2008 sunbelt - gleave lento welser smith - social roles in social networks

1
SOCIAL ROLES IN SOCIAL NETWORKS: Identifying Role Behaviors from Structure Introduction Moving from individuals to social roles simplifies complex social structures. Behavioral data identifies important social roles in online communities. Corresponding social network structures are characteristic of individuals playing specific social roles in computer-mediated interaction spaces. Data Since 2000 over two billion messages have been posted by tens of millions of authors to hundreds of thousands of threaded conversation newsgroups in Usenet. The Netscan Project has collected every message posted to Usenet and built structural models of every author, thread and newsgroup. Our research shows that technical support, social support, and political discussion spaces are habitats in which specific stable behaviors, “social roles”, occur. The following are several facets of behavior that illustrate key social roles in these computer-mediated collective action systems. Methods Roles are identified through direct observation and review of structural data. Local network structures of individuals performing key social role behaviors are generated. Structural role models are then used to identify additional individuals who resemble the role. The models are iteratively refined by subsequent observations. Conclusion Traces of social structure are created by individual behaviors and interactions in computer-mediated interaction systems. These traces reveal the presence of several distinct social roles. These roles are durable patterns of both individual behavior and structural position. The structural signature of a role can be used to rapidly identify additional individuals performing defined roles without resorting to more labor intensive content analysis. Communities can be classified on the basis of the ecology of roles found within them. These measures can also flag important changes in groups over time as the community ecology evolves. Hello, Yes, it is possible. IIS uses NTFS security, and you can configure the correct NTFS settings on the files. By doing this, your users will be prompted for a password. You can also completely remove the possibility for anonymous users by doing this: In IIS Manager, right click the Website and click Properties Click on the Directory Security tab. Click the Edit button for “Anonymous Access and authentication control” Remove the check box for “Anonymous access” Make sure that “Integrated Windows Authentication” is selected. If you have further questions in setting this up, the people in the IIS newsgroup will help you (it is easier for us to find your messages if you post there): microsoft.public.inetserver.iis http://www.microsoft.com/windowsserver2003/community/centers/iis/defa... Good luck! High Out-Degree Low In-Degree Alters are Unconnected Low Tie Strength High In-Degree Low Out-Degree Alters Highly Connected Low tie Strength High Degree Alters Highly Connected High Tie Mutuality High Tie Strength Eric Gleave University of Washington [email protected] Thomas Lento Cornell University [email protected] Howard T. Welser Ohio University [email protected] Marc Smith Microsoft Research [email protected] Discussion Person Answer Person Discussion Catalyst Microsoft Research Netscan Project http://netscan.research.microsoft.com Welser, H.T., Gleave, E., Fisher, D., and Smith, M.A. (2007). “Visualizing the Structure of Social Roles in Online Discussion Groups”. Journal of Social Structure. Vol. 8 No. 2. http://www.cmu.edu/joss/content/articles/volume8/Welser Turner, T.C., Smith, M.A., Fisher, D., and Welser, H.T. (2005). “Picturing Usenet: Mapping Computer-Mediated Collective Action”. JCMC. 10(4), article 7. http://jcmc.indiana.edu/vol10/issue4/turner.html

Transcript of 2008 sunbelt - gleave lento welser smith - social roles in social networks

Page 1: 2008   sunbelt - gleave lento welser smith - social roles in social networks

SOCIAL ROLES IN SOCIAL NETWORKS: Identifying Role Behaviors from Structure

IntroductionMoving from individuals to social roles simplifies complex social structures. Behavioral data identifies important social roles in online communities. Corresponding social network structures are characteristic of individuals playing specific social roles in computer-mediated interaction spaces.

DataSince 2000 over two billion messages have been posted by tens of millions of authors to hundreds of thousands of threaded conversation newsgroups in Usenet. The Netscan Project has collected every message posted to Usenet and built structural models of every author, thread and newsgroup. Our research shows that technical support, social support, and political discussion spaces are habitats in which specific stable behaviors, “social roles”, occur. The following are several facets of behavior that illustrate key social roles in these computer-mediated collective action systems.

MethodsRoles are identified through direct observation and review of structural data. Local network structures of individuals performing key social role behaviors are generated. Structural role models are then used to identify additional individuals who resemble the role. The models are iteratively refined by subsequent observations.

ConclusionTraces of social structure are created by individual behaviors and interactions in computer-mediated interaction systems. These traces reveal the presence of several distinct social roles. These roles are durable patterns of both individual behavior and structural position. The structural signature of a role can be used to rapidly identify additional individuals performing defined roles without resorting to more labor intensive content analysis. Communities can be classified on the basis of the ecology of roles found within them. These measures can also flag important changes in groups over time as the community ecology evolves.

Hello,

Yes, it is possible. IIS uses NTFS security, and you can configure thecorrect NTFS settings on the files. By doing this, your users will beprompted for a password.

You can also completely remove the possibility for anonymous users by doingthis:

In IIS Manager, right click the Website and click PropertiesClick on the Directory Security tab.Click the Edit button for “Anonymous Access and authentication control”Remove the check box for “Anonymous access”

Make sure that “Integrated Windows Authentication” is selected.

If you have further questions in setting this up, the people in the IISnewsgroup will help you (it is easier for us to find your messages if youpost there):

microsoft.public.inetserver.iishttp://www.microsoft.com/windowsserver2003/community/centers/iis/defa...

Good luck!

High Out-DegreeLow In-DegreeAlters are UnconnectedLow Tie Strength

High In-DegreeLow Out-DegreeAlters Highly ConnectedLow tie Strength

High DegreeAlters Highly ConnectedHigh Tie MutualityHigh Tie Strength

Eric Gleave

University of [email protected]

Thomas Lento

Cornell [email protected]

Howard T. Welser

Ohio University [email protected]

Marc Smith

Microsoft [email protected]

Discussion PersonAnswer Person Discussion CatalystMicrosoft Research Netscan Projecthttp://netscan.research.microsoft.com

Welser, H.T., Gleave, E., Fisher, D., and Smith, M.A. (2007). “Visualizing the Structure of Social Roles in Online Discussion Groups”. Journal of Social Structure. Vol. 8 No. 2.http://www.cmu.edu/joss/content/articles/volume8/Welser

Turner, T.C., Smith, M.A., Fisher, D., and Welser, H.T. (2005). “Picturing Usenet: Mapping Computer-Mediated Collective Action”. JCMC. 10(4), article 7.http://jcmc.indiana.edu/vol10/issue4/turner.html