roethlisberger FJ, Dickson WJ (1939) Management and the 897worker. Harvard University Press, Cambridge 898

    12. Warner WL, Lunt PS (1941) The social life of a modern commu- 899nity. Yale University Press, New Haven 900

    13. Davis A, Gardner B, Gardner MR (1941) Deep south. University 901of Chicago Press, Chicago 902

    14. Mitchell JC (1994) Situational analysis and network analysis. 903Connections 17:16–22 904

    15. Available at http://www.analytictech.com/downloadnd.htm 90516. Eades P (1984) A heuristic for graph drawing. Congressus Nut- 906

    nerantiunt 42:149–160 90717. Krempel L (1999) Visualizing networks with spring embedder: 908

    Two-mode and valued data. In: Proceedings of the section of 909

    http://www.analytictech.com/downloadnd.htm

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 18 — le-tex��

    �� ��

    18 Social Network Visualization, Methods of

    statistical graphics. American Statistical Association, Alexan-910dria, pp 36–45911

    18. Weller SC, Romney AK (1990) Metric scaling: Correspondence912analysis. Sage Publications, Newbury Park913

    19. Freeman LC (2005) Graphical techniques for exploring social914network data. In: Carrington PJ, Scott J, Wasserman S (eds)915Models and methods in social network analysis. Cambridge916University Press, Cambridge, pp 248–269917

    20. Bott E (1957) Family and social network. Tavistock, London918

    21. Available at http://vlado.fmf.uni-lj.si/pub/networks/pajek/919

    22. Kamada T, Kawai S (1989) A general framework for visualizing920abstract objects and relations. ACM Trans Graph 10:1–39921

    23. Forkman B, Haskell MJ (2004) The maintenance of stable dom-922inance hierarchies and the pattern of aggression: Support for923the suppression hypothesis. Ethology 110:737–744924

    24. Available at http://visone.info/download/925

    25. Krackhardt D (1996) Social networks and the liability of new-926ness for managers. In: Cooper CL, Rousseau DM (eds) Trends in927organizational behavior, vol 3. TS5 , pp 159–173928

    26. Brandes U, Raab J, Wagner D (2001) Exploratory network vi-929sualisation: Simultaneous display of actor status and connec-930tions. J Soc Struct 2:4931

    27. Estrada E, JA Rodríguez-Velázquez. (2005) Complex networks932as hypergraphs. Physica A 364:581–594933

    28. Available on request from its author, Vincent Duquenne934([email protected])935

    29. Levine JH (1979) Joint-space analysis of ‘pick-any’ data:936Analysis of choices from an unconstrained set of alternatives.937Psychometrika 44:85–92938

    30. Wille R (1982) Restructuring lattice theory: An approach based939on hierarchies of concepts. In: Rival I (ed) Ordered Sets. Reidel,940Dordrecht–Boston, pp 445–470941

    31. Wille R (1984) Line diagrams of hierarchical concept systems.942Int Classif 11:77–86943

    32. Duquenne V (1987) Contextual implications between at-944tributes and some representation properties for finite lattices.945In: Ganter B, Willie R, Wolff K (eds) Beiträge zur Begriffsanalyse.946B. I. Wissenschaftsverlag, Berlin, pp 213–240947

    33. Freeman LC, White DR (1993) Using Galois lattices to represent948network data. In: Marsden PV (ed) Sociological methodology.949Blackwell, Oxford, pp 127–146950

    34. Forsyth E, Katz L (1946) A matrix approach to the analysis of951sociometric data: Preliminary report. Sociometry 9:340–347952

    35. Beum CO, Brundage EG (1950) A method for analyzing the so-953ciomatrix. Sociometry 13:141–145954

    36. Coleman JS, MacRae D (1960) Electronic processing of socio-955metric data for groups up to 1000 in size. Am Sociol Rev95625:722–727957

    37. White HC, Boorman SA, Breiger RL (1976) Social structure from958multiple networks: I. Blockmodels of roles and positions. Am J959Sociol 81:730–779960

    38. Sampson SF (1969) A noviate in a period of change: An exper-961imental and case study of relationships. Unpublished PhD dis-962sertation. Department of Sociology, Cornell University963

    39. Richards WD, Seary AJ (2000) Cover illustration. Connections96423:1965

    40. Valente TW, Foreman RK, Junge B, Vlahov D (1998) Satellite 966exchange in the Baltimore needle exchange program. Public 967Health Reports 113:91–96 968

    41. Availble by contacting Bill Richards ([email protected]) 96942. Bock RD, Husain SZ (1952) Factors of the tele: A preliminary 970

    report. Sociometry 15:206–219 97143. Alba R (1972) SOCK. Behav Sci 17:326–327 97244. Kadushin C (1974) The american intellectual elite. Little, Brown, 973

    Boston 97445. Kirke DM (1996) Collecting peer data and delineating peer net- 975

    works in a complete network. Social Netw 18:333–346 97646. Kirke DM (2006) Teenagers and substance use: Social networks 977

    and peer influence. Palgrave Macmillan, Basingstoke, Hamp- 978shire and New York 979

    47. Höpner M, Krempel L (2003) The politics of the German com- 980pany network. Max Planck Institute for the Study of Societies, 981Working Paper 03/9 982

    48. MAGE is available at http://kinemage.biochem.duke.edu/ 983software/mage.php 984

    49. Richardson DC, Richardson JS (1992) The kinemage – a tool for 985scientific communication. Protein Sci 1:3–9 986

    50. Richards WD, Seary AJ (2006) Multinet. http://www.sfu.ca/ 987~richards/Multinet/Pages/multinet.htm 988

    51. SoNIA is available at http://www.stanford.edu/group/sonia/ 98952. Moody J, McFarland DA, Bender-deMoll S (2005) Visualizing 990

    network dynamics. Am J Sociol 110:1206–1241 99153. Bender-deMoll S, McFarland DA (2006) The art and science of 992

    dynamic network visualization. J Social Struct 7:2 993

    Books and Reviews 994Brandes U, Kenis P, Raab J, Schneider V, Wagner D (1999) 995

    Explorations into the visualization of policy networks. J Theor 996Polit 11:75–106 997

    Brandes U, Corman SR (2003) Visual unrolling of network evolution 998and the analysis of dynamic discourse. Information Visualiza- 999tion 2:40–50, 1000

    Brandes U, Kenis P, Wagner D (2003) Communicating centrality 1001in policy network drawings. IEEE Transactions on Visualization 1002and Computer Graphics 9:241–253, 1003

    Brandes U, Wagner D (2004) Netzwerkvisualisierung. Inform Tech- 1004nol 46:129–134, 1005

    Brandes U, Wagner D (2004) Visone - Analysis and visualization of 1006social networks. In: Jünger M, Mutzel P (eds) Graph drawing 1007software. Springer-Verlag, pp 321–340 1008

    Brandes U, Kenis P, Raab J (2006) Explanation through network 1009visualization. Methodology 2:16–23 1010

    Frank O (2000) Structural plots of multivariate binary data. J Social 1011Struct 1:4 1012

    Freeman LC (2000) Visualizing social groups. In: Proceedings of the 1013section on statistical graphics (1999). American Statistical As- 1014sociation, pp 47–54 1015

    Freeman LC (2000) Visualizing social networks. J Social Struct 1:1 1016Freeman LC, Webster CM, Kirke DM (1998) Exploring social 1017

    structure using dynamic three-dimensional color images. So- 1018cial Netw 20:109–118 1019

    Johnson JC, Krempel L (2004) Network visualization: The ‘Bush 1020Team’ in Reuters News Ticker 9/11–11/15/01. J Social Struct 5:1 1021

    Klovdahl AS (1981) A note on images of networks. Social Netw 10223:197–214 1023

    TS5 Please provide the publisher and location of publishing.

    Editor’s or typesetter’s annotations (will be removed before the final TEX run)

    http://moreno.ss.uci.edu/86.pdfhttp://moreno.ss.uci.edu/86.pdfhttp://moreno.ss.uci.edu/86.pdfhttp://moreno.ss.uci.edu/86.pdfhttp://moreno.ss.uci.edu/86.pdfhttp://moreno.ss.uci.edu/86.pdfhttp://moreno.ss.uci.edu/86.pdfhttp://vlado.fmf.uni-lj.si/pub/networks/pajek/http://visone.info/download/https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6https://vpn.nacs.uci.edu/http/0/springerlink.metapress.com/content/006x6846532826wh/?p=598eaf7e89e34bc3bf6d668304da0fc6�egingroup uppercase {count@ 38}elax elax uccode `unhbox voidb@x �group let unhbox voidb@x setbox @tempboxa hbox {count@ global mathchardef accent@spacefactor spacefactor }accent 3 count@ egroup spacefactor accent@spacefactor uppercase {gdef 0{~}}endgroup 0pi=6http://moreno.ss.uci.edu/62.pdfhttp://moreno.ss.uci.edu/62.pdfhttp://moreno.ss.uci.edu/62.pdfhttp://moreno.ss.uci.edu/62.pdfhttp://moreno.ss.uci.edu/62.pdfhttp://moreno.ss.uci.edu/62.pdfhttp://moreno.ss.uci.edu/62.pdfhttp://kinemage.biochem.duke.edu/software/mage.phphttp://kinemage.biochem.duke.edu/software/mage.phphttp://www.sfu.ca/~richards/Multinet/Pages/multinet.htmhttp://www.sfu.ca/~richards/Multinet/Pages/multinet.htmhttp://www.stanford.edu/group/sonia/http://www.inf.uni-konstanz.de/algo/publications/bkrsw-evpn-99.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkrsw-evpn-99.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkrsw-evpn-99.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkrsw-evpn-99.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkrsw-evpn-99.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkrsw-evpn-99.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkrsw-evpn-99.pdfhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.palgrave-journals.com/cgi-taf/DynaPage.taf?file=/ivs/journal/v2/n1/abs/9500037a.htmlhttp://www.inf.uni-konstanz.de/algo/publications/bkw-ccpnd-03.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkw-ccpnd-03.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkw-ccpnd-03.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkw-ccpnd-03.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkw-ccpnd-03.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bkw-ccpnd-03.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bw-n-04.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bw-vavsn-04.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bw-vavsn-04.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bw-vavsn-04.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bw-vavsn-04.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bw-vavsn-04.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bw-vavsn-04.pdfhttp://www.inf.uni-konstanz.de/algo/publications/bw-vavsn-04.pdfhttp://www.springer.de/cgi/svcat/search_book.pl?isbn=3-540-00881-0http://www.springer.de/cgi/svcat/search_book.pl?isbn=3-540-00881-0http://www.springer.de/cgi/svcat/search_book.pl?isbn=3-540-00881-0http://www.psycontent.com/abstracts/hh/med/2006/01/body-med0201016.htmlhttp://www.psycontent.com/abstracts/hh/med/2006/01/body-med0201016.htmlhttp://www.psycontent.com/abstracts/hh/med/2006/01/body-med0201016.htmlhttp://www.psycontent.com/abstracts/hh/med/2006/01/body-med0201016.htmlhttp://moreno.ss.uci.edu/80.pdfhttp://moreno.ss.uci.edu/80.pdfhttp://moreno.ss.uci.edu/80.pdfhttp://moreno.ss.uci.edu/77.pdfhttp://moreno.ss.uci.edu/77.pdfhttp://moreno.ss.uci.edu/77.pdfhttp://moreno.ss.uci.edu/77.pdfhttp://moreno.ss.uci.edu/77.pdfhttp://moreno.ss.uci.edu/77.pdfhttp://moreno.ss.uci.edu/77.pdfhttp://moreno.ss.uci.edu/77.pdflinNoteNew York:Wiley

  • Unco

    rrecte

    d Pr

    oof

    2008

    -10-

    10

    ��

    Meyers: Encyclopedia of Complexity and Systems Science — Entry 205 — 2008/10/10 — 16:28 — page 19 — le-tex��

    �� ��

    Social Network Visualization, Methods of 19

    Klovdahl AS (1998) A picture is worth. . . : Interacting visually with1024complex network data. In: LiebrandWBG (ed) Computer mod-1025eling of dynamic social processes. Sage, London1026

    Krempel L (2005) Visualisierung komplexer Strukturen. Grundla-1027gen der Darstellung mehrdimensionaler Netzwerke. Campus,1028Frankfurt aM1029

    Krempel L, SchneggM (2005) About the image: Diffusion dynamics1030in an historical network. Structure and dynamics: eJ Anthropol1031Rel Sci 1:1, 101032

    McGrath C, Blythe J, Krackhardt D (1996) Seeing groups in graph1033layouts. Connections 19:22–291034

    McGrath C, Blythe J, Krackhardt D (1997) The effects of spatial ar-1035rangements on perceptions of graphs. Social Netw 19:223–2421036

    McGrath C, Krackhardt D, Blythe J (2003) Visualizing complexity in1037networks: Seeing both the forest and the trees. Connections103825:37–471039

    McGrath C, Blythe J (2004) Do you see what i want you to see? The1040effects of motion and spatial layout on viewers’ perceptions of1041graph structure. J Social Struct 5:21042

    /ColorImageDict > /JPEG2000ColorACSImageDict > /JPEG2000ColorImageDict > /AntiAliasGrayImages false /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 600 /GrayImageDepth 8 /GrayImageDownsampleThreshold 2.03333 /EncodeGrayImages true /GrayImageFilter /FlateEncode /AutoFilterGrayImages false /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict > /GrayImageDict > /JPEG2000GrayACSImageDict > /JPEG2000GrayImageDict > /AntiAliasMonoImages false /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 2400 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict > /AllowPSXObjects false /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputCondition () /PDFXRegistryName (http://www.color.org) /PDFXTrapped /False

    /Description >>> setdistillerparams> setpagedevice


Recommended