Social Network Analysis with Applications


A comprehensive introduction to social network analysis that hones in on basic centrality measures, social links, subgroup analysis, data sources, and more

Written by military, industry, and business professionals, this book introduces readers to social network analysis, the new and emerging topic that has recently become of significant use for industry, management, law enforcement, and military practitioners for identifying both ...

See more details below
Other sellers (Hardcover)
  • All (8) from $79.20   
  • New (6) from $79.20   
  • Used (2) from $96.52   


A comprehensive introduction to social network analysis that hones in on basic centrality measures, social links, subgroup analysis, data sources, and more

Written by military, industry, and business professionals, this book introduces readers to social network analysis, the new and emerging topic that has recently become of significant use for industry, management, law enforcement, and military practitioners for identifying both vulnerabilities and opportunities in collaborative networked organizations.

Focusing on models and methods for the analysis of organizational risk, Social Network Analysis with Applications provides easily accessible, yet comprehensive coverage of network basics, centrality measures, social link theory, subgroup analysis, relational algebra, data sources, and more. Examples of mathematical calculations and formulas for social network measures are also included.

Along with practice problems and exercises, this easily accessible book covers:

  • The basic concepts of networks, nodes, links, adjacency matrices, and graphs
  • Mathematical calculations and exercises for centrality, the basic measures of degree, betweenness, closeness, and eigenvector centralities
  • Graph-level measures, with a special focus on both the visual and numerical analysis of networks
  • Matrix algebra, outlining basic concepts such as matrix addition, subtraction, multiplication, and transpose and inverse calculations in linear algebra that are useful for developing networks from relational data
  • Meta-networks and relational algebra, social links, diffusion through networks, subgroup analysis, and more

An excellent resource for practitioners in industry, management, law enforcement, and military intelligence who wish to learn and apply social network analysis to their respective fields, Social Network Analysis with Applications is also an ideal text for upper-level undergraduate and graduate level courses and workshops on the subject.

Read More Show Less

Product Details

  • ISBN-13: 9781118169476
  • Publisher: Wiley
  • Publication date: 7/22/2013
  • Edition number: 1
  • Pages: 320
  • Sales rank: 1,229,060
  • Product dimensions: 6.30 (w) x 9.30 (h) x 0.90 (d)

Meet the Author

IAN McCULLOH, PhD, holds academic appointments at several institutions to include Curtin University Business School. He consults industry to increase collaboration in knowledge-intensive organizations and educates military intelligence professionals to more ethically and effectively target enemy networks. He has supported the U.S. Military with network analysis to include service in Afghanistan and Iraq.

HELEN ARMSTRONG, PhD, is an Associate Professor in the School of Information Systems at Curtin University in Perth, Australia. She has more than twenty years' experience teaching and conducting research in ICT network security, analyses of networks and systems, information systems strategy, and management and problem solving in business environments. She works closely with industry in the application of network analyses for business problem solving and risk analyses.

ANTHONY JOHNSON, PhD, is an Associate Professor in the Department of Mathematical Sciences at the United States Military Academy at West Point. He has served in a variety of positions ranging from Fiber Optic Cable Network Engineer for the White House Communications Agency to the Chief of Counter Improvised Explosive Device (CIED) Operations in Iraq where he applied linear algebra and graph theory to exploit terrorist networks.

Read More Show Less

Table of Contents

List of Figures xi

List of Tables xv

Foreword xvii

Preface xix

Acknowledgments xxi

Introduction xxv

Part I Network Basics

Chapter 1 What is a Network? 3

1.1 Basic Network Concepts 4

1.2 Adjacency Matrices, Graphs, and Notation 4

1.3 Nodes and Links 6

1.4 Good Will Hunting Problem 9

1.5 Formal and Informal Networks 13

1.6 Summary 18

Chapter 2 Centrality Measures 29

2.1 What is “Centrality” and Why do we Study It? 29

2.2 Calculating Nodal Centrality Measures 33

2.3 Directed Networks and Centrality Measures 46

2.4 Location in the Network 46

2.5 Summary 52

Chapter 3 Graph Level Measures 69

3.1 Density 70

3.2 Diameter 71

3.3 Centralization 73

3.4 Average Centralities 77

3.5 Network Topology 78

3.6 Summary 86

Part II Social Theory

Chapter 4 Social Links 109

4.1 Individual Actors 110

4.2 Social Exchange Theory 111

4.3 Social Forces 113

4.4 Graph Structure 120

4.5 Agent Optimization Strategies in Networks 121

4.6 Hierarchy of Social Link Motivation 124

4.7 Summary

Chapter 5 Subgroup Analysis 129

5.1 Subgroups 129

5.2 Organizational Theory 130

5.3 Random Groups 133

5.4 Heuristics for Subgroup Identification 133

5.5 Analysis Methods 135

5.6 Summary 143

Chapter 6 Diffusion and Influence 149

6.1 Applications for Social Diffusion 149

6.2 Strain Theory 151

6.3 Social Context 152

6.4 Group Impacts on Diffusion 156

6.5 Network Structure and Diffusion 158

6.6 Group Influence Strategies and Bases of Power 160

6.7 Summary 165

Part III Data

Chapter 7 Meta-Networks and Relational Algebra 173

7.1 Modes of Data 174

7.2 Source, Target, Direction 174

7.3 Mulitmode Networks 176

7.4 Bridging a Meta-Network 180

7.5 Strength of Ties 182

7.6 Summary 183

Chapter 8 Sources of Data 189

8.1 Network Sampling 189

8.2 Measuring Links 191

8.3 Data Quality 195

8.4 Additional Ethnographic Data Collection Methods 196

8.5 Anonymity Issues 198

8.6 Summary 199

Part IV Organizational Risk

Chapter 9 Organizational Risk 205

9.1 What is risk? 205

9.2 Measures of Centrality and Risk 207

9.3 Other Risk Measures 216

9.4 The Right Network: Efficient Versus Learning/Adaptive 220

9.5 Network Threats and Vulnerabilities 223

9.6 Thickening a Network 226

9.7 Thinning a Network 227

9.8 Process of Organizational Risk Analysis 228

9.9 Summary of Main Points 231

Appendix A: Matrix Algebra Primer 235

Appendix B: Tables of Data and Networks 241

Appendix C: Five Points of a Graph 273

Index 281

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)