The Multilevel p2 Model

Methodology ◽  
2006 ◽  
Vol 2 (1) ◽  
pp. 42-47 ◽  
Author(s):  
Bonne J. H. Zijlstra ◽  
Marijtje A. J. van Duijn ◽  
Tom A. B. Snijders

The p 2 model is a random effects model with covariates for the analysis of binary directed social network data coming from a single observation of a social network. Here, a multilevel variant of the p 2 model is proposed for the case of multiple observations of social networks, for example, in a sample of schools. The multilevel p 2 model defines an identical p 2 model for each independent observation of the social network, where parameters are allowed to vary across the multiple networks. The multilevel p 2 model is estimated with a Bayesian Markov Chain Monte Carlo (MCMC) algorithm that was implemented in free software for the statistical analysis of complete social network data, called StOCNET. The new model is illustrated with a study on the received practical support by Dutch high school pupils of different ethnic backgrounds.

2019 ◽  
pp. 81-93
Author(s):  
Iliya L. Musabirov ◽  

The article presents a description of the approach to the use of data visualization in various educational Analytics tools when building University courses. In addition to the analysis of educational behavior, socio-psychological approaches, including the theory of expectations and social values, and the social network approach, are separately considered as prospects for analysis. An example of designing training Analytics using modern data analysis and visualization tools is analyzed.


E-Marketing ◽  
2012 ◽  
pp. 185-197
Author(s):  
Przemyslaw Kazienko ◽  
Piotr Doskocz ◽  
Tomasz Kajdanowicz

The chapter describes a method how to perform a classification task without any demographic features and based only on the social network data. The concept of such collective classification facilitates to identify potential customers by means of services used or products purchased by the current customers, i.e. classes they belong to as well as using social relationships between the known and potential customers. As a result, a personalized offer can be prepared for the new clients. This innovative marketing method can boost targeted marketing campaigns.


Author(s):  
Przemyslaw Kazienko ◽  
Piotr Doskocz ◽  
Tomasz Kajdanowicz

The chapter describes a method how to perform a classification task without any demographic features and based only on the social network data. The concept of such collective classification facilitates to identify potential customers by means of services used or products purchased by the current customers, i.e. classes they belong to as well as using social relationships between the known and potential customers. As a result, a personalized offer can be prepared for the new clients. This innovative marketing method can boost targeted marketing campaigns.


Author(s):  
Anatoliy Gruzd

The chapter presents a new web-based system called ICTA (http://netlytic.org) for automated analysis and visualization of online conversations in virtual communities. ICTA is designed to help researchers and other interested parties derive wisdom from large datasets. The system does this by offering a set of text mining techniques coupled with useful visualizations. The first part of the chapter describes ICTA’s infrastructure and user interface. The second part discusses two social network discovery procedures used by ICTA with a particular focus on a novel content-based method called name networks. The main advantage of this method is that it can be used to transform even unstructured Internet data into social network data. With the social network data available it is much easier to analyze, and make judgments about, social connections in a virtual community.


Author(s):  
Anfeng Cheng ◽  
Chuan Zhou ◽  
Hong Yang ◽  
Jia Wu ◽  
Lei Li ◽  
...  

Predicting pairs of anchor users plays an important role in the cross-network analysis. Due to the expensive costs of labeling anchor users for training prediction models, we consider in this paper the problem of minimizing the number of user pairs across multiple networks for labeling as to improve the accuracy of the prediction. To this end, we present a deep active learning model for anchor user prediction (DALAUP for short). However, active learning for anchor user sampling meets the challenges of non-i.i.d. user pair data caused by network structures and the correlation among anchor or non-anchor user pairs. To solve the challenges, DALAUP uses a couple of neural networks with shared-parameter to obtain the vector representations of user pairs, and ensembles three query strategies to select the most informative user pairs for labeling and model training. Experiments on real-world social network data demonstrate that DALAUP outperforms the state-of-the-art approaches.


Author(s):  
Sanur Sharma ◽  
Vishal Bhatnagar

In recent times, there has been a tremendous increase in the number of social networking sites and their users. With the amount of information posted on the public forums, it becomes essential for the service providers to maintain the privacy of an individual. Anonymization as a technique to secure social network data has gained popularity, but there are challenges in implementing it effectively. In this chapter, the authors have presented a conceptual framework to secure the social network data effectively by using data mining techniques to perform in-depth social network analysis before carrying out the actual anonymization process. The authors’ framework in the first step defines the role of community analysis in social network and its various features and temporal metrics. In the next step, the authors propose the application of those data mining techniques that can deal with the dynamic nature of social network and discover important attributes of the social network. Finally, the authors map their security requirements and their findings of the network properties which provide an appropriate base for selection and application of the anonymization technique to protect privacy of social network data.


Author(s):  
Preeti Gupta ◽  
Vishal Bhatnagar

The social network analysis is of significant interest in various application domains due to its inherent richness. Social network analysis like any other data analysis is limited by the quality and quantity of data and for which data preprocessing plays the key role. Before the discovery of useful information or pattern from the social network data set, the original data set must be converted to a suitable format. In this chapter we present various phases of social network data preprocessing. In this context, the authors discuss various challenges in each phase. The goal of this chapter is to illustrate the importance of data preprocessing for social network analysis.


Author(s):  
Goetz Greve

Social network data can be used to identify key influencers within a company’s customer database. Key influencers are consumers that are equipped with a large and strong network of connected neighbors. Within such a strong network, marketing messages can be passed on easily via the key influencers. The purpose of the chapter is to elaborate on the social effects of customer networks and the possibility to use data from these networks for Social CRM. First, the foundations of social contagion in networks and the relationship between social effects and Social CRM performance measures are explained. Second, possible ways of data acquisition and data integration are discussed and an overview of analytical software solutions is given. Fourth, the implementation process and its challenges are elaborated. The chapter closes with an outline of further research directions.


Author(s):  
Mantian (Mandy) Hu

In the age of Big Data, the social network data collected by telecom operators are growing exponentially. How to exploit these data and mine value from them is an important issue. In this article, an accurate marketing strategy based on social network is proposed. The strategy intends to help telecom operators to improve their marketing efficiency. This method is based on mutual peers' influence in social network, by identifying the influential users (leaders). These users can promote the information diffusion prominently. A precise marketing is realized by taking advantage of the user's influence. Data were collected from China Mobile and analyzed. For the massive datasets, the Apache Spark was chosen for its good scalability, effectiveness and efficiency. The result shows a great increase of the telecom traffic, compared with the result without leader identification.


Sign in / Sign up

Export Citation Format

Share Document