Social Network Analysis in Telecommunications - Carlos Andre Reis Pinheiro - E-Book

Social Network Analysis in Telecommunications E-Book

Carlos Andre Reis Pinheiro

0,0
41,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

A timely look at effective use of social network analysis within the telecommunications industry to boost customer relationships The key to any successful company is the relationship that it builds with its customers. This book shows how social network analysis, analytics, and marketing knowledge can be combined to create a positive customer experience within the telecommunications industry. * Reveals how telecommunications companies can effectively enhance their relationships with customers * Provides the groundwork for defining social network analysis * Defines the tools that can be used to address social network problems A must-read for any professionals eager to distinguish their products in the marketplace, this book shows you how to get it done right, with social network analysis.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 392

Veröffentlichungsjahr: 2011

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Series page

Title page

Copyright page

Dedication

Foreword

SOME PEOPLE ARE SPECIAL

THE CONNECTOR WHO CHANGED THE COURSE OF HISTORY

COMMUNICATIONS SERVICE PROVIDERS AND THE TIPPING POINT

THE ROLE OF MAVENS IN SOCIAL NETWORKS

Preface

Acknowledgments

Part I: Foundation of Social Network Analysis

CHAPTER 1 An Introduction to Social Network Analysis

EVOLUTION OF SOCIAL NETWORK ANALYSIS

BUILDING SOCIAL NETWORKS BASED ON NODES AND LINKS

INFLUENCE

STRUCTURES OF SOCIAL NETWORKS

ANALYSES APPROACH FOR SOCIAL NETWORKS

GRAPH THEORY AND SOCIAL NETWORK ANALYSIS

STATISTICS AND SOCIAL NETWORK ANALYSIS

SUMMARY

CHAPTER 2 Formal Methods for Network Analysis

A GRAPHICAL APPROACH FOR SOCIAL NETWORK ANALYSIS

LEVELS OF MEASUREMENT FOR SOCIAL RELATIONS

SUMMARY

CHAPTER 3 Theoretical Foundation

TYPE OF DATA FOR SOCIAL NETWORK ANALYSIS

IDENTIFYING NODES AND LINKS WITHIN SOCIAL NETWORKS

MODALITY AND LEVELS OF ANALYSIS

CORRELATING NODES WITHIN THE NETWORK

SCALES OF MEASUREMENT

SUMMARY

CHAPTER 4 Measures of Power and Influence

TYPES OF NETWORKS

MEASURING POWER BY DEGREE CENTRALITY

ADDITIONAL LEVELS FOR THE DEGREE OF CENTRALITY

MEASURING POWER BY CLOSENESS CENTRALITY

EIGENVECTOR

MEASURING THE POWER BY BETWEENNESS CENTRALITY

SUMMARY

Part II: Social Network Analysis Case Study

CHAPTER 5 Telecommunications Environment

NEW CHALLENGES IN THE TELECOMMUNICATIONS MARKET

SOCIAL NETWORKS IN THE TELECOMMUNICATIONS ENVIRONMENT

TRADITIONAL PREDICTIVE MODELS BASED ON ARTIFICIAL NEURAL NETWORKS

COMBINED MODELING APPROACH

FEASIBLE ACTION PLAN BASED ON THE COMBINED APPROACH

BENEFITS FROM THE COMBINED MODELING APPROACH

SUMMARY

CHAPTER 6 Social Network Modeling

CUSTOMER-INFLUENCE FACTOR MODELING

DATA EXTRACTION PROCESS FOR SOCIAL NETWORK ANALYSIS MODELING

DATA PREPARATION PROCESS FOR SOCIAL NETWORK ANALYSIS MODELING

COMPUTING THE BASIC SOCIAL NETWORK MEASURES

COMPUTING THE CUSTOMER-INFLUENCE FACTOR

ADJUSTING THE INFLUENCE FACTOR ACCORDING TO PAST EVENTS

SUMMARY

CHAPTER 7 Assessing the Social Network Model

ASSESSING THE CUSTOMER-INFLUENCE FACTOR DUE TO BUSINESS EVENTS

PLOTTING THE SOCIAL NETWORK

ESTABLISHING THE DISTANCE FOR CUSTOMERS BASED ON SIMILARITY

SUMMARY

CHAPTER 8 Evaluating the Business Results

CORRELATION BETWEEN CUSTOMER INFLUENCE AND PAST EVENTS OF CHURN

CORRELATION BETWEEN CUSTOMER INFLUENCE AND PAST EVENTS OF BUNDLE DIFFUSION

THE SOCIAL NETWORK’S EVOLUTION IN A CHAIN PROCESS PERSPECTIVE USING BUSINESS EVENTS

THE BUNDLE DIFFUSION PROCESS ANALYZED OVER TIME

ENHANCED DATA ANALYSIS VISUALIZATION

GEOGRAPHIC VISUALIZATION ANALYSIS

SUMMARY

CHAPTER 9 Final Remarks for the Case Study

PRODUCTS AND SERVICE CHOICE

FURTHER INFERENCES AND FUTURE WORKS

SUMMARY

Part III: SAS Capabilities for Social Network Analysis

CHAPTER 10 Basic Statistics

DESCRIPTIVE ANALYSIS

GROUPING BASED ON RELATIONSHIP SIMILARITIES

SUMMARY

CHAPTER 11 Overview of the Link Analysis Node

DEFINING NODES AND LINKS

USING LINK ANALYSIS MACROS TO CALCULATE THE NETWORK MEASURES

CENTRALITY MEASURES

RESULT ANALYSIS

SUMMARY

CHAPTER 12 Visualization Capabilities for Social Network Analysis

NETWORK VISUALIZATION WORKSHOP

NETWORK GRAPHS

DS2CONST MACRO

SUMMARY

CHAPTER 13 A Note about OPTGRAPH

RECOGNIZING GROUPS INSIDE A NETWORK

INDIVIDUAL MEASURES FOR THE NETWORK

SUMMARY

Bibliography

About the Author

Index

Wiley & SAS Business Series

The Wiley & SAS Business Series presents books that help senior-level managers with their critical management decisions.

Titles in the Wiley and SAS Business Series include:

Activity-Based Management for Financial Institutions: Driving Bottom-Line Results by Brent Bahnub

Branded! How Retailers Engage Consumers with Social Media and Mobility by Bernie Brennan and Lori Schafer

Business Analytics for Customer Intelligence by Gert Laursen

Business Analytics for Managers: Taking Business Intelligence beyond Reporting by Gert Laursen and Jesper Thorlund

Business Intelligence Competency Centers: A Team Approach to Maximizing Competitive Advantage by Gloria J. Miller, Dagmar Brautigam, and Stefanie Gerlach

Business Intelligence Success Factors: Tools for Aligning Your Business in the Global Economy by Olivia Parr Rud

Case Studies in Performance Management: A Guide from the Experts by Tony C. Adkins

CIO Best Practices: Enabling Strategic Value with Information Technology, Second Edition by Joe Stenzel

Credit Risk Assessment: The New Lending System for Borrowers, Lenders, and Investors by Clark Abrahams and Mingyuan Zhang

Credit Risk Scorecards: Developing and Implementing Intelligent Credit Scoring by Naeem Siddiqi

Customer Data Integration: Reaching a Single Version of the Truth, by Jill Dyche and Evan Levy

Demand-Driven Forecasting: A Structured Approach to Forecasting by Charles Chase

Enterprise Risk Management: A Methodology for Achieving Strategic Objectives by Gregory Monahan

Executive’s Guide to Solvency II by David Buckham, Jason Wahl, and Stuart Rose

Fair Lending Compliance: Intelligence and Implications for Credit Risk Management by Clark R. Abrahams and Mingyuan Zhang

Foreign Currency Financial Reporting from Euros to Yen to Yuan: A Guide to Fundamental Concepts and Practical Applications by Robert Rowan

Information Revolution: Using the Information Evolution Model to Grow Your Business by Jim Davis, Gloria J. Miller, and Allan Russell

Manufacturing Best Practices: Optimizing Productivity and Product Quality by Bobby Hull

Marketing Automation: Practical Steps to More Effective Direct Marketing by Jeff LeSueur

Mastering Organizational Knowledge Flow: How to Mae Knowledge Sharing Work by Frank Leistner

Performance Management: Finding the Missing Pieces (to Close the Intelligence Gap) by Gary Cokins

Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics by Gary Cokins

The Business Forecasting Deal: Exposing Bad Practices and Providing Practical Solutions by Michael Gilliland

The Data Asset: How Smart Companies Govern Their Data for Business Success by Tony Fisher

The Executive’s Guide to Enterprise Social Media Strategy: How Social Networks Are Radically Transforming Your Business by David Thomas and Mike Barlow

The New Know: Innovation Powered by Analytics by Thornton May

Visual Six Sigma: Making Data Analysis Lean by Ian Cox, Marie A. Gaudard, Philip J. Ramsey, Mia L. Stephens, and Leo Wright

For more information on any of the above titles, please visit www.wiley.com.

Copyright © 2011 by SAS Institute Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging-in-Publication Data:

Reis Pinheiro, Carlos Andre, 1940-

 Social network analysis in telecommunications / Carlos Andre Reis Pinheiro.

p. cm. – (Wiley and SAS business series)

 Includes index.

 ISBN 978-0-470-64754-7 (hardback); 978-1-118-01077-8 (ebk); 978-1-118-01094-5 (ebk); 978-1-118-01095-2 (ebk)

 1. Telecommunication–Customer services. 2. Social networks. 3. Customer relations–Technological innovations. I. Title.

 HE7631.R45 2011

 384.068’8–dc22

2010039895

This book is dedicated to my small but crucial social network, which supports me unconditionally. This small social network has been serving as my inspiration to do everything in my life. This book is dedicated to my wife Daniele, my son Lucas, and my daughter Maitê.

Foreword

SOME PEOPLE ARE SPECIAL

Large communications service providers lose some customers every month and they work hard to keep this number as low as possible. In fact, most have become quite good at understanding the causes of customer churn and improving customer service to minimize the things that make customers leave. Of course, the competition has also improved at creating offers to attract your customers away. This healthy competition is good for consumers and is the source of great innovations, but it forces even the best service providers to constantly ask, “How can we do better?”

One way to do better is to pay attention to special people–connectors. So who are these connectors and what makes them so special?

THE CONNECTOR WHO CHANGED THE COURSE OF HISTORY

Tensions ran high between American colonists and British soldiers in the spring of 1775. On the morning of April 19th, a few hundred British soldiers set off from Boston to capture a cache of arms and arrest rebel leaders. Marching north into the small towns of Lexington and Concord, the British were astonished to encounter fierce and well organized resistance. Soundly beaten, they beat a hasty retreat back to Boston under constant harassment from colonial militia. The nascent rebellion was given a huge boost in confidence. Thus began the war for American Independence from Great Brittan.

How the colonial militia was notified in time and able to assemble ahead of the advancing British troops is a story well known to American schoolchildren, many of whom have read or perhaps even memorized the Henry Wadsworth Longfellow poem called “The Midnight Ride of Paul Revere,” Revere rode his horse through the night alerting militia men of the approaching army. Hundreds quickly turned up ready to fight the heavily armed British troops.

A young man named William Dawes also rode out of Boston the same night with the same message. Starting earlier than Revere, and riding through more populous towns along a more westerly route, Dawes could have been expected to arouse even more rebels. He didn’t. The few militia men who responded to Dawes turned up too late to be of much use.

Paul Revere is an essential figure in American History. William Dawes is but a footnote. Both men carried the same message into towns where the people had equal motivations. One started a word-of-mouth epidemic, the other was mostly ignored. But why? Malcolm Gladwell proposes an answer to this question in his 1999 book The Tipping Point: How Little Things Can Make a Big Difference. According to Gladwell, Paul Revere was a special type of person—a connector.

William Dawes was a shoemaker—age 26. He rode through towns knocking on random doors and shouting that the British were coming. But people in these towns didn’t know who he was, didn’t have confidence that his message represented an immediate threat. They didn’t see their neighbors doing anything so they went back to bed, figuring they would check it out in the morning. Paul Revere on the other hand was well known. He was a successful businessman who at age 40, had been at the center of events in and around Boston for years. When Paul Revere rode into a town he didn’t knock on a random door but went straight to the local militia commanders. Opening their doors in the middle of the night and recognizing Paul Revere on the doorstep, they sprung into action, alerted their neighbors, and spread the word. Revere alerted enough of the right people, so the alarm reached the tipping point.

COMMUNICATIONS SERVICE PROVIDERS AND THE TIPPING POINT

This story is a classic example of how connectors are essential to get an idea to tip. But what can this history lesson from 235 years ago tell us about today’s fast-moving high-technology marketplace? Instead of riding around on horses shouting to each other, we use mobile phones, e-mail, and social network sites. But these special people, the connectors, are still with us. The technology may have changed but connectors still influence our behavior and they are worth paying attention to.

Connectors know lots of people, many times the number of people the average person knows. But, they also know essential facts about people. Chances are you know someone like this, someone that seems to know everyone and stops to talk wherever they go, but it isn’t all small talk. Connectors know what to talk about with the people they meet. If you tell a connector about your hobby they can give you the names of several people who share that interest. Tell them about a problem you have and they will give you the names of people who can be helpful. Tell them about a great new product and a connector will spread the word. Research has shown that most people have at one time or another found a job because a connector put them in contact with someone they did not know who helped them get the job. Connectors play a vital role in our social networks.

The impact of connectors to a small neighborhood business is quite obvious. A local restaurant owner would obviously want to give his best table to a customer who is very influential in the neighborhood while the lone traveling businessman will likely find himself seated near the kitchen. I bet tavern owners in colonial Boston bent over backward to make sure Paul Revere had a good table, a well-prepared meal, and excellent service. The smart tavern owner would realize that he had more customers on nights when Paul Revere stopped in, he observed other customers saying hello to Paul and asking him to please join them. People stayed longer and spent more money when Paul was around. Then as now, owning a tavern is high risk business venture and the presence of one man like Paul Revere can determine if the business will tip toward profitability.

A communications service provider is not a local tavern. The managers can’t personally know 10 million customers. Yet the impact of connectors can be vital clues to what others will be doing in the future. Lose a connector to a competitor and next quarter your churn numbers may shoot up. Entice a connector away from your competitor and others may follow. Have a new service, get the word to a connector and see how fast it spreads.

But how does a communications service provider know that someone is a connector? You can’t just put a check box on the service application that says, “Are you a connector, yes or no?” Connector is not a binary status like gender. Sure connectors could be expected to be heavy service users, but just adding up call minutes and numbers of messages is not a good indicator, because these calls and messages may be only a small number of people. Looking at the number of people someone calls won’t help either. A taxi driver may speak with hundreds of people a month, but if he’s just arranging pick-ups, he’s not a connector.

THE ROLE OF MAVENS IN SOCIAL NETWORKS

The ideas connectors spread are not always their own. Paul Revere didn’t see the British troops on the move before setting off to spread the word. A stable boy overheard a conversation between British officers. Other people saw an unusual amount of activity on British ships and around their barracks. They knew exactly where to go with this news, to the home of Paul Revere. Connectors don’t just indiscriminately spread the word, they consolidate ideas, filter the important from the trivial, and think about who would want to know that idea.

I attended a wireless industry conference last year and met a man named Michael Gartenberg. To say that Michael is talkative would be an understatement. He has a lot to say, but he is not interested in small talk or talking about himself. He asked me a lot of questions to find out what I was interested in. As he learned more about me he started offering me all kinds of suggestions. Easily switching between his three handsets, he showed me dozens of applications and could talk in depth about how they worked on different platforms. Michael is a geek, no doubt about it, but a special kind of geek—a maven. Mavens, Malcolm Gladwell says, are one of the other types of people who contribute to tipping points.

Michael Gartenberg is very smart and loves to play with his gadgets. He knows a lot about the industry and has a widely read blog. He makes his living as a consultant, but never asked me about getting consulting business from SAS. From my perspective, his motivation seemed to be more about helping me than impressing me. According to Gladwell mavens combine intense curiosity with a passion to spread their knowledge in a way that is helpful.

By paying attention to mavens we can spot new ideas. Mavens share those ideas with connectors, and by watching connectors we can see which ideas become trends and spread through a social network. If you have a new product or service, show it first to a maven who will help you improve it. If a maven likes it, he will pass it along to connectors and this new idea may be one of the few that reach the tipping point.

The author of this book is a maven. I have had the pleasure of meeting Dr. Pinheiro at several SAS events and he is a classic example of Gladwell’s definition. By leading analytic projects in a broad range of subjects, including customer segmentation, churn prediction, payment risk, customer profitability, and revenue assurance, Dr. Pinheiro has become one of the world’s top experts in telecommunications data and analytical models. His willingness to share his knowledge has benefitted many SAS® users. Dr. Pinheiro’s presentation at SAS forums are always well attended and highly rated.

Among our telecommunications industry customers, social network analysis is one of the most frequently discussed topics. A recent survey of telecommunications service providers by industry analyst firm The Yankee Group validates that social network analysis is one of their top areas for new investment.

It is with great pleasure that I am able to introduce this book, which will guide SAS users on every aspect of social network analysis, from theory to practice. By applying the principles and examples laid out by Dr. Pinheiro, your attempts to increase profitability will reach a tipping point.

Ken King, Product Manager, SAS Institute Inc.

Preface

Traditional methods and techniques for identifying patterns in business data—such as K-means, self-organizing maps of Kohonen, and others—can achieve good results. However, they are usually focused on identifying individuals’ behaviors. They are based on a set of information about individuals and are clustered according to similar characteristics. All behaviors are placed in one of those cluster groups, so presumably individuals included in each group have similar characteristics and behaviors. However, as with any analytical model, it is an approximation of similar behaviors. Each group holds a particular average behavior. Each observation inside the group holds its own behavior. Some observations have behavior similar to the average group, some do not. By being aware that a clustering model is an approximation, any practical action should consider, for instance, the closest observations to the center of each cluster, assuring that these observations hold behavior similar to the cluster. Some particular clusters exhibit an average behavior. Some observations (customers) are close to this behavior, some are not. This is the approximation. The closer to the cluster’s center the observations are, the closer their individual behavior will be to the average cluster.

Social network analysis is also an approximation, but about the group rather than about the individual. The characteristics that are taken into consideration are not ones assigned to the individuals, but rather to the groups’ behaviors and the connections’ attributes. The main objective is to gather knowledge, not about the individuals, but about the group in which these individuals are set. More important than the individual’s characteristics is the group behavior, how the individuals inside a group relate to each other. In most cases the relationships among the individuals are the key to recognizing the group’s behavior. The individuals’ attributes are nothing more than additional information about the nodes inside a network. The links assigned to the network reveal the group’s behavior and the features of the community.

Attributes in relation to nodes and links depict the network structure and the knowledge of communities inside the entire network. This approach allows companies to understand beyond the customers, recognizing the relationships, and, hence, identifying the influential nodes, the ones that marketing campaigns should target.

The first part of this book describes the theory of social network analysis, presenting a sociological perspective, where this methodology started, but most important, the mathematical foundations that allow us to create metrics and compute measures to analyze the network in practice. Distinct network measurements and methods of calculation are discussed in this first part. The majority of the theoretical foundations presented in this book are based on the work of professors Robert A. Hanneman and Mark Riddle, of the Department of Sociology at the University of California, Riverside.

This first part also covers the concept of social network analysis, drawn from sociological studies. A theoretical foundation, based primarily on the graph theory, is presented in order to establish a base for the concept of social networks, the possible measures, and the structures assigned to the social networks in general. Formal methods used for the presentation and analysis of social networks are covered in Part II. Methods used to measure social networks are presented, depicting the algorithms and the methods used to compute the most relevant measures of centrality and power.

Part II of this book presents a case study, in which the concepts covered in Part I, through the use of SAS® capabilities, were used to distinguish results in terms of business challenges. The methodology used for social network analysis was applied to a telecommunications company in order to understand the customers’ relationship, and, hence, to identify influential customers from the perspective of distinct businesses. Two different business issues were addressed by using social network analysis to prove the value of this approach to telecommunications. The first issue dealt with the recognition of influential customers in terms of churn events, and, therefore, identification of the crucial customers who should be retained. The second approach dealt with bundle diffusion, identifying the central customers who should be targeted by marketing campaigns in order to spread the bundle quickly and effectively through the network.

This case study was elaborated, developed, and deployed during postdoctoral research at Dublin City University. This research was accomplished inside the Business Informatics Group at the School of Computing, under the direction of Dr. Markus Helfert.

Part III of this book presents the SAS capabilities used to address the challenge of social network analysis. Different modules of SAS solutions can be deployed to analyze social networks, compute measurements, calculate scores, identify communities, and draw the network structure. SAS® Enterprise MinerTM features the Link Analysis node, which provides a wide range of functionality to create and analyze the relationship among the nodes according to their links. Macros related to the Link Analysis node will be described in an isolated way, presenting a distinct approach to SAS capabilities when used to analyze social networks. Multidimensional scaling, used to establish coordinates based on the distance among the nodes will be shown as well, as an alternative method of identifying clusters of nodes based on the strength of their relationships. Some additional features to plot a network structure will be presented, such as using the macro %ds2const, which draws different types of networks.

In Part III, basic statistics are presented as a complementary way to analyze social networks. Statistical processes used to sort, create frequencies, identify extreme values, compute coordinates based on multidimensional scale and clustering nodes, and link connected components and communities are also presented at the end of Part III. The basic task of social network analysis is computing network measures. A more complex task is to analyze the network measures upon a particular business perspective. The measurements of nodes and links should be compared according to a particular target, highlighting the influential nodes, the strong links, the leaders of the network, as well as the followers. The analysis of the network measurements reveals the main characteristics of the social network and makes it possible to understand it from a business point of view.

Acknowledgments

I would like to thank everyone who assisted me in the production of this book. The actions of many people from all over the world were instrumental to the success of this project, especially the support of my family, discussions with my colleagues, and kindness from my friends.

A special thanks to my supervisor Dr. Markus Helfert, who led me through eighteen months of research during a postdoctoral term at Dublin City University. Dr. Markus leads the Business Informatics Group at the School of Computing where a tremendous amount of research in data management and analytics takes place. Thanks also to all members of the Business Informatics Group for sharing ideas and discussing projects and applications with no objections.

Many thanks to James Davey, Gavin Kiernan, and Brian Buckley for making available all telecommunications data that supported this research, and, most important, for sharing such valuable knowledge during this study.

Also thanks to my colleagues from SAS Ireland, John Farrelly, Eamonn McQuaid, Eoin Byrne, John Curran, Karl Langan, Sarunas Tankeliavicius, Kielty Hughes, Alan Gormley, David Ferguson, Martin Duffy, Turlough Fitzpatrick, Paul Power, John Lyons, Julianne Purcell, and Linda Moran. Special thanks to John Curran, Karl, and Eoin, who shared their very good knowledge of analytics.

Very special thanks to SAS Press, particularly to Stacey Hamilton and Shelley Sessoms, for helping me in this endeavor. This book would not have been possible without the unique involvement of Stacey. Thanks also to Stacey Rivera from Wiley for conducting such a rigorous review process.

Thanks to Ken King for his knowledge of telecommunications, analytics, SAS® software, and many other things. Also thanks for the great foreword and the amazing story.

Over these 18 months of research at Dublin City University, my family and I had the privilege of sharing great moments with our extended family and friends. We realized that in terms of a social network, the following group of people became very important to build our own. I really appreciate the kindness and friendship from all our “visitors.” We certainly have built the best social network ever. Thus, many thanks to my mother Suely; to Alex and Irma; to my sister Joseanne and my brother-in-law Gustavo; to my father-in-law Ivan and my mother-in-law Ana; to my “brother” Andre Brugger; to Rita and Sonia; to Claudio and Daniela; to Marco Aurelio and Rosane; to Marcelo and Patricia; to Michele and Daniel; and finally to Graziela and Eduardo. This is the sort of social network that never ends.

Part I: Foundation of Social Network Analysis

The first part of this book presents the basic theories of social network analysis. Chapter 1 introduces the foundation of this social science and the approaches to analyze social relations. Chapter 2 presents the formal theory and the most important concepts of social network analysis. Chapter 3 describes the formal methods to analyze social networks. Finally, Chapter 4 presents the most relevant measurements of social network analysis, such as degree, power, and influence.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!