Sei sulla pagina 1di 641

Scott and Carrington

‘An outstanding volume that brings together contributions from the world’s leading experts on social
network analysis. Methods, theory and substantive applications are presented in a clear exposition making
this the most comprehensive text available in this rapidly expanding and changing field. For anyone with
any interest in social networks this is quite simply a “must have” book.’
Martin Everett, Professor of Social Network Analysis, Manchester University, UK

‘There is something for everyone in The SAGE Handbook of Social Network Analysis. Whether you are
The SAGE Handbook of
brand new to the field or a seasoned expert, interested in the theoretical underpinnings of network

Social Network Analysis

Edited by
analysis or the methodological nuts and bolts associated with analyzing the evolution of an affiliation
network over time, this book is a must have.’
Michael Schwartz, Chair, Department of Sociology, Stony Brook University, USA

This sparkling Handbook offers an unrivalled resource for those engaged in the cutting edge field of
social network analysis. Systematically, it introduces readers to the key concepts, substantive topics, central
methods and prime debates. Among the specific areas covered are:

Social Network Analysis


• Network theory • Corporate networks • Measuring devices
• Interdisciplinary applications • Lobbying networks • Key Methodologies
• Online networks • Deviant networks • Software applications.

The result is a peerless resource for teachers and students which offers a critical survey of the field’s
origins, basic issues and major debates. The Handbook provides a one-stop guide that will be used by

The SAGE Handbook of


readers for decades to come.

John Scott is Professor in Sociology at Plymouth University.


Peter J. Carrington is Professor of Sociology and Legal Studies at the University of Waterloo.

Edited by
John Scott and
Peter J. Carrington
The SAGE Handbook of
Social Network
Analysis

5605-Scott-FM.indd i 4/15/2011 11:58:39 AM


‘An outstanding volume that brings together contributions from the world’s leading experts on
social network analysis. Methods, theory and substantive applications are presented in a clear
exposition making this the most comprehensive text available in this rapidly expanding and
changing field. For anyone with any interest in social networks this is quite simply a “must
have” book.’
Martin Everett, Professor of Social Network Analysis, Manchester University, UK

‘There is something for everyone in The SAGE Handbook of Social Network Analysis.
Whether you are brand new to the field or a seasoned expert, interested in the theoretical under-
pinnings of network analysis or the methodological nuts and bolts associated with analyzing
the evolution of an affiliation network over time, this book is a must have.’
Michael Schwartz, Chair, Department of Sociology, Stony Brook University, USA

‘Over the past decades Social Network Analysis has broadened its scope from anthropology
and sociology to all behavioral and social sciences, from social and organizational psychology
to management science and economics. This Handbook provides well-founded introductions
and overviews for a broad range of social network studies, approaches, and methodology.
It is a must for everybody who is interested in the way social network relations evolve, are
structured and affect outcomes in any part of our life and society.’
Frans N. Stokman, Professor of Social Science Research Methodology, ICS,
University of Groningen, The Netherlands

5605-Scott-FM.indd ii 4/15/2011 11:58:40 AM


The SAGE Handbook of
Social Network
Analysis

Edited by
John Scott and
Peter J. Carrington

5605-Scott-FM.indd iii 4/15/2011 11:58:40 AM


Chapter 1/Introduction © Peter J. Carrington & John Scott Chapter 20 © Paul DiMaggio 2011
2011 Chapter 21 © Ron Johnston & Charles Pattie 2011
Chapter 2 © Alexandra Marin & Barry Wellman 2011 Chapter 22 © Edward L. Kick, Laura A. McKinney, Steve
Chapter 3 © Linton C. Freeman 2011 McDonald & Andrew Jorgenson 2011
Chapter 4 © Stephen P. Borgatti & Virginie Lopez-Kidwell Chapter 23 © Robert A. Hanneman & Mark Riddle 2011
2011 Chapter 24 © Robert A. Hanneman & Mark Riddle 2011
Chapter 5 © John Scott 2011 Chapter 25 © Peter V. Marsden 2011
Chapter 6 © Sanjeev Goyal 2011 Chapter 26 © Ove Frank 2011
Chapter 7 © Ann Mische 2011 Chapter 27 © Betina Hollstein 2011
Chapter 8 © Vincent Chua, Julia Madej & Barry Wellman 2011 Chapter 28 © Stephen P. Borgatti & Daniel S. Halgin 2011
Chapter 9 © Lijun Song, Joonmo Son & Nan Lin 2011 Chapter 29 © Anuška Ferligoj, Patrick Doreian & Vladimir
Chapter 10 © Douglas R. White 2011 Batagelj 2011
Chapter 11 © Katherine Faust 2011 Chapter 30 © Philippa Pattison 2011
Chapter 12 © Anatoliy Gruzd & Caroline Haythornthwaite Chapter 31 © Marijtje A.J. van Duijn & Mark Huisman 2011
2011 Chapter 32 © Garry Robins 2011
Chapter 13 © William K. Carroll & J. P. Sapinski 2011 Chapter 33 © Tom A.B. Snijders 2011
Chapter 14 © Matthew Bond & Nicholas Harrigan 2011 Chapter 34 © Weihua (Edward) An 2011
Chapter 15 © David Knoke 2011 Chapter 35 © Klaus Hamberger, Michael Houseman &
Chapter 16 © Mario Diani 2011 Douglas R. White 2011
Chapter 17 © Peter J. Carrington 2011 Chapter 36 © Vladimir Batagelj 2011
Chapter 18 © Renée C. van der Hulst 2011 Chapter 37 © Lothar Krempel 2011
Chapter 19 © Howard D. White 2011 Chapter 38 © Mark Huisman & Marijtje A.J. van Duijn 2011

First published 2011

Apart from any fair dealing for the purposes of research or private study, or criticism or
review, as permitted under the Copyright, Designs and Patents Act, 1988, this publication
may be reproduced, stored or transmitted in any form, or by any means, only with the
prior permission in writing of the publishers, or in the case of reprographic reproduc-
tion, in accordance with the terms of licences issued by the Copyright Licensing Agency.
Enquiries concerning reproduction outside those terms should be sent to the publishers.

SAGE Publications Ltd


1 Oliver’s Yard
55 City Road
London EC1Y 1SP

SAGE Publications Inc.


2455 Teller Road
Thousand Oaks, California 91320

SAGE Publications India Pvt Ltd


B 1/I 1 Mohan Cooperative Industrial Area
Mathura Road, Post Bag 7
New Delhi 110 044

SAGE Publications Asia-Pacific Pte Ltd


33 Pekin Street #02-01 Far East Square Singapore 048763

Library of Congress Control Number 2010935654

British Library Cataloguing in Publication data


A catalogue record for this book is available from the British Library

ISBN 978-1-84787-395-8

Typeset by by Glyph International, Bangalore, India


Printed in Great Britain by MPG Books Group, Bodmin, Cornwall
Printed on paper from sustainable resources

5605-Scott-FM.indd iv 4/15/2011 11:58:40 AM


Contents

Notes on Contributors ix
Acknowledgements xvii

1 Introduction 1
Peter J. Carrington and John Scott

SECTION I GENERAL ISSUES 9

2 Social Network Analysis: An Introduction 11


Alexandra Marin and Barry Wellman

3 The Development of Social Network Analysis – with an


Emphasis on Recent Events 26
Linton C. Freeman

4 Network Theory 40
Stephen P. Borgatti and Virginie Lopez-Kidwell

5 Social Physics and Social Networks 55


John Scott

6 Social Networks in Economics 67


Sanjeev Goyal

7 Relational Sociology, Culture, and Agency 80


Ann Mische

SECTION II SUBSTANTIVE TOPICS 99

8 Personal Communities: The World According to Me 101


Vincent Chua, Julia Madej, and Barry Wellman

9 Social Support 116


Lijun Song, Joonmo Son, and Nan Lin

10 Kinship, Class, and Community 129


Douglas R. White

5605-Scott-FM.indd v 4/15/2011 11:58:40 AM


vi CONTENTS

11 Animal Social Networks 148


Katherine Faust

12 Networking Online: Cybercommunities 167


Anatoliy Gruzd and Caroline Haythornthwaite

13 Corporate Elites and Intercorporate Networks 180


William K. Carroll and J.P. Sapinski

14 Political Dimensions of Corporate Connections 196


Matthew Bond and Nicholas Harrigan

15 Policy Networks 210


David Knoke

16 Social Movements and Collective Action 223


Mario Diani

17 Crime and Social Network Analysis 236


Peter J. Carrington

18 Terrorist Networks: The Threat of Connectivity 256


Renée C. van der Hulst

19 Scientific and Scholarly Networks 271


Howard D. White

20 Cultural Networks 286


Paul DiMaggio

21 Social Networks, Geography and Neighbourhood Effects 301


Ron Johnston and Charles Pattie

22 A Multiple-Network Analysis of the World System


of Nations, 1995–1999 311
Edward L. Kick, Laura A. McKinney,
Steve McDonald, and Andrew Jorgenson

SECTION III CONCEPTS AND METHODS 329

23 A Brief Introduction to Analyzing Social Network Data 331


Robert A. Hanneman and Mark Riddle

24 Concepts and Measures for Basic Network Analysis 340


Robert A. Hanneman and Mark Riddle

25 Survey Methods for Network Data 370


Peter V. Marsden

5605-Scott-FM.indd vi 4/15/2011 11:58:41 AM


CONTENTS vii

26 Survey Sampling in Networks 389


Ove Frank

27 Qualitative Approaches 404


Betina Hollstein

28 Analyzing Affiliation Networks 417


Stephen P. Borgatti and Daniel S. Halgin

29 Positions and Roles 434


Anuška Ferligoj, Patrick Doreian, and Vladimir Batagelj

30 Relation Algebras and Social Networks 447


Philippa Pattison

31 Statistical Models for Ties and Actors 459


Marijtje A.J. van Duijn and Mark Huisman

32 Exponential Random Graph Models for Social Networks 484


Garry Robins

33 Network Dynamics 501


Tom A.B. Snijders

34 Models and Methods to Identify Peer Effects 514


Weihua (Edward) An

35 Kinship Network Analysis 533


Klaus Hamberger, Michael Houseman, and Douglas R. White

36 Large-Scale Network Analysis 550


Vladimir Batagelj

37 Network Visualization 558


Lothar Krempel

38 A Reader’s Guide to SNA Software 578


Mark Huisman and Marijtje A.J. van Duijn

Index 601

5605-Scott-FM.indd vii 4/15/2011 11:58:41 AM


5605-Scott-FM.indd viii 4/15/2011 11:58:41 AM
Notes on Contributors

Weihua (Edward) An is a PhD candidate in Sociology, doctoral fellow in the Multidisciplinary Program
in Inequality and Social Policy at the Kennedy School of Government and a graduate associate in the
Institute for Quantitative Social Science and the Fairbank Center for Chinese Studies at Harvard
University. He earned a master’s degree in Statistics from Harvard (in 2009) and has strong interests in
quantitative methods, especially social network analysis, causal inference, and Bayesian statistics. His
general substantive interests span a variety of areas, including sociology of health, inequality and social
policy and organizations. Currently, he focuses on formal and statistical analysis of peer effects on health
and social behaviours, and social-network-based policy interventions. He is working on several projects,
including ‘Bayesian Propensity Score Estimators: Incorporating Uncertainties in Propensity Score into
Causal Inference’ (forthcoming in Sociological Methodology), ‘Instrument Variable Estimates of Peer
Effects on Health Behaviors’, ‘Directionality of Social Ties and the Edge-Reversal Test of Peer Effects’
and ‘Peer Effects on Adolescent Cigarette Smoking and Social-Network-Based Interventions: Experimental
Evidence from China’.

Vladimir Batagelj is Professor of Discrete and Computational Mathematics at the University of


Ljubljana. His main research interests are in graph theory, algorithms on graphs and networks, combina-
torial optimization, data analysis and applications of information technology in education. With A. Mrvar,
he has developed Pajek, http://pajek.imfm.si, a program for analysis and visualization of large networks.
He is author and coauthor of several papers published in scientific journals (CACM, Psychometrika,
Journal of Classification, Social Networks, Discrete Mathematics, Algorithmica, Journal of Mathemati-
cal Sociology, etc.) and in proceedings of international conferences. Recently he coauthored two
books: Generalized Blockmodeling (with P. Doreian and A. Ferligoj) and Exploratory Network
Analysis with Pajek (with W. de Nooy and A. Mrvar). These books were published in 2005 by
Cambridge University Press. The book Generalized Blockmodeling was awarded a Harrison White
Outstanding Book Award by the Mathematical Sociology Section of the American Sociological
Association in 2007.

Matthew Bond is a Senior Lecturer in the Department of Social and Policy Studies, Faculty of Arts and
Human Sciences, London South Bank University. His main research interests are the quantitative analysis
of corporate political behaviour, corporate charity and the British Establishment.

Stephen P. Borgatti is the Paul Chellgren Chair of Management at the University of Kentucky. His
research interests include social network theory and methodology, knowledge management and career
trajectories. He is a member of the LINKS Center for Social Network Analysis in Management, and has
recently coauthored a piece on network theory in Science with his LINKS Center colleagues.

Peter J. Carrington is Professor of Sociology and Legal Studies at the University of Waterloo and editor
of Canadian Journal of Criminology and Criminal Justice. His current research, the Canadian Criminal
Careers and Criminal Networks Study, combines his long-standing interests in social network analysis
and in crime and delinquency. Other interests include police discretion and the impact of the Canadian

5605-Scott-FM.indd ix 4/15/2011 11:58:41 AM


x NOTES ON CONTRIBUTORS

Youth Criminal Justice Act. His recent articles have appeared in Criminology, Canadian Journal of
Criminology and Criminal Justice, and Criminal Justice Policy Review. With John Scott and Stanley
Wasserman, he coedited Models and Methods in Social Network Analysis (Cambridge University Press,
2005), which won the 2006 Harrison White Outstanding Book Award, given by the Mathematical
Sociology Section of the American Sociological Association.

William K. Carroll is a member of the Sociology Department at the University of Victoria since
1981, and a founding participant in the Graduate Program in Cultural, Social and Political
Thought. He currently directs UVic’s Interdisciplinary Minor/Diploma Program in Social Justice
Studies. His research interests are in the areas of social movements and social change, the political
economy of corporate capitalism and critical social theory and method. His recent books include
The Making of a Transnational Capitalist Class (Zed Books, 2010) and Corporate Power in a
Globalizing World (Oxford University Press, revised edition, 2010).

Vincent Chua obtained his PhD in Sociology at the University of Toronto. In his dissertation, he
examined the sources of several forms of social capital in Singapore and the effects of social capital
on occupational success. He has won several academic awards for his dissertation research: the
Daniel Grafton Hill Prize, the Ellie Yolles Ontario Graduate Scholarship in Sociology and the Norman
Bell Award.

Mario Diani is ICREA Research Professor in the Department of Political and Social Sciences of the
Universitat Pompeu Fabra, Barcelona. He has worked extensively on social network approaches to social
movements and collective action. His publications include Social Movements (with Donatella della Porta,
Blackwell, 1999/2006), Social Movements and Networks (coedited with Doug McAdam, Oxford
University Press, 2003), and articles in leading journals such as American Sociological Review, American
Journal of Sociology, Social Networks and Theory and Society.

Paul DiMaggio is A. Barton Hepburn Professor of Sociology and Public Affairs and the Director of the
Center for the Study of Social Organization at Princeton University. His current projects include the
development and application of network methods to detect schematic heterogeneity in attitude data and a
study of network effects on social inequality. He is coeditor (with Patricia Fernandez-Kelly) of Art in the
Lives of Immigrant Communities in the U.S. (Rutgers University Press, 2010).

Patrick Doreian is Emeritus Professor of Sociology and Statistics at the University of Pittsburgh and a
research faculty member of the Faculty of Social Sciences at the University of Ljubljana. He ‘retired’ in
order to have more time for research and writing. He currently coedits Social Networks with Tom Snijders
and previously edited The Journal of Mathematical Sociology for 23 years. His research interests include
social network analysis, network evolution, and macro social change.

Katherine Faust is Professor of Sociology and member of the Institute for Mathematical Behavioral
Sciences at the University of California, Irvine. She is coauthor (with Stanley Wasserman) of the book
Social Network Analysis: Methods and Applications (Cambridge University Press) and of numerous
articles about social networks and network methodology. Her current research focuses on comparing
network patterns across different forms of social relations and animal species; development of methodol-
ogy for complex network structures, including constraints and local network properties; and understand-
ing relationships between social networks and demographic processes.

Anuška Ferligoj is Professor at the Faculty of Social Sciences at University of Ljubljana, head of the
graduate program on Statistics at the University of Ljubljana and head of the Center of Methodology and
Informatics at the Institute of Social Sciences. She has been the editor of the journal Advances in
Methodology and Statistics (Metodoloski zvezki) since 2004 and is a member of the editorial boards of

5605-Scott-FM.indd x 4/15/2011 11:58:41 AM


NOTES ON CONTRIBUTORS xi

the Journal of Mathematical Sociology, Journal of Classification, Social Networks, Advances in Data
Analysis and Classification, Methodology, Structure and Dynamics: eJournal of Anthropology and
Related Sciences, BMS and Corvinus Journal of Sociology and Social Policy. She was a Fulbright scholar
in 1990 to 1991 and a visiting professor at the University of Pittsburgh in 1996 and at the University of
Vienna in 2009 to 2010. She was awarded the title of Ambassador of Science of the Republic of Slovenia
in 1997 and was given the Simmel Award in 2007 by the International Network for Social Network
Analysis (INSNA). In 2010 she received Doctor et Professor Honoris Causa at Eotvos Lorand University
(ELTE) in Budapest. She is an elected member of the European Academy of Sociology and the
International Statistical Institute. Her interests include multivariate analysis (constrained and multicriteria
clustering), social networks (measurement quality and blockmodeling), and survey methodology
(reliability and validity of measurement). She is the coauthor of the monograph Generalized Blockmodeling
(Cambridge University Press, 2005), which obtained the Harrison White Outstanding Book Award in
2007, given by the Mathematical Sociology Section at the American Sociological Association.

Ove Frank, is Emeritus Professor in the Department of Statistics at Stockholm University. From 1971 he
held professorships in statistics at the universities of Uppsala, Lund and Stockholm. He also had visiting
positions at the University of California–Riverside and Stanford University. He is one of the pioneers of
statistical graph theory and he contributed to the development of statistical sampling theory for social net-
works. He developed probabilistic network models and statistical methods for sampling and estimation in
networks. He also made contributions to various problems in combinatorics and information theory. Among
his recent publications are contributions to Encyclopedia of Complexity and Systems Science (Springer,
2009), International Encyclopedia of Statistical Science (Springer, 2010) and Official Statistics: Methodology
and Applications in Honour of Daniel Thorburn (Department of Statistics, Stockholm University, 2010).

Linton C. Freeman is Research Professor in the Department of Sociology and member of the Institute
for Mathematical Behavioral Sciences at the University of California, Irvine. He began working in social
network analysis in 1958 when he directed a structural study of community decision making in Syracuse,
New York. In 1978 he founded the journal Social Networks. Beginning in the 1950s, and continuing on to
the present time, one of his continuing areas of interest has been the history of social network analysis.

Sanjeev Goyal is Profesor of Economics at the University of Cambridge and Fellow of Christ’s College,
Cambridge. He was educated at the University of Delhi and the Indian Institute of Management
(Ahmedebad) in India, and at Cornell University in the United States. He has carried out theoretical
research in the fields of learning, coordination problems and political economy and industrial organiza-
tion; and is one of the pioneers in the economic study of networks. His research has appeared in leading
international journals such as Econometrica, Journal of Political Economy, American Economic Review
and the Review of Economic Studies. His book Connections: An Introduction to the Economics of
Networks was published by Princeton University Press in 2007.

Anatoliy Gruzd is Assistant Professor in the School of Information Management at Dalhousie University
in Canada. He earned his PhD in Library and Information Science at the University of Illinois at Urbana-
Champaign and also holds a MS in Library and Information Science from Syracuse University as well
as BS and MS degrees in Computer Science from Dnipropetrovsk National University in Ukraine. His
current research includes the development of various automated text-mining techniques and visualization
tools for uncovering social networks between online participants based on their digital footprints alone.
Recently, he was awarded a $161,000 Social Sciences and Humanities Research Council of Canada grant
to study how online social media and networks are changing the ways scholars disseminate information.
He is also participating in a $23.2 million NCE collaborative research initiative called the GRAND
(GRaphics, Animation and New meDia) network.

Daniel S. Halgin is Assistant Professor of Management at the University of Kentucky, where he is a


member of the LINKS Center for Organizational Social Network Analysis. His program of research
focuses on social network theory, identity dynamics and research methodologies.

5605-Scott-FM.indd xi 4/15/2011 11:58:41 AM


xii NOTES ON CONTRIBUTORS

Klaus Hamberger teaches Social Anthropology at the École des Hautes Etudes en Sciences Sociales
(Paris, France). He has done fieldwork in Southern Togo and has published on social space and kinship
networks.

Robert A. Hanneman is Professor of Sociology at the University of California, Riverside. Much of his
work has been in simulation modeling (both systems dynamics and agent-based) as an approach to formal
theory construction. He has published on a variety of topics in macro-sociology, political economy and
the sociology of education. In the field of social network analysis, he is currently working on empirical
projects in market organization and world systems. He is also working on software and algorithms for the
modeling of multimodal network data.

Nicholas Harrigan is Assistant Professor of Sociology in the School of Social Sciences and Humanities,
Singapore Management University. He works in two overlapping research areas: social networks and the
politics of business. He has developed Coevolution Regression Graph Models and has used statistical
models to study corporate political strategy in Australia and the United Kingdom.

Caroline Haythornthwaite received her PhD in 1996 from Toronto. She is Director of the School
of Library, Archival and Information Studies, University of British Columbia. She joined UBC in
August 2010 after 14 years at the University of Illinois at Urbana-Champaign, where she was Professor
in the Graduate School of Library and Information Science. In 2009 to 2010, she was Leverhulme
Trust Visiting Professor at the Institute of Education, University of London, presenting and writing on
‘Learning Networks’. Her research concentrates on information and knowledge sharing through
social networks, and the impact of computer media and the Internet on work, learning and social
interactions. She has studied social networks of work and media use, the development and nature of
community online, distributed knowledge processes, the nature and constraints of interdisciplinary
collaboration, and transformative effects of the Internet and Web 2.0 technologies on learning and
collaborative practices, and automated processes for analysis of online activity. Her major
publications include The Internet in Everyday Life (2002, with Barry Wellman); Learning, Culture and
Community in Online Education (2004, with Michelle M. Kazmer), the Handbook of E-Learning
Research (2007, with Richard Andrews) and E-Learning Theory and Research (2011, with Richard
Andrews).

Betina Hollstein is Professor of Sociology at Hamburg University. She was educated at Marburg University
and at the Free University Berlin. She has been a lecturer and researcher at the Free University Berlin and
at Ludwig-Maximilians-University Munich, and an assistant professor at Mannheim University and
Humboldt-University Berlin. Her research interests include social networks, sociology of the life-course,
social inequality, and social research methods. Her relevant publications include Mixed Methods in Social
Network Research (coedited with Silvia Dominguez) and ‘Netzwerkveränderungen verstehen. Zur
Integration von struktur- und akteurstheoretischen Perspektiven’ [Understanding Changes in Personal
Networks. Integrating Structural and Actor-oriented Approaches] inBerliner Journal für Soziologie (2003).

Michael Houseman is Professor of Religions of Black Africa (Ethnology) at the École Pratique des
Hautes Etudes (Paris, France) and was trained in social anthropology at the University of Paris
10-Nanterre. He has done fieldwork in Cameroon, Benin and French Guyana. He has published numerous
articles on ritual and on kinship and social organization, is the author (with Carlo Severi) of Naven or the
Other Self. A Relational Approach to Ritual Action (Brill, 1998) and the editor of Eprouver l’Initiation
(EPHE, 2008).

Mark Huisman is Assistant Professor in the Department of Sociology at the University of


Groningen. His research interests are in applied statistics, statistical models for social networks and
methods for nonresponse and missing data. He teaches courses on statistics and multivariate statistical
methods.

5605-Scott-FM.indd xii 4/15/2011 11:58:41 AM


NOTES ON CONTRIBUTORS xiii

Ron Johnston is Professor in the School of Geographical Sciences at the University of Bristol, having
previously worked at Monash University and the universities of Canterbury, Sheffield and Essex. His
main research interests are in electoral studies and urban social segregation and include several studies on
neighbourhood effects in voting patterns generated by conversations in social networks. His recent books
include (with Charles Pattie) Putting Voters in Their Place: Geography and Elections in Great Britain
(Oxford University Press, 2006).

Andrew Jorgenson is Macro-Sociologist at the University of Utah. His current research interests include
the political-economy and human-ecology of global environmental change, environmental degradation
and public health, and the structural determinants of income inequality. His publications have appeared
in Social Forces, Social Problems, Social Science Research, International Sociology, Global Environmental
Politics, Organization and Environment and dozens of other scholarly journals and collections. He also
serves as coeditor of the Journal of World-Systems Research.

Edward L. Kick is the former Head and now Professor of Sociology in the Department of Sociology and
Anthropology at North Carolina State University. His macro-sociological research has examined world-
system structure and its impacts on social change, militarization, economic development, inequality,
environment, polity, urban and rural community, and food insecurity. Recently, he has examined environ-
mental issues of flood management and global biodiversity. His research has appeared in the American
Sociological Review, American Journal of Sociology, Social Forces, Social Science Research, and most
recently in Disasters, Organization and Environment and in handbooks on networks and on globalization.
He coedits the Journal of World-Systems Research.

David Knoke is Professor of Sociology at the University of Minnesota. He received his Ph.D. in
1972 from the University of Michigan. His primary areas of research and teaching are organizations,
networks, and social statistics. He has been a principal investigator on more than a dozen National
Science Foundation grants, most recently a project to investigate networks and teamwork of 26 Minnesota
Assertive Community Treatment (ACT) teams, a multiprofessional mental-health services program.
His recent books, some with coauthors, include Comparing Policy Networks: Labor Politics in the
U.S., Germany, and Japan (1996), Organizations: Business Networks in the New Political Economy
(2001), and Statistics for Social Data Analysis, 4th ed. (2002), and Social Network Analysis, 2nd ed.
(2008). In 2008 he received the UMN College of Liberal Arts’ Arthur ‘Red’ Motley Exemplary Teaching
Award.

Lothar Krempel is a senior Research fellow at the Max Planck Institute for the Study of Societies in
Cologne, Germany, and is Associate Professor (PD) for Empirical Social Science Research at the
University of Duisburg, Essen. He has written a book (in German) on network visualization and has
applied network visualization technologies in various domains like German capital ties and directory
interlocks and world trade and historical networks.

Nan Lin is the Oscar L. Tang Family Professor of Sociology of the Trinity College, Duke University. His
academic interests, for more than four decades, have focused on social networks, social support and social
capital. He has made efforts to construct theories, devise measurements and conduct empirical research
in each research arena. Empirically, he has applied these theories and measurements to the studies of
social stratification and mobility, stress and coping, and individual, organizational, and community well-
being. He has employed both quantitative (large-scale national surveys, and surveys in organizations and
communities) and qualitative (intensive long-term observations in villages, for example) methods. He has
authored or edited 11 books (including Social Capital: A Theory of Social Structure and Action,
Cambridge University Press, 2001), 40 book chapters and numerous journal articles.

Virginie Lopez-Kidwell is a Doctoral Candidate in management at the University of Kentucky and is


affiliated with the LINKS International Center for Research on Social Networks in Business. Her research

5605-Scott-FM.indd xiii 4/15/2011 11:58:41 AM


xiv NOTES ON CONTRIBUTORS

interests include social networks, the role of affect in organizational behaviours, as well as power and
dependence in workplace relationships.

Julia Madej was a Researcher at NetLab from 2006 to 2009. She is a graduate of the University of Toronto
and is currently an official of the Ministry of Health and Long-Term Care in the Province of Ontario.

Alexandra Marin is Assistant Professor of Sociology at the University of Toronto. Her research interests
include the role of social networks and social capital in the labour market and workplace, and social
network data collection.

Peter V. Marsden is Harvard College Professor and Edith and Benjamin Geisinger Professor of Sociology
at Harvard University. His concern with the measurement of social networks via survey methods is long-
standing. Marsden’s substantive research interests center on social organization, including social net-
works, formal organizations, and the sociology of medicine. He has done methodological work on
network analysis and survey research. He coedited (with James D. Wright) the Handbook of Survey
Research, 2nd ed. (Emerald Group Publishing, 2010). He is editing a forthcoming collection of studies
of U.S. social trends based on General Social Survey data.

Steve McDonald is Assistant Professor of Sociology at North Carolina State University. His research
examines inequality in access and returns to social capital across the life course. His primary focus is on
the role that social networks play in reproducing race and gender inequality in the labour market. He has
also conducted research on informal mentoring in adolescence and the consequences of these relation-
ships for status attainment in adulthood. Examples of his research can be found in the American Journal
of Sociology, Social Problems, Social Forces, Social Science Research, Sociology of Education and
Gender and Society.

Laura A. McKinney is a doctoral candidate in the Department of Sociology and Anthropology at North
Carolina State University. Her dissertation research uses cross-national data and structural equation mod-
eling to examine interdependencies among economic, ecological, and social systems that determine sus-
tainability. Her research interests include global and local sustainability, global political economy,
environmental sociology, global social change, rural/community development and research methods. Her
work has been published in Organization and Environment, Disasters, Human Ecology Review and the
International Journal of Comparative Sociology.

Ann Mische is Associate Professor of Sociology at Rutgers University. Her work combines interpretive
and network-analytic approaches to the study of political communication in social movements and demo-
cratic politics. Her book Partisan Publics: Communication and Contention across Brazilian Youth Activist
Networks was published by Princeton University Press in 2007. In addition to her work on Brazil, she has
also published theoretical articles in leading sociological journals addressing the relationship between
networks, culture, and agency. She is currently beginning a new research project on how individual and
collective projections of future possibilities influence interactions and choices in the present.

Charles Pattie is Professor of Geography at the University of Sheffield. His research interests include
electoral studies, political participation and the politics of devolution.

Philippa Pattison is Professor of Psychological Sciences at the University of Melbourne. Her research
interests include the development of mathematical and statistical models for social and behavioural phe-
nomena, particularly for social networks and network-based social processes. Her current research
focuses on the development of stochastic models for social processes and on applications of these models
to a diverse range of phenomena, including the evolution of the biotechnology industry in Australia
and the spread of infectious diseases.

5605-Scott-FM.indd xiv 4/15/2011 11:58:41 AM


NOTES ON CONTRIBUTORS xv

Mark Riddle is Associate Professor of Sociology at the University of Northern Colorado.

Garry Robins is a mathematical psychologist and social network methodologist in the Department of
Psychological Sciences at the University of Melbourne. His research has concentrated on developing
exponential random graph models for social networks but he is also involved in a wide range of empirical
social network projects. His research has won awards from the Psychometric Society, the American
Psychological Association and the International Network for Social Network Analysis. He is a former
editor of the Journal of Social Structure.

J.P. Sapinski is currently pursuing a PhD in Sociology at the University of Victoria, in British Columbia,
Canada. His research focuses on the involvement of private actors and of business organizations in global
environmental and climate politics. Before turning to sociology, he obtained a Master’s degree in
Anthropology from the Université de Montréal, where he studied aboriginal social movements in Mexico.

John Scott is Professor of Sociology at the University of Plymouth and was previously Professor of
Sociology at the universities of Essex and Leicester. He has been President, Chair, Secretary, and
Treasurer of the British Sociological Association and is a Fellow of the British Academy and an
Academician of the Academy of the Social Sciences. He is the author of Social Network Analysis (1992
and 2000), editor of Social Networks: Critical Concepts (Routledge, 2002) and with Peter Carrington and
Stanley Wasserman, of Models and Methods in Social Network Analysis (2005). In addition to applica-
tions of network analysis in studies of economic sociology (including Capitalist Property and Financial
Power, 1986, and Corporate Business and Capitalist Classes, 1997) he is the author of Power (2001),
Social Theory (2006) and Conceptualising the Social World (2011). He is currently completing a book on
the early development of British sociology.

Tom A.B. Snijders is Professor of Statistics in the Social Sciences at the University of Oxford
and a Fellow of Nuffield College; he also is Professor of Statistics and Methodology at the
University of Groningen. His research focuses on methodology for social network analysis, and
multilevel modeling. He has a particular interest in modeling network dynamics and has been the origin-
ator of the statistical program SIENA for analysing network panel data. He is coeditor of Social
Networks.

Joonmo Son received his PhD in Sociology from Duke University and is currently Assistant Professor of
Sociology at the National University of Singapore. His research interests include social capital, social
support, network diversity, health and aging, volunteering and comparative sociology. One of his current
research projects compares the effect of social support on depression and physical health in the United
States, China, and Taiwan. His publications have appeared in Social Science Research, Journal of Health
and Social Behavior and Sociological Quarterly.

Lijun Song received her PhD in Sociology from Duke University and is Assistant Professor of
Sociology and a participant at the Center for Medicine, Health, and Society at Vanderbilt University.
Her scholarly interests focus on causes and consequences of social networks, social integration,
social capital, and social support. Her recent publications include ‘Social Capital and Health
Inequality: Evidence from Taiwan’ (2009) in Journal of Health and Social Behavior; ‘The Effect of the
Cultural Revolution on Educational Homogamy in Urban China’ (2009) in Social Forces; and several
book chapters, including ‘Social Capital and Health’ (2009) in The New Companion to Medical
Sociology.

Marijtje A.J. van Duijn is Associate Professor of Statistics in the Department of Sociology of the
University of Groningen. Her research interests are in the development and application of random effects
models for discrete or complex data, such as longitudinal, grouped, or social network data.

5605-Scott-FM.indd xv 4/15/2011 11:58:41 AM


xvi NOTES ON CONTRIBUTORS

Renée C. van der Hulst (1970) is the Director of Bureau Netwerkanalyse (the Netherlands) and special-
izes in social scientific research, in particular social network analysis in relation to law enforcement,
crime prevention, public safety and security. She has been working for several years as a researcher and
consultant in this area, and holds a PhD in Sociology and a Master’s degree in Social and Organisational
Psychology. Her main areas of interest are the study of social networks, and human factors in relation to
radicalization, terrorism, and organized crime.

Barry Wellman is a Fellow of the Royal Society of Canada and the past chair of the American
Sociological Association’s Community and Urban Sociology section and the Communication and
Information Technologies section. Wellman holds the S.D. Clark Chair at the Department of Sociology,
University of Toronto, where he directs NetLab. He founded the International Network for Social
Network Analysis in 1976. The author and coauthor of more than 200 papers, his most recent coedited
book is The Internet in Everyday Life (with Caroline Haythornthwaite). His coauthored book Networked
(with Lee Rainie) will be published by MIT Press in 2011.

Douglas R. White is Professor of Anthropology and Mathematical Behavioral Sciences at the University
of California, Irvine, and External Faculty at the Santa Fe Institute. He is a recipient of the Distinguished
Senior U.S. Scientist Award, Alexander von Humboldt Foundation (Ethnosoziologie). He has published
extensively on kinship and social organization and is the author (with Ulla Johansen) of Network Analysis
and Ethnographic Problems: Process Models of a Turkish Nomad Clan (Lexington, 2005) and the editor
of Structure and Dynamics: eJournal of Anthropological and Related Sciences.

Howard D. White received his PhD in Librarianship at the University of California, Berkeley, in 1974.
He joined Drexel University, where he is Professsor Emeritus. He is known for author-centered biblio-
metric techniques, examples of which appear in this volume. He and Katherine W. McCain won the best
paper award of the American Society for Information Science and Technology in 1998. The society gave
him its highest honour, the Award of Merit, in 2004. The following year, he received the Derek Price
Medal of the International Society for Scientometrics and Informetrics for contributions to the quantita-
tive study of science.

5605-Scott-FM.indd xvi 4/15/2011 11:58:41 AM


Acknowledgements

We are grateful to the large number of leading researchers who gave their time to join us in
producing this Handbook. Collating the efforts of a large and diverse group of scholars is not
always an easy task and we hope that this final version of the Handbook will be a fitting tribute
to the generosity and forbearance of our authors. The editors and authors acknowledge with
gratitude the permission granted by various copyright holders for the reproduction of extracts
from their work, and we are happy to have included the necessary formal acknowledgements
at appropriate places in the book. At SAGE we are grateful to Chris Rojek for suggesting the
idea of the book and to Jai Seaman for her commitment to the book and patience with
us throughout the production process. As network researchers we are also particularly aware
of the hidden networks of individuals at SAGE who have labored on our behalf to produce
this finished version. Preparation of this book was supported by a grant from the Social
Sciences and Humanities Research Council of Canada. We are grateful to Kritika Kaul at
Glyph International for her work in copy editing and proofing the manuscript.
John Scott
Peter Carrington

5605-Scott-FM.indd xvii 4/15/2011 11:58:41 AM


5605-Scott-FM.indd xviii 4/15/2011 11:58:41 AM
1
Introduction
Peter J. Carrington and John Scott

The SAGE Handbook of Social Network Analysis These formal ideas influenced many people
is the first published attempt to present, in a single working in social psychology and psychotherapy,
volume, an overview of the social network analy- especially when looking at the ways in which the
sis paradigm. It includes accounts of the history, structures of small groups influenced the percep-
theory and methods of social network analysis, tions and action choices of their individual mem-
and a comprehensive review of its application to bers. This was most explicit in the work of Lewin
the various substantive areas of work in which (1936) and Moreno (1934), who investigated the
cutting-edge research is taking place. We do not ‘field’ or ‘space’ of social relations and its charac-
intend to repeat in this Introduction the ideas to be teristics as a ‘network’ (see also Bott, 1928).
found in the various individual chapters, but it is Moreno referred to this approach as ‘sociometry’
important to provide a brief introduction to the and invented the ‘sociogram’ as a way of visually
discussions that follow.1 representing social networks with points and lines.
Sociometry became a major field of investigation
in education (Jennings, 1948; Gronlund, 1959)
and community studies (Lundberg and Lawsing,
THE DEVELOPMENT OF SOCIAL 1937; Lundberg and Steele, 1938). In social psy-
NETWORK ANALYSIS chology it took the form of an emphasis on ‘group
dynamics’ (Cartwright and Zander, 1953; Harary
The date at which researchers on social structure and Norman, 1953), an approach that was particu-
began to explicitly use the idea of a ‘social net- larly developed at the University of Michigan and,
work’ is difficult to determine with any precision. in London, at the Tavistock Institute.
While structural thinking has deep roots in the The initial insights into community relations by
sociological tradition, it was not until the 1930s Lundberg had a wider impact through the work of
that researchers and theorists began to employ Warner, who initially cooperated with Mayo in a
such ideas to represent the shape and characteris- study of the Hawthorne electrical works in
tics of social structures.2 This was especially Chicago (Roethlisberger and Dickson, 1939).
marked in German sociology, where the ‘formal Although sociometry no doubt had some influ-
sociology’ of Simmel and others emphasised the ence on their visual representations, the Hawthorne
formal properties of social relations and the inves- researchers were also directly influenced by seeing
tigation of the configurations of social relations the electrical wiring diagrams in the Hawthorne
that result from the interweaving of actions in factory, seeing these as a metaphor for group rela-
social encounters. These writers explicitly adopted tions. Warner went on to investigate community
a novel terminology and referred to ‘points’, structure in American towns and cities. Influenced
‘lines’ and ‘connections’ in their analyses and by the work of the British anthropologist Radcliffe-
descriptions of patterns of social relations. Brown, Warner looked at the structure of group

5605-Scott-Chap01.indd 1 4/6/2011 11:34:40 AM


2 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

relations in large communities and used network of social positions and roles (Lorrain and White,
diagrams to represent social structure. In his study 1971; Boorman and White, 1976; White et al.,
of the New England town of Newburyport, carried 1976). This group constituted a new generation of
out between 1930 and 1935, Warner presented social network researchers who helped to spread
large-scale community relations in matrix form to social network analysis across the globe.
represent what he referred to as the ‘clique struc- An important area for the application of social
ture’ of the city (Warner and Lunt, 1941). In a network analysis has been the investigation of
famous commentary, Homans (1950) advanced on corporate power and interlocking directorships.
these matrix methods to reanalyze a small clique While Sweezy (1939) and others had adopted ad
of women studied by Warner in the southern town hoc techniques in their early studies for drawing
of Natchez, Mississippi. network diagrams of board-level connections, it
A major advance in social network analysis was not until the 1960s and 1970s that these sug-
took place at the University of Manchester in the gestions were furthered as a result of the technical
1950s, when social anthropologists critical of the advances made in social network analysis. A path-
emphasis on consensus and harmony in main- breaking paper by Bearden and his colleagues
stream American sociology sought to recognize (1975) elaborated on the idea of centrality to
conflict and divisions within African and European explore the power and influence of banks in the
communities. They were influenced by the ‘struc- American corporate world, connecting with
turalist’ view of society that had been expounded Levine’s (1972) documentation of the clusters
by Radcliffe-Brown since the 1920s; his public associated with particular banks and their direc-
lectures delivered in 1937 and 1940 referred tors. In the Netherlands, work led by Mokken and
explicitly to a ‘network of social relations’ and Stokman (Helmers et al., 1975) became the basis
‘social morphology’ (Radcliffe-Brown, 1940, for an investigation of transnational patterns
1957). The network analysis being developed at (Fennema, 1982) and an international comparative
the Tavistock Institute and in the work of Warner investigation (Stokman et al., 1985; see Scott and
was the means through which they developed this. Griff, 1984). This was extended into a compara-
This work on African communities was subse- tive investigation of intercorporate shareholding
quently reported by Mitchell (1969b). This work networks (Scott, 1986) and led to numerous
had a wide influence. In a Norwegian study, studies in a variety of societies (see the reviews
Barnes (1954) proposed that the metaphor of the in Scott, 1997, and Carroll and Sapinski, this
network of relations be taken seriously to explore volume).
the warp and weft of community relations, and in Another important area of application has been
a study of kinship in London, Bott (1955, 1956) in the investigation of community structure.
employed ideas of connectedness and density. Rooted in Warner’s studies, it was again a number
Barnes and Bott worked closely with the of researchers influenced by the developments at
Manchester researchers and inspired the system- Harvard who pushed this area forward. Fischer
atic study by Nadel (1957) as well as Mitchell’s (1977) and Wellman (1979) generated work that
(1969a) commentary on this work. The latter pro- completely reoriented the research area. Wellman
vides one of the earliest summaries of a formal carried out a series of investigations on the chang-
social network methodology. ing structure of communal relations in a Canadian
A group of American researchers led by city and examined the role of friendship in social
Harrison White had begun to develop and apply a integration. A particular concern was to investi-
formal methodology for social network analysis gate the changing ways in which people main-
by the time that Mitchell published his summary. tained contact: his thesis was that each individual
Building on the work of Lévi-Strauss (1969 has his or her own ‘community’, consisting of
[1949]) and his collaborator Weil, White (1963a) those to whom the individual is socially con-
had initially used algebra to represent kinship nected. Thus, community was reconceptualised as
structures. When White moved from Chicago to a personal network and liberated from its previous
Harvard University he formed a large and dynamic spatial bounds in the neighbourhood (Chua et al.,
group of students and associates to develop the this volume). Wellman has recently explored the
network paradigm (see Mullins, 1973: Chapter 10). impact of electronic means of communication on
These researchers included Levine’s (1972) work patterning the structuring and operation of inter-
on corporate power as a multidimensional field, personal networks (Wellman and Hogan, 2006;
Lee’s (1969) sociometric study of searches for Gruzd and Haythornthwaite, this volume). This
abortionists, Granovetter’s (1973, 1974) investiga- work is connected with network formulations of
tion of searches for employment, and Mullins’s social support (Song et al., this volume) and has
(1973) analysis of modern American sociology. most recently converged with ideas on social
White himself worked with others on algebraic capital that developed out of Putnam’s (2000)
methods for representing and analysing systems work. The most important contributions to this

5605-Scott-Chap01.indd 2 4/6/2011 11:34:40 AM


INTRODUCTION 3

work have been the reflections of Lin (2001) and could be applied to the social world, egregiously
Burt (2005; see also Lin et al., 2001). ignoring the work on social networks already
Numerous other applications have extended undertaken by sociologists, anthropologists,
social network analysis into the study of political economists and political scientists. This lack of
and policy networks (Bond and Harrigan, this awareness of prior research – they proposed, for
volume; Knoke, this volume), social movements example, investigations into networks of director-
(Diani, this volume), criminality and terrorism ships on the grounds that none had so far been
(Carrington, this volume; van der Hulst, this undertaken – surprised and shocked those who
volume), the world political economy (Kick et al., had been researching the topics for many years.
this volume), cultural, scientific, and scholarly Reaction in a wider public context was, however,
networks (DiMaggio, this volume; Howard White, much more favourable. These later researchers’
this volume), economics (Goyal, this volume), claims to novelty were taken at face value by
geography (Johnston and Pattie, this volume), the many journalists and reviewers (see, e.g.,
impact of peers on attitudes and behaviour (An, Buchanan, 2002) but did create a wider interest in
this volume) and many other topics, even includ- network analysis at a time when practical applica-
ing animal networks (Faust, this volume). tions of ‘social networking’ were also being
At the same time, network theory and theories stimulated by new Web 2.0 technologies.
have been developed, including network exchange Freeman’s (2004) history of social network
theory, network flow theory, small world theory, analysis undertook a network analysis of citation
and the strength of weak ties theory (Borgatti and patterns in research on social networks and showed
Lopez-Kidwell, this volume). Many researchers that the work published by the physicists had
have stressed the links between social network rarely cited work by social scientists (see also
analysis and theories of rational choice, but this Freeman, this volume). It also disclosed, however,
has often led to a methodological individualism in that social network analysts had been reluctant to
which structural features become more outcomes engage with the work of the physicists. This divi-
of social action. More recent contributions have sion is now breaking down: Watts has moved into
investigated the relationship between individual sociology, and sociologists have debated the ideas
agency and the structural features of social net- contained in his work. Others such as Barabási,
works. White (1992) and Emirbayer (Emirbayer however, still persist in ignoring the work carried
and Goodwin, 1994; Emirbayer, 1997) have made out by social scientists during the last century.
especially important contributions to the theorisa- The work of the physicists has, however,
tion of a ‘relational sociology’, while Mische (this brought to the forefront of attention a number of
volume; Mische, 2003; see also Mische, 2007) has issues that received less than their due attention in
developed White’s approach to culture and identity earlier social network analyses. These physicists
to make important connections with the relational had, in particular, stressed network dynamics and
orientation (see Emirbayer and Mische, 1998). change over time, and they helped to develop
Since the late 1970s there has been a huge techniques for investigating these. Such work
increase in technical contributions to social moves social network analysis beyond the gener-
network methodology and in its application. Of ally static or cross-sectional methods typically
particular importance have been major studies used and the new techniques outlined by physi-
by Burt (1982), Freeman and his colleagues cists and social scientists are helping to develop
(1989), Wasserman and Faust (1994) and an explanations of network processes and to explore
introductory text by Scott (2000; originally pub- processual transformations in network structure.
lished in 1991). Edited collections have included Social network analysis is a scientific commu-
those by Wasserman and Galaskiewicz (1994), nity, or invisible college, with a recognizable
Brandes and Erlebach (2005) and Carrington et al. intellectual lineage and clusters of researchers
(2005). based in several centers and loosely linked by
The most striking development in social net- cross-cutting collaborations and intercitations
work analysis in recent years, however, has been (Freeman, 2004). It is also a scientific institution,
the growth of interest among physicists in apply- with dedicated journals (Social Networks, Journal
ing network ideas to social phenomena (Freeman, of Social Structure and Connections), textbooks
this volume; Scott, this volume). This growing and handbooks (e.g. Degenne and Forsé, 1994;
interest from outside the social sciences first Wasserman and Faust, 1994; Scott, 2000; Knoke
became apparent in a paper by Watts and Strogatz and Yang, 2008), dedicated computer software
(1998), which built on Milgram’s pioneering work (van Duijn and Huisman, this volume) and an
on ‘small worlds’ (1967; Travers and Milgram, association (the International Network for Social
1969) and the literature on random networks that Network Analysis; see http://www.insna.org/).
had grown up around it. Barabási (2002) and Although a well-defined paradigm in its own
Watts (1999, 2003) suggested that these ideas right, social network analysis is embedded within

5605-Scott-Chap01.indd 3 4/6/2011 11:34:40 AM


4 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

traditional disciplines such as social psychology, Sociomatrices can be analysed using the opera-
social anthropology, communication science, tions of matrix algebra. This is a great advantage
organizational science, economics, geography when analysing large-scale data sets for which it
and, especially, sociology. Since its ‘take-off’ in is often difficult to draw a meaningful sociogram,
the 1970s, the volume of published research on or to analyse it.
social networks has grown exponentially (Knoke While most social network research analyses
and Yang, 2008: 1–2), while the number of subject ‘one-mode’ networks, in which the rows and col-
areas in which it is being employed has experi- umns of the data matrix represent the same set of
enced almost linear growth, from a handful to points, or social actors, some work analyses ‘two-
almost 60 by the year 1999 (Freeman, 2004: 5). mode’ or ‘affiliation’ networks, in which there are
Neither the volume of published research nor the two distinct classes of points, and the lines exclu-
expansion of social network analysis into diverse sively connect points of one class with points of
subject areas shows any sign of leveling off. the other class (Borgatti and Halgin, this volume).
Two-mode data are represented by a rectangular
matrix, in which the rows represent one type of
point and the columns represent the other type.
CENTRAL IDEAS IN SOCIAL For example, one class of points could be persons
NETWORK ANALYSIS and the other type could be events in which they
were involved, or organizations to which they
At the heart of social network analysis is the belonged; each cell entry would indicate whether
branch of mathematics called graph theory (Harary the indexed person was related to the indexed
and Norman, 1953; Harary et al., 1965; Harary, event or organization. Two-mode networks can
1969). This is a set of axioms and deductions that easily be converted to one-mode networks.
originated in Euler’s mathematical investigations Graph theory analyses the formal properties of
of the famous problem of the seven bridges of graphs, which are systems of points and lines
Köningsberg. He explored the problem of whether between pairs of points. The concept of the graph
it was possible to walk through the city crossing can be extended to take account of the ‘direction’
each bridge just once and so visiting each of the of a line, so as to represent asymmetric relations
islands that made up the city. Euler converted this such as friendship choices made or the flow of
practical problem into an abstract model of points influence or resources. It can also take account of
and lines, the points representing the islands and the intensity or strength of a relationship by
the lines representing the bridges, and showed that assigning a ‘value’ to a line in order to represent
there is no solution to the problem: the task is this; the value can be positive or negative. There
impossible. This proof laid the foundations for can be multiple labelled lines between each pair of
studying networks of all kinds as being graphs points, with each type of line representing a differ-
composed of points and lines. ent relationship, or ‘type of tie’. Points can also
Social network analysis is a specific applica- have discrete- or continuous-valued properties,
tion of graph theory in which individuals and representing the attributes of the actors repre-
other social actors, such as groups, organizations sented by the points, as in conventional social
and so on, are represented by the points and their analysis. The term ‘network’ is used in mathemat-
social relations are represented by the lines ics for these extensions of a graph, in which the
(Hanneman and Riddle, this volume). This math- lines and/or points have properties such as direc-
ematical model formalises the initial insight tion, valence, weight, multiplicity and so forth:
depicted in Moreno’s sociograms. The theorems thus, social network analysis is the analysis of
of graph theory provide a basis for analysing the systems of social relationships represented by
formal properties of sociograms. It is not, how- networks.
ever, necessary to draw sociograms in order to use From this initial basis of representation, net-
graph theoretical concepts and measures. Network work analysis can measure such things as the
data on a given social relationship are typically overall ‘density’ of a network and the relative
recorded in the form of a square matrix – the ‘centrality’ of the various points within it.
‘sociomatrix’ – in which the rows and columns of Centrality measures have typically been used as
the matrix represent individuals or other social indicators of power, influence, popularity and
actors and the presence or absence of the social prestige. Other network analyses based on graph
relationship between each pair of individuals is theory include the investigation of cliques and
recorded in the cells. Thus, the sociomatrix con- clusters of points, structural divisions within a
tains the same information as the corresponding social network being seen in terms of the exist-
sociogram, taking the rows or columns as its ence of particularly dense or well-connected sub-
points and the contents of the cells as the presence groupings, or, equivalently, in terms of particularly
or absence of lines between pairs of points. sparse or poorly connected areas of the network,

5605-Scott-Chap01.indd 4 4/6/2011 11:34:40 AM


INTRODUCTION 5

representing points of potential cleavage. Notions Standard sampling procedures and statistical
of local clustering, cleavage and centrality have procedures such as significance tests, regression,
allowed the investigation of intermediary or bro- and the analysis of variance cannot usually be
kerage roles (Burt, 2005), as well as the develop- employed in social network analysis as their
ment of methods for ‘network reduction’, in assumption of the independence of observations
which large, complex networks are ‘reduced’ to does not hold for network data: indeed, it is the
smaller, more manageable realisations (Batagelj, assumption of the interdependence of social actors
this volume). that is the basis of network analysis. Frank (this
While graph theory is the heart of social net- volume) has pioneered the investigation of infer-
work analysis, a number of other mathematical ence from sampled network data. Conventional
models have been employed to highlight specific statistical models have been adapted for use with
aspects of network structure. The matrix-based network data (van Duijn and Huisman, this
algebraic approach used by Harrison White and volume). Building on work by Frank and Strauss
others looks not at the properties of individuals (1986), Wasserman and his colleagues (Wasserman
and groups but at the structural properties of the and Pattison, 1996; Pattison and Wasserman,
social positions (or ‘statuses’) occupied by indi- 1999; Robins et al., 1999; Robins, this volume)
viduals and the performed roles that are associated developed novel statistical techniques by general-
with these positions. These so-called positional ising Markov graphs to a larger family of models.
approaches – sometimes termed ‘block models’ Their so-called exponential random graph models
(Ferligoj et al., this volume) – use methods of – or p* models – define a probability distribu-
matrix clustering that build on Homans’s early tion on the set of all networks that can be con-
suggestions to decompose networks into hierar- structed on a given set of points using specific
chical positions of the kind documented by Nadel parameters. Solving the estimating equation for
(1957). These approaches have led to various the parameters, which resembles a logistic regres-
ways of measuring and analysing the ‘structural sion model, provides estimates of the impact of
equivalence’ or ‘substitutability’ of individuals such structural features such as transitivity and
within social positions, and to algebraic modelling reciprocity, as well as of the attributes of the
of systems of compound social roles (Pattison, points.
this volume), corresponding formally to the more Most recently, agent-based computational
familiar systems of compound kinship roles methods have been used to explore processes of
(mother’s brother, wife’s father, etc.) developed change in networks, relating structural transfor-
by ethnographers (Douglas White, this volume; mations to the unanticipated consequences of
Hamberger et al., this volume). individual-level decision making (see Monge and
Networks containing more than 20 or so points Contractor, 2003). Knowledge of the rules under
are difficult to draw accurately and legibly as which agents make decisions and act can be used
sociograms. Multidimensional scaling was one to predict broad patterns of change in network
of the earliest ways of eliminating the random structure. Networks change because of the ways in
jumble of criss-crossing lines in order to display which individual actions are constrained by the
points in a way that retains the spatial patterns structural locations of actors and the wider struc-
inherent in relational data. New techniques such tural properties of the network, though work on
as multiple correspondence analysis and spring ‘small-world’ networks has shown that these
embedder algorithms have greatly improved structural transformations may not be linear in
graph drawing, and writers such as Batagelj and nature. Snijders (this volume; Snijders and van
his colleagues (De Nooy et al., 2005; see also Duijn, 1997; Snijders, 2001, 2005) has developed
http://vlado.fmf.uni-lj.si/) and Krempel (2005; a powerful approach to this problem in which
this volume) have been exploring alternative bases networks develop through the continual iteration
for network visualisation, including moving of actions, and in which small, incremental
images of network change. changes can accumulate to a tipping point at
Special techniques are generally used to obtain which nonlinear transformation in network struc-
or generate network data. Network data can be ture occurs.
difficult to obtain, and they raise unique problems
of measurement validity and reliability, as well as
particular ethical issues (Marsden, this volume).
While the emphasis in social network analysis has CONCLUSION
been on quantitative data and analyses, qualitative
approaches are also used and indeed have charac- In preparing this volume, we took the view that
terised much of the foundational anthropological social network analysis is a ‘paradigm’, rather
work in social network analysis, as well as a grow- than a theory or a method: that is, a way of con-
ing body of recent work (Hollstein, this volume). ceptualizing and analysing social life that guides

5605-Scott-Chap01.indd 5 4/6/2011 11:34:40 AM


6 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

the selection of the social behavior data that are 2 Overviews of the history of social network
studied, influences the way these data are analysis can be found in Scott (2000: Chapter 2) and
organized for analysis, and specifies the kinds of Freeman (this volume; 2004).
questions addressed (Leinhardt, 1977: xiii).
In the most general terms, social network anal-
ysis is a structuralist paradigm: it conceptualises
social life in terms of structures of relationships REFERENCES
among actors, rather than in terms of categories of
actors. Harrison White’s comment that ‘subinfeu- Barabási, A.-L. (2002) Linked: The New Science of Net-
dation reminds one of industrial decentralization’ works. Cambridge, MA: Perseus.
(1963b: 77) highlighted structural rather than Barnes, J.A. (1954) ‘Class and committee in a Norwegian
categorical parallels, and illustrates the kinds of island parish’, Human Relations 7: 39–58.
questions and insights that arise from the study of Bearden, J., Atwood, W., Freitag, P., Hendricks, C., Mintz, B. and
social networks: Schwartz, M. (1975) ‘The nature and extent of bank centrality
in corporate networks’, presented at the Annual Meetings of
The same conundrums that baffled them baffle the American Sociological Association. Reprinted in J. Scott
us. Just as William the Conqueror insisted on (ed.), Social Networks. Vol. 3. London: Sage, 2002.
submission directly to himself from the chief Boorman, S.A. and White, H.C. (1976) ‘Social structure from
vassals of his loyal lords … so a wise President multiple networks II: Role structures’, American Journal of
seeks loyalty of subcabinet officers directly to Sociology 81: 1384–446.
himself (White, 1963b: 78). Bott, E. (1955) ‘Urban families: Conjugal roles and social
networks’, Human Relations 8: 345–84.
A social science paradigm is composed of a Bott, E. (1956) ‘Urban families: The norms of conjugal roles’,
theory or theories, a methodology or set of com- Human Relations 9: 325–41.
monly employed methods, and a body of empiri- Bott, H. (1928) ‘Observation of play activities in a nursery
cal research. This volume is organised around that school’, Genetic Psychology Monographs 4: 44–48.
tripartite division. Readers who are experienced in Brandes, U. and Erlebach, T. (eds.) (2005) Network Analysis:
social network analysis can use this volume as a Methodological Foundations. Berlin: Springer.
reference book, referring to particular chapters for Buchanan, M. (2002) Small World: Uncovering Nature’s
up-to-date summaries of knowledge and indica- Hidden Networks. London: Weidenfeld and Nicolson.
tions of future trends, in a given topic area. Burt, R.S. (1982) Towards a Structural Theory of Action. New
Readers who are new to social network analysis York: Academic Press.
may wish to begin with the introductory chapters Burt, R.S. (2005) Brokerage and Closure: An Introduction to
by Marin and Wellman and by Hanneman and Social Capital. New York: Oxford University Press.
Riddle, before reading chapters on particular Carrington, P.J., Scott, J. and Wasserman, S. (eds.) (2005)
topics. Alternately, a newcomer to social network Models and Methods in Social Network Analysis.
analysis who is interested in a particular topic, Cambridge: Cambridge University Press.
such as kinship or terrorism, or in applications of Cartwright, D. and Zander, A. (eds.) (1953) Group Dynamics.
social network analysis in a particular discipline, London: Tavistock.
such as economics, geography or criminology, De N., Wouter, M., Andrej and Batagelj, V. (2005) Exploratory
may prefer to start with the corresponding sub- Social Network Analysis with Pajek. Cambridge, UK:
stantive chapter, referring back to the introductory, Cambridge University Press.
conceptual and theoretical chapters as necessary. Degenne, A. and Forsé, M. (1994) Les réseaux sociaux. Une
In terms of theory, methods and substantive approche structurale en sociologie. Paris: Armand Colin,
empirical work, this is an exciting time in social 1994. Published in English as Introducing Social Networks.
network analysis. The SAGE Handbook of Social London: Sage, 1999.
Network Analysis aims to present a one-volume Emirbayer, M. (1997) ‘Manifesto for a relational sociology’,
state-of-the-art presentation of contemporary American Journal of Sociology 103: 281–317.
views and to lay the foundations for the further Emirbayer, M. and Goodwin, J. (1994) ‘Network analysis,
development of the area. culture, and the problem of agency’, American Journal of
Sociology 99: 1411–54.
Emirbayer, M. and Mische, A. (1998) ‘What is agency?’
American Journal of Sociology 103: 962–1023.
NOTES Fennema, M. (1982) International Networks of Banks and
Industry. The Hague: Martinus Nijhof.
1 See also the introductory chapters in this Fischer, C.S. (1977) Networks and Places: Social Relations in
volume by Marin and Wellman, and by Hanneman the Urban Setting. New York: Free Press.
and Riddle. An earlier version of some sections of this Frank, O. and Strauss, D. (1986) ‘Markov graphs’, Journal of
introduction appeared in Scott (2010). the American Statistical Association 81(395): 832–42.

5605-Scott-Chap01.indd 6 4/6/2011 11:34:41 AM


INTRODUCTION 7

Freeman, L.C. (2004) The Development of Social Network Social Movements and Networks: Relational Approaches to
Analysis: A Study in the Sociology of Science. Vancouver: Collective Action. Oxford: Oxford University Press.
Empirical Press. Mische, A. (2007) Partisan Publics: Communication and
Freeman, L.C., White, D.R. and Romney, A.K. (eds.) (1989) Contention across Brazilian Youth Activist Networks.
Research Methods in Social Network Analysis. New Princeton, NJ: Princeton University Press.
Brunswick, NJ: Transaction. Mitchell, J.C. (1969a) ‘The concept and use of social
Granovetter, M. (1973) ‘The strength of weak ties’, American networks’, in J. Clyde Mitchell (ed.), Social Networks in
Journal of Sociology 78, 6: 1360–80. Urban Situations. Manchester: Manchester University
Granovetter, M. (1974) Getting a Job. Cambridge, MA: Press.
Harvard University Press. Mitchell, J. (ed.) (1969b) Social Networks in Urban Situations.
Gronlund, N.E. (1959) Sociometry in the Classroom. New Manchester: Manchester University Press.
York: Harper & Bros. Monge, P.R. and Contractor, N.S. (2003) Theories of
Harary, F. (1969) Graph Theory. Reading, MA: Addison-Wesley. Communication Networks. Oxford: Oxford University
Harary, F. and Norman, R.Z. (1953) Graph Theory as a Press.
Mathematical Model in Social Science. Ann Arbor, MI: Moreno, J.L. (1934) Who Shall Survive? New York: Beacon
Institute for Social Research. Press.
Harary, F., Norman, R.Z. and Cartwright, D. (1965) Structural Mullins, N.C. (1973) Theories and Theory Groups in American
Models: An Introduction to the Theory of Directed Sociology. New York: Harper and Row.
Graphs. New York: Wiley. Nadel, S.F. (1957) The Theory of Social Structure. Glencoe, IL:
Helmers, H.M., Mokken, R.J.R., Plijter, C. and Stokman, F.N. Free Press.
(1975) Graven naar Macht. Op Zoek naar de Kern van de Pattison, P. and Wasserman, S. (1999) ‘Logit models and
Nederlandse Economic. Amsterdam: Van Gennep. logistic regressions for social networks: II. Multivariate rela-
Homans, G. (1950) The Human Group. London: Routledge tions’, British Journal of Mathematical and Statistical
and Kegan Paul, 1951. Psychology 52: 169–93.
Jennings, H.H. (1948) Sociometry in Group Relations. Putnam, R.D. (2000) Bowling Alone: The Collapse and Revival
Washington, DC: American Council on Education. of American Community. New York: Simon and Schuster.
Knoke, D. and Yang, S. (2008) Network Analysis. 2nd ed. Radcliffe-Brown, A.R. (1940) ‘On social structure’, The Journal
Beverly Hills, CA: Sage. of the Royal Anthropological Institute of Great Britain and
Krempel, L. (2005) Visualisierung komplexer Strukturen. Ireland 70: 1–12.
Frankfurt: Campus Verlag. Radcliffe-Brown, A.R. (1957) A Natural Science of Society.
Lee, N.H. (1969) The Search for an Abortionist. Chicago: Chicago: University of Chicago Press.
University of Chicago Press. Robins, G.L., Pattison, P. and Wasserman, S. (1999) ‘Logit
Leinhardt, S. (ed.) (1977) Social Networks: A Developing models and logistic regressions for social networks: III.
Paradigm. New York: Academic Press. Valued relations’, Psychometrika 64: 371–94.
Lévi-Strauss, C. (1969 [1949]) The Elementary Structures of Roethlisberger, F.J. and Dickson, W.J. (1939) Management
Kinship, ed. Rodney Needham. Rev. ed. Boston: Beacon and the Worker. Cambridge, MA: Harvard University Press.
Press. (Originally published as Les Structures élémentaires Scott, J. (1986) Capitalist Property and Financial Power.
de la Parenté. Paris: Mouton, 1949.) Brighton: Wheatsheaf Books.
Levine, J.H. (1972) ‘The sphere of influence’, American Scott, J. (1997) Corporate Business and Capitalist Classes.
Sociological Review 37: 14–27. Oxford: Oxford University Press.
Lewin, K. (1936) Principles of Topological Psychology. Scott, J. (2000) Social Network Analysis. 2nd ed. London:
New York: Harper and Row. Sage.
Lin, N. (2001) Social Capital: A Theory of Social Structure and Scott, J. (2010) ‘Social network analysis: Developments,
Action. New York: Cambridge University Press. advances, and prospects’, Social Network Analysis and
Lin, N., Cook, K.S. and Burt, R.S. (eds.) (2001) Social Mining 1, 1.
Capital: Theory and Research. New Brunswick, NJ: Scott, J. and Griff, C. (1984) Directors of Industry. Cambridge:
Transaction. Polity Press.
Lorrain, F.P. and White, H.C. (1971) ‘Structural equivalence of Snijders, T.A.B. (2001) ‘The statistical evaluation of
individuals in social networks’, Journal of Mathematical social network dynamics’, in M.E. Sobel and M.P. Becker
Sociology 1: 49–80. (eds.), Sociological Methodology, 2001. Oxford: Basil
Lundberg, G.A. and Lawsing, M. (1937) ‘The Sociography of Blackwell.
Some Community Relations’, American Sociological Review Snijders, T.A.B. (2005) ‘Models for longitudinal network data’,
2: 318–35. in Peter J. Carrington, John Scott, and Stanley Wasserman
Lundberg, G. and Steele, M. (1938) ‘Social attraction-patterns (eds.), Models and Methods in Social Network Analysis.
in a village’, Sociometry 1: 375–419. Cambridge: Cambridge University Press.
Milgram, S. (1967) ‘The small world problem’, Psychology Snijders, T.A.B. and van Duijn, M.A.J. (1997) ‘Simulation
Today 2: 60–67. for statistical inference in dynamic network models’, in
Mische, A. (2003) ‘Cross-talk in movements: Rethinking the R. Conte, R. Hegelmann, and P. Terna (eds.), Simulating
culture-network link’, in M. Diani and D. McAdam (eds.), Social Phenomena. Berlin: Springer.

5605-Scott-Chap01.indd 7 4/6/2011 11:34:41 AM


8 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Stokman, F., Ziegler, R. and Scott, J. (eds.) (1985) Networks of Watts, D.J. (2003) Six Degrees: The Science of a Connected
Corporate Power. Cambridge: Polity Press. Age. New York: W. W. Norton.
Sweezy, P.M. (1939) ‘Interest groups in the American econ- Watts, D.J. and Strogatz, S.H. (1998) ‘Collective dynamics of
omy’, in National Resources Committee, The Structure of “small-world” networks’, Nature 393: 440–42.
the American Economy, Part 1, Appendix 13. Reprinted in Wellman, B. (1979) ‘The community question: The intimate
Paul M. Sweezy, The Present as History. New York: networks of East Yorkers’, American Journal of Sociology
Monthly Review Press, 1953. 84: 1201–31.
Travers, J. and Milgram, S. (1969) ‘An experimental study of Wellman, B. and Hogan, B. (2006) ‘Connected lives: The
the small world problem’, Sociometry 32(4): 425–43. project’, in J. Purcell (ed.), Networked Neighbourhoods.
Warner, W.L. and Lunt, P.S. (1941) The Social Life of a London: Springer-Verlag, 2006.
Modern Community. New Haven: Yale University Press. White, H.C. (1963a) An Anatomy of Kinship. Englewood Cliffs,
Wasserman, S. and Faust, K. (1994) Social Network Analysis: NJ: Prentice-Hall.
Methods and Applications. New York: Cambridge White, H.C. (1963b) ‘Uses of mathematics in sociology’, in
University Press. James C. Charlesworth (ed.), Mathematics and the Social
Wasserman, S. and Galaskiewicz, J. (eds.) (1994) Advances Sciences. Philadelphia, PA: American Academy of Political
in Social Network Analysis. Beverly Hills, CA: Sage. and Social Science.
Wasserman, S. and Pattison, P. (1996) ‘Logit models and logistic White, H.C. (1992) Identity and Control. Princeton, NJ:
regressions for social networks: I. An introduction to Princeton University Press.
Markov random graphs and p*’, Psychometrika 60: 401–26. White, H.C., Boorman, S.A. and Breiger, R.L. (1976)
Watts, D.J. (1999) Small Worlds: The Dynamics of Networks ‘Social structure from multiple networks I: Blockmodels
Between Order and Randomness. Princeton, NJ: Princeton of roles and positions’, American Journal of Sociology
University Press. 81: 730–81.

5605-Scott-Chap01.indd 8 4/6/2011 11:34:41 AM


SECTION I

General Issues

5605-Scott-Chap02.indd 9 4/6/2011 11:36:23 AM


5605-Scott-Chap02.indd 10 4/6/2011 11:36:23 AM
2
Social Network Analysis:
An Introduction
Alexandra Marin and Barry Wellman

Social network analysis takes as its starting point strategy (Hargadon and Sutton, 1997), this pattern
the premise that social life is created primarily and of connections – not just the human capital of
most importantly by relations and the patterns individual actors – leads to accelerating rates of
formed by these relations. Social networks are innovation in the sectors and regions where it
formally defined as a set of nodes (or network occurs (Fleming et al., 2011).
members) that are tied by one or more types of In this chapter, we begin by discussing issues
relations (Wasserman and Faust, 1994). Because involved in defining social networks and then go
network analysts consider these networks to be the on to describe three principles implicit in the social
primary building blocks of the social world, they network perspective. We explain how these prin-
not only collect unique types of data, but they begin ciples set network analysis apart from attribute- or
their analyses from a fundamentally different per- group-based perspectives. In the second section,
spective than that adopted by researchers drawing we summarize the theoretical roots of network
on individualist or attribute-based perspectives. analysis and the current state of the field, while in
For example, a conventional approach to under- the third section we discuss theoretical approaches
standing high-innovation regions such as Silicon to asking and answering questions using a network
Valley would focus on the high levels of education analytic approach. In the fourth section, we turn
and expertise common in the local labour market. our attention to social network methods, which we
Education and expertise are characteristics of the see as a set of tools for applying the network
relevant actors. By contrast, a network analytic perspective rather than as the defining feature of
approach to understanding the same phenomenon network analysis. In our concluding section we
would draw attention to the ways in which mobil- argue that social network analysis is best under-
ity between educational institutions and multiple stood as a perspective within the social sciences
employers has created connections between organ- and not as a method or narrowly defined theory.
izations (Fleming et al., 2011). Thus, people
moving from one organization to another bring
their ideas, expertise and tacit knowledge with
them. They also bring with them the connections WHAT IS A SOCIAL NETWORK?
they have made to coworkers, some of whom have
moved on to new organizations themselves. This A social network is a set of socially relevant nodes
pattern of connections between organizations, in connected by one or more relations. Nodes, or
which each organization is tied through its employ- network members, are the units that are connected
ees to multiple other organizations, allows each to by the relations whose patterns we study. These
draw on diverse sources of knowledge. Since units are most commonly persons or organiza-
combining previously disconnected ideas is the tions, but in principle any units that can be
heart of innovation and a useful problem-solving connected to other units can be studied as nodes.

5605-Scott-Chap02.indd 11 4/6/2011 11:36:23 AM


12 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

These include Web pages (Watts, 1999), journal broad categories of relations: similarities, social
articles (White et al., 2004; White, this volume), relations, interactions and flows.
countries (Kick et al., this volume), neighbour- Similarities occur when two nodes share the
hoods, departments within organizations (Quan- kinds of attributes frequently studied in variable-
Haase and Wellman, 2006) or positions (Boorman based approaches, such as demographic character-
and White, 1976; White et al., 1976; Ferligoj et al., istics, attitudes, locations or group memberships.
this volume). Group memberships (particularly co-memberships
Defining which nodes to include in a network and interlocking memberships) are the only simi-
analysis often poses an early challenge. A scholar larities frequently treated as relations by network
might wish to analyse medical researchers analysts. For example, network analysts have
studying heart disease. However, knowing which examined the structure of industries by studying
individuals to consider as researchers in this field networks created by interlocking directorates
can be tricky, especially because many network (Mizruchi and Stearns, 1988; Mintz and Schwartz,
analysts avoid group-based approaches to under- 1985; Carroll and Sapinski, this volume).
standing the social world. Social relations include kinship (White, this
Laumann et al. (1983) identify three approaches volume) or other types of commonly defined role
to addressing this boundary specification problem. relations (e.g., friend, student); affective ties,
First, a position-based approach considers those which are based on network members’ feelings
actors who are members of an organization or hold for one another (e.g., liking, disliking); or cogni-
particular formally defined positions to be net- tive awareness (e.g., knowing). These are among
work members and all others would be excluded. the ties most commonly studied by personal
In the example listed above, network members community analysts. For example, Killworth et al.
could be researchers employed in hospital cardiol- (1990) study the network of people ‘known’ by
ogy departments or members of a professional respondents, and Casciaro et al. (1999) study how
association for cardiologists. Second, an event- affective ties (liking) predict cognitive perceptions
based approach to defining the boundaries of the of network forms.
network looks at who had participated in key Interactions refer to behaviour-based ties such as
events believed to define the population. For speaking with, helping, or inviting into one’s home.
example, this might include researchers who had Interactions usually occur in the context of social
attended at least two cardiology conferences in the relations, and interaction-based and affective-based
past three years. Third, a relation-based approach measures are frequently used as proxies for one
begins with a small set of nodes deemed to be another. For example, researchers may measure dis-
within the population of interest and then expands cussion networks as proxies for core support net-
to include others sharing particular types of rela- works (Marsden, 1987; McPherson et al., 2006).
tions with those seed nodes as well as with any Flows are relations based on exchanges or trans-
nodes previously added. For example, a relation- fers between nodes. These may include relations in
based approach might begin with researchers which resources, information or influence flow
publishing in a key cardiology journal and include through networks. Like interactions, flow-based
their co-authors and collaborators, and those relations often occur within other social relations
co-authors’ co-authors and collaborators, and so and researchers frequently assume or study their
on. This relation-based approach is particularly co-existence. For example, Wellman and Wortley
common in the study of egocentric networks, (1990) show how social relation ties such as kin-
which we discuss later in this chapter (see also ship and friendship affect the exchange of different
Hanneman and Riddle, this volume and Chua et al., kinds of support and companionship.
this volume). These three approaches are not
mutually exclusive, and studies will commonly
use a combination of more than one approach
to define network boundaries. For example, a GUIDING PRINCIPLES OF NETWORK
network analyst could study only researchers who ANALYSIS
work in cardiology departments and attend cardi-
ology conferences. Taking social relations seriously calls for more
After researchers have identified network mem- than knowing how to measure some characteristics
bers, they must identify the relations between of networks, such as the density of their inter-
these nodes. These could include collaborations, connections. It requires a set of assumptions
friendships, trade ties, Web links, citations, about how best to describe and explain the social
resource flows, information flows, exchanges of phenomena of interest. Network explanations
social support or any other possible connection do not assume that environments, attributes or
between these particular units (Wasserman and circumstances affect actors independently. More-
Faust, 1994). Borgatti et al. (2009) identify four over, they do not assume the existence of uniformly

5605-Scott-Chap02.indd 12 4/6/2011 11:36:23 AM


SOCIAL NETWORK ANALYSIS: AN INTRODUCTION 13

cohesive and discretely bounded groups. Finally, of network positions. In addition to being a more
network analysis take context so seriously that realistic model of causation, a network-based
relations themselves are often analysed in the explanation is better able to explain how feedback
context of other relations. loops can cause an epidemic of frugality, infecting
even those with secure incomes and contributing
further to economic troubles in societies.
Relations, not attributes
Individuals (and organizations, countries, Web pages, Networks, not groups
etc.) indisputably possess particular attributes. To
study the effects of attributes such as race, gender While researchers using a network analytic
or education – which are inherently contained approach must be concerned with defining the
within and not between actors – researchers sort boundaries of the networks they study, they do not
individuals based on their attributes and determine treat network embeddedness as binary and they do
which outcomes are disproportionately common not treat nodes as belonging only to sets of mutually
to individuals with particular attributes. This exclusive groups. It is too easy an oversimplifica-
endeavour treats causation as something that tion for researchers seeking to understand the
comes from within individuals, with common effects of opportunities and constraints afforded to
attributes acting independently on individuals to people in various positions to operationalize these
produce similar outcomes. positions by dividing research subjects into discrete
By contrast, social network analysts argue that groups, such as employees in different depart-
causation is not located in the individual, but in ments, residents of different city districts or mem-
the social structure. While people with similar bers of different school clubs. Treating these group
attributes may behave similarly, explaining these memberships as having discretely bounded or
similarities by pointing to common attributes mutually exclusive memberships makes invisible
misses the reality that individuals with common the importance of differing levels of group mem-
attributes often occupy similar positions in the bership, membership in multiple groups and cross-
social structure. That is, people with similar attrib- cutting ties between groups.
utes frequently have similar social network pos- Studying group membership as having a uni-
itions. Their similar outcomes are caused by the form influence on members only makes sense if
constraints, opportunities and perceptions created membership itself is uniform: if every group
by these similar network positions. member shares the same relation to the group.
By studying behaviour as embedded in social This is rarely the case. Even when something that
networks, social scientists are able to explain would be recognised as a ‘group’ exists, some
macro-level patterns not simply as a large number members are more or less committed, more or less
of people acting similarly because they are tied to other group members, more or less identi-
similar, but as a large number of people acting on fied with the group or more or less recognised by
one another to shape one another’s actions in others as co-members of the group. For example,
ways that create particular outcomes. For example, people affiliated with universities are sorted into
researchers using an attribute-based approach departments, which could be treated as groups.
might find that tough economic times make However, to treat group membership as binary and
Mary, John and Susan each cut back on thus uniform ignores distinctions between full-
spending. In each case, Mary, John and Susan are time, adjunct, cross-appointed, visiting and emeri-
independently – without regard to one another or tus faculty, to say nothing of students, staff and
to other people – acted upon by economic condi- alumni. While one might argue that the depart-
tions and by attributes such as their net worth, ment qua department has particular interests, the
financial savvy or internalised norms of frugality. extent to which these interests are shared by
By contrast, social network analysts would argue department members and the extent to which
that understanding how this happens requires department members influence one another’s
understanding how John’s, Mary’s and Susan’s understandings of their own interests will vary.
relationships with each other – and with others – A network approach to studying university
affect their views of the economy, their ideas departments would look instead at the strength
about reasonable spending and their opportunities and nature of connections of department members:
to save or to splurge. For example, financial the proportion of the individual’s courses that
knowledge or advice can come from network are taught within a department, the funding
members (Chang, 2005), and network-based and resources that flow from department to fac-
reference groups shape norms of saving or splur- ulty member, the frequency of attendance at
ging (Zelizer, 1994). While economic choices departmental talks or the frequency of socializing
may be correlated with attributes, this is because with other members. Examining ‘groups’ in this

5605-Scott-Chap02.indd 13 4/6/2011 11:36:23 AM


14 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

way has three advantages. First, it allows research- and Frank, 2001). Thus, assuming that each pair
ers to think of individuals as embedded in groups acts independently hides network processes that
to varying degrees and thus differentially subject to are created by larger patterns in the network.
the opportunities, constraints and influences For example, bridging is a structural condition
created by group membership. Second, it allows where the tie creates a connection between previ-
researchers to examine variations in group struc- ously unconnected portions of a network. A rela-
ture, determining which groups are more or less tionship between Romeo and Juliet constitutes
cohesive, which are clearly bounded and which are a bridge between the Capulets and Montagues.
more permeable. Such a strategy also allows net- To identify the tie as bridging, we must know the
work analysts to define groups empirically rather network of Verona elites well enough to know
than a priori. Third, leaving open the questions of that the Capulets and Montagues are otherwise
cohesion and boundary strength allows network unconnected.
researchers to move beyond studying clearly iden-
tifiable groups to studying sets of people who
would be less easily identifiable as groups but who
nonetheless structure social relations – such as THE ORIGINS AND CURRENT STATE OF
gatherings of old-timers or newcomers at a wind-
surfing beach (Freeman et al., 1989).
SOCIAL NETWORK ANALYSIS
Approaches that assume mutually exclusive
group memberships preclude the study of patterns Simmelian roots
of multiple group membership or ties to multiple
groups. Yet, multiple group memberships are the The primacy of relations over atomised units is an
basis of social structure, creating bridges between idea much older than the field that has come to be
some groups and, just as significantly, not creating known as network analysis (see Freeman, this
bridges between others (Blau, 1994; Breiger, volume). Network theorists have found examples
1974; Feld, 1981). Because people exist at the of this idea in the work of influential thinkers
intersections of groups, memberships in multiple from Heraclitus to Einstein, and in the work of
groups interact. They exacerbate or mitigate such giants of sociological theory as Marx,
opportunities, constraints and influences offered Durkheim, Weber, Goffman and even Parsons
by single-group memberships and influence the (Emirbayer, 1997) – a theorist often associated
identities of group members. Thus, neglecting with the norm-based approach with which
varying levels of overlap between social circles network analysis is frequently contrasted
precludes the study of the social processes that (Granovetter, 1985; Wellman, 1988). The primacy
knit otherwise atomised individuals into a society of relations is most explicit in the work of Georg
(Simmel, 1922 [1955]). Simmel, whose theoretical writings inspired and
anticipated major empirical findings in network
analysis. Simmel clearly articulates the premise
that social ties are primary. Instead of viewing
Relations in a relational context things as isolated units, they are better understood
Social network analysts study patterns of rela- as being at the intersections of particular relations
tions, not just relations between pairs. This means and as deriving their defining characteristics from
that while relations are measured as existing the intersections of these relations. He argues that
between pairs of nodes, understanding the effect society itself is nothing more than a web of rela-
and meaning of a tie between two nodes requires tions. There is no ‘society’ without interactions:
taking into account the broader patterns of ties
within the network (Barnes, 1972). For example, The significance of these interactions among men
while individual ties provide social support and lies in the fact that it is because of them that the
companionship, the amount of support provided individuals, in whom these driving impulses and
by one person to another is affected by the extent purposes are lodged, form a unity, that is, a soci-
to which support network members know one ety. For unity in the empirical sense of the word is
another (Wellman and Frank, 2001). The nature of nothing but the interaction of elements. An
relationships between two people may also vary organic body is a unity because its organs maintain
based on their relations with others. For example, a more intimate exchange of their energies with
understanding relations of support, jealousy and each other than with any other organism; a state
competition between siblings requires understand- is a unity because its citizens show similar mutual
ing and taking into account the relationship of effects. (Simmel, 1908 [1971]: 23)
each child to the parents. Parent-child relation-
ships are similarly affected by the relationship Here, Simmel argues against understanding
each parent has with the other parent (Wellman society as a mass of individuals who each react

5605-Scott-Chap02.indd 14 4/6/2011 11:36:23 AM


SOCIAL NETWORK ANALYSIS: AN INTRODUCTION 15

independently to circumstances based on their Current state: association, grants


individual tastes, proclivities and beliefs and and journals
who create new circumstances only by the
simple aggregation of their actions. He argues Today, social network analysis has become an inter-
we should focus instead on the emergent disciplinary area of study, with its own professional
consequences of the interactions of individual association, annual conference and multiple jour-
actions: nals. The International Network for Social Network
Analysts (INSNA), founded by Barry Wellman in
A collection of human beings does not become a 1977, has grown from 175 founding members to
society because each of them has an objectively more than 1,300 members as of February 2011.
determined or subjectively impelling life-content. It While sociologists form a plurality of members, the
becomes a society only when the vitality of these network also includes researchers from anthropol-
contents attains the form of reciprocal influence; ogy, communications, computer science, education,
only when one individual has an effect, immediate economics, management science, medicine, polit-
or mediate, upon another, is mere spatial aggrega- ical science, public health, psychology and other
tion or temporal succession transformed into disciplines. INSNA’s annual conference, the
society. (Simmel, 1908 [1971]: 24–25) International Sunbelt Social Network Conference,
attracts more than 500 people each year, to sites
Based on his belief that the social world is found rotating in a three-year cycle between the east and
in interactions rather than in an aggregation of west coasts of North America and Europe.
individuals, Simmel argued that the primary work Social network analysis is a thriving research
of sociologists is to study patterns among these area. Between 1998 and 2007, network-based
interactions – which he called forms – rather than projects accounted for the fourth largest share of
to study the individual motives, emotions, grants dispensed by the Social Science Research
thoughts, feelings and beliefs – which he called Council of Canada, and it was the area receiving
content. Similar forms can exist and function the largest per-project grants (Klassen, 2008).
similarly in diverse content areas, and different Research applying a social network perspective
forms can emerge within any single content area. appears in major generalist social science journals
Therefore, Simmel argued, sociologists’ study of such as the American Journal of Sociology,
form and content must remain separate. Only by American Sociological Review, Social Forces,
studying similar forms across diverse contents can Human Organization and Administrative Science
people truly understand how these forms function Quarterly, as well as specialised journals, such as
as forms and separate the effects of forms from the City and Community, Work and Occupations and
effects of contents. While a similar argument Information, Communication and Society. Three
holds for the study of contents – they can be fully peer-reviewed journals publish social network
understood only by studying their manifestations research exclusively: Social Networks (INSNA’s
in diverse forms – Simmel argued that the sociolo- flagship journal), Connections (an INSNA journal
gist’s role is to focus on form because only forms publishing short, timely papers) and the Journal of
are ‘purely social’, unlike contents, which fre- Social Structure, published online.
quently exist as individual-level characteristics
(Simmel, 1908 [1971]).
Although Simmel developed theories of
many types of forms and the consequences of APPLYING A NETWORK PERSPECTIVE
various forms across contents, he did not formal-
ize his theories mathematically as many network We have shown thus far that network analysts take
analysts do today. However, he did recognize patterns of relations between nodes as the primary
the inherently mathematical logic of his theories. units for sociological theorizing and research. In
He used geometric metaphors in his writing, this section we describe the ways in which net-
and he compared the study of forms to geometri- work analysts use this perspective to develop
cians’ ability to analyse pure forms apart from theory, including those analysts who focus exclu-
their real-world manifestations (Simmel, 1908 sively on patterns of relations themselves and
[1971]: 24–25). His influence is apparent in those who seek to address substantive issues.
much subsequent network analytic work, such
as formalistic ‘blockmodelling’ described below
(White et al., 1976; Boorman and White, 1976;
Ferligoj et al., this volume) and Burt’s substan- Formalist theories
tive analysis (1992, 2005) of how individuals
benefit by knowing two people unknown to Formalist theories are primarily concerned with the
each other. mathematical form of social networks (see Scott,

5605-Scott-Chap02.indd 15 4/6/2011 11:36:23 AM


16 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

this volume). These theories study the effects of Genre-crossing actors, such as Tom Hanks, Kevin
forms, insofar as they are effects on the form Bacon and many lesser-known genre crossers,
itself, and the causes of these forms, insofar as make possible the well-known game ‘Six Degrees
they are structural. For example, when networks of Kevin Bacon’. While identifying the shortest
are composed of clusters of densely connected path to Kevin Bacon may be a challenge (Watts et
nodes with many ties within clusters and just a al., 2002), a path no longer than four degrees
small number of ties between clusters, the result is exists for the large majority of those appearing on
a network in which short paths are available television and in film (Watts, 1999).
between most pairs of nodes (Watts, 1999).
Because these theories are concerned primarily
with pure form – in the mathematical, platonic
sense – of networks, they can be studied without Structuralist theories
the need for empirical data. Mathematical model-
ling and computer simulations can create net- Structuralist theories are concerned with how pat-
works that allow researchers to observe unfolding terns of relations can shed light on substantive
patterns of relations that result from particular topics within their disciplines. Structuralists study
rules of tie formation or dissolution. For example, such diverse subjects as health (Lin and Ensel,
Barabási and Albert (1999) simulated networks 1989; Pescosolido, 1992; Cohen S. et al., 1997,
that were continually joined by new nodes. As 2001), work (Burt, 1992; Podolny and Baron,
nodes joined, they formed ties to existing nodes, 1997; Ibarra, 1993) and community (Fischer,
particularly to already-popular existing nodes. 1982a; Wellman and Wortley, 1990). Structuralists
Based on these simulations, Barabási and Albert take at least four different approaches to applying
showed that this form of preferential attachment the mantra that relations matter.
creates a Matthew Effect (‘For to everyone who
has, more will be given’, Matthew 25:29; see also
Merton, 1968), magnifying popularity gaps and
Defining key concepts in network terms
One approach to applying a network perspective to
creating networks with power-law distributions.
a substantive area is to take a key concept within
That is, this process of tie formation creates net-
that area and define it in network terms. Researchers
works where a small number of nodes have huge
adopting this approach examine how new under-
numbers of ties, while the vast majority of nodes
standings of the key concept reframe longstanding
have only a few.
debates and call widely accepted findings into
Recently, formalist-based research has received
doubt. For example, Wellman argued that com-
popular exposure in trade books such as Six
munities are not geographic areas providing sup-
Degrees (Watts, 2003), Linked (Barabási, 2002)
port and services, but are people providing support
and Nexus (Buchanan, 2002), partly because the
and services to those to whom they are connected.
approach has interesting real-world applications.
By thinking of communities as ‘personal’, mean-
For example, the concept of preferential attach-
ing that a person’s community uniquely consists of
ment is based on the empirical reality that people
the people to whom he is connected, Wellman
meet people through other people. The more
transformed understandings of how modernity and
people you know, the more people can introduce
urban living affect interaction and support
you to others. Small-world networks also resonate
(Wellman, 1979; Wellman and Wortley, 1990).
well with the public imagination. The most well-
This work set the agenda for debates that would
known example of a small-world network is a
follow about how social support networks are
network formed by co-appearances in movies and
changing (Fischer, 1982a; Grossetti, 2005; Hennig,
television shows. This is a clustered network with
2007), and how new technology affects commun-
clusters created both by career timing (Rudolph
ities (Wellman et al., 2006; Boase and Wellman,
Valentino and Dakota Fanning are unlikely to
2006; Hampton, 2007; Stern, 2008; also see Chua
have ever been co-stars), and by actors’ specializa-
et al., this volume).
tion within genres. For example, there is a cluster of
actors who frequently co-star in romantic comedies:
Jennifer Aniston, Hugh Grant, Meg Ryan, Tom
Hanks and Julia Roberts. Yet, genre-based clusters Testing an existing theory
are interconnected thanks to genre-hopping actors. Researchers may start from an existing socio-
For example, Tom Hanks links actors appearing logical theory. By thinking of relation-based
in romantic comedies to those appearing in chil- understandings of the theory and testing the
dren’s films (Toy Story, Polar Express), dramas resulting hypotheses, these researchers apply a
(Philadelphia), comedies (Turner and Hooch) and network approach to a theory that may previously
film adaptations of pulp fiction conspiracy theo- have been studied using attribute- or group-based
ries (The Da Vinci Code, Angels and Demons). approaches. For example, Wilson’s (1978, 1987)

5605-Scott-Chap02.indd 16 4/6/2011 11:36:23 AM


SOCIAL NETWORK ANALYSIS: AN INTRODUCTION 17

theory of the underclass suggests that as poor Therefore, treating such norms as the primary
African Americans have come increasingly to live causal mechanism provides asocial or psycho-
in high-poverty neighbourhoods, they have lost logical explanations. Rational-actor approaches
connections to people who provide ties to the similarly locate causality within individuals, in
labour market. Their social isolation contributes to this case in an internal process of reason and cal-
difficulties in finding work, and it hinders social culation. Thus, when social network analysts
mobility. study norms, they are usually not treated as static
Although Wilson’s argument speaks of net- and internalised but as memes created in response
work connections, the evidence presented is still to network positions or that diffuse through social
group-based, treating neighbourhoods as mono- networks (see accounts of adaptation and trans-
liths that are connected – or not connected – to the mission, below).
labour market by virtue of the neighbourhood’s At times, social network-based theories do
class composition. Further, by focussing on with- assume some rationality. However, taking social
in-neighbourhood ties, the theory neglects the network positions into account tempers this ration-
possibility of out-group ties providing connec- ality so it is no longer the dominant causal force.
tions to the labour market. However, the story Instead, social network analysts argue that differ-
may be more complex. Fernandez and Harris ences in available opportunities mean that uni-
(1992) find that the urban poor do have out-group formly rational actors will make different choices
ties to people committed to labour market partici- and will experience different consequences even
pation, while Smith (2005) further finds that when they make the same choices. Moreover, net-
what the African American urban poor lack are work positions create obligations and commit-
ties to people in the labour market who are willing ments that alter the calculus of rationality by
to offer assistance in finding jobs. By looking at promoting trustworthiness and relieving people of
real patterns of relations rather than assuming a the fear that their interaction partners will always
lack of relations based on a perceived lack of be strictly and ruthlessly rational (Granovetter,
opportunity, such research creates a stronger link 1985; Uzzi, 1996).
between theory and data. The original theory – Researchers using network structure to explain
like many social theories that are studied nonethe- substantive outcomes frequently combine net-
less from attribute-based or group-based work-based data with more standard kinds of
perspectives – is about patterns of relations. statistical analyses. By taking networks as the
Therefore, the theory can be more validly tested units of analysis, researchers can use statistical
using data on relations than data on neighbour- methods to determine if more densely inter-
hood characteristics. connected networks provide more support than
similarly sized but more sparsely connected
networks (Wellman and Frank, 2001). By taking
Looking at network causes of phenomena network positions as the units of analysis, they
of interest can ask if people who are in bridges are more
Researchers taking this approach ask what kinds likely to be promoted (Burt, 2005). This combined
of social networks lead to particular outcomes. approach is especially common among research-
These outcomes may include finding a job ers studying the networks surrounding individual
(Granovetter, 1973, 1974) or promotion (Burt, people (see ego networks, below). By sampling
1997, 1998; Podolny and Baron, 1997; Ibarra, unconnected individuals and collecting data about
1997), catching a cold (Cohen et al., 1997, 2001), their social networks, researchers can essentially
having a good idea (Burt, 2004), being sexy sample networks and network positions. Ego net-
(Martin, 2005) or knowing about different kinds work data for N randomly selected people are
of culture (Erickson, 1996). essentially data on N randomly selected networks,
Network-based explanations of substantive one ego network for each respondent. The same
outcomes are fundamentally different from data could be treated as data on N randomly
explanations that rely on individual-level or group selected network positions, using each respond-
attributes. Social network analysts often have little ent’s position as a unit of analysis (e.g. Wellman,
tolerance for norm-based explanations, norms 1979; Fischer, 1982a; Marsden, 1987; McPherson
being precisely the kind of content that Simmel et al., 2006).
argued was outside the domain of social explana-
tions. Moreover, when causal forces are presumed
to be internal or possessed by individuals, the Looking at network effects of phenomena
mechanisms frequently are internalised norms of interest
or atomised rational actors (Granovetter, 1985). Finally, in addition to studying the effects of
Social network analysts argue that internalised particular network properties and positions, social
norms are inherently asocial mechanisms. network analysts study the causes of networks

5605-Scott-Chap02.indd 17 4/6/2011 11:36:23 AM


18 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

and positions. For example, McPherson and finds that where institutional factors make the
Smith-Lovin (1987) draw from theories of how exercise of influence risky, job opportunities are
foci of social interaction shape social networks more likely to flow through strong ties. Gibson
(Feld, 1981) to argue that participation in demo- (2005a) uses computer simulations to show that
graphically segregated voluntary associations having a small number of highly connected nodes
causes friendship networks to be filled with demo- can slow the early stages of diffusion when
graphically similar people. Hampton and Wellman compared to random networks. However, once
(2003) find that within-neighbourhood relations central actors have been infected, diffusion rates
are more likely to form between neighbours who are comparable.
have access to electronic means of communicat-
ing with each other. Like researchers studying the
effects of network structures, researchers taking
this approach also frequently combine network-
Adaptation
based data with statistical approaches, taking Adaptation occurs when two people make the
positions or networks as their units of analysis. same choices because they have similar network
positions and are thus exposed to similar con-
straints and opportunities. For example, California
winemakers make wines from grapes sourced
NETWORK EXPLANATIONS primarily in one region, allowing them to market
their wines as Sonoma County or Napa Valley
In this section, we show the mechanisms by which wines. While blending grapes from different
network analysts argue that particular kinds of sources may create higher-quality wines, losing
networks or network positions can cause particu- place-based appellations would lower the status
lar outcomes. We follow Borgatti et al.’s (2009) associated with the wine and cause wine drinkers
classification of network arguments into four cat- to react similarly – by drinking something else.
egories: transmission, adaptation, binding and Therefore, winemakers are not making decisions
exclusion (see Borgatti, this volume). about how to blend their wines because they are
transmitting knowledge of winemaking to one
another but because they are responding to similar
network constraints. Maintaining ties to custom-
Transmission ers requires that they maintain ties with viticul-
tural regions (Podolny, 2005).
Network-based theories frequently treat network
ties as pipelines through which many things
flow: information about jobs (Granovetter, 1973, Binding
1974), social support (Wellman and Wortley,
1990), norms (Coleman, 1988), workplace identi- Binding occurs when a network binds together to
ties (Podolny and Baron, 1997), disease (Morris, act as one unit. The actions or outcomes of that
1993), immunity to disease (S. Cohen et al., 1997, action are influenced by the internal structure of
2001), material aid (Stack, 1974) or knowledge of the network. For example, Granovetter (1973)
culture (Erickson, 1996). Researchers taking this argues that communities fighting urban renewal in
approach study the kinds of networks that result in their neighbourhoods are better able to organize
the most widespread distribution, the network their resistance when their internal networks are
positions most likely to receive flows, and the less fragmented. When community networks are
ways in which different network structures create internally disconnected, information cannot dif-
different patterns of flow under different circum- fuse fully through the network and trust in leaders
stances. For example, networks leading to people that is facilitated by indirect connections may
who are neither connected to one another nor con- never develop. With an internally fragmented
nected to the same others provide the best access structure, the community is less effective, less
to new, nonredundant information and ideas (Burt, coordinated and more easily defeated in its
1992, 2004, 2005; Hargadon and Sutton, 1997; attempts at collective action than a community
Granovetter, 1973). On the other hand, networks with a more integrated network.
leading to people who are connected directly to
one another transmit consistent expectations and
clear norms (Coser, 1975; Coleman, 1988; Podolny Exclusion
and Baron, 1997).
The effects of network structure on the ways in Exclusion occurs when the presence of one tie
which resources flow through networks may not precludes the existence of another tie, which in
always be uniform. For example, Bian (1997) turn affects the excluded node’s relations with

5605-Scott-Chap02.indd 18 4/6/2011 11:36:24 AM


SOCIAL NETWORK ANALYSIS: AN INTRODUCTION 19

other nodes. This mechanism is most visible in we expect that those who are structurally
markets or exchange networks where the availa- equivalent will be subject to similar pressures and
bility of alternative partners improves a node’s opportunities.
bargaining power. A manufacturing firm with two Similarly, when we study the effects of phe-
potential suppliers can negotiate a good price by nomena on networks, the results are sociologic-
creating competition between them. When one of ally significant only insofar as the network
those suppliers enters an exclusive contract with measures being affected are sociologically signifi-
another manufacturer, this not only prevents our cant. If something causes a network to be
protagonist firm from buying from that supplier but fractured such that there is no path between pairs
it also greatly increases the remaining supplier’s of nodes, the fracture matters only because of the
power to name its own price. Similarly, a person social effects it will have. These consequences
with two potential romantic partners loses access might include bringing the Internet to its knees
to a potential partner who marries someone else. (R. Cohen et al., 2000, 2001) or preventing the
In addition, this person loses bargaining power widespread transmission of sexually transmitted
with the remaining love interest due to the absence diseases among teenagers (Bearman et al., 2004).
of (immediately visible) alternatives. Even a measure as basic as the number of ties that
a particular node has is primarily significant for its
social implication: a high level of network activity
(Freeman, 1979).
STUDYING AND OPERATIONALIZING
NETWORKS
COLLECTING NETWORK DATA
Although social network analysis is more than a
set of algorithms and methods, analysts have
developed unique ways of measuring concepts Researchers collecting network data must first
and analysing relation-based data. These methods decide what kinds of networks and what kinds of
have been developed because the key premise of relations they will study. While there are many
network analysis – that relations are primary – kinds of network data, we discuss here only two
makes it difficult to rely only on analytic tools that important dimensions along which network data
treat atomised individuals as primary. vary: whole versus ego networks, and one-mode
versus two-mode networks. Researchers must
make these choices even before they can begin to
think about the boundary specification problem
Operationalizing concepts relationally discussed above.

Studying substantive phenomena from a network


perspective requires that at least one theoretically Whole networks versus ego networks
significant concept be defined relationally. This Whole networks take a bird’s-eye view of social
redefinition, together with an examination of its structure, focussing on all nodes rather than priv-
implications, can in itself become a seminal piece ileging the network surrounding any particular
of research. However, even where the network node (see Hanneman and Riddle, this volume).
definition of a concept is not the primary focus of These networks begin from a list of included
a project, thinking about how networks cause par- nodes and include data on the presence or absence
ticular outcomes or what kinds of networks are of relations between every pair of nodes. Two
caused by different forces requires that we map well-known examples are a network where nodes
sociological concepts onto particular network forms. consist of all workers in a factory, showing who
For example, we study network density because it plays games with whom (Roethlisberger and
is a mathematical expression of concepts such as Dickson, 1939) and a network of actors appearing
cohesion, solidarity or constraint, each of which is on film or television, showing who has co-starred
associated with social processes likely to have with whom (Watts, 1999).
particular effects. For example, cohesion and soli- Researchers using whole network data fre-
darity create identity (Podolny and Baron, 1997) quently analyse more than one relation, sometimes
and reinforce norms (Coleman, 1988; Podolny collapsing relations into a single network such as
and Baron, 1997). Constraint (Burt, 1992) is a workplace networks or support networks (Burt,
more negative framing of reinforced norms. 1992) and sometimes examining how different
We study structural equivalence because it is a relations are used to different effect. For example,
mathematical expression of the concept of the Padgett and Ansell (1993) collected data on eight
role (White et al., 1976; Boorman and White, types of relations among elite Florentine families
1976; Ferligoj et al., this volume), and therefore in the fifteenth century to show how the Medici

5605-Scott-Chap02.indd 19 4/6/2011 11:36:24 AM


20 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

used economic ties to secure political support affiliation networks, relations consist of things such
from geographically neighbouring families, but as memberships or attendance at events that cannot
used marriage and friendship ties with more dis- exist between nodes of the same type: a person can
tant families to build and maintain the family’s attend an event or belong to an organization, but a
status. person cannot attend or belong to another person
Egocentric network data focus on the network and an event cannot attend another event (see
surrounding one node, known as the ego (see Borgatti and Halgin, this volume).
Hanneman and Riddle, this volume). Data are on One-mode network data can be derived from
nodes that share the chosen relation(s) with the two-mode network data by extracting relations
ego and on relations between those nodes. Although that consist of co-membership/co-attendance or
these networks could extend to the second-order relations based on having members of attendees in
ego network, or nodes sharing relations with nodes common (Breiger, 1974). For example, the net-
related to the ego (e.g., friends of friends), in prac- work of actors who have appeared in movies
tice, first-order ego networks are the most com- together (Watts, 1999) is a one-mode network, in
monly studied (e.g., Wellman, 1979; Marsden, which nodes are actors and actors are connected to
1987; Fischer, 1982a; Campbell and Lee, 1992). one another if they have both appeared in a movie
Ego network data can be extracted from whole or television show together. However, this one-
network data by choosing a focal node and exam- mode network is derived from the analysis of a
ining only nodes connected to this ego. For two-mode network in which one mode consists of
example, Burt’s (1992, 2005) studies of the effects actors and the second mode consists of movies
of network constraint are often based on whole and television shows.
network data, though his measure of constraint is
egocentric, calculated by treating each node in the
whole network as a temporary ego. Types of ties
Like whole network data, ego network data can Once network types have been chosen and theor-
also include multiple relations. These relations can etically relevant relations have been identified,
be collapsed into single networks, as when ties to researchers must decide how to measure their
people who provide companionship and emotional chosen relations. Relations can be measured as
aid are collapsed into a single support network directed or undirected and as binary or valued.
(Fischer, 1982; Wellman, 1979). Or each relation Directed ties are those that go from one node to
can be treated as creating its own network: for another, while undirected ties exist between two
example, to examine how the kin content of the nodes in no particular direction. Advice seeking,
networks providing material aid differs from the information sharing, visiting at home and lending
kin content of socializing networks (Wellman and money are directed ties while co-memberships are
Wortley, 1990). Unlike whole network analyses, examples of undirected ties. Directed ties may be
which commonly focus on one or a small number reciprocated, as would be the case for two people
of networks, ego network analyses typically who visit one another or they may exist in only one
sample large numbers of egos and their networks. direction, as when only one gives emotional sup-
Typically, these ego networks are treated as the port to the other (Plickert et al., 2007). Some kinds
units of analysis using standard statistical meth- of directed ties preclude the possibility of reci-
ods. In another approach, alters (members of each procity: for example, two military officers cannot
ego’s network) are treated as the units of analysis, have command relationships over one another.
using multilevel methods to take into account Both directed and undirected ties can be meas-
dependence created by being tied to common egos ured as binary ties that either exist or do not exist
(Wellman and Frank, 2001; Snijders and Bosker, within each dyad, or as valued ties that can be
1999). stronger or weaker, transmit more or fewer resour-
ces, or have more or less frequent contact. For
example, a friendship network can be represented
One-mode data versus two-mode data by binary ties that indicate if two people are
Researchers studying whole networks most fre- friends or by valued ties that assign higher or
quently collect data on a single type of node in lower scores based on how close people feel to
networks where every node could conceivably be one another, or how often they interact.
connected to any other node. Most of the networks As these examples suggest, decisions about
they analyse are one-mode networks. However, whether to measure ties as directed or undirected
some research problems, particularly those con- or as valued or unvalued are sometimes dictated by
cerned with group memberships, require the collec- the theoretical nature of the tie: a co-membership is
tion and analyses of two kinds of nodes – typically inherently undirected and authority is inherently
organizations and organization members, or events directed. However, for many types of ties, deci-
and attendees. In these two-mode networks or sions to treat ties as directed or undirected, or

5605-Scott-Chap02.indd 20 4/6/2011 11:36:24 AM


SOCIAL NETWORK ANALYSIS: AN INTRODUCTION 21

binary or valued, are pragmatic choices based on (Freeman, 1992), and they may not know their
available data, expected methods of analyses and alters’ characteristics (Chen, 1999).
the expected theoretical pay-off. Designing surveys and interviews to collect
network data presents related issues. Surveys
require complicated patterns of skips and loops,
Survey and interview methods with questions not only being asked or skipped
Network data can be collected through observa- based on previous answers, but questions also
tion (Gibson, 2005b), from archives and historical being created by incorporating previous responses.
materials (Gould, 1995; Padgett and Ansell, 1993) Given these challenges, computer-assisted inter-
or from trace observation of electronic communi- viewing and computer-based surveying are
cations (Carley, 2006). We discuss survey and common (e.g., Hampton, 1999; Marin, 2004;
interview methods here because collecting social Manfreda et al., 2004). However, continued innov-
network data from network members directly ation in survey and interview design using non-
through surveys and interviews involves challen- computer-based methods of working around these
ges unique to social network data (see Marsden, difficulties shows that the analog interview is not
this volume). dead yet (Hogan et al., 2007).
Surveys and interviews collecting social net- When researchers are interested in specific
work data ask respondents to report with whom properties of social networks that can be measured
they share particular relations. Collecting whole without knowing the full structure of the network,
network data can be done by presenting respond- they sometimes use data collection methods that
ents with a list of network members and asking collect only relevant data. For example, research-
them to indicate the people with whom they share ers interested in the diversity of the social status of
ties. When networks are too large to make a full list acquaintances (Lin, 1986; Lin and Erickson,
feasible or where no complete list is available, 2008; Erickson, this volume), the size of social
respondents are asked to make a list by recalling networks (Killworth et al., 1990), and resource
the people with whom they share the relevant rela- availability within networks (van der Gaag and
tion. Follow-up questions may ask respondents to Snijders, 2005) have developed specialised meas-
rank the importance or strength of their relation to ures of data collection.
different network members, to choose their most
important relations or to provide more detail about
their relations. Because whole-network researchers Analysing network data
will also be collecting data directly from other Once network data have been collected, social
network members, respondents need not report on network analysts use these data to calculate meas-
characteristics of their alters or on relations between ures of the properties of network positions, dyads
the people with whom they share relations. and networks as a whole. Properties of network
Ego network data are most commonly collected positions include things such as the number of
using name generators: survey questions that ask relations a node has and the extent to which the
respondents to list the people with whom they node is a bridge between other nodes (Freeman,
share a particular relation (Marsden, 1987, 2005; 1979). Dyads can vary in the strength or reciproc-
Burt, 1984; Hogan et al., 2007). Because these ity of their ties, the similarity of the two nodes
alters will not be surveyed directly, respondents (homophily), their content, the number of relation
must report any characteristics of the relationship types shared (multiplexity) or the number of com-
or characteristics of the alters that are of interest to munication media used (media multiplexity).
researchers. Additional data collected from When studying properties of networks as a
respondents can include information about ties whole, researchers can look at such things as the
between network members. proportion of dyads connected to one another
These surveys or interviews can be difficult (density), the average path length necessary to
and burdensome for both respondents and connect pairs of nodes, the average tie strength, the
researchers. Ego-network surveys especially – extent to which the network is dominated by one
with their repetitive questions about each alter – central actor (centralization [Freeman, 1979]) or
can be long and boring. In addition, providing the the extent to which the network is composed of
information requested by researchers is difficult. similar nodes (homogeneity) or of nodes with par-
People interpret relations in different ways ticular characteristics (composition), such as the
(Fischer, 1982b; Bailey and Marsden, 1999; proportion of network members who are women.
Bearman and Parigi, 2004): they forget people In addition, networks can be studied by the
with whom they share relations (Brewer, 2000; ways that they can be divided into subgraphs. For
Brewer and Webster, 1999; Bernard and Killworth, example, networks may consist of multiple com-
1977; Killworth and Bernard, 1976; Marin, 2004), ponents: sets of nodes that are tied directly or
they misapprehend relations between their alters indirectly to one another but are not tied directly

5605-Scott-Chap02.indd 21 4/6/2011 11:36:24 AM


22 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

to nodes in other components. They may also families, with people belonging to more than one
include cliques, in which every node is tied dir- family group.
ectly to every other node. Ethnographers and qualitative interviewers
Because social network analysts do not take continue to inform their work with network per-
individuals as their units of analysis, quantitative spectives. For example, Menjívar (2000) uses
analysis packages designed for individual- or interviews with Salvadoran immigrants in San
attribute-based analyses are frequently either Francisco to show how network relations are
unsuitable or intolerably clunky for relation-based strained and severed when economic conditions
analyses. In response to this problem, social and positions preclude meeting obligations of reci-
network analysts have developed a number of procity. Domínguez and Maya-Jariego (2008) use
software applications to analyse social network ethnographic and interview data to demonstrate
data (see van Duijn and Huisman, this volume). that networks connecting immigrants and natives
The most commonly used are Pajek (Batagelj of the host country spread culture in both direc-
and Mrvar, 2007; Nooy et al., 2005), UCINet tions, both assimilating immigrants and causing
(Borgatti et al., 2002), MultiNet (Richards and non-immigrants to adopt aspects of the immigrant
Seary, 2006), SIENA (Snijders, 2001), P*/ERGM culture. In a different vein, Tilly’s (1984) lifelong
(Snijders et al., 2006), R (R Development Core corpus of historical analysis emphasised that con-
Team, 2007; Butts, 2008) ORA (Carley and tentious politics and social movements drew heav-
DeReno, 2006) and Node XL (Smith and the ily from the relations among participants.
Node XL Development Team, 2009). These
packages are designed primarily for studying
whole network data. While ego network data can
be analysed using network-specific software CONCLUSIONS
packages or standard statistical packages such as
SAS, SPSS or Stata (Müller et al., 1999), UCINet
Social network analysis is neither a theory nor a
also includes functions to calculate ego network
methodology. Rather, it is a perspective or a para-
measures from whole network data.
digm. It takes as its starting point the premise that
social life is created primarily and most import-
antly by relations and the patterns they form.
Unlike a theory, social network analysis provides
Applying the network perspective a way of looking at a problem, but it does not
using qualitative methods predict what we will see. Social network analysis
Qualitative as well as quantitative modes of research does not provide a set of premises from which
have been used since the outset of social network hypotheses or predictions can be derived. The
analysis (see Hollstein, this volume). Indeed, the primacy of relations over atomised units has no
earliest social network analyses were qualitative, immediately identifiable specific implications for
such as Barnes’s study of Norwegian fishing crews when inequality will rise or fall, how organiza-
(1954), in which he invented the term ‘social net- tions can ensure success, or who is likely to live a
work’; Bott’s (1957) demonstration that kinship long and healthy life. Taken alone, network analy-
networks trumped social class in explaining English sis can offer only vague answers to these ques-
women’s domestic behaviour; and Mitchell’s tions: relations within and between classes should
(1969) analysis of South African migrants. matter, relations between organizations should
More recently, Stack, in her ethnography of matter and health-related and health-influencing
poor families in a Midwestern city in the United relations will matter. Yet these answers serve a
States (1974), defined families relationally as ‘an function: while they do not tell social scientists
organized, durable network of kin and non-kin the answers to these questions, they provide guid-
who interact daily, providing the domestic needs ance on where to look for such answers.
of children and assuring their survival’ (p. 31). By
defining families based on interactions and
exchanges rather than on kin groups or house-
holds – two group-based definitions – her research ACKNOWLEDGEMENTS
showed the importance of ties across kin groups
and households and the ways in which the strength We thank Julie Bowring, Jessica Collins, Robert
of membership within families varied, with men Di Pede, Sherri Klassen and Paromita Sanyal for
frequently being less permanently tied than their comments on this chapter, and Julia Chae,
women. It also showed both the fluidity of family Stephen Di Pede, Christine Ensslen, Sinye Tang,
memberships – with people sometimes moving Yu Janice Zhang and Natalie Zinko for editorial
between families – and the overlapping nature of assistance.

5605-Scott-Chap02.indd 22 4/6/2011 11:36:24 AM


SOCIAL NETWORK ANALYSIS: AN INTRODUCTION 23

REFERENCES Burt, R. (2004) ‘Structural holes and good ideas’, American


Journal of Sociology 110(2): 349–99.
Bailey, S. and Marsden, P.V. (1999) ‘Interpretation and Burt, R. (2005) Brokerage and Closure: An Introduction to
interview context’, Social Networks 21: 287–309. Social Capital. Oxford: Oxford University Press.
Barabási, A.-L. and Albert, R. (1999) ‘Emergence of scaling in Butts, C. (2008) ‘Network: A package for managing relational
random networks’, Science 286(5439): 509–12. data in R’, Journal of Statistical Software 24(2).
Barabási, A.-L. (2002) Linked: The New Science of Networks. Campbell, K. and Lee, B. (1992) ‘Sources of personal neighbor
Cambridge, MA: Perseus. networks: Social integration, need, or time?’ Social Forces
Barnes, J.A. (1954) ‘Class and committees in a Norwegian 70(4): 1077–100.
island parish’, Human Relations 7: 39–58. Carley, K.M. (2006) ‘A dynamic network approach to the
Barnes, J.A. (1972) Social Networks. Reading, MA: Addison- assessment of terrorist groups and the impact of alternative
Wesley. courses of action’, in Visualising Network Information
Batagelj, V. and Mrvar, A. (2007) ‘Pajek: package for large Meeting Proceedings RTO-MP-IST-063, Keynote 1. Neuilly-
network analysis’, University of Ljubljana, Slovenia. http:// sur-Seine, France. pp. KN1–1—KN1–10.
vlado.fmf.uni-lj.si/pub/networks/pajek/. Carley, K.M. and DeReno, M. (2006). ORA: Organization Risk
Bearman, P.S., Moody, J. and Stovel, K. (2004) ‘Chains of Analyzer, ORA User’s Guide. Carnegie Mellon University,
affection’, American Journal of Sociology 110: 44–91. School of Computer Science, Institute for Software
Bearman, P.S. and Parigi, P. (2004) ‘Cloning headless frogs Research, Technical Report, CMU-ISRI-06-113.
and other important matters: Conversation topics and Casciaro, T., Carley, K.M. and Krackhardt, D. (1999) ‘Positive
network structure’, Social Forces 83(2): 535–57. affectivity and accuracy in social network perception’,
Bernard, H.R. and Killworth, P. (1977) ‘Informant accuracy in Motivation and Emotion 23: 285–306.
social network data II’, Human Communication Research Chang, M.L. (2005) ‘With a little help from my friends (and my
4: 3–18. financial planner)’, Social Forces 83(4): 1469–97.
Bian, Y. (1997) ‘Bringing strong ties back in’, American Chen, K.K. (1999) ‘The networks methodology of proxy-
Sociological Review 62(3): 366–85. reporting: How well do respondents proxy-report
Blau, P.M. (1994) Structural Context of Opportunities. different kinds of information on others, and how do
Chicago: University of Chicago Press. respondents err in making these proxy-reports?’ Qualifying
Boase, J. and Wellman, B. (2006) ‘Personal relationships: paper, Department of Sociology, Harvard University,
On and off the Internet’, in Anita V. and Dan P. (eds.), Cambridge, MA.
Cambridge Handbook of Personal Relationships. Cohen, R., Erez, K., ben-Avraham, D. and Havlin, S. (2000)
Cambridge: Cambridge University Press. pp. 709–23. ‘Resilience of the Internet to random breakdowns’, Physical
Boorman, S. and White, H. (1976) ‘Social structure from Review of Letters 85: 4626–28.
multiple networks II: Role structures’, American Journal of Cohen, R., Erez, K., ben-Avraham, D. and Havlin, S. (2001)
Sociology 81: 1384–446. ‘Breakdown of the Internet under intentional attack’,
Borgatti, S., Everett, M. and Freeman, L. (2002) UCINet 6.0 Physical Review of Letters 86: 3682–85.
for Windows. MA: Analytic Technologies. http://www. Cohen, S., Brissette, I., Skoner, D.P. and Doyle, W.J. (2001)
analytictech.com/. ‘Social integration and health: The case of the common
Borgatti, S., Mehra, A., Brass, D. and Labianca, G. (2009) cold’, Journal of Social Structure, http://www.library.cmu.
‘Network analysis in the social sciences’, Science edu:7850/JoSS/cohen/cohen.html.
323(5916): 892–95. Cohen, S., Doyle, W.J., Skoner, D.P., Rabin, B.S. and
Bott, E. (1957) Family and Social Network. London: Tavistock. Gwaltney, J.M. (1997) ‘Social ties and susceptibility to the
Breiger, R. (1974) ‘The duality of persons and groups’, Social common cold’, Journal of the American Medical Association
Forces 53: 181–90. 277: 1940–44.
Brewer, D. (2000) ‘Forgetting in the recall-based elicitation Coleman, J.S. (1988) ‘Social capital in the creation of
of personal and social networks’, Social Networks 22: human capital’, American Journal of Sociology 94:
29–43. S95–S120.
Brewer, D. and Webster, C. (1999) ‘Forgetting of friends and Coser, R.L. (1975) ‘The complexity of roles as a seedbed of
its effects on measuring friendship networks’, Social individual autonomy’, in The Idea of Social Structure:
Networks 21: 361–73. Papers in Honor of Robert K. Merton. New York: Harcourt
Buchanan, M. (2002) Nexus: Small Worlds and the Ground- Brace Jovanovich.
breaking Theory of Networks. New York: W. W. Norton. Domínguez, S. and Maya-Jariego, I. (2008) ‘Acculturation of
Burt, R. (1984) ‘Network items and the General Social Survey’, host individuals: Immigrants and personal networks’,
Social Networks, 6: 293–339. American Journal of Community Psychology 42: 309–27.
Burt, R. (1992) Structural Holes. Cambridge, MA: Harvard Emirbayer, M. (1997) ‘Manifesto for a relational sociology’,
University Press. American Journal of Sociology 103(2): 281–317.
Burt, R. (1997) ‘The contingent value of social capital’, Erickson, B. (1996) ‘Culture, class and connections’, American
Administrative Science Quarterly 42: 339–65. Journal of Sociology 102: 217–51.
Burt, R. (1998) ‘The gender of social capital’, Rationality and Feld, S. (1981) ‘The focused organization of social ties’,
Society 10: 5–46. American Journal of Sociology 86: 1015–35.

5605-Scott-Chap02.indd 23 4/6/2011 11:36:24 AM


24 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Fernandez, R.M. and Harris, D. (1992) ‘Social isolation and the Killworth, P. and Bernard, H.R. (1976) ‘Informant accuracy
underclass’, in Adele Harrell and George Peterson (eds.), in social network data’, Human Organization 35:
Drugs, Crime, and Social Isolation. Washington, DC: The 269–86.
Urban Institute. pp. 257–93. Killworth, P., Johnsen, E., Bernard, H.R., Shelley, G.A and
Fischer, C.S. (1982a) To Dwell Among Friends. Berkeley: McCarthy, C. (1990) ‘Estimating the size of personal
University of California Press. networks’, Social Networks 12: 289–312.
Fischer, C.S. (1982b) ‘What do we mean by friend?’ Social Klassen, S. (2008) ‘Indicators of research success in sociology
Networks 3: 287–306. at the University of Toronto’, [presentation to the Faculty]
Fleming, L., Colfer, L.J., Marin, A. and McPhie, J. (2011) ‘Why Department of Sociology, University of Toronto.
the Valley went first: Aggregation and emergence in Laumann, E., Marsden, P. and Prensky, D. (1983) ‘The bound-
regional collaboration networks’, in John Padgett and ary specification problem in network analysis’, in Ronald
Walter Powell (eds.), Market Emergence and Transformation. Burt and Michael Minor (eds.), Applied Network Analysis.
Princeton, NJ: Princeton University Press. Beverly Hills, CA: Sage. pp. 18–34.
Freeman, L. (1979) ‘Centrality in social networks: Conceptual Lin, N. (1986) ‘Access to occupations through social ties’,
clarification’, Social Networks 1: 215–39. Social Networks 8: 365–85.
Freeman, L. (1992) ‘Filling in the blanks: A theory of cognitive Lin, N. and Ensel, W. (1989) ‘Life stress and health’, American
categories and the structure of social affiliation’, Social Sociological Review 54: 382–99.
Psychology Quarterly 55: 118–27. Lin, N. and Erickson, B. (eds.) (2008) Social Capital. New York:
Freeman, L., Freeman, S. and Michaelson, A. (1989) ‘How Oxford University Press.
humans see social groups: A test of the Sailer-Gaulin Manfreda, K.L., Vehovar, V. and Hlebec, V. (2004) ‘Collecting
models’, Journal of Quantitative Anthropology 1: 229–38. ego-centred network data via the Web’, Metodološki
Gibson, D. (2005a) ‘Concurrency and commitment’, Journal of zvezki 1(2): 295–321.
Mathematical Sociology 29(4): 295–323. Marin, A. (2004) ‘Are respondents more likely to list
Gibson, D. (2005b) ‘Taking turns and talking ties’, American alters with certain characteristics? Implications for name
Journal of Sociology 110(6): 1561–97. generator data’, Social Networks 26: 289–307.
Gould, R. (1995) Insurgent Identities: Class, Community and Marsden, P. (1987) ‘Core discussion networks of Americans’,
Protest in Paris from 1848 to the Commune. Chicago: American Sociological Review 52: 122–31.
University of Chicago Press. Marsden, P. (2005) ‘Recent developments in network meas-
Granovetter, M. (1973) ‘The strength of weak ties’, American urement’, in Peter Carrington, John S., and Stanley W.
Journal of Sociology 78: 1360–80. (eds.), Models and Methods in Social Network Analysis.
Granovetter, M. (1974) Getting a Job: A Study of Contacts and Cambridge, UK: Cambridge University Press. pp. 8–30.
Careers. Cambridge, MA: Harvard University Press. Martin, J.L. (2005) ‘Is power sexy?’ American Journal of
Granovetter, M. (1985) ‘Economic action and social structure: Sociology 111: 408–46.
The problem of embeddedness’, American Journal of McPherson, J.M. and Smith-Lovin, L. (1987) ‘Homophily in
Sociology 91: 481–510. voluntary organizations’, American Sociological Review
Grossetti, M. (2005) ‘Where do social relations come from?’ 52: 370–79.
Social Networks 27: 289–300. McPherson, J.M., Smith-Lovin, L. and Brashears, M. (2006)
Hampton, K. (1999) ‘Computer-assisted interviewing: The ‘Social isolation in America’, American Sociological Review
design and application of survey software to the Wired 71: 353–75.
Suburb Project’, Bulletin de Méthodologie Sociologique Menjívar, C. (2000) Fragmented Ties. Berkeley: University of
62: 49–68. California Press.
Hampton, K. (2007) ‘Neighborhoods in the network society: Merton, R. (1968) ‘The Matthew Effect in science’, Science
The e-Neighbors study’, Information, Communication & 159: 56–63.
Society 10(5): 714–48. Mintz, B. and Schwartz, M. (1985) The Power Structure
Hampton, K. and Wellman, B. (2003) ‘Neighboring in Netville’, of American Business. Chicago: University of Chicago
City and Community 2(3): 277–311. Press.
Hargadon, A. and Sutton, R. (1997) ‘Technology brokering Mitchell, J.C. (ed.). (1969) Social Networks in Urban Situations.
and innovation in a product development firm’, Manchester: Manchester University Press.
Administrative Science Quarterly 42: 716–49. Mizruchi, M. and Brewster Stearns, L. (1988) ‘A longitudinal
Hennig, M. (2007) ‘Re-evaluating the community question study of the formation of interlocking directorates’,
from a German perspective’, Social Networks 29(3): 375–90. Administrative Science Quarterly 33(2): 194–210.
Hogan, B., Carrasco, J.-A. and Wellman, B. (2007) ‘Visualizing Morris, M. (1993) ‘Epidemiology and social networks’,
personal networks’, Field Methods 19(2): 116–44. Sociological Methods and Research 22: 99–126.
Ibarra, H. (1993) ‘Personal networks of women and minorities Müller, C., Wellman, B. and Marin, A. (1999) ‘How to use
in management’, Academy of Management Review 18: SPSS to study ego-centered networks’, Bulletin de Methode
56–87. Sociologique 69: 83–100.
Ibarra, H. (1997) ‘Paving an alternate route: Gender differ- Nooy, W.D., Mrvar, A. and Batagelj, V. (2005) Exploratory
ences in managerial networks’, Social Psychology Quarterly Social Network Analysis with Pajek. Cambridge: Cambridge
60: 91–102. University Press.

5605-Scott-Chap02.indd 24 4/6/2011 11:36:24 AM


SOCIAL NETWORK ANALYSIS: AN INTRODUCTION 25

Padgett, J. and Ansell, C. (1993) ‘Robust action and the rise Stern, M. (2008) ‘How locality, frequency of communication,
of the Medici, 1400–1434’, American Journal of Sociology and Internet usage affect modes of communication within
98(6): 1259–319. core social networks’, Information, Communication &
Pescosolido, B. (1992) ‘Beyond rational choice’, American Society 11(5): 591–616.
Journal of Sociology 97: 1096–138. Tilly, C. (1984) Big Structures, Large Processes, Huge
Plickert, G., Côté, R. and Wellman, B. (2007) ‘It’s not who you Comparisons. New York: Russell Sage Foundation.
know, it’s how you know them’, Social Networks 29(3): Uzzi, B. (1996) ‘The sources and consequences of embedded-
405–29. ness for the economic performance of organizations’,
Podolny, J.M. (2005) Status Signals. Princeton, NJ: Princeton American Sociological Review 61: 674–98.
University Press. van der Gaag, M. and Snijders, T. (2005) ‘The resource gen-
Podolny, J.M. and Baron, J.N. (1997) ‘Resources and relation- erator’, Social Networks 27: 1–27.
ships’, American Sociological Review 62: 673–93. Wasserman, S. and Faust, K. (1994) Social Network Analysis.
Quan-Haase, A. and Wellman, B. (2006) ‘Hyperconnected net Cambridge: Cambridge University Press.
work’, in Charles Heckscher and Paul Adler (eds.) The Firm Watts, D. (1999) Small Worlds. Princeton, NJ: Princeton
as a Collaborative Community. New York: Oxford University University Press.
Press. pp. 281–333. Watts, D. (2003) Six Degrees. New York: W. W. Norton.
R Development Core Team (2007) ‘R: A language and envi- Watts, D., Dodds, P. and Newman, M. (2002) ‘Identity and
ronment for statistical computing’, R Project for Statistical search in social networks’, Science 296: 1302–5.
Computing, Vienna, Austria. Version 2.6.1. http://www. Wellman, B. (1979) ‘The community question’, American
R-project.org/. Journal of Sociology 84: 1201–31.
Richards, W. and Seary, A. (2006) MultiNet for Windows. Wellman, B. (1988) ‘Structural analysis’, in Barry Wellman and
Version 4.75. http://www.sfu.ca/~richards/Multinet/Pages/ S.D. Berkowitz (eds.), Social Structures. Cambridge:
multinet.htm. Cambridge University Press. pp. 19–61.
Roethlisberger, F.J., and Dickson, W.J. (1939) Management Wellman, B. and Frank, K. (2001) ‘Network capital in a multi-
and the Worker. Cambridge, MA: Harvard University level world’, in Nan Lin, K.C. and Ronald B. (eds.), Social
Press. Capital. Chicago: Aldine De Gruyter. pp. 233–73.
Simmel, G. (1908 [1971]) On Individuality and Social Wellman, B., Hogan, B., Berg, K., Boase, J., Carrasco, J.-A.,
Forms: Selected Writings. Chicago: University of Chicago Côté, R., Kayahara, J., Kennedy, T. and Tran, P. (2006)
Press. ‘Connected lives: The project’ in Patrick Purcell (ed.),
Simmel, G. (1922 [1955]) ‘The web of group affiliations’, in Networked Neighbourhoods. Guildford, UK: Springer.
Kurt Wolff (ed.), Conflict and the Web of Group Affiliations. pp. 157–211.
Glencoe, IL: Free Press. pp. 125–95. Wellman, B. and Wortley, S. (1990) ‘Different strokes from dif-
Smith, M. and the Node XL Development Team (2009) Node ferent folks’, American Journal of Sociology 96(3): 558–88.
XL: Network overview. Version 1.0.1.84. http://www. White, H., Boorman, S. and Breiger, R. (1976) ‘Social structure
codeplex.com/NodeXL. from multiple networks I: Blockmodels of roles and posi-
Smith, S.S. (2005) ‘Don’t put my name on it’, American tions’, American Journal of Sociology 81: 730–80.
Journal of Sociology 111: 1–57. White, H., Wellman, B. and Nazer, N. (2004) ‘Does citation
Snijders, T.A.B. (2001) SIENA. Version 3.1. http://stat.gamma. reflect social structure?’ Journal of the American Society for
rug.nl/snijders/siena.html. Information Science and Technology 55(2): 111–26.
Snijders, T. and Bosker, R.J. (1999) Introduction to Multilevel Wilson, W.J. (1978) The Declining Significance of Race.
Analysis. London: Sage. Chicago: University of Chicago Press.
Snijders, T., Pattison, P., Robins, G. and Handock, M. (2006) Wilson, W.J. (1987) The Truly Disadvantaged. Chicago:
‘New specifications for exponential random graph models’, University of Chicago Press.
Sociological Methodology 36: 9–153. Zelizer, V.A. (1994) The Social Meaning of Money. New York:
Stack, C. (1974) All Our Kin. New York: Harper & Row. Basic Books.

5605-Scott-Chap02.indd 25 4/6/2011 11:36:24 AM


3
The Development of Social
Network Analysis – with an
Emphasis on Recent Events
Linton C. Freeman

In a recent book I reviewed the development of psychologists and sociologists. But that interest
social network analysis from its earliest begin- turned out to be short-lived; by the 1940s most
nings until the late 1990s (Freeman, 2004). There, American social scientists returned to their tradi-
I characterized social network analysis as an tional focus on the characteristics of individuals.
approach that involved four defining properties: During the same period another group, led by
(1) It involves the intuition that links among social an anthropologist, W. Lloyd Warner, also adopted
actors are important; (2) it is based on the collec- the social networks approach (Freeman, 2004:
tion and analysis of data that record social Chapter 4). Their efforts were centered in the
relations that link actors; (3) it draws heavily Anthropology Department and the Business
on graphic imagery to reveal and display the School at Harvard, and their approach was pretty
patterning of those links; and (4) it develops clearly independent of Moreno’s and Jennings’s
mathematical and computational models to work. Warner designed the “bank wiring room”
describe and explain those patterns. study, a social network component of the famous
In that book I reviewed the prehistory of social Western Electric research on industrial productiv-
network analysis. I showed that as early as the ity (Roethlisberger and Dixon, 1939). He also
thirteenth century, and probably even earlier, involved business school colleagues and anthro-
people began to produce work that drew on one or pology students in his community research. They
more of the four properties listed above. Until the conducted social network research in two
1930s, however, no one had used all four proper- communities, Yankee City (Warner and Lunt,
ties at the same time. The modern field of social 1941) and Deep South (Davis et al., 1941).
network analysis, then, emerged in the 1930s. The Warner research group never stirred up as
In its first incarnation, modern social network much interest as did Moreno and Jennings. When
analysis was introduced by a psychiatrist, Jacob L. Warner moved to the University of Chicago in
Moreno, and a psychologist, Helen Jennings 1935 and turned to other kinds of research, the
(Freeman, 2004: Chapter 3). They conducted whole Harvard movement fell apart.
elaborate research, first among the inmates of a The third version of social network analysis
prison (Moreno, 1932) and later among the resi- emerged when a German psychologist, Kurt
dents in a reform school for girls (Moreno, Lewin, took a job at the University of Iowa in
1934). 1936 (Freeman, 2004: 66–75). There, Lewin
Moreno and Jennings named their approach worked with a large number of graduate students
sociometry. At first, sociometry generated a great and postdocs. Together, they developed a struc-
deal of interest, particularly among American tural perspective and conducted social network

5605-Scott-Chap03.indd 26 4/6/2011 7:13:45 PM


THE DEVELOPMENT OF SOCIAL NETWORK ANALYSIS 27

research in the field of social psychology (e.g., recognized paradigm for the social network
Lewin and Lippitt, 1938). approach to social science research.
The Lewin group moved to the Massachusetts That all changed in the early 1970s when
Institute of Technology in 1945, but after Lewin’s Harrison C. White, together with his students at
sudden death in 1947 most of the group moved Harvard, built a seventeenth center of social
again, this time to the University of Michigan. network research. In my book I described the
This Michigan group made important contribu- impact of this group (Freeman, 2004: 127):
tions to social network research for more than
20 years (e.g., Festinger et al., 1950; Cartwright From the beginning, White saw the broad general-
and Harary, 1956; Newcomb, 1961). ity of the structural paradigm, and he managed
One of Lewin’s students, Alex Bavelas, to communicate both that insight and his own
remained at MIT where he spearheaded a famous enthusiasm to a whole generation of outstanding
study of the impact of group structure on produc- students. Certainly the majority of the published
tivity and morale (Leavitt, 1951). This work was work in the field has been produced by White and
influential in the field of organizational behavior, his former students. Once this generation started
but most of its influence was limited to that field. to produce, they published so much important
All three of these teams began work in the theory and research focused on social networks
1930s. None of them, however, produced an that social scientists everywhere, regardless of
approach that was accepted across all the social their field, could no longer ignore the idea. By the
sciences in all countries; none provided a standard end of the 1970s, then, social network analysis
for structural research. came to be universally recognized among social
Instead, after the 1930s and until the 1970s, scientists.
numerous centers of social network research
appeared. Each involved a different form and a Following the contributions of White and his
different application of the social network students, social network analysis settled down,
approach. Moreover, they worked in different embraced a standard paradigm, and became
social science fields and in different countries. widely recognized as a field of research.
Table 3.1 lists 13 centers that emerged during In the late 1990s, however, there was a
those 30 years.1 revolutionary change in the field. It was then that
By 1970, then, 16 centers of social network physicists began publishing on social networks.2
research had appeared. With the development of First, Watts and Strogatz (1998) wrote about small
each, knowledge and acceptance of the structural worlds. A year later Barabási and Albert (1999)
approach grew. Still, however, none of these examined the distribution of degree centralities.
centers succeeded in providing a generally I ended the earlier account in my book by

Table 3.1 Centers of social network research from 1940 to 1969

Place Field Team leaders Country

Michigan State Rural sociology Charles P. Loomis USA


Leo Katz
Sorbonne Linguistics Claude Lévi-Strauss France
André Weil
Lund Geography Thorsten Hägerstrand Sweden
Chicago Mathematical Biology Nicolas Rashevsky USA
Columbia Sociology Paul Lazersfeld USA
Robert Merton
Iowa State Communication Everett Rogers USA
Manchester Sociology Max Gluckman Great Britain
MIT Political Science Ithiel de Sola Pool USA
Manfred Kochen
Syracuse Community Power Linton Freeman USA
Sorbonne Psychology Claude Flament France
Michigan Sociology Edward Laumann USA
Chicago Sociology Peter Blau USA
James A. Davis
Amsterdam Sociology Robert Mokken Netherlands

5605-Scott-Chap03.indd 27 4/6/2011 7:13:45 PM


28 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

commenting on the entry of Watts, Strogatz, “small world.” Concern with that issue stemmed
Barabási, and Albert into social network research. from one of the classic social network papers,
I expressed the pious hope that, like all the earlier “Contacts and Onfluence,” written by Pool and
potential claimants to the field, our colleagues Kochen (1978) in the mid-1950s. It circulated in
from physics would simply join in the collective typescript until 1978 when it was finally pub-
enterprise. lished as the lead article in volume 1, number 1, of
That hope, however, was not immediately a new journal, Social Networks.
realized. These physicists, new to social network The questions raised by Pool and Kochen
analysis, did not read previous literature; they concerned patterns of acquaintanceship linking
acted as if our 60 years of effort amounted to pairs of persons. They speculated that any two
nothing. In a recent article, I contrasted the people in the United States are linked by a chain
approach of these new physicists with that of of acquaintanceships involving no more than
earlier physicists who had been involved in social seven intermediaries.
network research (Freeman, 2008): “Other physi- Various students picked up on Pool and
cists had already been involved in social network Kochen’s ideas, including Stanley Milgram,
analysis. Notable among these were Derek de who used them as the basis for his doctoral
Solla Price, Harrison White and Peter Killworth dissertation on the “small world.” Milgram pub-
(e.g., Price, 1965, 1976; White, 1970; White et al., lished several papers on the subject, one of which
1976; Killworth et al., 2003; Killworth et al., was a popularization that appeared in Psychology
2006). These physicists read the social network Today (1967).
literature, joined the collective effort and contrib- Watts and Strogatz cited the Psychology Today
uted to an ongoing research process.” But neither article as well as a later book edited by Kochen
Watts and Strogatz nor Barabási and Albert did (1989) on the small-world idea. But they appar-
any of these things. They simply claimed research ently did not discover any of the other literature on
topics that had always been part of social network the subject. In any case, they introduced an
analysis and made them topics in physics. entirely new model that was designed to account
The result was a good deal of irritation (and for both the clustering found in human interaction
perhaps a certain amount of jealousy) on the part and the short paths linking pairs of individuals.
of many members of the social network research The Watts and Strogatz model begins with an
community. Bonacich (2004) put it this way: attempt to capture clustering—the universal ten-
dency of friends of friends to be friends. They
Duncan Watts and Albert-Lásló Barabási are both represent links among individuals as a circular
physicists who have recently crashed the world of lattice like the one shown in Figure 3.1, where each
social networks, arousing some resentment in the node is an individual and each edge is a social link
process. Both have made a splash in the wider connecting two individuals. They go on to define
scientific community, as attested by their publica- an average clustering coefficient C(p) that meas-
tions in high status science journals (Science, ures the degree to which each node and its immedi-
Nature).... Both have recently written scientific ate neighbors are all directly linked to one another.
best-sellers: Six Degrees ranks 2,547 on the The structure in Figure 3.1 embodies a good deal of
Amazon list, while Linked ranks 4,003. clustering—neighbors of neighbors are, for the
most part, neighbors—thus the clustering coeffi-
Watts, Strogatz, Barabási, and Albert opened cient C(p) is high. But, at the same time, L(p), the
the door. They managed to get a huge number of average length of the path linking any two individu-
their physics colleagues involved—enough to als in the whole lattice, is relatively large.
completely overwhelm the traditional social net- Since L(p) is large, the world represented by
work analysts. Their impact, then, was to produce this circular lattice is certainly not small. But
a revolution in social network research. In the Watts and Strogatz showed that they could
present chapter I will focus on that revolution and produce a small-world effect—where no individ-
its aftermath. Here I will review the developments ual is very far from any other individual—simply
that have occurred since those two articles (by by removing just a few of the links between close
Watts and Strogatz and by Barabási and Albert) neighbors and substituting links to randomly
were published. selected others. As Figure 3.2 shows, under those
conditions some links span across the lattice. The
result is that, as random links are substituted for
links to close neighbors, path length L(p) drops
THE ORIGINS OF THE REVOLUTION abruptly, but the clustering coefficient C(p) is
hardly diminished at all. Thus, for the most part,
The article by Watts and Strogatz (1998) addressed friends of friends are still friends, but the total
a standard topic in social network analysis: the world has become dramatically smaller.

5605-Scott-Chap03.indd 28 4/6/2011 7:13:45 PM


THE DEVELOPMENT OF SOCIAL NETWORK ANALYSIS 29

5
4
6
3

15

10

14
11
13
12

Figure 3.1 A circular lattice with high clustering but long path lengths

5
4
6
3

15

10

14
11
13
12

Figure 3.2 A lattice with high clustering and shorter path lengths

5605-Scott-Chap03.indd 29 4/6/2011 7:13:45 PM


30 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The article by Barabási and Albert (1999) also Albert were apparently unaware of the earlier
took up a standard network analytic topic: degree findings by Moreno and Jennings, they discovered
distribution. The degree of a node is simply the that the connections in the networks they
number of other nodes to which it is directly con- examined were not random. Instead, the links
nected by edges. Much of the earliest research on were skewed; there were a few nodes that dis-
social networks was focused on the distributions played too many connections and a great many
of degrees. Research in sociometry often involved nodes that displayed too few.
asking people whom they would choose, say, to Barabási and Albert went on to propose a
invite to a party or to work with on a project simple model designed to account for the pattern
(Moreno, 1934). As soon as the responses to such of skewing they had observed. Consider a collec-
questions began to be tallied, it became apparent tion of existing nodes. Let ki be the number of
that the distribution of being chosen was dramati- links already established to node i. Then let the
cally skewed. A few individuals were chosen probability that a new node is going to link to any
extremely often while a large number were chosen node i depend on ki. The model specifies the
rarely, if at all. probability of that link connecting to node i
Moreno and Jennings (1938) reported two as P(ki) kig, where 2 ≤ γ ≤ 3.3 The distribution of
empirical results: (1) such skewed distributions connections, then, follows a power law, or
were universally observed, and (2) they departed as Barabási and Albert characterize it, it is
from expectations based on random choices. As “scale free.”
they described it, “A distortion of choice distribu-
tion in favor of the more chosen as against the less
chosen is characteristic of all groupings which
have been sociometrically tested.”
Barabási and Albert (1999) studied the distribu- THE GROWTH OF THE REVOLUTION
tion of connections in networks that grew as a
consequence of adding new nodes. Their As a consequence of the interest generated by
examples included links between sites in the Watts and Strogatz and by Barabási and Albert,
World Wide Web, links between screen actors the revolution began in earnest. As Figure 3.3
who worked together on films, and links between shows, physicists followed up on the Watts and
generators, transformers, and substations in the Strogatz small-world paper. Within five years,
U.S. electrical power grid. Although Barabási and the physics community had produced more

Figure 3.3 Small world publications 1950–2004 (physicists are displayed as black points)

5605-Scott-Chap03.indd 30 4/6/2011 7:13:45 PM


THE DEVELOPMENT OF SOCIAL NETWORK ANALYSIS 31

small-world papers than the social network com- Thus, the social ties within a cohesive group
munity had turned out in 45 years (Freeman, will tend to be dense; most individuals in the
2004: 164–66). group will be linked to a great many other
Moreover, Figure 3.3 also shows that, at that group members. Moreover, those in-group ties
point, 98 percent of the citations were made will tend to display clustering—where, as
within either the physics community or the social described above, friends of friends are friends. In
network community. For the most part, physicists contrast, relatively few social ties will link
ignored the earlier work by social network members of different groups, and clustering will
analysts. And social network analysts responded be relatively rare.
in kind. An early social network analyst, George
Physicists were also quick to follow up on Homans (1950: 84), spelled out the intuitive basis
Barabási and Albert’s work on degree distribu- for the social network conception of cohesive
tions. According to Google Scholar, their first groups:
paper had received over 4,000 citations as of
mid-November 2008. But practically none of A group is defined by the interactions of its
those citations were produced by social network members. If we say that individuals A, B, C, D,
analysts. E, ... form a group, this will mean that at least the
It soon became evident that the physicists’ following circumstances hold. Within a given
interest in social networks was not going to be period of time, A interacts more often with B, C,
confined to small-world phenomena and degree D, E,... than he does with M, N, L, O, P, ... whom
distributions. Members of the physics community we choose to consider outsiders or members
quickly began to explore other problems that had of other groups. B also interacts more often with
traditionally belonged to social network analysts. A, C, D, E, ... than he does with outsiders, and
Nor was that interest restricted to physicists. At so on for the other members of the group. It is
the same time, physicists succeeded in getting possible just by counting interactions to map out a
biologists and computer scientists involved in group quantitatively distinct from others.
their efforts. Two main foci of this new thrust
involved the study of cohesive groups, or what Over the years, network analysts have proposed
physicists call communities, and the study of dozens of models of cohesive groups. These
the positions that nodes occupy in a network— models serve to define groups in structural terms
particularly their centrality. I will review these and provide procedures to find groups in network
foci in the next two sections. data. They all try to capture something close to
Homans’s intuition in one way or another. Some
of them represent groups in terms of on/off or
binary links among actors (e.g., Luce and Perry,
1949; Mokken, 1979). Others represent them in
COHESIVE GROUPS OR COMMUNITIES terms of quantitative links that index the strength
of ties linking pairs of actors (e.g., Sailer and
The notion of cohesive groups is foundational in Gaulin, 1984; Freeman, 1992).
sociology. Early sociologists (Tönnies, 1855/1936; Currently, then, we have a huge number of
Maine, 1861/1931; Durkheim, 1893/1964; models of cohesive groups. Most of them were
Spencer, 1897; Cooley, 1909/1962) talked about reviewed by Wasserman and Faust (1994). Some
little else. Their work provided an intuitive “feel” were algebraic (e.g., Breiger, 1974; Freeman and
for groups, but it did not define groups in any White, 1993), some were graph theoretic (e.g.,
systematic way. Alba, 1973; Moody and White, 2003), some were
When the social network perspective emerged, built on probability theory (e.g., Frank, 1995;
however, network analysts set out to specify Skvoritz and Faust, 1999), and some were based
groups in structural terms. Freeman and Webster on matrix permutation (e.g., Beum and Brundage,
(1994) described the observation behind this 1950; Seary and Richards, 2003). All, however,
structural perspective on groups: were designed to specify the properties of groups
in exact terms, to uncover group structure in
Whenever human association is examined, we see network data, or both.
what can be described as thick spots—relatively Over the years social network analysts have
unchanging clusters or collections of individuals also drawn on various computational algorithms
who are linked by frequent interaction and often in an attempt to uncover groups. These include
by sentimental ties. These are surrounded by thin multidimensional scaling (Freeman et al., 1987;
areas where interaction does occur, but tends to Arabie and Carroll, 1989); various versions of
be less frequent and to involve very little if any singular value decomposition, including principal
sentiment. components analysis and correspondence analysis

5605-Scott-Chap03.indd 31 4/6/2011 7:13:46 PM


32 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

(Levine, 1972; Roberts, 2000); hierarchical sequence of nodes and edges beginning and
clustering (Breiger et al., 1975; Wasserman and ending with nodes. Girvan and Newman reasoned
Faust, 1994: 382–83); the max-cut min-flow algo- that since there should be relatively few edges
rithm (Zachary, 1977, Blythe, 2006); simulated linking individuals in different groups, those
annealing (Boyd, 1991: 223; Dekker, 2001); and linking edges should display a high degree of
the genetic algorithm (Freeman, 1993; Borgatti betweenness. So they began by removing the edge
and Everett, 1997). with the highest betweenness, and they continued
In social network research, the general that process until the graph was partitioned.
tendency over the years has been to move from Two years later Newman and Girvan (2004)
binary representations to representations in which published a follow-up article. Their second paper
the links between nodes take numeric values that again focused on edge removal, but this time they
represent the strengths of connections. At the introduced an alternative model that had two
same time social network analysts have gradually intuitive foundations. In one, they showed that
shifted from building algebraic and graph random walks between all pairs of nodes would
theoretic models to developing models grounded determine the betweenness of edges—not just
in probability theory. And, as time has passed, along shortest paths, but along all the paths
they have relied more often on the use of compu- linking pairs of nodes. The other intuition was
tational procedures to uncover groups. motivated by a physical model where edges were
A notable exception to this trend can be found defined as resistors that impeded the flow of
in an article by Moody and White (2003). They current between nodes. The edge with the lowest
used graph theory to define structural cohesion. current flow was removed. If that did not yield
They defined structural cohesion “... as the a partition the process was continued until parti-
minimum number of actors who, if removed tioning did take place. These two models
from a group, would disconnect the group.” Then produced the same partitions.
they went on to define embeddedness in terms Newman and Girvan went on to show that all of
of a hierarchical nesting of cohesive structures. their algorithms always partitioned the data even
This approach represents a new and sophisticated though some of the partitions might not reflect
version of the traditional social network model the presence of actual communities. So they intro-
building. duced a measure called modularity. Modularity is
Since the early 1970s, mathematicians and based on the ratio of within-partition ties to those
computer scientists had also been interested in that cross partition boundaries and compares that
groups or communities. They defined that interest ratio to its expected value when ties are produced
in terms of graph partitioning (Fiedler, 1973, at random. Thus, it provides an index of the
1975; Parlett, 1980; Fiduccia and Mattheyses, degree to which each partition embodies a group-
1982; Glover, 1989, 1990; Pothen et al., 1990). or community-like form.
Social network analysts recognized this tradition The result of the two papers by Girvan and
when the work by Glover was cited and integrated Newman was dramatic. Both physicists and com-
into the program UCINet (Borgatti et al., 1992). puter scientists quickly developed an interest in
And in 1993 the link in the other direction groups or communities. Radicchi and colleagues
was made when a team composed of an electrical (2004) specified two kinds of communities. One
engineer and a computer engineer, Wu and was characterized as “strong”; it defined a parti-
Leahy (1993), cited the work of a statistician and tion as a community if it met the condition
social network analyst, Hubert (1974). And in that every node had more within-group ties than
2000 three computer scientists, Flake, Lawrence, cross-cutting ones.4 The other they characterized
and Giles (2000), cited the social network text as “weak.” It proposed that a partition was a com-
by Scott (1992). munity if the total number of ties within each
Until quite recently, however, these efforts partition was greater than the total number of ties
did not stir up much interest in the physics linking nodes in the partition to nodes outside the
community. Instead, the physicists turned to the partition.
procedures developed in social network analysis. Radicci et al. also pointed out that the Girvan
Girvan and Newman (2002) adapted the social and Newman betweenness-based algorithm was
network model of betweenness centrality computationally slow. So they introduced a new,
(Freeman, 1977) to the task of uncovering groups. more efficient measure. They reasoned that edges
Their adaptation was based on the betweenness of that bridge between communities are likely to be
graph edges, rather than nodes, and the result was involved in very few 3-cycles (where friends of
a new algorithm for partitioning graphs. friends are friends). So they based their measure
Edge betweenness refers to the degree to which on the number of 3-cycles in which each edge
an edge in the graph falls along a shortest path is involved, and they showed that their measure
linking every pair of nodes. A path in a graph is a had moderate negative correlation with the

5605-Scott-Chap03.indd 32 4/6/2011 7:13:46 PM


THE DEVELOPMENT OF SOCIAL NETWORK ANALYSIS 33

Girvan-Newman measure. The number of communities. And three others, Fortunato, Latora,
3-cycles in which an edge is involved, then, turns and Marchiori (2004), proposed a variation of
out to be inversely related to the betweenness of edge centrality called “information centrality.”
that edge. Their centrality is based on the inverse of the
Newman (2004) quickly jumped back in. He, shortest path length connecting each pair of
too, was troubled by the slowness of the Girvan- nodes. The physicists Palla et al. (2005) defined
Newman algorithm for finding communities. So communities as cliques and focused on patterning
he proposed a fast “greedy” algorithm. A greedy of clique overlap. Reichardt and Bornholdt (2006)
algorithm makes the optimal choice at each step in used simulated annealing to search for partitions
a process, without regard to the long-term conse- that yield communities that have a large number
quences of that choice.5 In this case, Newman of ties within groups and a small number of ties
proposed starting a process by having each cluster that cut across groups.
contain a single node. Then, at each stage in the Some of these ideas, like overlapping cliques
process, the pair of clusters that yields the highest and simulated annealing, will be familiar to
modularity is merged. seasoned social network analysts. Many others,
The concern with computing speed seems to however, are new and several are quite creative. In
have started a race to see who could develop particular, edge betweenness, modularity, the
the fastest algorithm to cluster nodes in terms of use of 3-cycles, short random walks, and graph
their modularity. A computer scientist, Clauset, coloring appear to have promise.
working with two physicists, Clauset et al. (2004), Almost all of these contributions focused
was able to speed up Newman’s “greedy” algo- on building new tools to uncover groups or com-
rithm. Two more computer scientists, Duch and munities. They all reported applications to data,
Arenas (2005), devised an algorithm to speed it up but for the most part their applications were
even more. And in 2006 Newman showed how to merely illustrative. The main thrust of this research
gain still more speed by applying singular value has been to build better and faster group-finding
decomposition to the modularity matrix. Then, in algorithms. That preoccupation with developing
2007, a computer scientist, Djidjev, developed a ever-faster algorithms may not seem too important
still faster algorithm for constructing partitions to most social network analysts, but many applica-
based on modularities. tions — particularly those in biology — involve
Continuing the search for speed, two other data sets that involve connections linking
computer scientists, Pons and Latapy (2006), took hundreds of thousands or millions of nodes. For
an entirely different approach. They reasoned that those applications, speed is essential.
since communities are clusters of densely linked
nodes that are only sparsely linked together, a
short (two- or three-step) random walk should
typically stay within the community in which it is
started. They proposed an algorithm that begins POSITIONS
with a series of randomly selected starter nodes.
Each starter is used to generate a random walk. Concern with the positions occupied by individual
Then the starters, along with the nodes that are actors has been the second main theme in social
reached, are tallied as linked. The likelihood is network analysis. Four kinds of positions have
that once these results are cumulated, they will been defined. First, positions in groups — core
display the clustered communities. Finally, two and periphery — have been specified. Second, a
industrial engineers and a physicist, Raghavan, good deal of attention has been focused on social
Albert, and Kumara (2007), produced a very fast roles. Third, some attention has also been devoted
algorithm based on graph coloring. Nodes begin to the study of the positions of nodes in hierarchi-
with unique colors, then, iteratively, each acquires cal structures. And fourth, social network analysts
the color of the majority of their immediate have been concerned with the structural centrality
neighbors. of nodes in networks.
Other quite different procedures were also Core and peripheral positions in groups were
introduced. A physicist and a computer scientist, first defined by the early network analysts Davis
Wu and Huberman (2004), developed a model et al. (1941):
based on assuming that edges are resistors, as was
the case in the earlier model introduced by Those individuals who participate together most
Newman and Girvan. But Wu and Huberman’s often and at the most intimate affairs are called
model turns out to be much more complicated core members; those who participate with core
and ad hoc. Four physicists, Capocci, Servedio, members upon some occasions but never as a
Caldarelli, and Colaiori (2004), suggested group by themselves alone are called primary
using singular value decomposition to uncover members; while individuals on the fringes, who

5605-Scott-Chap03.indd 33 4/6/2011 7:13:46 PM


34 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

participate only infrequently, constitute the sec- to account for differences in performance and
ondary members of a clique. (p. 150) morale in an organization.
Very soon a large number of other conceptions
Various others followed up on this observation, of centrality were introduced. Those based on
and algorithms for finding core and peripheral graph theory were reviewed (Freeman, 1979)
positions in groups were proposed by Bonacich and reduced to a set of three. They included
(1978), Doreian (1979), Freeman and White Sabidussi’s (1966) measure based on closeness,
(1993), and Skvoretz and Faust (1999). Finally, in Nieminen’s (1974) measure based on degree, and
a pair of articles, (Borgatti and Everett, 1999; Freeman’s (1977) measure based on betweenness.
Everett and Borgatti, 2000) two researchers devel- In addition to these graph theoretic measures,
oped a full model of core/periphery structure. Bonacich (1972, 1987) introduced an algebraic
The intuitive idea of social role was introduced centrality measure. His measure is based on the
by the anthropologist Ralph Linton (1936). The concept of eigenstructure; it is determined by a
notion was that two individuals who were, say, combination of the degree of a node, the degrees
both fathers of children occupied a similar of its neighbors, the degrees of their neighbors,
position as a consequence of their being fathers. and so on.
They could, it was assumed, be expected to The community of physicists has not displayed
display similar behaviors. This idea was spelled any major interest in the first three of these kinds
out by Siegfried Nadel (1957) and formalized of positions developed in social network analysis.
by Lorrain and White (1971) in their model of Physicist Petter Holme (2005) did write an article
structural equivalence. In that model, two indi- about core/periphery structures, and in a review
viduals are structurally equivalent if they have the article, Mark Newman (2003) introduced struc-
same relations linking them to the same others. tural equivalence to physicists. Petter Holme and
Other social network analysts concluded that Mikael Huss (2005) reviewed the social network
structural equivalence was too restrictive to equivalence measures and applied them in the
capture the concept of social role (Sailer, 1978). study of protein function in yeast. Finally, Juyong
They were quick to propose other models that Park and Mark Newman (2005) introduced a new
relaxed the restrictions of structural equivalence. model of dominance and applied it to ranking
These include regular equivalence, isomorphic American college football teams.
equivalence, automorphic equivalence, and local The physicists, however, were quick to adopt
role equivalence. These ideas are all thoroughly the ideas about centrality that had been developed
reviewed in Wasserman and Faust (1994). in social network analysis, and they immediately
The third kind of positional model used in passed them on to biologists. Figure 3.4 displays
social network analysis is focused on hierarchies the number of articles on centrality published each
or dominance orders. The study of dominance year by social network analysts and the number
began with Pierre Huber’s (1802) observations of published by physicists and biologists. It is clear
dominance among bumblebees. Huber was an that once they began publishing in this area, the
ethologist, and most of the research and model physicists and biologists quickly overtook the
building about dominance has remained in social network analysts.
ethology. But Martin Landau (1951), who was In working with centrality, though, the physi-
both an ethologist and a social network analyst, cists took a very different approach than the one
created a formal model of hierarchical structure they used when they dealt with the group or com-
for social network analysts. Another social munity concept. As we saw above, most of their
network analyst, James S. Coleman (1964), contributions to the study of groups involved the
proposed an alternative model. More recently, development of new models and the introduction
Freeman (1997) adapted an algebraic model of refined procedures for finding groups. But, with
from computer science (Gower, 1977) to be used centralities, most of the physicists’ work has
in social network analysis. And Jameson et al. involved applications; they simply found new
(1999) took a model from psychology (Batchelder problems to which standard centrality measures
and Simpson, 1988) and applied it to the study could be fruitfully applied.
of social networks. Many of the areas in which physicists applied
The fourth and final kind of model of social centrality may seem quite surprising, as only a
position is based on the notion of centrality. Alex few of their applications fall into what most out-
Bavelas (1948) and Harold Leavitt (1951) siders would think of as belonging to physics.
originally developed the idea of structural These include packet switching on the Internet,
centrality at the Group Networks Laboratory at electronic circuitry, and the electric power grid
the Massachusetts Institute of Technology. Their (Freeman, 2008).
conception of centrality, based on the distance of A great many more of these applications involve
each node to all the others in the graph, was used areas that traditionally are considered to fall in the

5605-Scott-Chap03.indd 34 4/6/2011 7:13:46 PM


THE DEVELOPMENT OF SOCIAL NETWORK ANALYSIS 35

Centrality publications
80
SocSci
Phys&Biol

60

Frequency
40

20

0
-49
-53
-57
-61
-65
-69
-73
-77
-81
-85
-89
-93
-97
-01
-05
48
52
56
60
64
68
72
76
80
84
88
92
96
00
04
Years

Figure 3.4 Articles on centrality by date and by field (from Freeman, 2008)

domain of social network analysis. These include together and merged into a single coherent
studies of friendships linking students, contacts research effort that embodied a structural
among prisoners, email contacts, telephone con- perspective.
versations, scientific collaboration, corporate But in the late 1990s a new kind of situation
interlock, and links among sites on the World arose. A completely alien field, physics, embraced
Wide Web (Freeman, 2008). the same kind of structural perspective that was
By far the most common application of embodied in social network analysis. Moreover, a
centrality has been to problems in biology. This good many of these physicists did not limit their
work was started by physicists (Jeong et al., 2001) research to the physical realm but studied the
who studied interactions among proteins. patterning of links among social actors. One
But, almost immediately, biologists themselves physicist, Evans (2004), reported on this trend
began to use centrality ideas in their research. to his fellow physicists: “If you are naturally
Two biologists, Wagner and Fell (2001), exam- skeptical about trendy new areas of physics
ined centrality in a study of metabolic networks. and attempts to mix physics with anything and
A year later, four molecular biologists, Vendruscolo everything, then the citations of papers in journals
et al. (2002), used centrality in a study of protein of sociology ... and of books on archeology
folding. These three themes — protein-protein and anthropology ... may just be the last straw!”
interaction, metabolic networks, and protein fold- Thus, though it may not be mainstream physics,
ing — have all come to rely heavily on the use of at least some physicists have defined social
various centrality models and have produced a network analysis as a proper part of their
great deal of research (Freeman, 2008). discipline.
To understand how this occurred, we need to
look at physics and biology in the late 1990s. Both
fields were suddenly faced with mammoth
amounts of structural data. In physics, data on the
SUMMARY AND CONCLUSIONS Internet became available. These data involve
millions of computers, all linked by wires, fiber-
In social network analysis we have a field with a optic cables, and wireless connections. And in
long history. It began in the late 1930s and biology, data on genetic and metabolic networks
emerged again and again in different social were being produced by genome research. In both
science disciplines and in various countries. In the fields investigators were confronted with data on
1970s all these separate research efforts came very large networks.

5605-Scott-Chap03.indd 35 4/6/2011 7:13:46 PM


36 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

These investigators needed tools – both intel- His description centers on their theoretical
lectual and computational – that would help them perspective.
to grapple with these huge new network data sets. 3 The Barabási and Albert model, however, turns
So they turned to a field that had been dealing out to be essentially the same as that proposed by
with network data for 60 years: social network a social network analyst, Derek de Solla Price,
analysis. They drew on ideas from social network in 1976.
analysis and used analytic tools developed in that 4 They did not cite the similar social network
field. They refined existing tools and developed models introduced by Sailer and Gaulin (1984).
new ones. Sometimes they reinvented established 5 Hierarchical clustering is an example of a
tools and sometimes they rediscovered known greedy algorithm.
results, but often they contributed important new 6 Freeman (2004: 166) mentions the attendance
ways to think about and analyze network data. of the physicists Watts, Newman, and Hoser at social
More important, at least some of these network meetings.
physicists have become increasingly involved in 7 The social network analysts Vladimir Batagelj
social network research. They have developed and Linton Freeman were invited to the Summer
new tools aimed toward the study of social Workshop in Complex Systems and Networks, put on
networks (Watts and Strogatz, 1998). They have by physicists in Transylvania in 2007.
reanalyzed standard social network data sets 8 See, for example, the physicists Watts (1999),
(Girvan and Newman, 2002; Holme et al., 2003; Holme, Edling, Liljeros (2004), and Newman (2005)
Kolaczyk et al., 2007; Newman, 2006). publishing in Social Networks or network analysts
Physicists have increasingly begun to cite Borgatti et al. (2009) appearing in Science.
social network articles. Girvan and Newman 9 A hopeful sign is that Jeroen Bruggeman
(2002), for example, cited eight social network (2008) cites 77 reports by physicists in a book about
articles among their 29 citations. Fortunato et al. social network analysis.
(2004) cited nine social network articles in
27 citations. And Holme and Huss (2005) cited
five in 34 citations. On the other hand, most social
network analysts have resisted citing physicists. REFERENCES
Many, I suspect, still view the physicists as “alien
invaders.” Alba, R.D. (1973) ‘A graph theoretic definition of a
Physicists have used computer programs sociometric clique’, Journal of Mathematical Sociology
produced by social network analysts in their data 3: 113–26.
analyses, and they have produced new programs Arabie, P. and Carroll, J.D. (1989) ‘Conceptions of overlap
that include some of the models developed in in social structure’. In Freeman, L.C., White, D.R. and
social network analysis (Freeman, 2008). In addi- Romney, A.K. (eds.), Research Methods in Social Network
tion, a few physicists have attended the annual Analysis. George Mason University Press, pp. 367–92.
Sun Belt social network meetings,6 and a few Barabási, A-L. and Albert, R. (1999) ’Emergence of scaling
social network analysts have been invited to the in random networks’, Science 286: 509–12.
meetings of the physicists.7 Representatives Batchelder, W.H. and Simpson, R.S. (1988) ‘Rating system for
of each discipline are beginning to publish in jour- human abilities: the case of rating chess skill’, Modules in
nals usually associated with the other.8 There are Undergraduate Mathematics and Its Applications.
even some joint publications (e.g., Reichardt and Arlington, MA: Consortium for Mathematics and its
White, 2007; Salganik et al., 2006). Applications, Inc. pp. 289–314.
My earlier hope for rapprochement between Bavelas, A. (1948) ’A mathematical model for small group
physics and social network analysis, it seems, is structures’, Human Organization 7: 16–30.
beginning to take place. All that is required now is Beum, C.O. and Brundage, E.G. (1950) ‘A method for
that the social network analysts relax their claim analyzing the sociomatrix’, Sociometry 13: 141–45.
to ownership of the field. The physicists are Blythe, J. (2006) KP 4.3. from http://www.isi.edu/~blythe/
making important contributions to what could KP4.
easily end up as a collective effort.9 Bonacich, P. (1972) ’Factoring and weighting approaches to
status scores and clique identification’, Journal of
Mathematical Sociology 2: 113–20.
Bonacich, P. (1978) ‘Using boolean algebra to analyze the
NOTES overlapping Memberships’, Sociological Methodology
15: 101–15.
1 Important publications from each of these Bonacich, P. (1987) ‘Power and centrality-a family of meas-
centers are listed in Freeman (2004). ures’, American Journal of Sociology 92(5): 1170–82.
2 Scott, in the current volume, also describes Bonacich, P. (2004) ’The invasion of the physicists’, Social
the entry of physicists into social network analysis. Networks 26(3): 285–88.

5605-Scott-Chap03.indd 36 4/6/2011 7:13:46 PM


THE DEVELOPMENT OF SOCIAL NETWORK ANALYSIS 37

Borgatti, S.P. and Everett, M.G. (1997) ‘Network analysis of Fiedler, M. (1975) ‘A property of eigebvectors of non-negative
2-mode data’, Social Networks 19(3): 243–69. symmetric matrices and its application to graph theory’,
Borgatti, S.P. and Everett, M.G. (1999) ‘Models of core/ Czechoslovak Mathematics Journal 25: 619–33.
periphery structures’, Social Networks 21(4): 375–95. Flake, G.W., Lawrence, S. and Giles, C.L. (2000) ‘Efficient
Borgatti, S.P., Everett, M.G. and Freeman, L.C. (1992) ‘Ucinet, identification of web communities’, Proceedings of t
version iv’, Analytic Technology, Columbia, SC. he Sixth International Conference on Knowledge
Borgatti, S.P., Mehra, A., Brass, D.J. and Labianca, G. (2009) Discovery and Data Mining New York, NY: ACM Press,
‘Network analysis in the social sciences’, Science 323: 892–5. pp. 150–60.
Boyd, J.P. (1991) Social Semigroups. Fairfax, VA: George Fortunato, S., Latora, V. and Marchiori, M. (2004) ‘Method to
Mason University Press. find community structures based on information centrality’,
Breiger, R.L. (1974) ‘The duality of persons and groups’, Social Physical Review 70(5): 056104.
Forces 53: 181–90. Frank, K.A. (1995) ‘Identifying cohesive subgroups’, Social
Bruggeman, J. (2008) Social Networks, London: Routledge. Networks 17(1): 27–56.
Breiger, R.L., Boorman, S.A. and Arabie, P. (1975) ‘An Freeman, L.C. (1977) ‘A set of measures of centrality based on
algorithm for clustering relational data, with applications betweenness’, Sociometry 40: 35–41.
to social network analysis and comparison to multidimen- Freeman, L.C. (1979) ‘Centrality in social networks: concep-
sional scaling’, Journal of Mathematical Psychology tual Clarification’, Social Networks 1: 215–39.
12: 328–83. Freeman, L.C. (1992) ‘On the sociological concept of “group”:
Capocci, A., Servedio, V.D.P. and Caldarelli, G. and a empirical test of two models’, American Journal of
Colaiori, F. (2004) ‘Detecting communities in large net- Sociology 98: 152–66.
works’, Physica: Statistical Mechanics and Its Applications Freeman, L.C. (1993) ‘Finding groups with a simple
352: 669–76. genetic algorithm’, Journal of Mathematical Sociology 17:
Cartwright, D. and Harary, F. (1956) ‘Structural balance: 227–41.
a generalization of heider’s theory’, Psychological Review Freeman, L.C. (1997) ‘Uncovering organizational hierarchies’,
63: 277–92. Computational and Mathematical Organization Theory
Clauset, A., Newman, M.E.J. and Moore, C. (2004) ‘Finding 3: 5–18.
communities in very large networks’, Physical Review E Freeman, L.C. (2004) ‘The development of social network
70(6): 066111. analysis: a study in the sociology of science’, Vancouver,
Coleman, J.S. (1964) Introduction to Mathematical Sociology. B.C.: Empirical Press.
New York: Free Press. Freeman, L.C. (2008) ‘Going the wrong way on a one-way
Cooley, C.H. (1909/1962) Social Organization. New York: street: centrality in physics and biology’, Journal of Social
Shocken Books. Structure 9(2).
Davis, A., Gardner, B.B. and Gardner, M.R. (1941) Deep Freeman, L.C., Romney, A.K. and Freeman, S.C. (1987)
South. Chicago: The University of Chicago Press. ‘Cognitive structure and informant accuracy’, American
Dekker, A. (2001) ‘Visualization of social networks using Anthropologist 89: 311–25.
Cavalier’, Proceedings of the 2001 Asia-Pacific Symposium Freeman, L.C. and Webster, C.M. (1994) ‘Interpersonal
on Information Visualization 9: 49–55. proximity in social and cognitive space’, Social Cognition
Djidjev, H. (2007) ‘A fast multilevel algorithm for graph 12: 223–47.
clustering and community detection’. Arxiv preprint Freeman, L.C. and White, D.R. (1993) ‘Using galois lattices
arXiv:0707.2387,2007 - arxiv.org. to represent network data’, Marsden, P. (ed.),
Doreian, P. (1979) ’On the deliniation of small group Sociological Methodology 1993. Cambridge, MA: Blackwell
structures’, Classifying Social Data. Hudson, M. (ed.), San pp. 127–46.
Francisco: Jossey-Bass pp. 215–30. Girvan, M. and Newman, M.E.J. (2002) ‘Community struc-
Duch, J. and Arenas, A. (2005) ’Community detection in ture in social and biological networks’, PNAS 99(12):
complex networks using external optimization’, Physical 7821–26.
Review 72: 2027104. Glover, F. (1989) ‘Tabu search-part I’, ORSA Journal on
Durkheim, E. (1893/1964) The Division of Labor in Society. Computing 1: 190–206.
New York: Free Press. Glover, F. (1990) ‘Tabu search-part II’, ORSA Journal on
Evans, T.S. (2004) ‘Complex networks’, Contemporary Physics. Computing 2: 4–32.
45(6): 455–74. Gower, J.C. (1977) ‘The analysis of asymmetry and orthoga-
Everett, M. and Borgatti, S.R. (2000) ‘Peripheries of cohesive nality’, Recent Developments in Statistics. Barra, J.,
subsets’, Social Networks 21(4): 397–407. Brodeau, F., and Romier, G. (eds.), Amsterdam: North
Festinger, L., Schachter, S. and Back, K.W. (1950) Social Holland, pp. 109–23.
Pressures in Informal Groups. New York: Harper & Bros. Holme, P. (2005) ‘Core-periphery organization of complex
Fiduccia, C.M. and Mattheyses, R.M. (1982) ‘A linear networks’, Physical Review 72(4).
time heuristic for improving network partitions’, Design Holme, P. and Huss, M. (2005) ‘Role-similarity based
Automation Conference pp. 175–81. functional prediction in networked systems: application
Fiedler, M. (1973) ‘Algebraic connectivity of graphs’, to the yeast proteome’, Journal of the Royal Society
Czechoslovak Mathematics Journal 23: 298–305. Interface. 2(4): 327–33.

5605-Scott-Chap03.indd 37 4/6/2011 7:13:46 PM


38 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Holme, P., Edling, C.R. and Liljeros, F. (2004) ‘Structure and Moody, J. and White, D.R. (2003) ‘Structural cohesion and
time evolution of an Internet dating community’, Social embeddedness: a hierarchical concept of social groups’,
Networks 26: 155–74. American Sociological Review 68(1): 103–27.
Holme, P., Huss, M. and Jeong, H.W. (2003) ‘Subnetwork Moreno, J.L. (1932) Application of the Group Method to
hierarchies of biochemical pathways’, Bioinformatics Classification. New York: National Committee on Prisons
19(4): 532–38. and Prison Labor.
Homans, G.C. (1950) The Human Group. New York: Harcourt, Moreno, J.L. (1934) Who Shall Survive? Washington, DC:
Brace and Company. Nervous and Mental Disease Publishing Company.
Huber, P. (1802) ‘Observations on several species of the genus Moreno, J.L. and Jennings, H.H. (1938) ‘Statistics of social
apis, known by the name of humble bees, and called configurations’, Sociometry 1: 342–74.
bombinatrices by linneaus’, Transactions of the Linnean Nadel, S.F. (1957) The Theory of Social Structure. London:
Society of London 6: 214–98. Cohen and West.
Hubert, L. (1974) ’Approximate evaluation techniques for the Newcomb, T.M. (1961) The Acquaintance Process. New York:
single-link and complete-link hierarchical clustering Holt, Rhinehart, and Winston.
procedures’, Journal of the American Statistical Association Newman, M.E.J. (2003) ‘The structure and function of
69: 698–704. complex networks’, Siam Review 45(2): 167–256.
Jameson, K.A., Appleby, M.C. and Freeman, L.C. (1999) Newman, M.E.J. (2004) ‘Detecting community structure in
‘Finding an appropriate order for a hierarchy based on networks’, European Physical Journal 38(2): 321–30.
probabilistic dominance’, Animal Behaviour 57: 991–98. Newman, M.E.J. (2006) ’Finding community structure in
Jeong, H., Mason, S.P., Barabási, A.L. and Oltvai, Z.N. (2001) networks using the eigenvectors of matrices’, Physical
’Lethality and centrality in protein networks’, Nature Review 74(3): 19.
411(6833): 41–42. Newman, M.E.J. and Girvan, M. (2004) ‘Finding and evaluat-
Killworth, P.D., McCarty, C., Bernard, H.R. and House, M. ing community structure in networks’, Physical Review
(2006) ‘The accuracy of small world chains in social 69: 026113.
networks’, Social Networks 28: 85–96. Nieminen, J. (1974) ‘On centrality in a graph’, Scandinavian
Killworth, P.D., McCarty, C., Bernard, H.R., Johnsen, E.C., Journal of Psychology 15(4): 332–36.
Domini, J. and Shelley, G.A., (2003) ‘Two interpretrations Palla, G., Derény, I., Farkas, I. and Vicsek, T. (2005)
of reports of knowledge of subpopulation sizes’, Social ‘Uncovering the overlapping community structure of
Networks 25: 141–69. complex networks in nature and society’, Nature 435:
Kochen, M. (1989) The Small World. Northwood, NJ: 814–18.
Ablex Publishing Co. Park, J. and Newman, M.E.J. (2005) ‘A network-based ranking
Kolaczyk, E.D., Chua, D.B. and Barthelemy, M. (2007) system for U.S. college football’, Journal of Statistical
‘Co-betweenness: a pairwise notion of centrality’, Mechanics: P Theory and Experiment Vol. P10014.
Arxiv preprint arXiv:0709.3420, 2007 – arxiv.org. Parlett, B.N. (1980) ‘A new look at the {L}anczos method for
Landau, H.G. (1951) ‘On dominance relations and the struc- solving symmetric systems of linear equations’, Linear
ture of animal societies: some effects of possible social Algebra Applied 29: 323–46.
factors’, Bulletin of Mathematical Biophysics 13: 245–62. Pons, P. and Latapy, M. (2006) ‘Computing communities in
Leavitt, H.J. (1951) ‘Some effects of communication patterns large networks using random walks’, Journal of Graph
on group performance’, Journal of Abnormal and Social Algorithms and Applications 10(2): 191–218.
Psychology 46: 38–50. Pool, I.D. and Kochen, M. (1978) ‘Contacts and influence’,
Levine, J.H. (1972) ’The sphere of influence’, American Social Networks 1(1): 5–51.
Sociological Review 37: 14–27. Pothen, A., Simon, H. and Liou, K-P. (1990) ‘Partitioning
Lewin, K. and Lippitt, R. (1938) ‘An experimental approach sparse matrices witheigenvalues of graphs’, Journal of
to the study of autocracy and democracy: a preliminary Matrix Analysis Applied 11(3): 430–52.
note’, Sociometry 1(3/4): 292–300. Price, D.J. (1965) ‘Networks of scientific papers’, Science
Linton, R. (1936) The Study of Man. New York: D. Appleton- 149: 510–15.
Century Company. Price, D.J. (1976) ‘A general theory of bibliometric and other
Lorrain, F.P. and White, H.C. (1971) ‘Structural equivalence of cumulative advantage processes’, Journal of the American
individuals in social networks’, Journal of Mathematical Society for Information Science 27: 292–306.
Sociology 1: 49–80. Radicchi, F., Castellano, C., Cecconi, F., Loretto, V. and
Luce, R.D. and Perry, A. (1949) ‘A method of matrix analysis Parisi, D. (2004) ‘Defining and identifying communities in
of group structure’, Psychometrika 14: 95–116. networks’, Proceedings of the National Academy of
Maine, H. (1861/1931) Ancient Law. London: Oxford Sciences 101: 2658–63.
University Press. Raghavan, U.N., Albert, R. and Kumara, S. (2007) ’Near linear
Milgram, S. (1967) ‘The small world problem’, Psychology time algorithm to detect community structures in
Today 22: 61–67. large-scale networks’, Physical Review 76: 036106.
Mokken, R.J. (1979) ‘Cliques, clubs and clans’, Quantity and Reichardt, J. and Bornholdt, S. (2006) ‘Statistical mechanics of
Quality 13: 161–73. community detection’, Physical Review 74: 016110.

5605-Scott-Chap03.indd 38 4/6/2011 7:13:46 PM


THE DEVELOPMENT OF SOCIAL NETWORK ANALYSIS 39

Reichardt, J. and White, D.R. (2007) ‘Role models for Vendruscolo, M., Dokholyan, N.V., Paci, E. and Karplus, M.
complex networks’, The European Physical Journal 60: (2002) ‘Small-world view of the amino acids that play
217–24. a key role in protein folding’, Physical Review 65(6):
Roberts, J.M. (2000) ‘Correspondence analysis of two-mode 061910–061913.
network data’, Social Networks 22: 65–72. Wagner, A. and Fell, D.A. (2001) ‘The small world inside large
Roethlisberger, F.J. and Dickson, W.J. (1939) Management metabolic networks’, Proceedings of the Royal Society of
and the worker, Cambridge, MA: Harvard University London Series B-Biological Sciences 268(1478): 1803–10.
Press. Warner, W.L. and Lunt, P.S. (1941) The Social Life of a
Sabidussi, G. (1966) ‘The centrality index of a graph’, Modern Community. New Haven, CT: Yale University
Psychometrika 31(4): 581–603. Press.
Sailer, L.D. (1978) ‘Structural equivalence: meaning and Wasserman, S. and Faust, K. (1994) Social Network Analysis:
definition, computation and application’, Social Networks Methods and Applications. Cambridge: Cambridge
1: 73–90. University Press.
Sailer, L.D. and Gaulin, S.J.C. (1984) ‘Proximity, sociality and Watts, D.J. (1999) ‘Networks, dynamics, and the small-
observation: the definition of social groups’, American world phenomenon’, American Journal of Sociology 105:
Anthropologist 86: 91–98. 493–527.
Salganik, M.J., Dodds, P.S. and Watts, D.J. (2006) Watts, D.J. and Strogatz, S.H. (1998) ‘Collective dynamics
‘Experimental study of inequality and unpredictability in an of “small-world” networks’, Nature 393(6684): 440–42.
artificial cultural market’, Science 311: 854–56. White, H.C., Boorman, S.A. and Breiger, R.L. (1976) ‘Social
Scott, J. (1992) Social Network Analysis. Newbury Park, structure from multiple networks i: blockmodels of
CA: Sage. roles and positions’, American Journal of Sociology 81:
Seary, A.J. and Richards, W.D. (2003) ‘Spectral methods for 730–81.
analyzing and visualizing networks: an introduction’, Wu, F. and Huberman, B.A. (2004) ‘Finding communities in
Dynamic Social Network Modeling and Analysis. linear time: a physics approach’, European Physical Journal
Breiger, R.L., Carley, K.M., and Pattison, P. (eds.), 38(2): 331–38.
Washington: The National Academies Press, pp. 209–28. Wu, Z. and Leahy, R. (1993) ‘An optimal graph theoretic
Skvoretz, J. and Faust, K. (1999) ‘Logit models for affiliation approach to data clustering: theory and its application to
networks’, Sociological Methodology 29: 253–80. image segmentation’, IEEE Transactions on Pattern Analysis
Spencer, H. (1897) The Principles of Sociology. New York: and Machine Intelligence 15: 1101–13.
Appleton-Century-Crofts Vol I. Zachary, W. (1977) ‘An information flow model for conflict
Tönnies, F. (1855/1936) Fundamental Concepts of Sociology. and fission in small groups’, Journal of Anthropological
New York: American Book Company. Research 33: 452–73.

5605-Scott-Chap03.indd 39 4/6/2011 7:13:46 PM


4
Network Theory
Stephen P. Borgatti and Virginie Lopez-Kidwell

This chapter is about network theory, which in efforts and provide conceptual tools for creating
general usage can refer to several different kinds new theory.
of ideas. For example, both a theory of tie forma- We start the chapter with detailed accounts of a
tion and a theory of the advantages of social capi- few well-known network theories that serve as
tal could be considered network theory. In the tie prototypes. We then abstract an underlying generic
formation case, network properties serve as the theory that we call the network flow model (where
dependent variable, and the theory concerns the networks are seen as systems of pipes through
antecedents of network phenomena. In the social which information flows), which we argue under-
capital case, the network construct is the inde- lies much of network thinking. As part of this, we
pendent variable, and the theory considers the introduce a typology of dyadic states and events.
consequences of network phenomena. We distin- Next, we consider examples of network theorizing
guish between the two kinds of theory by referring that stem from a different underlying model,
to the first (on antecedents) as theory of networks which we call the network architecture model
and the second (on consequences) as network (where networks are seen as systems of girders
theory.1 The focus of this chapter is on network that create structures of dependencies). The two
theory, which we define as the proposed processes models are then discussed in the light of a typol-
and mechanisms that relate network properties to ogy of network research traditions. We conclude
outcomes of interest. with some general observations about the state of
One approach to writing a chapter on network network theorizing.
theory is to simply review the network literature
and note that so-and-so argued that network vari-
able X leads to Y while someone else argued that
network variable Z leads to W. The problem with EXAMPLES OF NETWORK THEORIZING
this is that theory is more than a system of inter-
related variables—it is the reason the variables are We start with a detailed account of Granovetter’s
related. Theory describes the unseen mechanism (1973) strength of weak ties (SWT) theory, using
that generates an outcome from initial conditions. new terminology that facilitates comparison with
Our approach, therefore, is to examine well- other theories. Conveniently, the theory is organ-
known network theories and extract the underly- ized as a set of explicit premises and conclusions,
ing principles or mechanisms they propose. We as shown in Figure 4.1. The first premise of the
think of these mechanisms as elemental theoreti- theory is that the stronger2 the tie between two
cal memes that are combined in various ways to people, the more likely that their social worlds
generate theory. We hope this approach will help will overlap—that they will have ties with the
identify commonalities across different research same third parties, a kind of transitivity.

5605-Scott-Chap04.indd 40 4/13/2011 2:21:41 PM


NETWORK THEORY 41

Bridges are links


Time between
demands of Balance otherwise
Homophily strong ties distantly linked
theory
pairs of nodes

implies implies implies so

Strong ties tend to Your bridges link to


have overlapping nodes your friends
friends do not

so so

Bridges provide
Strong ties are
novel
rerely bridges
information
therefore

Weak ties are more


likely to provide
novel information

and

Weak ties are


surprisingly “strong”

Figure 4.1 Granovetter’s (1973) strength of weak ties theory

For example, if A is married to B, and B is close Another argument is based on balance or cog-
friends with C, the chances are that A and C will at nitive dissonance theory (Heider, 1958; Cartwright
least be acquaintances (see Figure 4.2). The reason and Harary, 1956; Newcomb, 1961; J. Davis,
for this, Granovetter argues, is that the underlying 1967). If A likes B, and B likes C, A would like to
causes of tie formation have this kind of transitiv- like C as well to avoid dissonance.
ity built into them. For example, people tend to be The second premise of SWT is that bridging ties
homophilous, meaning that they have stronger ties are a potential source of novel ideas. A bridging tie
with people who are similar to themselves is a tie that links a person to people who are not
(Lazarsfeld and Merton, 1954; McPherson et al., connected to their other friends.3 The idea is that
2001). Homophily is weakly transitive because if from a bridging tie a person can hear things that are
A is similar to B, and B is similar to C, then A and not already circulating among their other friends. In
C are likely to share some similarity as well. To the Figure 4.3, A’s tie with G is a bridging tie.4
extent ties are caused by similarity, this will induce Putting the two premises together, Granovetter
weak transitivity in the tie structure as well. reasoned that strong ties are unlikely to be the

B
A A

++ ++ A
++ ++ G
C C
Increased
B +
likelihood B C

Figure 4.2 One premise of Granovetter’s Figure 4.3 Bridging tie from A to G.
(1973) SWT theory Removing the tie disconnects the network

5605-Scott-Chap04.indd 41 4/13/2011 2:21:41 PM


42 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

sources of novel information. The reason is as fol-


lows. First, bridging ties are unlikely to be strong.
According to premise 1, if A and G have a strong
tie, then G should have at least a weak tie to A’s X
other strong friends. But if this is true, then the tie
between A and G cannot be a bridge, since this Y
would imply the existence of many short paths from A B
A to G via their common acquaintances. Therefore,
only weak ties can be bridges. Since bridges are the
sources of novel information, and only weak ties
are bridges, it is the weak ties that are the best
potential sources of novel information.5
Granovetter uses this theory to explain why
people often get or at least hear about jobs through
acquaintances rather than close friends. In this Figure 4.4 Node A has more structural
sense, the theory is one of individual social capi- holes than B
tal, where people with more weak ties (i.e., more
social capital) are more successful.
Granovetter also applies the theory at the group Burt’s theory may look different from
level, arguing that communities with many strong Granovetter’s, but the differences are largely in
ties have pockets of strong local cohesion but language and focus. In Burt’s language, A has
weak global cohesion. In contrast, communities more structural holes than B, which means A has
with many weak ties have weak local cohesion but more nonredundant ties. In Granovetter’s lan-
strong global cohesion. He illustrates the idea in a guage, A has more bridges than B. But whether
case study of Boston in which the city assimilated we call them nonredundant ties or bridges, the
one adjacent community (the West End) but failed concept is the same, and so are the consequences:
to assimilate another (Charlestown). According to more novel information.
Granovetter, Charlestown had more weak ties, Where Granovetter and Burt differ is that
which facilitated community-level organizing. The Granovetter further argues that a tie’s strength
traditional ethnic West End was a bedroom com- determines whether it will serve as a bridge. Burt
munity in which people worked elsewhere; it was does not disagree and even provides empirical evi-
fragmented into distinct clusters of very dense dence that bridging ties are weaker in that they are
strong ties, lacking bridging weak ties. In contrast, more subject to decay (Burt, 1992, 2002). However,
Charlestown residents worked in the community Burt sees tie strength as a mere “correlate” of the
and had more opportunities to rub elbows. Thus, a underlying principle, which is nonredundancy
community’s diffuse weak-tie structure constitutes (1992: 27). Thus, the difference is between prefer-
group-level social capital that enables the group to ring the distal cause (strength of ties), as Granovetter
work together to achieve goals, such as mobilizing does, and the proximal cause (bridging ties), as Burt
resources and organizing community action to does. The first yields an appealingly ironic and
respond to an outside threat. counterintuitive story line, while the second “cap-
Another well-known network theory is Burt’s tures the causal agent directly and thus provides a
(1992) structural holes theory of social capital. stronger foundation for theory” (Burt, 1992: 28).
Burt argues that if we compare nodes A and B in But it is all based on the same underlying model of
Figure 4.4, the shape of A’s ego network is likely how networks work, a model that we shall argue
to afford A more novel information than B’s ego underpins a great deal of network theory.
network does for B. Both have the same number of The superficial differences and underlying simi-
ties, and we can stipulate that they are of the same larity of weak tie and structural hole theories recall
strength. But because B’s contacts are connected the apparent contradiction between Burt’s structural
with each other, the information B gets from, say, hole argument and Coleman’s closure theory of
X may well be the same information B gets from social capital. Burt (1992) argues that communica-
Y. In contrast, A’s three ties connect A to three tion between an ego’s two alters doesn’t just reduce
pockets of the network, who may know different information, it constrains ego’s behavior. For exam-
things. A’s ties connect to three different pools of ple, if the alters share information about their inter-
information (represented by circles in Figure 4.4), actions with ego, then ego cannot tell substantially
while B’s ties connect to just one pool. Burt different stories to each party, constraining ego’s
argued that, as a result, A is likely to receive more behavior and reducing ego’s social capital. In
nonredundant information at any given time than contrast, Coleman (1988) argues that the connec-
B, which can then be exploited to do a better job tions among ego’s alters enable the alters to work
or to be the source of “new” ideas. together to help ego, increasing ego’s social capital.

5605-Scott-Chap04.indd 42 4/13/2011 2:21:42 PM


NETWORK THEORY 43

For example, a child benefits from having parents, (or any resource) flows from node to node along
teachers, neighborhood adults, and so on communi- paths consisting of ties interlocked through shared
cate with each other because this way they can ensure endpoints. The element of network paths is impor-
that the child does his homework, avoids danger, etc. tant. Paths simultaneously imply both connection
But as Burt (2005) points out, the conflict between and disconnection, with the length of paths indi-
these views is more apparent than real, as both cating the degree of disconnection. We refer to
assume that ties among the child’s alters constrain this model as the network flow model, and we
that child. The difference is simply that in Coleman’s conceive of it as a platform for theorizing.
educational setting, constraint is good, and in Burt’s We limit the network flow model to “true” flows
corporate setting, constraint is typically bad. It is in the sense that what arrives at the other end is the
really only the (unwise) value-loadedness of the same as when it started. Whatever flows through
social capital concept that creates contradiction. the network may be damaged or changed en route,
Another well-known area of network theoriz- but it remains basically the same thing. If it starts
ing is small-world theory. In the 1950s and 1960s, as gossip, it arrives as gossip, even if the details
a stream of mathematical research sought to have changed. The distinction we are making is
explain coincidences of mutual acquaintanceship with a more general sense of flow such as a chain
(de Sola Pool and Kochen, 19786; Rapoport and of causality, where, for example, someone misses
Horvath, 1961). The basic thrust of the research an appointment and sets off a chain of events
was to show that societies were probably much that culminate in a civil war. We regard this more
more close-knit than popularly believed. A field general sense of flow as constituting a different
experiment by Milgram (1967; Travers and model.
Milgram, 1969) supported this theory, finding that The middle layer consists of a bit of reasoning
paths linking random Americans were incredibly that says that transitivity (closure; clusteredness)
short. Restarting this stream of research 20 years slows network flows by increasing path lengths.
later, Watts and Strogatz (1998) asked how human This reasoning is effectively a theorem derived
networks could have such short average distances, from the underlying flow model. Because all of
given that human networks were so clustered, a the elements of the theorem are drawn from the
property that was known to lengthen network dis- network flow model, the theorem can be proved
tances (Rapoport and Horvath, 1961). The answer, (or disproved) mathematically and can be explored
Watts and Strogatz showed, was simple: adding via simulation. The network flow model is a
even a small number of random ties to a heavily closed world in which all the rules are known.
clustered network could radically reduce distances Theory, at this level, consists of taking constructs
among nodes. The reason was that many of these defined on the underlying model (such as between-
random ties would be between clusters, which is ness centrality) and relating them to outcomes in
to say, they were bridges. the same universe (such as frequency and time
of first arrival of something flowing through the
network).
Integrating network yheories: The surface layer can be seen as a “personaliza-
the network flow model tion” of the theory that ornaments the basic theory
with variables drawn from the immediate empirical
In our view, small-world (SW) theory, structural context and which serve as an interface to general
hole (SH) theory, Coleman social capital (CSC) social theory. For example, Granovetter decorates
theory, and SWT theory are all elaborations—in the theory at one end by adding strength of tie as
different directions and for different purposes—of an antecedent to transitivity. Burt decorates the
the same theory. In this section, we deconstruct theory at the other end by connecting information
this theory into three layers: a deep layer that flows to personal creativity and producing value.
defines the rules of a theoretical universe within Travers and Milgram suggest that upper-class
which to work, a middle layer that consists of a people are more likely to be key nodes.
theorem derived from the rules of the universe, The transitivity theorem is just one of many we
and a surface layer that connects to the variables can derive from the underlying flow model to
associated with a specific empirical setting. yield new theory. For example, a different theo-
Together, these create the theory of which SW, rem is that, ceteris paribus, nodes with more ties
SWT, SH and CSC are all different views. We have greater exposure to (i.e., more chances of
then show how other theorems or derivations from receiving) whatever is flowing through a network
the same set of underlying rules generate different (Freeman, 1979; Borgatti, 1995, 2005). Depending
(but not incompatible) theories. on the flow’s usefulness, this should mean better
The deep layer consists of a very simple model outcomes for nodes with more ties.7
of how social systems work, which is essentially We can also reason that it matters how well
that they are networks through which information connected a node’s contacts (Bonacich, 1972) are.

5605-Scott-Chap04.indd 43 4/13/2011 2:21:42 PM


44 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

A node with five contacts that have no other con- Backcloth Relational events
tacts has little exposure to information flowing Simila- Social Interac-
Flows
through the network. A node whose five contacts rities relations tions
are the most central nodes in the network will
have great exposure. For example, in a sexual Figure 4.5 Types of dyadic phenomena
network, many nodes can be monogamous, but
their risk of catching a sexually transmitted dis-
ease will vary based on how well “connected” dyadic phenomena, which Atkin (1974, 1977)
their partner has recently been. referred to as backcloth and traffic. The backcloth
If the connectedness of an ego’s alters matters, consists of an underlying infrastructure that ena-
so could other characteristics, including nonstruc- bles and constrains the traffic, and the traffic
tural attributes, such as wealth, power, or exper- consists of what flows through the network, such
tise. Being connected to powerful and wealthy as information. For example, in SWT theory,
people may present more opportunities than being social ties such as acquaintanceships serve as
connected to an equal number of people without potential conduits for information.
such resources. This is the basis of Lin’s (1982) A more elaborate set of distinctions is illus-
social resource theory (see also Snijders, 1999), trated in Figure 4.5, which divides dyadic phe-
another branch of social capital research. nomena into four basic categories: similarities,
If we assume that the time it takes for informa- social relations, interactions, and flows.9
tion to move along a network path is proportional The similarities category refers to physical
to the length of the path, another obvious theorem proximity, co-membership in social categories,
is that nodes that are closest to all others should, and sharing of behaviors, attitudes, and beliefs.
on average, receive flows more quickly (Freeman, Generally, we do not see these items as social ties,
1979; Borgatti, 1995, 2005). When it is beneficial but we do often see them as increasing the prob-
to receive flows before others do (e.g., informa- abilities of certain relations and dyadic events. For
tion on organizational events), nodes with greater example, in an organizational setting, Allen (1977)
overall closeness should perform better. found that communication tends to increase as a
A well-known theoretical proposition is that function of spatial proximity.
nodes positioned along the only or best paths The social relations category refers to the clas-
between others may be able to benefit by controlling, sic kinds of social ties that are ubiquitous in net-
filtering, or coloring the flow, as well as charging work theorizing. We distinguish between two
rents for passing along the flow (Freeman, 1977). types of social relations: role-based and cognitive/
Finally, we can theorize that nodes located in affective. Role-based includes kinships and role
the same general areas (e.g., connected to the relations such as boss of, teacher of, and friend of.
same nodes; Lorrain and White, 1971) will tend to We use the term role-based because these rela-
hear the same things and therefore have equal tions are usually institutionalized into rights and
access to opportunities provided by network flows obligations, and are linguistically identified as, for
(Burt, 1976). example, friend, boss, or uncle. Many are also
There are many other basic theoretical proposi- symmetric or skew-symmetric, such that if A is a
tions found in the literature that can be derived friend of B, then B is a friend of A, and if A is the
from the basic network flow model. The main teacher of B, then B is the student of A. Another
point is that the network flow model provides a characteristic of role-based relations is that they
conceptual universe within which we can concep- are in a weak sense public and objective—a
tualize properties (such as clusteredness or cen- researcher can ask a third party whether two
trality) and relate them to other properties (such as people are friends or have a teacher/student rela-
probabilities of receiving something flowing tionship and not receive an automatic “how should
through the system). These properties are widely I know?” reaction.
misperceived as elements of methodology (i.e., The second type of social relation consists of
“measures”) that are unconnected to theory, when perceptions and attitudes about specific others,
in fact they are derivations of a model and exist such as knowing, liking, or disliking. These evalu-
only in the context of a theoretical process.8 ations are widely considered private, idiosyncratic,
and invisible. They can easily be nonsymmetric: A
likes B, but the reverse may or may not be true.
The interactions category refers to discrete and
RELATIONAL STATES AND EVENTS IN separate events that may occur frequently but then
THE NETWORK FLOW MODEL stop, such as talking with, fighting with, or having
lunch with.
Theories derived from the network flow model Finally, the flows category includes things such
distinguish between two kinds of relational or as resources, information, and diseases that move

5605-Scott-Chap04.indd 44 4/13/2011 2:21:42 PM


NETWORK THEORY 45

from node to node. They may transfer (being


only at one place at a time) and duplicate (as in THE NETWORK ARCHITECTURE MODEL
information). Flows matter in most network theo-
ries but are generally assumed immeasurable in As noted earlier, the network flow model is based
practice. on what we termed true flows of resources, which
In Atkin’s view, the four dyadic phenomena all travel along network paths and are acquired by the
serve as the backcloth for the phenomena to their nodes encountered along the way, either as capital
right. Hence, physical proximity can facilitate the or as a trait. However, not all network theorizing
development of certain relationships, and certain derives from this underlying model. Consider the
relationships permit certain interactions; these in image of an entrepreneur usually presented in
turn provide the vehicle for transmissions or social resource theory (Lin, 1982, 1999a, 1999b).
flows. However, it is also clear that phenomena on To be successful, the entrepreneur needs help: rich
the right can transform the phenomena on the left, friends can contribute capital, or experienced
so that people with certain relationships (e.g., friends can convey key knowledge, but often no
spouses) tend to move closer together, and certain resources are actually transferred to ego. For exam-
interactions (e.g., sex) can change or institutional- ple, a legislator can favor a developer by pushing
ize relationships. through a bill that allows the developer to utilize
Theory based on the network flow model previously off-limits land. A judge can decide a
focuses on either social relations or interactions, case for a friend’s benefit. The benefits are real, but
using these ties to define the network backcloth, contrary to the network flow model, the legislator’s
which then determines flows. Interactions are and the judge’s powers are not transferred to the
transitory, so theory built on them typically con- developer. Rather, work is done on behalf of
ceptualizes them as cumulative and repeated over another, as described by principal/agent theory
time, describing them as recurrent, patterned, or (Rees, 1985; Eisenhardt, 1989), and this consti-
relatively stable. In effect, this relation converts tutes a different mechanism for achievement.
into an underlying social relation that is ongoing A similar situation is seen in transactional
across interaction episodes. knowledge theory (Hollingshead, 1998; Argote,
We emphasize three points based on this dis- 1999; Moreland, 1999), where organizations are
cussion. First, much of the flow model exists seen as distributed knowledge systems in which
because we do not measure flows directly.10 different bits of the organization’s knowledge store
Hence we build theory that links the observable are held in different heads. While it is known who
network of social relations to these latent flows. knows what, the knowledge can be utilized.
If the flows were directly measurable, we would not However, the knowledge in a node’s head may not
need to infer that nodes with more structural be actually transferred when it is used. For exam-
holes (or weak ties) would receive more informa- ple, a chemist is tapped to solve a problem involv-
tion: we would simply measure the information ing stereo isomers. The chemist’s knowledge of
they got. chemistry is not likely to be transferred to others
Second, much of network flow theory depends on the project team who may not have a chemistry
on the relative permanence of ties. For example, background. In fact, if the knowledge were trans-
consider a node that profits from being the broker ferable, the organization would cease to be a dis-
between otherwise unconnected nodes. This works tributed knowledge system, and every member
only if the spanned nodes cannot simply create a would be a prodigious polymath. Rather, the chem-
tie with each other at will. If a direct tie can ist works in concert with the team or its leader.11
always be formed, the importance of paths through These examples imply a mechanism of node
a network vanishes, as does the importance of success that is slightly different from the procure-
structure in general. ment of resources through network paths, as in the
Third, when researching the exploitation of net- network flow model. Instead, it is a virtual pro-
work position by nodes, it is problematic to meas- curement because instead of transferring their
ure relational events such as interactions and flows resources, an ego’s alters act on behalf of or in
rather than relational states, because power use can concert with ego. Another way to think about this
change the event network. For example, if a node is that the alters act as an extension of ego,
tries to extract rents for being between two others, together forming a larger, more capable, entity.
the others may choose a different path (Ryall and The nodes act as one, and this coordination not
Sorenson, 2007; Reagans and Zuckerman, 2008). only harnesses the powers of all the nodes but also
So the event network we see is not the potential means that the individual nodes cannot be used
structure defined by underlying relations, but an against each other. This is the principle behind
actualized instance that could change at any time unions, co-ops, and other collectivities that pre-
and therefore does not tell us what other paths vent negotiation with each member individually.
might have been possible. The key here is that ties are serving as bonds that

5605-Scott-Chap04.indd 45 4/13/2011 2:21:42 PM


46 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

bind the nodes together (whether through solidar- Y X Y


ity or authority), creating a common fate. (a)
We argue that this mechanism is different
enough from that of the network flow model to
constitute a different model, which we term the Y Z X Z Y
network architecture model. In defining a separate (b)
model that does not include the term “flow,” we do
not imply that, in the architecture model, informa- Figure 4.6 Two experimental exchange
tion does not flow. To coordinate actions, nodes networks. Light-colored nodes have more
may well communicate. However, two points power (Allen, Thomas J., Managing the Flow
should be kept in mind. First, communication is of Technology, figure, page 239, © 1977
not the only way to achieve coordination
Massachusetts Institute of Technology, by
(Thompson, 1967). Second, communication, even
if plentiful, plays a role in the network architecture permission of The MIT Press)
model that is different from its role in the network
flow model. In the network flow model, it is the has only powerful partners to trade with. Why are
value of the flow itself that generates outcomes for the Ys weak? Because whenever their Z makes a
the ego that receives it. A manager receives gossip deal with someone else, the Y is excluded from
about a failing project and takes steps to disassoci- that particular round. The Ys depend on the Zs
ate herself from it. In the architecture model, it is because they lack alternatives. But it is not simply
the alignment between nodes produced by the flow the number of alternatives that matters, because X
that yields the outcome. has just as many alternatives as the Zs. Ultimately,
The case of authority relations—bureaucracy’s a node’s bargaining position is a consequence not
backbone—is instructive. The “reports to” ties only of its alternatives, but also the (lack of) alter-
serve as conduits for information flow (e.g., natives of its alternatives, which in turn are deter-
orders going down; reports going up), but this dif- mined by their own alternatives, virtually ad
fers from the network flow model both because infinitum.
simply receiving an order is not enriching, and Note a number of interesting points about the
orders are not (usually) repeated down the line, as exchange situation. First, while nodes interact and
on a ship. Rather, the orders from A to B are dif- accumulate resources, resources (i.e., points) do
ferent from those from B to C. Communication is not travel along paths of the network; the rules of
involved, but the coordination, not the message, is the game prevent it. This is why centrality meas-
the mechanism. ures are useless in predicting outcomes of this
Finally, consider network exchange theory, experiment—centrality is a construct of the net-
which we regard as the analogue to SWT theory in work flow model, and there are no flows here. But
providing a clear example of a distinctive kind of even without flows, paths do matter here. For
network theorizing. In the experimental exchange example, adding a node linked to any of the Ys in
tradition of social network analysis (Cook et al., Figure 4.6b would tend to change X’s fortunes
1983; Markovsky et al., 1988), researchers have considerably. It is, if not a flow, a propagation
volunteers bargain with each other to distribute effect in which being adjacent to a weak node
points between them, with the goal of amassing as makes a node strong, which in turn weakens
many points as possible across a series of rounds. others that the node is connected to, which
The participants are placed in a network designed strengthens still others and so on through the net-
by the experimenters and can negotiate only with work (Bonacich, 1987). Perhaps a better term than
people they have been given links to. In each round propagation would be autocorrelation, meaning
of the game, participants must divide 24 points that a node’s state is affected by the states of the
with someone they have a tie to. Initially, they tend nodes it is connected to, but not necessarily in the
to make even trades of 12 and 12. Over time, how- simple manner proposed by the network flow
ever, those in certain network positions are able to model, in which a node always comes to have the
command more favorable terms, such as 13–11, same thing its environment has.12 Rather, it is
14–10, and eventually, 23–1. For example, in more like adaptation, such that nodes react to their
Figure 4.6a, node X accumulates the most points. environments rather than acquire them.
Initially, centrality was thought to be the under- Network exchange theory may be seen as a
lying principle (Cook et al., 1983). However, it special case of network role theory (Borgatti and
was soon discovered that in the network shown in Everett, 1992b). If we examine a network such as
Figure 4.6b, the most central node had no power. shown in Figure 4.7, it is apparent that nodes b, g,
Instead, the Zs had the power. The reason was d, and i are structurally similar to each other, even
simple: even though X has as many potential trad- if they are not particularly close to each other.
ing partners as the Zs, the Zs each have a partner Indeed, suppose one were to remove the labels on
(a Y) that is in a very weak position, whereas X all nodes in Figure 4.7, pick up the diagram, flip it

5605-Scott-Chap04.indd 46 4/13/2011 2:21:43 PM


NETWORK THEORY 47

a b g h which things flow (the traffic, the current). In the


e f architecture model, the ties are bonds, ligatures,
girders, or bones that bind the network together,
creating a structure (like a skeleton) around which
d the rest of the social system is draped. The bonds
c i j serve as the elemental units of structure.
This pipes-and-bonds distinction is not unhelp-
Figure 4.7 Shapes identify nodes that are ful, but it is also not quite right. As we have tried
structurally isomorphic to point out, both models typically involve flows
of some kind at the dyadic level. It is the style and
function of these flows that is different.
around on both its vertical and horizontal axes,
and then put it back down on the page. Could one
reassign the labels correctly? Clearly one could
not mistake b for e, because b has a pair of friends GOALS OF NETWORK THEORY
(a and c) who are friends with each other, while
none of e’s friends are friends with each other. We
For simplicity of exposition, our discussion of the
would also not confuse b for a, because among a’s
network flow and architecture models has focused
friends, not one but two pairs are friends with each
on explaining differences in node (or group) suc-
other. But we could not tell the difference between
cess with respect to performance or rewards. This
b and d, nor g and i. Similarly, a, c, h, and j are
value-loaded focus is drawn from the social capi-
indistinguishable from each other, as are e and f;
tal research tradition, which investigates the ben-
within each of these sets, the nodes are structur-
efits of (or aspects of) network position for
ally isomorphic.
individuals and groups.
In a sense, the network in Figure 4.7 has an
However, social capital is not the only theoreti-
underlying structure in which the 10 different
cal perspective in the field. The social homogeneity
nodes reduce to just three classes of nodes that
perspective seeks network-theoretic explanations
share certain characteristic relations with each
for why some nodes share traits with certain
other. The pattern of relations among classes is
others, particularly with respect to behaviors (such
shown in Figure 4.8, which presents a reduced
as adoption of innovation), beliefs, and attitudes
model (a blockmodel in the language of White
(Borgatti and Foster, 2003).13
et al., 1976) of the network in Figure 4.7. The pat-
The network flow model and the architecture
tern is that square nodes (the class containing a, c,
model are used in both social capital and social
h, j) have ties to both circle nodes and other square
homogeneity studies, providing competing expla-
nodes; triangle nodes have ties with themselves
nations for the same outcomes. Figure 4.9, drawn
and with circle nodes; circle nodes connect square
from Borgatti and Foster (2003), summarizes this
nodes to triangle nodes and have no ties among
discussion as a simple 2-by-2 cross-classification.
themselves.
The rows correspond to the fundamental models
In effect, the three classes of nodes play three
and therefore basic explanatory modes. The col-
different structural roles and have three different
umns correspond to research traditions, based on
social environments, and these differences imply
their generic goals of explaining variance in per-
different consequences for the nodes occupying
formance or similarity of traits. The cells of the
those positions. Indeed, returning to experimental
table identify specific mechanisms used in each
exchange networks, Borgatti and Everett (1992a)
context. We regard these elemental mechanisms as
showed that all experimental results to date con-
part of the vocabulary of social network theory.
firm that nodes playing the same structural roles
We discuss each quadrant in turn.14
obtain the same results, within bounds of statisti-
cal variation.
In discussing the flow and architecture models,
it is tempting to argue that they rest on two differ- Underlying Social Social
ent metaphorical understandings of ties. In the flow model capital homogeneity
model, ties are pipes (or roads, or circuits) through
Network
Capitalization Contagion
flow model
Network
architecture Coordination Adaptation
model

Figure 4.8 Blockmodel of network in Figure 4.9 Network functions (mechanisms)


Figure 4.7 by model and research tradition

5605-Scott-Chap04.indd 47 4/13/2011 2:21:43 PM


48 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The top-left quadrant, which uses the network The top-right quadrant, contagion, is the basis
flow model to understand success, is one of the for most diffusion research. The basic idea is that
most developed, particularly in organizational nodes essentially become their environments
research. The key concept is capitalization, mean- through a process of contamination/infection/
ing that nodes acquire ideas, resources, and oppor- staining16 so that one’s location in a network has
tunities through their ties, and this process either much to do with one’s acquired traits. Both the
directly increases their human capital or increases coordination quadrant and the capitalization
their ability to exploit their human capital, which mechanisms are about processes in which nodes
in turn contributes to their success in terms of acquire something flowing through network paths.
performance and rewards. The capitalization proc- The difference is that in one case the nodes acquire
ess is evident in work on social support (e.g., capital, while in the other they acquire traits.
Wellman and Wortley, 1990), status attainment Network research based on the contagion mech-
(Lin, 1999a), job search information and job- anism includes Coleman, Katz, and Menzel’s
getting (Granovetter, 1973, 1974), knowledge (1966) classic study, which argued that informal
(Borgatti and Cross, 2003; Bouty, 2000), creativ- discussions among physicians created behavioral
ity (Perry-Smith and Shalley, 2003; Burt, contagion with respect to adopting tetracycline, as
2004), mobility (Boxman et al., 1991; Burt, 1997; well as the study by Davis (1991) arguing that the
Seibert et al., 2001), power (Brass, 1984; Kilduff now-standard corporate practice of “poison pills”
and Krackhardt, 1994), leadership (Brass and spread through corporate board interlocks. The
Krackhardt, 1999; Pastor et al., 2002), perform- contagion mechanism has been used to explain
ance (Baldwin et al., 1997; Mehra et al., 2001), similarity in job decisions (Kilduff, 1990), the
and entrepreneurship (Renzulli et al., 2000).15 adoption of organizational structures and strategies
The capitalization mechanism can also be seen in (DiMaggio and Powell, 1983; Geletkanycz and
group-level research, such as in the work of Hambrick, 1997), disease and immunity outcomes
Bavelas (1950) and Leavitt (1951), showing that (Morris, 1993; Cohen et al., 1997), decisions to
communication networks with short distances smoke (Christakis and Fowler, 2008), similarity of
from each node to a central node (an “information attitudes and beliefs (Harrison and Carroll, 2002;
integrator”) were better able to solve puzzles Sanders and Hoekstra, 1998; Molina, 1995), and
involving pooling of information. the production of consensus through social influ-
The bottom-left quadrant, labeled coordination, ence (Friedkin and Johnsen, 1999).
uses the architectural model to provide an alterna- It should be noted that each of these general
tive set of explanations for node (or group) suc- processes, such as contagion, can be broken down
cess. In this model, networks provide benefits further into micro-mechanisms at the dyadic level.
because they can coordinate or “virtually agglom- For example, DiMaggio and Powell (1983) dis-
erate” multiple nodes in order to bring all their cussed mimetic processes, in which a firm actively
resources to bear in a coordinated fashion (and imitates another firm in its environment, and coer-
avoid being divided and conquered). Different cive processes, where a trait is imposed on a firm,
network structures, in combination with contex- as when a large customer imposes a certain
tual rules of the game, create different dependen- accounting system on a supplier. Within each of
cies and possibilities for coordination (Markovsky these micro-mechanisms we can continue to add
et al., 1988; Cook et al., 1983). Work based on detail, such as noting that the likelihood of mimetic
these mechanisms includes Burt’s (1992) work on processes increases with uncertainty and the need
the control benefits of structural holes, research on for legitimacy (DiMaggio and Powell, 1983;
“network organizations” (Miles and Snow, 1986; Galaskiewicz and Wasserman, 1989; Haunschild
Powell, 1990; Snow et al., 1992; Jones et al., and Miner, 1997). However, this kind of theorizing
1997), research on compliance with norms belongs to the interface layer discussed earlier and
(Roethlisberger and Dickson, 1939; Mayhew, is outside the scope of this chapter.
1980; Kiuru et al., 2009), and work on the in- and Finally, the bottom-right quadrant, adaptation,
out-groups of leaders (Sparrowe and Liden, 1997). uses the architecture model to provide an alterna-
Other work in this tradition is the literature on tive to network flows for explaining homogeneity.
transactional memory systems (Hollingshead, Instead of a node acquiring what is flowing
1998; Moreland, 1999; Rulke and Galaskiewicz, through the network, as in contagion, the node
2000), in which an individual or group benefits responds or adapts to a set of environmental
from the knowledge of others without necessarily dependencies. Social homogeneity is explained by
acquiring that knowledge themselves. At the group the architecture model as convergent evolution,
level, we have already mentioned Granovetter’s similar to the evolutionary process that results in
(1973) account of communities’ differential ability sharks and dolphins having similar shapes. For
to fight off incorporation by a neighboring city, example, two nodes that are both central in the
thanks to having a network structure that facili- advice networks of their respective firms may
tated community-wide collaboration. come to have a similar distaste for the phone,

5605-Scott-Chap04.indd 48 4/13/2011 2:21:43 PM


NETWORK THEORY 49

because it so often brings more work. Similarly, in of nodes. For a nominalist, networks can be dis-
structural role theory, nodes are seen as similar if connected, and indeed the degree of connected-
they have ties to similar others, which is to say ness is just another property of networks that can
they have similar environments. be theorized about.
The adaptation mechanism has been used to In contrast, in the realist perspective (which is
explain similarity in attitudes (Erickson, 1988), often found in applied work), networks are defined
organizational behaviors (Galaskiewicz and Burt, as a set of interconnected nodes, which by defini-
1991; Haunschild and Miner, 1997; Galaskiewicz tion cannot be disconnected. A realist considers
and Wasserman, 1989), and organizational iso- multiple networks to mean multiple groups.
morphism (DiMaggio, 1986). Indeed, the realist conception of a network tends
to be a replacement for or variant of the concept of
sociological group. This is especially evident in
popular culture, where public entities that would
once have been named the “Preservation Society”
DISCUSSION or “Lexington Trade Association” would today be
called the “Preservation Network” and “Lexington
A frequent confusion about network research has Trade Network.” Similarly, we speak of terrorist
to do with where theory ends and methodology networks rather than terrorist organizations, and
begins. Network analysis is exemplary in the medical insurance companies identify doctors as
social sciences in basing its theorizing on a funda- either in- or out-of-network.
mental construct—the network—that is both emi- In academic work in the realist tradition, net-
cally meaningful and fully mathematical. Fitted work typically connotes a group that has more
with some fundamental processes, such as flows lateral than vertical ties, relies on social or infor-
of resources through paths, the network model is mal ties to achieve coordination, and consists of
extremely fertile in that it so easily generates dis- relatively empowered or autonomous members,
tinctive research questions—such as, how does it whether they are employees in a firm or organiza-
affect a node to be along the only path between tions in a so-called network organization.
two sets of others? A consequence of having these different views
Furthermore, the “mathematicity” of the is confusion about meaningful research questions.
network construct means that such research For example, although we have not discussed
questions are almost automatically expressible in theories of networks, a reasonable research ques-
terms of mathematical properties of the network tion for a realist is, “What conditions will cause a
(such as betweenness), and usually are. This network to emerge?” For the nominalist, this
makes research questions in the network field question is awkward because networks arise when
highly amenable to empirical, mathematical, you define them, even if they are empty of ties.
and simulation-based exploration. But it also It is not the network that emerges, but rather ties
generates an image problem because the same (or, more usefully, it is that properties of the
formula that defines the theoretical network network structure change over time). Similarly, a
property of, say, betweenness, also enables us meaningful methodological question for a realist
to measure it in an empirical dataset. Therefore, it is, “What are the best relations to ask about in
appears to be “just” methodology. Yet concepts a survey to tap into the network?” For a nominal-
like centrality are not only theoretical constructs, ist, each question corresponds to a different
they embody a basic model of how social network, and which question is asked depends on
systems work. the research question. But for the realist, an under-
Confusion also exists regarding what a network lying reality can be detected by well-chosen
is. In our view, at least two fundamental conceptu- questions, much like a psychometric scale.
alizations define networks: nominalist and realist Confusion also lies in the concept of a node
conceptualizations, echoing a well-known distinc- “belonging to multiple networks.” For a realist,
tion by Laumann, Marsden, and Prensky (1989) this really means that the node belongs to multiple
with regard to data collection. The concept of groups. For a nominalist, it is an odd concept—at
networks implicit in this chapter and in most aca- best it could mean that the node is not an isolate in
demic research has been the nominalist view, several different networks defined by different
which sees networks principally as models rather social relations.
than things “out there.” For a nominalist, a network A final confusion has to do with the multiple
is defined by choosing a tie, such as friendship, to levels of analysis possible in network research and
examine among a set of nodes. So when a nomi- how this relates to traditional micro/macro distinc-
nalist speaks of multiple networks, the nominalist tions. At the lowest level is the dyad. Research at
is considering different kinds of ties simultane- this level is concerned with whether one kind of tie
ously, such as a friendship network together with influences another. For example, in economic soci-
an advice network, both defined on the same set ology, a fundamental proposition is that economic

5605-Scott-Chap04.indd 49 4/13/2011 2:21:43 PM


50 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

transactions are embedded in social relationships system as a system of nodes interconnected by


(Granovetter, 1985). In knowledge management, paths (the backcloth), which carry information or
Borgatti and Cross (2003) suggested that in order other resources (the traffic). Theories based on the
for X to seek information from Y, certain rela- flow model define properties of the backcloth
tional conditions must be present. structure and relate these to flow outcomes, such as
At the next level is the node. This is the level frequency and time of arrival of something flowing
that receives the most attention in the literature, through the network, which are then related to
and it is readily accessible to researchers outside more general outcomes such as status attainment.
the network tradition. Most of the work reviewed The architecture model sees network ties as
in this chapter is at the node level, such as when creating structures of interdependency and
the number of structural holes a node possesses is coordination. Theories based on this model explain
related to the node’s performance. how the pattern of interconnections interacts
The highest level is the network as a whole.17 with contextual rules to generate outcomes such as
Theorizing at this level is concerned with the con- power.
sequences for the network of properties of the Drawing on Borgatti and Foster (2003), we
network’s internal structure. For example, note that network theorizing can be seen as
Johnson, Boster, and Palinkas (2003) argued that answering two basic types of research questions,
work teams with core/periphery structures would namely why some nodes or groups achieve more
have higher morale than teams divided into poten- (the social capital tradition), and why some nodes
tially warring factions. Thus, a property of net- or networks are more similar to each other (the
work structure, core/peripheriness, is related to a social homogeneity tradition). Combining this
network outcome—morale. The network level of distinction based on types of outcomes with the
analysis should not be confused with whether the distinction between the two explanatory models
nodes themselves consist of collectivities. For yields a four-cell cross-classification in which
example, suppose our nodes are firms, and we each cell corresponds to a different generic mech-
theorize that more central firms in an inter-firm anism for explaining outcomes (Figure 4.9): the
alliance network are more profitable. This is a capitalization mechanism is used to explain suc-
node-level analysis, not a network-level analysis. cess as a function of receiving useful flows
In contrast, if we theorize that the shape of the through the network; the coordination mechanism
alliance network in an industry affects the profit- explains success via virtually merging with others
ability of the industry as a whole (and we compare and preventing adversaries from coordinating
across several industries), this is a network-level with each other; the contagion mechanism explains
analysis. Similarly, a study of how the network observed similarity as a function of direct influ-
structure of top management teams affects their ence or diffusion; and the adaptation mechanism
performance is also a network-level study. explains similarity as resulting from adaptation to
similar social environments.
Our objective has been to analyze network
theory into theoretical building blocks that make it
CONCLUSION easier to create new theory as needed. We hope
this will help stem the flow of “cookie-cutter”
In this chapter, we have sought to explain network studies that copy the variables of classic studies
theory, and to do so in a way that would facilitate but miss the logic of how network properties
generating new theory. Our approach has been to generate outcomes.
analyze a few representative network theories and
extract from them generic mechanisms or modes of
explanation. In so doing, we found it convenient to
deconstruct network theories into “layers,” where NOTES
the deepest layer consists of a general model of
how things work. This is a model of a system, not Steve Borgatti is Chellgren Chair and Professor of
of any particular outcome. On top of that are the Management, sborgatti@uky.edu. Virginie Lopez-
theorems or propositions that we can derive from Kidwell is a doctoral candidate in Management,
the underlying model. The final layer is the inter- v.kidwell@uky.edu. Both authors are affiliated with
face layer, which connects the network constructs the LINKS Center for Network Research in Business
to the concepts of specific research domains. (http://www.linkscenter.org/), Dept. of Management,
We argue that two underlying models are in Gatton College of Business and Economics, at the
evidence in network theorizing, which we refer to University of Kentucky.
as the network flow model and the network archi- This chapter is based in part on a piece in Science
tecture model. The flow model views a social (Borgatti et al., 2009) and a piece in Organization

5605-Scott-Chap04.indd 50 4/13/2011 2:21:43 PM


NETWORK THEORY 51

Science (Borgatti and Halgin, forthcoming). The 11 However, this is not to imply particular motives
present authors are indebted to the coauthors of such as wanting to help, or being coerced into help-
those pieces as well as to Beth Becky, Travis Grosser, ing. Space limitations in this chapter prevent us from
and Brandon Ofem for their critical reviews of the discussing the micro-theory of these exchanges.
chapter. We would also like to thank Jackie Thompson 12 We don’t use the term “autocorrelation”
for her editorial assistance. This work was supported because it refers to a statistical condition rather than
by grant HDTRA1–08–1-0002-P00002 from the a social process.
Defense Threat Reduction Agency (DTRA). 13 As Borgatti and Foster (2003) pointed out,
1 In this terminology, a theory of endogenous modeling variance in outcome and homogeneity in
network evolution, in which both independent and attributes are logically two sides of the same coin but
dependent variables are network properties, would seem to constitute different literatures in the field.
be called a network theory of networks. A psycho- 14 This terminology varies slightly from Borgatti
logical theory of tie formation (e.g., homophily) et al.’s (2009) and Marin and Wellman’s in this
would be labeled a theory of networks, but not a volume. What was transmission in Borgatti et al. has
network theory of networks. been subdivided into capitalization and contagion
2 While Granovetter (1973: 1361) provides a here. Binding and exclusion in Borgatti et al. have
definition of strength of tie, it is useful to realize that been combined as coordination here. The mecha-
any definition of tie strength that preserves the first nism of adaptation is the same in both.
premise can be used (Freeman, 1979). 15 At the empirical level, much of this work is
3 More technically, a bridge is a tie between ego-centered, and therefore might seem to ignore
A and B, which, if removed, would leave a very long the network path structure that is at the heart of the
path (if any at all) connecting A to B. A bridge is a network flow model. However, in much of this work,
shortcut. the theoretical rationale is built on whole network
4 The second premise was “in the air” processes, as in the case of weak tie theory and
when Granovetter was writing. Rapoport and structural hole theory.
Horvath (1961), in particular, explored this concept in 16 We do not intend to imply that what is
depth. adopted is “bad.” Any attitude, behavior, or belief
5 Note that there is no claim that all weak ties can be diffused, whether it is positive, negative, or
are sources of novel information—just the ones that indifferent.
happen to be bridges. Granovetter’s point is simply 17 To simplify exposition, we have omitted the
that it is weak ties rather than strong ties that are intermediary level of the subgroup, which shares
more likely to be bridges. qualities with both the node and whole network
6 Original paper written in 1958 and well circu- levels.
lated for 20 years before publication in 1978 in the
inaugural issue of Social Networks.
7 Similarly, a well-connected node has many
opportunities to expose others to what it carries, REFERENCES
whether an idea or a disease.
8 Indeed, Borgatti (2005) showed that the well- Allen, T. (1977) Managing the Flow of Technology. Cambridge,
known formulas for closeness and betweenness MA: MIT Press.
centrality give the expected values of key network Argote, L. (1999) Organizational Learning: Creating, Retaining
outcomes (such as frequency and time of arrival) and Transferring Knowledge. Boston: Kluwer.
under specific models of flow. They are not generic Atkin, R.H. (1974) Mathematical Structure in Human Affairs.
measures or techniques such as regression, which London: Heinemann.
can be divorced from an underlying model of how Atkin, R.H. (1977) Combinatorial Connectives in Social
things work. Rather, they are rooted in specific net- Systems. Basel: Birkhauser.
work theories of how social systems work. Baldwin, T.T., Bedell, M.D. and Johnson, J.L. (1997) ‘The
9 It is useful to note that the two categories on social fabric of a team-based M.B.A. program: Network
the left make up relational phenomena that, while effects on student satisfaction and performance’. Academy
they exist, exist continuously, like states. The phenom- of Management Journal 40: 1369–97.
ena on the right tend to be transitory and discrete, as Bavelas, A. (1950) ‘Communication patterns in task-oriented
in events. groups’. Journal of the Acoustical Society of America
10 This is largely for convenience. For example, 22: 271–82.
it is time-consuming and therefore rare to track a Bonacich, P. (1972) ‘Factoring and weighing approaches to
specific bit of information as it moves through a status scores and clique identification’. Journal of Mathe-
gossip network. However, some settings lend them- matical Sociology 2: 113–20.
selves to observing flows, as in the movement of Bonacich, P. (1987) ‘Power and centrality: A family of
goods in the world economic trade network. measures’. American Journal of Sociology 92: 1170–82.

5605-Scott-Chap04.indd 51 4/13/2011 2:21:43 PM


52 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Borgatti, S.P. (1995) ‘Centrality and AIDS’. Connections 18, Coleman, J.S., Katz, E. and Menzel, H. (1966) Medical
112–14. Innovation: A Diffusion Study. Indianapolis: Bobbs-Merrill.
Borgatti, S.P. (2005) ‘Centrality and network flow’. Social Cook, K.S., Emerson, R.M., Gillmore, M.R. and Yamagishi, T.
Networks 27: 55–71. (1983) ‘The distribution of power in exchange networks:
Borgatti, S.P. and Cross, R. (2003) ‘A relational view of Theory and experimental results’. American Journal of
information seeking and learning in social networks’. Sociology 89: 275–305.
Management Science 49: 432–45. Davis, G.F. (1991) ‘Agents without principles? The spread of
Borgatti, S.P. and Everett, M.G. (1992a) ‘Graph colorings and the poison pill through the inter-corporate network’.
power in experimental exchange networks’. Social Administrative Science Quarterly 36: 583–613.
Networks 14: 287–308. Davis, J.A. (1967) ‘Clustering and structural balance in
Borgatti, S.P. and Everett, M.G. (1992b) ‘Notions of position graphs’. Human Relations 20: 181–87.
in social network analysis’. Sociological Methodology de Sola Pool, I. and Kochen, M. (1978) ‘Contacts and
22: 1–35. influence’. Social Networks 1: 5–51.
Borgatti, S.P. and Foster, P.C. (2003) ‘The network paradigm DiMaggio, P. (1986) ‘Structural analysis of organizational
in organizational research: A review and typology’. Journal fields: A blockmodel approach’. Research in Organizational
of Management 29: 991–1013. Behavior 8: 335–70.
Borgatti, S.P. and Halgin, D.S. (forthcoming) ‘Network DiMaggio, P.J. and Powell, W.W. (1983) ‘The iron cage
Theorizing’. Organization Science. revisited: Institutional isomorphism and collective
Borgatti, S.P., Mehra, A., Brass, D.J. and Labianca, G. (2009) rationality in organizational fields’. American Sociological
‘Network analysis in the social sciences’. Science 323: Review 48: 147–60.
892–95. Eisenhardt, K. (1989) ‘Agency theory: An assessment and
Bouty, I. (2000) ‘Interpersonal and interaction influences on review’. Academy of Management Review 1: 57–74.
informal resource exchanges between R&D researchers Erickson, B. (1988) ‘The relational basis of attitudes’. In
across organizational boundaries’. Academy of Manage- B. Wellman and S. Berkowitz (eds.), Social Structures:
ment Journal 43: 50–65. A Network Approach, pp. 99–121. New York: Cambridge
Boxman, E.A.W., De Graaf, P.M. and Flap, H.D. (1991) University Press.
‘The impact of social and human capital on the income Freeman, L.C. (1977) ‘A set of measures of centrality based on
attainment of Dutch managers’. Social Networks 13: betweenness’. Sociometry 40: 35–41.
51–73. Freeman, L.C. (1979) ‘Centrality in social networks: Conceptual
Brass, D.J. (1984) ‘Being in the right place: A structural analy- clarification’. Social Networks 1: 215–39.
sis of individual influence in an organization’. Administrative Friedkin, N.E. and Johnsen, E.C. (1999) ‘Social influence and
Science Quarterly 29: 518–39. opinions’. Journal of Mathematical Sociology 15: 193–205.
Brass, D.J. and Krackhardt, D. (1999) ‘The social capital of Galaskiewicz, J. and Burt, R.S. (1991) ‘Interorganization
21st century leaders’. In J.G. Hunt, and R.L. Phillips (eds.), contagion in corporate philanthropy’. Administrative
Out-of-the-Box Leadership, pp. 179–94. Stamford, CT: JAI Science Quarterly 36: 88–105.
Press. Galaskiewicz, J. and Wasserman, S. (1989) ‘Mimetic and
Burt, R.S. (1976) ‘Positions in networks’. Social Forces 55: normative processes within an interorganizational field:
93–122. An empirical test’. Administrative Science Quarterly 34:
Burt, R.S. (1992) Structural Holes: The Social Structure of 454–79.
Competition. Cambridge, MA: Harvard University Press. Geletkanycz, M.A. and Hambrick, D.C. (1997) ‘The external
Burt, R.S. (1997) ‘The contingent value of social capital’. ties of top executives: Implications for strategic choice and
Administrative Science Quarterly 42: 339–65. performance’. Administrative Science Quarterly 42: 654–81.
Burt, R.S. (2002) ‘Bridge decay’. Social Networks 24: 333–63. Granovetter, M. (1973) ‘The strength of weak ties’. American
Burt, R.S. (2004) ‘Structural holes and good ideas’. American Journal of Sociology 78: 1360–80.
Journal of Sociology 110: 349–99. Granovetter, M. (1974) Getting a Job: A Study of Contacts and
Burt, R.S. (2005) Brokerage and Closure: An Introduction to Careers. Cambridge, MA: Harvard University Press.
Social Capital. Oxford: Oxford University Press. Granovetter, M. (1985) ‘Economic action and social structure:
Cartwright, D. and Harary, F. (1956) ‘Structural balance: The problem of embeddedness’. American Journal of
A generalization of Heider’s theory’. Psychological Review Sociology 91: 481–510.
63: 277–93. Harrison, R.J. and Carroll, G.R. (2002) ‘The dynamics of cul-
Christakis, N.A., and Fowler, J.H. (2008) ‘The collective tural influence networks’. Computational and Mathematical
dynamics of smoking in a large social network’. New Organization Theory 8: 5–30.
England Journal of Medicine 358: 2249–58. Haunschild, P.R. and Miner, A.S. (1997) ‘Modes of interor-
Cohen, S., Doyle, W.J., Skoner, D.P., Rabin, B.S. and ganizational imitation: The effects of outcome salience and
Gwaltney, J.M. (1997) ‘Social ties and susceptibility to the uncertainty’. Administrative Science Quarterly 42: 472–500.
common cold’. Journal of the American Medical Association Heider, F. (1958) The Psychology of Interpersonal Relations.
277: 1940–44. New York: Wiley.
Coleman, J.S. (1988) ‘Social capital in the creation of human Hollingshead, A.B. (1998) ‘Distributed knowledge and trans-
capital’. American Journal of Sociology 94: S95–S120. active processes in groups’. In M.A. Neale, E.A. Mannix,

5605-Scott-Chap04.indd 52 4/13/2011 2:21:43 PM


NETWORK THEORY 53

and D.H. Gruenfeld (eds.), Research on Managing Groups Miles, R.E. and Snow, C.C. (1986) ‘Network organizations,
and Teams, 1: 103–23. Greenwich, CT: JAI Press. new concepts for new forms’. California Management
Johnson, J.C., Boster, J.S. and Palinkas, L.A. (2003) Review 28: 62–73.
‘Social roles and the evolution of networks in extreme Milgram, S. (1967) ‘The small-world problem’. Psychology
and isolated environments’. Journal of Mathematical Today 1: 62–67.
Sociology 27: 89–121. Molina, J.L. (1995) ‘Analysis of networks and organizational
Jones, C., Hesterly, W.S. and Borgatti, S.P. (1997) ‘A general culture: A methodological proposal’. Revista Española de
theory of network governance: Exchange conditions Investigaciones Sociológicas 71: 249–63.
and social mechanisms’. Academy of Management Journal Moreland, R.L. (1999) ‘Transactive memory: Learning
22: 911–45. who knows what in work groups and organizations’. In
Kilduff, M. (1990) ‘The interpersonal structure of decision L. Thompson, D. Messick and J. Levine (eds.), Sharing
making: A social comparison approach to organizational Knowledge in Organizations, pp. 3–33. Hillsdale, NJ:
choice’. Organizational Behavior and Human Decision Erlbaum.
Processes 47: 270–88. Morris, M. (1993) ‘Epidemiology and social networks’.
Kilduff, M. and Krackhardt, D. (1994) ‘Bringing the individual Sociological Methods and Research 22: 99–126.
back in: A structural analysis of the internal market for Newcomb, T.M. (1961) The Acquaintance Process. New York:
reputation in organizations’. Academy of Management Holt, Rinehart and Winston.
Journal 37: 87–108. Pastor, J.-C., Meindl, J.R. and Mayo, M.C. (2002) ‘A network
Kiuru, N., Nurmi, J.E., Aunola, K. and Salmela-Aro, K. (2009) effects model of charisma attributions’. Academy of
‘Peer group homogeneity in adolescents’ school Management Journal 45: 410–20.
adjustment varies according to peer group type and Perry-Smith, J.E. and Shalley, C.E. (2003) ‘The social side of
gender’. International Journal of Behavioral Development creativity: A static and dynamic social network perspective’.
33: 65–76. Academy of Management Review 28: 89–107.
Laumann, E.O., Marsden, P.V. and Prensky, D. (1989) ‘The Powell, W.W. (1990) ‘Neither market nor hierarchy:
boundary specification problems in network analysis’. In Network forms of organization’. Research on Organizational
L.C. Freeman, D.R. White and A.K. Romney (eds.), Research Behavior 12: 295–336.
Methods in Social Network Analysis, pp. 61–87. Fairfax, Rapoport, A. and Horvath, W. (1961) ‘A study of a large
VA: George Mason University Press. sociogram’. Behavioral Science 6: 79–91.
Lazarsfeld, P. and Merton, R.K. (1954) ‘Friendship as social Reagans, R.E. and Zuckerman, E.W. (2008) ‘Why
process: A substantive and methodological analysis’. In knowledge does not equal power: The network
M. Berger, T. Abel, and C. Page (eds.), Freedom and redundancy trade-off’. Industrial and Corporate Change
Control in Modern Society, pp. 18–66. New York: Octagon 17: 903–44.
Books. Rees, R. (1985) ‘The theory of principal and agent—part I’.
Leavitt, H. (1951) ‘Some effects of certain communication Bulletin of Economic Research 37: 3–26.
patterns on group performance’. Journal of Abnormal and Renzulli, L.A., Aldrich, H. and Moody, J. (2000) ‘Family
Social Psychology 46: 38–50. matters: Gender, networks, and entrepreneurial outcomes’.
Lin, N. (1982) ‘Social resources and instrumental action’. In Social Forces 79: 523–46.
P. Marsden and N. Lin (eds.), Social Structure and Network Roethlisberger, F. and Dickson, W. (1939) Management
Analysis, pp. 131–45. Beverly Hills, CA: Sage. and the Worker. Cambridge: Cambridge University
Lin, N. (1999a) ‘Social networks and status attainment’. Press.
Annual Review of Sociology 25: 467–87. Rulke, D.L. and Galaskiewicz, J. (2000) ‘Distribution of knowl-
Lin, N. (1999b) ‘Building a network theory of social capital’. edge, group network structure, and group performance’.
Connections 22: 28–51. Management Science 46: 612–26.
Lorrain, F. and White, H.C. (1971) ‘Structural equivalence of Ryall, M.D. and Sorenson, O. (2007) ‘Brokers and competitive
individuals in social networks’. Journal of Mathematical advantage’. Management Science 53: 566–83.
Sociology 1: 49–80. Sanders, K. and Hoekstra, S.K. (1998) ‘Informal networks and
Markovsky, B., Willer, D. and Patton, T. (1988) ‘Power absenteeism within an organization’. Computational and
relations in exchange networks’. American Sociological Mathematical Organization Theory 4: 149–63.
Review 53: 220–36. Seibert, S.E., Kraimer, M.L. and Liden, R.C. (2001) ‘A social
Mayhew, B.H. (1980) ‘Structuralism versus individualism: capital theory of career success’. Academy of Management
Part 1, Shadowboxing in the dark’. Social Forces 59: Journal 44: 219–47.
335–75. Snijders, T.A.B. (1999) ‘Prologue to the measurement of social
McPherson, J.M., Smith-Lovin, L. and Cook, J.M. (2001) capital’. The Tocqueville Review 20: 27–44.
‘Birds of a feather: Homophily in social networks’. Annual Snow, C.C., Miles, R.E. and Coleman, H.J. (1992) ‘Managing
Review of Sociology 27: 415–44. 21st century organizations’. Organizational Dynamics
Mehra, A., Kilduff, M. and Brass, D.J. (2001) ‘The social 20: 5–20.
networks of high and low self-monitors: Implications for Sparrowe, R.T. and Liden, R.C. (1997) ‘Process and structure
workplace performance’. Administrative Science Quarterly in leader-member exchange’. Academy of Management
46: 121–46. Review 22: 522–52.

5605-Scott-Chap04.indd 53 4/13/2011 2:21:43 PM


54 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Thompson, J.D. (1967) Organizations in Action. New York: Wellman, B. and Wortley, S. (1990) ‘Different strokes from
McGraw-Hill. different folks’. American Journal of Sociology 96: 558–88.
Travers, J. and Milgram, S. (1969) ‘An experimental study of White, H.C., Boorman, S.A. and Breiger, R.L. (1976)
the “small-world” problem’. Sociometry 32: 425–43. ‘Social structure from multiple networks: I. Blockmodels of
Watts, D.J. and Strogatz, S.H. (1998) ‘Collective dynamics of roles and positions’. American Journal of Sociology
“small-world” networks’. Nature 393: 409–10. 81: 730–80.

5605-Scott-Chap04.indd 54 4/13/2011 2:21:43 PM


15
Social Physics and
Social Networks
John Scott

Social network analysis has made rapid strides social physicists at face value. Those sociologists
since the 1960s as ever larger numbers of sociolo- who have been working in social network analy-
gists, and other social scientists, have built and sis, however, have been rather less welcoming.
applied the methodological techniques necessary While recognising that a number of important
to explore the relational phenomena reported in insights and theoretical advances have been made
the various chapters of this Handbook. The ability by the social physicists, they have been dismayed
to describe structural phenomena has advanced by the almost total ignorance shown concerning
considerably beyond the ideas inherited by the the vast amount of prior work in social network
researchers of the 1970s. One of the most striking analysis. The social physicists have moved into
developments in recent years, however, has been sociology in the role of the civilised colonisers of
the massive growth of interest in social network virgin, barbarian territory. Not unnaturally, they
analysis by researchers working in physics. have encountered resistance from the native inhab-
Because of an apparent decline in the number of itants, who justifiably feel that their achievements
soluble theoretical problems that are left to resolve have been disparaged and that they are being dis-
in their own discipline, a growing number of theo- possessed from the field that they have made their
retical physicists have begun to explore the impli- own. So great is the concern, that some network
cations of some of their mathematical ideas for the specialists would reject the new social physics out
explanation of social and economic phenomena. of hand.
Many of these theorists have made great claims This chapter will present an intellectual assess-
for the novelty of what they are doing and for the ment of the work of the advocates of the new
explanatory power of their proposed models. The social physics and it will demonstrate the failure
most striking feature of their work, however, is of this new work to engage with existing socio-
that they present their arguments as novel and logical work. I want also to recognise, however,
distinctive advances from a zero starting point. that there is a long and important history of social
They know little or nothing of sociological work physics within sociology. Earlier generations of
that preceded them, and they present themselves physicists have provided models of analysis that
as initiating a scientific revolution in sociological have been developed through an intellectual
analysis. engagement with social scientists. This history
This has not prevented outside commentators, and the debates that constitute it are generally
ignorant of sociological work, from being strongly unknown to the present-day proponents of social
attracted to these social physics publications in physics. I aim to show the failures in its historiog-
large numbers. Its innovations have been lauded in raphy and the rather arrogant and dismissive
numerous glowing reviews of books in the press stance towards the social sciences of the new
and on the Internet. More worrying is the fact that social physicists, but also to recognise the contri-
many sociologists unacquainted with social net- butions that it can make to the development of
work analysis have also accepted the claims of the social network analysis.

5605-Scott-Chap05.indd 55 4/19/2011 10:10:00 AM


56 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

This basic idea was used to explore migration and


SOCIOLOGY, SOCIAL PHYSICS AND urbanism and to explain conquest and the forma-
SOCIAL NETWORKS tion of markets and trading monopolies.
One of the most important theorists to develop
As is fairly well known, Comte’s first choice of this approach was Friedrich Engels (1876, 1886),
name for the new discipline of sociology was, in who paradoxically came to his own position
fact, ‘social physics’. In proposing this name he through a critical engagement with the work of
was establishing the idea that the discipline should Dühring. Engels employed the idea of the paral-
focus on the systemic organisation of social life lelogram of forces and its equilibrium conditions
and that specific scientific methods were required to establish social physics as a central feature in
if these systemic properties were to be properly orthodox Marxism. This general idea has also had
explored. While some of the early sociologists a great deal of influence in recent Marxism (see,
pursued their work through using an organic for example, Althusser, 1962, 1963).
model of systems, an approach that gave rise to The most important development within the
various forms of ‘functionalism’, others borrowed social physics approach was its incorporation of
directly from classical physics and pursued more advanced physical ideas that began to appear
mechanical models of social systems. In drawing from the late nineteenth century. The innovations
explicitly from physics, and later from chemistry, made by James Clerk Maxwell (1865, 1877) were
sociologists held that societies could be seen as taken up as social physics by Georg Helm (1887)
systems of forces and energies that could be ana- and Wilhelm Ostwald (1909) in Germany, Ernst
lysed in terms of their specific equilibrium condi- Solvay (1904) in Belgium and Nelson Sims
tions. The first attempt to construct a social (1924) in the United States. Their key innovation
physics in these terms was that of the Belgian was to see labour and other types of social activity
statistician Adolphe Quetelet (1848). His attempt not simply as examples of ‘force’ but as embodi-
was remarkably successful. Indeed, its success ments of the ‘energy’ that flows around a system
appeared to undermine the novelty of Comte’s and can be both expended and accumulated.
own work and led him to abandon his original Referring to their theoretical standpoint as ‘ener-
preference for the term ‘social physics’ and to getics’, these theorists held that social systems
advocate, instead, the neologism ‘sociology’ in its could be seen as energy fields. These field theories
place. Quetelet sought to discover the laws of began to influence mainstream social theory
association between statistically defined social during the 1930s through the efforts of Lawrence
facts. The interdependence of social facts, he Henderson (1935, 1938–42), who was popularis-
argued, could be studied through the systems of ing the equilibrium theories of Pareto (1916).
equations that define these laws. Henderson’s influence was especially apparent in
This basic insight was elaborated in economics the emerging system theories of Parsons (1945)
and in social demography by those who applied and the more practical system concepts of George
concepts of ‘force’ and ‘gravity’ in their studies of Lundberg (1939) and George Homans (1951; also
the social world. Friedrich List and Herman see Homans and Curtis, 1934). This sociological
Gossen were early pioneers in this area and their work was closely associated with marginalist eco-
ideas were taken up by Eugen Dühring in Germany nomics and inspired more general applications of
and Henry Carey (1858–59, 1872) in the United rational choice theories to social interaction.
States. For these writers, labour activity was the These theoretical advances had a crucial influ-
human form of physical force or effort. The social ence on the early development of social network
interaction of individuals could, therefore, be analysis. Kurt Lewin (1936) combined Maxwell’s
understood as the resultant of the forces that are field theories with ideas from Gestalt psychology
inherent in the motions of individuals acting under in his concept of the ‘psychic field’, a concept
the influence of ‘gravitational’ forces of attraction. designating the system of energising forces or
These forces push and pull individuals, whose motives at work in the human mind. Equilibrium
movements can, therefore, be analysed in terms of is established in a psychic field through the proc-
the ‘distance’ moved in space and time and the esses that were later explored by Fritz Heider
‘mass’ produced by the total volume and density (1958) and Leon Festinger (1957) as processes of
of activity. This led to the view that the circulation cognitive ‘balance’. Lewin extended the idea of
of forces in a social system creates the equilibrium the psychic field to a sociological idea of the
conditions that shape individual actions. Thus, it social field. This was understood as a system of
was held that large social aggregates, which have interpersonal forces, such as pressure, influence
a greater mass than smaller ones, can exert a and constraint, which are at work within social
strong attractive pull on individuals and so can groups. These ideas echoed and systematised
generate tendencies towards the concentration of the formal sociology of Georg Simmel (1908),
individuals in the emerging centres of population. Alfred Vierkandt (1923) and Leopold von Wiese

5605-Scott-Chap05.indd 56 4/19/2011 10:10:00 AM


SOCIAL PHYSICS AND SOCIAL NETWORKS 57

(1924–29; and see Wiese-Becker 1932), who all into networks have investigated the ‘macro com-
used concepts of attraction and repulsion in social plexity’ of real networks as an outcome of the
situations to model the networks of social rela- random links among their individual elements.
tions built through interactions. This complex of Apart from this work, Barabási holds, there has
arguments was reflected in the sociometric con- been little work in the biological and human sci-
cerns of Jacob Moreno (1934) and eventually led ences that has been at all concerned with studying
to the emergence of a ‘group dynamics’ perspec- networks of relations and their properties. He does
tive on small-scale networks (Cartwright and note the existence of some empirical work on
Zander, 1953). In parallel with this, Homans ‘small worlds’ from the 1960s, and he makes
(1951) applied his system ideas in a reinterpreta- some brief allusions to the growth of interest in
tion of empirical work on social networks that he social networks that began at Harvard in the late
used to develop a more general rational choice 1960s and culminated in Granovetter’s (1974)
model (Homans, 1961). work on the strength of weak ties, but he sees
The roots of contemporary social network anal- nothing beyond this. Small-world and weak-tie
ysis are to be found in these emerging ideas. research, he argues, focused on clustering rather
Through the 1940s and into the 1950s and 1960s, than randomness and added something important
social network analysts used concepts of distance, to the basic model of Erdös and Renyi, but he
density, spatial direction, valence and balance in rather strangely observes that these advances ‘did
their studies, and their use of these as their central not come from sociology or graph theory’
concepts demonstrated the extent of their debt to (Barabási, 2002: 44): until the 1990s there simply
the earlier social physics. With the growth of social was no network analysis – and certainly no social
network analysis, the approach drew more exten- network analysis – worth speaking of.
sively on the sociological concepts of systems, In the introduction to an anthology produced by
fields and spaces that had developed from the wider the leading social physicists (Newman et al.,
system theories of the 1930s that had, like Homans’s 2006) there is a rather more rounded recognition
arguments, been influenced by the Pareto circle. of prior achievements in network analysis. A ‘brief
Central to this work was the use of multidimen- history’ of the study of networks suggests that this
sional scaling and similar methods for embedding history begins in mathematics and ‘more recently’
relational networks in social space (see, for exam- in sociology, also stating that ‘Nowhere . . . has
ple, Laumann, 1966; Laumann and Pappi, 1976). graph theory found a more welcome home than
in sociology’ (Newman et al., 2006: 3). Despite
recognising a growing interest in networks by
sociologists from the 1950s, however, no citations
THE NEW SOCIAL PHYSICS are given to this work and three textbooks from
the 1990s (Scott, 1991; Wasserman and Faust,
This is the historical context from which I think we 1994; Degenne and Forsé, 1994) are the only indi-
can best approach the recent emergence of a new cation of any familiarity with the literature.
social physics. The new social physics, however, Barabási’s strongest and most influential
has been constituted by those who lack any aware- claim – often repeated by other commentators – is
ness that there is a pre-existing research specialisa- that it was not until 1998 that a significant break-
tion of social network analysis and that physicists through occurred in a paper by Duncan Watts and
made a number of the early contributions to its Steven Strogatz (1998). The key innovation in this
development. The leading theorists of the new paper, he held, was that it saw the most efficient
social physics have been Albert-Lázló Barabási networks as combining features of both random-
(2002), Mark Buchanan (2002), Duncan Watts ness and clustering. This paper was, he claims, ‘the
(1999, 2003) and Mark Newman (Newman et al., first serious challenge to the view that real
2006). Their works are connected with wider, networks are fundamentally random’ (Barabási,
and slightly older, theories of complexity and 2002: 51) and it generated a mass of new work
emergence in physical systems (Lewin, 1992; among mathematicians and physicists, who were
Buchanan, 2000; Strogatz, 2003; Ball, 2004). keen to take up its revolutionary implications. The
Barabási has received the greatest attention and paper was described by Mark Buchanan, a mathe-
has been the most strident in his views on social matician and science journalist, as ‘unprecedented’
network analysis. Barabási’s approach to net- (2002: 13) and as alluding to ‘some deep organiza-
works relies almost exclusively on the mathemati- tional principles of our world’ (2002: 15) that had
cal theory of graphs, the true significance of hitherto been unrecognised by social scientists.
which he sees as beginning with the 1959 work Sociologists, in particular, wrongly assumed
of Erdös and Renyi on random graph models. that ‘society’ is formed through the random accu-
His claim is that this was pioneering work that mulation of social relationships (Barabási, 2002:
defined the field and that subsequent researchers 62, 64). The mathematical discoveries of Watts and

5605-Scott-Chap05.indd 57 4/19/2011 10:10:01 AM


58 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Strogatz, Barabási held, had highlighted phenom- Unintended and unplanned consequences are not
ena that are ‘unprecedented and unexpected in the the same as random consequences. The structuring
context of networks’ (Barabási, 2002: 77). They of social life is apparent to most participants on a
had showed ‘a new and unsuspected order within practical level, and it is difficult to understand what
networks’ that ‘lifted complex networks out of the kind of life Barabási may have been leading if he
jungle of randomness’ (Barabási, 2002: 77). believes that, prior to 1998, all real networks were
Buchanan claimed that research by ‘mathemati- assumed to be formed as random processes.1
cians, physicists and computer scientists’, had Despite these deep reservations about the
begun to show that social and all other networks central claim to originality made in the new social
have certain common properties. This led Buchanan physics, it is important to see what positive discov-
to make the extremely strong claim that ‘for the eries they felt they had established about network
first time in history, scientists are beginning to structure. Barabási argued that previous research-
learn how to talk meaningfully about the architec- ers had been wrong to assume that networks are
ture of networks’ (2002: 19). always formed through the concatenation of
The discovery by scientists that complex net- random links. Rather, networks tend to be organ-
works are orderly ‘represented a serious deviation ised around key brokers or intermediaries who tie
from everything then [1998] known about net- other, less well-connected points into the network.
works’ (Barabási, 2002: 71, 221). The properties Networks, therefore, are organised around ‘hubs’
of real networks, including all social networks, or ‘connectors’, understood as ‘nodes with an
have to be seen as expressions of ‘strict mathemat- anomalously large number of links’ (Barabási,
ical laws’ (Barabási, 2002: 64). There are ‘funda- 2002: 56). It is for this reason, Barabási held, that
mental laws forcing different networks to take up the distribution of links in a network does not
the same universal form and shape’ (Barabási, follow a normal distribution. There is, instead, a
2002: 78). The reason why complex systems of ‘power law’ distribution. As in the well-known
all kinds have similar characteristics is that there Pareto curve of income distribution, the majority of
are necessary and therefore universal structural points have very few connections, while a small
features in all real networks. Barabási saw his task minority have extremely large numbers of connec-
as the uncovering of these laws. tions. As there is no meaningful mean figure of
It has to be said immediately that no sociolo- connections, the whole distribution is seen as
gists, to the best of my knowledge, have ever ‘scale-free’ (see Figure 5.1). Barabási claims that
thought that complex social networks are purely this methodological research ‘gave legitimacy to
random phenomena. While some have made ana- hubs’ as the pivotal points in networks and it high-
lytical use of models of random networks, it is a lighted the need to make them a topic of further
central, defining idea in sociology that social life is research (2002: 71).
to be seen as structured. Social life is organised In an illuminating insight into his research
and patterned by purposive actions that have unin- process he states that he came up with a first
tended, but far from random, consequences. ‘simple and straightforward’ mechanism for the

140

120

100
Number of points

80

60

40

20

0
0 1 2 3 3 4 5 6
Number of links per point

Figure 5.1 A Scale Free Distribution (Artificial Data)

5605-Scott-Chap05.indd 58 4/19/2011 10:10:01 AM


SOCIAL PHYSICS AND SOCIAL NETWORKS 59

power law during a 15-minute walk between con- formulate his most striking conclusion: ‘We have
ference rooms and he wrote this up on a five-hour learned that a sparse network of a few powerful
flight back from the conference. The resulting directors controls all major appointments in
paper was summarily rejected by Science without Fortune 1000 companies’ (2002: 200, 204).
even being sent for peer review: it was, the editor Yet economic sociologists would regard this
said, neither novel nor of wide interest (Barabási, conclusion as commonplace. The ‘discovery’
2002: 81). He succeeded in getting the paper pub- would certainly not have surprised Rudolf
lished only because he telephoned the editor and Hilferding a century ago. Hilferding demonstrated
complained about the decision. Barabási did not, exactly this phenomenon in 1910, and in some
it seems, consider for one moment that the editor detail, as a central element in his analysis of
may have been correct in the assessment of the German finance capital (Hilferding, 1910). Nor
paper. As I will show, there are, in fact, good rea- would it have surprised John Hobson, who had
sons for thinking that the editor was correct when published his report on economic concentration
making this original decision. and interlocking directorships just a few years
The basic mathematical law at work in a power earlier (Hobson, 1906). Congressional hearings
law or scale-free distribution, Barabási argued, is into the Money Trust in the United States pro-
simply the law that ‘the rich get richer’. Put duced the report of the Pujo Committee (1913),
simply, this is the principle that to he who hath which came to precisely the same conclusion.
shall be given, that is, the famous ‘Matthew These findings were repeated for economy after
Effect’ formulated by sociologist Robert Merton economy and generated a long-standing research
(1968), though Barabási was not aware of Merton’s tradition that constantly updated its results.
work. Barabási describes this as the principle of However, despite these well-known predecessors,
‘preferential attachment’, according to which Barabási presented his findings as a new and sig-
well-connected points tend to become even better nificant discovery about corporate networks.
connected over time. Thus, successful people who Barabási sees economic concentration as pro-
become more prominent over the course of their ceeding hand in hand with the formation of ‘hubs’
careers will accumulate business and professional of economic power. He holds that in 1999 ‘the
connections exponentially, while those who fail to Web was the only network mathematically proven
build connections will tend to remain uncon- to have hubs’ (2002: 79), but by 2001 this had all
nected. Colleagues apparently developed this into changed. Barabási reported a new study that
the idea that the ‘fittest’ will attract and accumu- showed the distribution of directorships and com-
late connections. One colleague, he reports, came pany connections to follow a scale-free pattern
up with a striking extension to this law that stated that is associated with the formation of hubs and
that ‘actors stop acquiring links after retirement’ the clustering of companies around these hubs.
(Barabási, 2002: 89). As a statement of the com- This again displays a massive ignorance of eco-
monplace, this was, perhaps not such a striking nomic sociology and the results – conceptual and
conclusion after all. empirical – of investigations into corporate net-
works. Studies of interlocking directorships had
long ago demonstrated both the phenomenon and
the word ‘hub’. More than 20 years earlier, Warner
and Unwalla (1967) had shown in 1967 that the
THE POWER LAW IN American corporate network could be seen as a
ECONOMIC SOCIOLOGY huge national ‘wheel’ with a New York hub. Less
than 10 years later, Jim Bearden and his colleagues
The novelty and potentiality of the new social (1975) documented the centrality of banks in cor-
physics can, perhaps, best be assessed in relation porate networks and employed a variety of meas-
to the area that Barabási has highlighted as the one ures of centrality. Their work was elaborated in
in which it seeks to have the greatest impact. This that of Mintz and Schwartz (1985), who explicitly
area is economic sociology. He has claimed that it used the language of hubs and peaks to describe
is only since the appearance of his own work that the patterns of centrality in their data. Clustering,
researchers have started to look at business net- too, was recognised as early as the U.S. National
works. He holds that economists – he does not Resources Committee’s investigations during the
even mention sociologists – have studied the 1930s (Means et al., 1939). The committee’s
economy only as a collection of anonymous and report demonstrated the existence of financial
impersonal markets. However, ‘Motivated by the ‘interest groups’ of interlocked companies and
renaissance of networks in physics and mathemat- established a long line of research into what later
ics’ researchers have, since 1999, begun to see the writers called ‘spheres of influence’. In the face of
economy as a complex network of companies all this research, Barabási still felt able to claim
that are linked to each other by financial ties. This that, prior to 1999, ‘social network models did not
supposed conceptual innovation led Barabási to support the existence of hubs’ (2002: 130).

5605-Scott-Chap05.indd 59 4/19/2011 10:10:01 AM


60 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

100
90
80 1904-5
70 1920-21
No. of people

60 1937-8
50 1955-6
40 1973-4
30
20
10
0
2 3 4 5 6 7 8 9 10 11
No. of directorships per person

Figure 5.2 Directorships: Scotland, 1904–74

In fact, the phenomenon of the corporate hub Scotland from 1904 to 1974. Charting the number
was widely recognised and explored in sociologi- of directorships in these companies held by each
cal research. Combined with an explicit recogni- director, it shows a clear scale-free pattern. For
tion of the existence of hubs in corporate networks each of the five periods studied, the number of
was an almost universal recognition that the distri- directorships per person fell rapidly to the point at
bution of degrees in a network follows a scale-free which hubs – multiple directors with five or more
pattern. It is certainly the case that the terminol- directorships – appear. Similar data for Britain as
ogy of the scale-free distribution or power law a whole are shown in Figure 5.3. In this case,
was not used, but standard frequency distribution directorships in the top 250 companies were ana-
tables were used precisely in order to display this lysed with strikingly similar results. The British
pattern. The evidence was abundant, with support- research formed part of the largest international
ing data from studies dating back to at least the research project in this area. Using data on the top
1930s. Some examples of this work are shown in 250 companies for 1976 in 10 different countries,
Figures 5.2 to 5.5. the project showed a series of comparative
Figure 5.2, taken from research published in measures of network structure. Figure 5.4 shows
1980, shows data for the top 100 companies in that each country showed precisely the same

250

200
No. of people

150
1904
100 1938
1976
50

0
2 3 4 5 6 7
No. of directorships per person

Figure 5.3 Directorships: Britain 1904–76

5605-Scott-Chap05.indd 60 4/19/2011 10:10:01 AM


SOCIAL PHYSICS AND SOCIAL NETWORKS 61

80 Austria
Belgium
% of all directorships
70
60 Switzerland
50 Germany
40 France
30
Britain
20
Italy
10
0 Netherlands
Finland

10

+
2

11
United States

to
6
No. of directorships

Figure 5.4 Multiple Directorships: Global 1976

scale-free pattern. Figure 5.5 again looks at his- Granovetter’s work in studies undertaken by
torical data, this time for the United States, and Granovetter’s Harvard associates during the 1970s
also shows the scale-free distribution. and after: work by Michael Schwartz and his col-
Barabási was unaware of the research reported leagues (see, for example, Mintz and Schwartz,
in Figures 5.2 to 5.5. Nor was he aware of many 1985; Mizruchi, 1982; Mizruchi and Schwartz,
similar studies. This failure to appreciate the long- 1987), by Barry Wellman (Wellman and Berkowitz,
standing traditions of research was responsible for 1988), and, of course, those by Harrison White
his belief that he had made startlingly new discov- and his students and colleagues (White, 1992).
eries and that he was the first to recognise the Indeed, Granovetter was himself a student and
existence of scale-free distributions in social net- colleague of White and learned a great deal from
works. Not all of the new social physicists were so White’s own work on networks that was under-
ignorant of earlier research, though few were taken earlier in the 1960s (White, 1963).
aware of its full extent. Buchanan knew of the Why is there such ignorance of relevant socio-
importance of Mark Granovetter’s classic study, logical work among the new social physicists? It
which he discusses at some length. Yet he remark- is, perhaps, an unstated assumption that sociolo-
ably claims that ‘For nearly 30 years, his simple gists – not being ‘real’ scientists – cannot be
but striking insights . . . remained virtually unno- expected to know how to study the social world
ticed by other scientists’ (Buchanan, 2002: 47). scientifically. For this reason, it would seem, they
This is a truly astonishing statement to make felt that there was simply no point in looking for
about one of the most cited works in the history of any sociological work, as nothing worthwhile
sociology. Buchanan seems, in particular, to could have been undertaken. If sociologists are
have completely missed the extensive use of barely safe enough to be let out on their own,

3000 1899
2500 1905
1912
No. of people

2000
1919
1500
1935
1000 1964
500 1969
1974
0
1 2 to 5 6+
No. of directorships per person

Figure 5.5 Directorships: United States 1899–1974

5605-Scott-Chap05.indd 61 4/19/2011 10:10:01 AM


62 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

without the guidance of a real scientist to tell them studies in social network analysis. He makes a
what they ought to be doing, there is no reason to brief nod towards an introductory textbook on
expect them to have undertaken important work methods (Scott, 2000), but he makes no mention
independently. of any of the substantive studies that have looked
However, poor research skills must also be at precisely the issues that he sees as being so
recognised as responsible for Barabási’s igno- important.
rance. He has given some indication of how he
came to miss the existing sociological research.
Having completed his PhD, and with nothing
better to do, he read ‘a general audience book on
computer science’ and came to realise ‘how little PROMISE AND POTENTIAL IN
was known about networks in general’ (2002: 219). THE NEW SOCIAL PHYSICS
This was why he began to study the random net-
work models of Erdös. But he did not take the The new social physics, then, has developed
crucial first step of undertaking a systematic bib- largely in ignorance of the achievements made by
liographical investigation. He did not undertake sociologists working in social network analysis
the basic literature review that any neophyte PhD and of the contributions made by earlier genera-
candidate in sociology would undertake. Barabási tions of social physicists. The much-trumpeted
knew where his university library was, as he had innovations that lie at the heart of their ‘revolu-
borrowed his computer book from it, but he did tion’ – the power law and hubs – are the well-
not seem to have used the library or its catalogues known and well-established findings of social
to try to discover what work might already have network analysts. Does this mean that we are deal-
been carried out. Perhaps this bibliographical fail- ing simply with a case of the emperor’s new
ing was why the editor of Science had rejected his clothes: is there nothing substantial in the new
initial paper so rapidly because of its lack of social physics? I think it would be a mistake to
originality. Barabási discovered nothing on social conclude this. Behind the hype and misplaced
network analysis except the text by Wasserman enthusiasm there are some important ideas that do
and Faust (1994) – though he shows no sign of make a real and substantial contribution. This
having read it – and he did not even discover that contribution can make itself felt, however, only
a journal called Social Networks had begun publi- insofar as the social physicists engage with exist-
cation in 1978. Nor did he discover that an ing work in social network analysis and enter into
International Network for Social Network Analysis a proper dialogue with the sociologists and other
had been formed around the same time and that it social scientists who have already begun to move
carried an image of a scale-free network on the in a similar direction.
cover of its regular newsletter. The possibility of The potential contribution of the new social
searching for material on the Internet also seems physics is most apparent in the work of Duncan
to have escaped him completely. Although Watts. He is, undoubtedly, the most sophisticated
Barabási’s particular specialisation was search physicist to contribute to the area and he has,
engine methods, he did not, apparently, think of albeit rather belatedly, recognised the overstate-
typing the word ‘networks’, or the phrase ‘social ments of other social physicists. In a review article
networks’ into a search engine. he noted that the label ‘new’ science of networks
Even stranger is the fact that some sociologists ‘may strike many sociologists as misleading,
have also failed to appreciate the extent of socio- given the familiarity . . . of many of its central
logical research on social networks and have ideas’ (Watts, 2004: 243). This recognition led
accepted the physicist’s view of network analysis Watts to transfer into a Department of Sociology,
rather than researching the subject for themselves. where he could better develop his ideas.
John Urry (2004), for example, has been heavily Watts rejects the view that most real networks
influenced by the new social physics. Reviewing are built from random connections and highlights,
the contributions of its advocates, he equates it instead, the fact that they are characterised by a
with social network analysis and then criticises it clustering into zones of relatively high density and
for its excessive formality and its lack of under- a differentiation between close (‘strong’) and more
standing of the sociological character of the data distant (‘weak’) ties. These features of real net-
employed. These criticisms of the new social works mean that it is impossible to study network
physics may be well founded, but they misunder- properties from purely ‘local’ data. Networks have
stand social network analysis by failing to address to be investigated through their global or overall
it. Relying heavily on popular science books, Urry properties. Watts holds that this can be done best by
reiterates the misleading claim that the social starting from certain general network principles.
physicists are proposing a ‘new network analysis’. Watts’s own theoretical work begins from a rec-
Strikingly, Urry makes no reference at all to any ognition of the importance of ‘small-world’ research.

5605-Scott-Chap05.indd 62 4/19/2011 10:10:01 AM


SOCIAL PHYSICS AND SOCIAL NETWORKS 63

He asks what structural features the social world graphs are locally clustered but globally sparse –
must have if it exhibits the characteristics of a they are ‘Granovetter graphs’.
small world and he tries to assess the implications Watts shows that small-world graphs can be
of this for sociological analysis. The concept of a defined by the two parameters n and k, where n is
small-world network derives from the frequently the number of points and k is the average degree of
experienced claim on meeting someone with a the points. These are mathematical conditions that
mutual acquaintance: ‘what a small world!’ As a apply to any type of network, which leads Watts to
network idea, it originates in experimental studies claim that he is constructing a generic science of
by Milgram (1967; Travers and Milgram, 1969) in networks. The small-world properties of a network
which he investigated the number of links required do not, in any sense, depend upon the type of con-
to connect two people who are unknown to each nections that are involved. Thus, a social network
other. Typically, he found, randomly close indi- has small-world properties not because of the type
viduals are connected by lines of length six. of social relation involved but because of the math-
In his work, Watts attempted to formalise the ematical relations that define its structure. If a social
features of the interesting subset of networks that network is formed that has the non-random
have this small-world feature. A small-world net- attributes of a small-world network, then certain
work is not a ‘small’ network but one in which the structural consequences will necessarily follow.
distances between points is optimally low. It is While an explanation of the emergence of such a
one in which the interweaving and overlapping of network lies in the sociology of the area under
connections and a high degree of redundancy in investigation, the explanation of these consequences
linkages is such that distances are non-transitive. is to be found in the mathematics of the network.
Graphs that are embedded in a Euclidean or other It is important to be clear about exactly what is
metric space will not show any small-world prop- being claimed in this argument. If it is claimed – as
erties for their metric distances. Thus, small-world Barabási often implies – that any actual network
phenomena are features of the relational proper- will, of necessity, have certain characteristics, then
ties of a graph and not of its spatial properties highly deterministic assumptions are being made
(Watts, 1999: 41–42). It is possible for two spa- about the formation of social relations. If, on the
tially ‘distant’ people to be connected by a rela- other hand, it is argued that mathematics describes
tively short path. the constraints that are inherent in particular struc-
A ‘small-world graph’ is one in which there are tures, then greater scope remains to recognise the
a large number of ‘shortcuts’. A shortcut in a autonomy of human agency in social networks.
graph is a line that connects two points that would The implications of this argument are illus-
otherwise be distant from each other. Specifically, trated with an examination of diffusion processes.
a line is a shortcut if it reduces the distance Despite its rather disappointing neglect of the
between two points otherwise connected at a dis- classic works by Rogers (1962) and by Coleman
tance greater than two. Shortcuts are ‘wormholes’ and his colleagues (1966), he does produce some
in a graph. Formally, a shortcut is a line that does suggestive conclusions about the intuitive idea
not complete a triad (see Figure 5.6). A com- that the spread of a disease is faster in networks
pletely connected graph consists only of triads so with shorter path lengths (Watts, 1999: 180).
has no shortcuts – it is made of numerous overlap- Rather more compelling is his discussion of
ping one-cliques. A random graph, on the other the development of cooperative relationships and
hand, has neither triads nor shortcuts. The creation strategic behaviour, where he shows that the pos-
of shortcuts, therefore, builds the intermediate sibility of cooperation improves at a particular,
range of graphs where small-world properties though unspecified, level of network connectivity.
occur. They are most marked at a certain sub- The most general conclusion that Watts draws
range of the small-world networks. Small-world from his explorations is that relatively small
changes in the connectivity of a network (e.g.,
adding a small number of shortcuts) can dramati-
a a cally change its small-world properties and, hence,
the ability of its members to communicate or
c b c cooperate with each other.
In order to develop this point of view into a
generalised theory of network processes, Watts
d
b e draws on contemporary complexity theories of
nonlinear change. The development of network
ab is not a shortcut ab is a shortcut structure, he argues, is a result of gradual, incre-
between a and b between a and b mental changes that generate sudden ‘phase
transitions’ at critical threshold points. Radical
Figure 5.6 Shortcuts in networks transformation in macro-level structure can result,

5605-Scott-Chap05.indd 63 4/19/2011 10:10:02 AM


64 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

unintentionally, from an immediate, situational sion (as suggested in Scott and Griff, 1984: 11–12;
change at the micro-level. Specifically, the making see also Useem, 1984). In a fragmented network, it
or breaking of links in a network as agents prag- is more difficult for knowledge about business
matically adjust to their immediate situation cre- conditions to flow through the network and so
ates the shortcuts that enhance the small-world people will respond to more immediate, local
features of the network and alter the way in which conditions.
it operates at a macro level. Watts shows, for Watts does not see these processes determinis-
example, that a phase transition that reduces the tically but as describing the constraints on indi-
small-world conditions in the network will disrupt vidual agency. He shows that the development of
its ability to promote the diffusion of innovations. networks and processes within networks is con-
Individuals in such a fragmentary network that strained by mathematical features. That is to say,
fragments are susceptible to new influences and once a small-world network has emerged, then its
constraints, but their innovations will never mathematical properties will constrain, but not
spread very far. On the other hand, the making determine, the actual relationships formed and so
of extensive links that result in a highly con- will make particular patterns of development more
nected network produces a situation in which likely than others to occur. Indeed, this was the
innovations reverberate around the network in basis on which Barabási himself had formulated
constantly reinforcing cascades that rapidly suf- the Matthew Effect, and it is what corporate
fuse the whole network. Watts holds that these researchers argued when describing the formation
threshold points can be predicted on the basis of of bank-centred spheres of influence (Scott and
the purely mathematical properties of the network Griff, 1984). Here are to be found the principal
in question. implications of the new social physics. The new
The implications of this argument are apparent social physics complement existing approaches by
in the influential study of social capital under- pointing to crucial and significant features of net-
taken by Putnam (2000). A person individually work dynamics. Much research in social network
might decide not to go bowling, not to go to analysis has been static and cross-sectional. Use
church, not to watch the latest repeat of a televi- of the mathematical theorems of small worlds
sion show and so on. Each individual thereby promises a more dynamic understanding of proc-
reduces the number of links, though in a small esses of change over time. This perspective has
world there is high redundancy and the effects of converged with uses of complexity theory and
these reductions may be masked until a critical agent-based computational methods to begin to
point is reached. This critical point occurs produce more powerful and productive examina-
when individual actions have significantly reduced tions of longitudinal change (see, for example,
the number of shortcuts. The network begins Monge and Contractor, 2003; see also the special
to lose its small-world properties and people issue of the American Journal of Sociology, 2005:
will then find it more difficult to recruit bowl- 110, 4). The work of Tom Snijders – discussed
ing teams, mount political protests and so on. elsewhere in this handbook – already offers soft-
A point may eventually be reached at which ware for modelling dynamic processes in terms of
the number of shortcuts is so few that the whole the macro-level, nonlinear consequences of indi-
network collapses catastrophically. This is the vidual, micro-level processes.
complete collapse in the ‘bridging’ social capital We may yet see further contributions from the
that Putnam saw as critical for holding networks new social physics that will match the introduc-
together. tion of force and energy in the earlier social phys-
Similar considerations apply in relation to the ics, but we are not there yet. The exaggerated
board-level recruitment of directors in corporate claims that have been made should not lead us to
enterprises. The structural features of networks of reject the work as a whole, and we must recognise
interlocking directorships – bank centrality, that some of its practitioners are making important
spheres of influence, centralisation and so on – studies in collaborative work. We can hope that
change in relation to changes in recruitment prac- others might be willing to work more collegially
tices that result from the introduction of new with social scientists in the future.
systems of regulation or governance, such as anti-
trust laws and the limitation of bank interlocking.
They change, however, in unintended ways as
a consequence of incremental changes in recruit-
ment at the micro level. Company-level decisions NOTE
about the recruitment of particular directors
transform the network through a threshold point 1 It is also puzzling that Barabási, a pioneering
and so generate radical, nonlinear changes in pat- Web user, should have assumed that Internet links
terns of corporate control and intercorporate cohe- are made at random.

5605-Scott-Chap05.indd 64 4/19/2011 10:10:02 AM


SOCIAL PHYSICS AND SOCIAL NETWORKS 65

REFERENCES Homans, G. (1961) Social Behaviour: Its Elementary Forms.


London: Routledge and Kegan Paul.
Althusser, L. (1962) ‘Contradiction and overdetermination’, in Homans, G. and Curtis, C.P. (1934) An Introduction to Pareto:
Louis Althusser (ed.), For Marx. Harmondsworth: Allen Lane. His Sociology. New York: Knopf.
Althusser, L. (1963) ‘On the materialist dialectic’, in Althusser, Laumann, E.O. (1966) Prestige and Association in an Urban
1962. Community. Indianapolis: Bobbs-Merrill.
Ball, P. (2004) Critical Mass: How One Thing Leads to Laumann, E.O. and Pappi, F.U. (1976) Networks of Collective
Another. London: Heinemann. Action: A Perspective on Community Influence Systems.
Barabási, A.L. (2002) Linked: The New Science of Networks. New York: Academic Press.
Cambridge, MA: Perseus. Lewin, K. (1936) Principles of Topological Psychology. New
Bearden, J., Atwood, W., Freitag, P., Hendricks, C., Mintz, B. York: Harper and Row.
and Scwhartz, M. (1975) ‘The nature and extent of bank Lewin, R. (1992) Complexity: Life at the Edge of Chaos. New
centrality in corporate networks’, in John Scott (ed.), Social York: Macmillan.
Networks, Volume 3. London: Sage, 2002. Lundberg, G. (1939) Foundations of Sociology. New York:
Buchanan, M. (2000) Ubiquity: The New Science That Is Macmillan.
Changing the World. London: Weidenfeld and Nicholson. Maxwell, J.C. (1865) A Dynamical Theory of the Electro-
Buchanan, M. (2002) Small World: Uncovering Nature’s magnetic Field. Edinburgh: Scottish Academic Press, 1982.
Hidden Networks. London: Weidenfeld and Nicolson. Maxwell, J.C. (1877) Matter and Motion. London: Routledge,
Bunting, D. and Barbour, J. (1971) ‘Interlocking directorates in 1996.
large American corporations, 1896–1964’, in John Scott Means, D.E., Gardner, C., Montgomery, J.M., Clark, A.,
(ed.), Social Networks, Volume 3. London: Sage, 2002. Hansen, H, and Mordecai E. (1939) ‘The structure of
Carey, H.C. (1858–59) The Principles of Social Science, Three controls’, in National Resources Committee (ed.), The
Volumes. New York: Augustus M. Kelley, 1963. Structure of the American Economy. National Resources
Carey, H.C. (1872) The Unity of Law: As Exhibited in the Committee of the U.S. Senate. Washington: Government
Relation of Physical, Social, Mental, and Moral Science. Printing Office.
New York: Augustus M. Kelley, 1967. Merton, R.K. (1968) ‘The Matthew Effect in Science’, Science
Cartwright, D. and Zander, A. (eds.) (1953) Group Dynamics. 159: 56–63.
London: Tavistock. Milgram, S. (1967) ‘The Small World Problem’, Psychology
Coleman, J.S., Katz, E. and Menzel, H. (1966) Medical Today 2: 60–67.
Innovation: A Diffusion Study. New York: Bobbs-Merrill. Mintz, B. and Schwartz, M. (1985) The Power Structure of
Degenne, A. and Forsé, M. (1994) Introducing Social Networks. American Business. Chicago: University of Chicago Press.
English translation, Beverly Hills: Sage, 1999. Mizruchi, M.S. (1982) The American Corporate Network,
Dooley, P.C. (1969) ‘The interlocking directorate’, in John 1900–1974. London: Sage.
Scott (ed.), The Sociology of Elites, Volume 3. Aldershot: Mizruchi, M.S. and Schwartz, M. (eds.) (1987) Intercorporate
Edward Elgar, 1990. Relations: The Structural Analysis of Business. New York:
Engels, F. (1876) Anti-Dühring. Moscow: Foreign Languages Cambridge University Press.
Publishing House, 1954. Monge, P.R. and Contractor, N.S. (2003) Theories of
Engels, F. (1886) Dialectics of Nature. Moscow: Progress, 1964. Communication Networks. Oxford: Oxford University
Festinger, L. (1957) A Theory of Cognitive Dissonance. Press.
Stanford: Stanford University Press. Moreno, J.L. (1934) Who Shall Survive? New York: Beacon.
Granovetter, M. (1974) Getting a Job. Cambridge, MA: Newman, M., Barabási, A.L., and Watts, D.J. (eds.) (2006) The
Harvard University Press. Structure and Dynamics of Networks. Princeton, NJ:
Heider, F. (1958) The Psychology of Interpersonal Relations. Princeton University Press.
New York: Wiley. Ostwald, W. (1909) Energetische Grundlagen Der
Helm, G. (1887) Die Lehre Von Der Energie. Leipzig: Felix. Kulturwissenschaften. Leipzig: Duncker.
Henderson, L.J. (1935) Pareto’s General Sociology: A Pareto, V. (1916) A Treatise on General Sociology. New York:
Physiologist’s Interpretation. Cambridge, MA: Harvard Dover, 1963.
University Press. Parsons, T. (1945) ‘The present position and prospects of
Henderson, L.J. (1938–42) ‘Sociology 23 Lectures’, in Bernard systematic theory in sociology’, in Talcott Parsons (ed.),
Barber (ed.), L.J. Henderson on the Social System. Chicago: Essays in Sociological Theory, Revised Edition. New York:
University of Chicago Press, 1970. Free Press, 1954.
Herman, E.O. (1981) Corporate Control, Corporate Power. Pujo, Report (1913) Money Trust Investigation. House
New York: Oxford University Press. Subcommittee on Banking and Currency, Washington:
Hilferding, R. (1910) Finance Capital. London: Routledge and Government Printing Office.
Kegan Paul, 1981. Putnam, R.D. (2000) Bowling Alone: The Collapse and
Hobson, J.A. (1906) The Evolution of Modern Capitalism, Revival of American Community. New York: Simon and
Revised Edition. London: George Allen and Unwin. Schuster.
Homans, G. (1951) The Human Group. London: Routledge and Quetelet, L.A.J. (1848) Du Système Sociale Et Des Lois Qui Le
Kegan Paul. Régissent. Paris: Guillaumin.

5605-Scott-Chap05.indd 65 4/19/2011 10:10:02 AM


66 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Rogers, E. (1962) Diffusion of Innovations, 5th Edition. New von Wiese, L. (1924–29) Allgemeine Soziologie Als Lehre Von
York: Free Press, 2003. Dem Beziehungen Und Beziehungsgebilden, Two Volumes.
Scott, J. (1985) Corporations, Classes and Capitalism, Second München: Duncker und Humblot.
Edition. London: Hutchinson. Warner, W.L. and Unwalla, D.B. (1967) ‘The system of inter-
Scott, J. (1991) Social Network Analysis. London: Sage. locking directorates’, in W. Lloyd Warner, Darab B.
Scott, J. (2000) Social Network Analysis, Second Edition. Unwalla, and Joan H. Trimm (eds.), The Emergent American
London: Sage. Society: Volume 1. Large-Scale Organizations. New Haven:
Scott, J. and Griff, C. (1984) Directors of Industry. Cambridge: Yale University Press.
Polity Press. Wasserman, S. and Faust, K. (1994) Social Network
Scott, J. and Hughes, M. (1980) The Anatomy of Scottish Analysis: Methods and Applications. New York: Cambridge
Capital. London: Croom Helm. University Press.
Simmel, G. (1908) Soziologie: Untersuchungen Über Die Watts, D. (1999) Small Worlds: The Dynamics of Networks
Formen Der Vergesselshaftung. Berlin: Düncker und between Order and Randomness. Princeton, NJ: Princeton
Humblot, 1968. University Press.
Sims, N.L. (1924) Society and Its Surplus: A Study in Social Watts, D. (2003) Six Degrees: The Science of a Connected
Evolution. New York: D. Appleton and Co. Age. New York: W. W. Norton.
Solvay, E. (1904) L’energétique Consideré Comme Principe Watts, D. (2004) ‘The “New” Science of Networks’, Annual
D’orientation Rationelle Pour La Sociologie. Bruxelles: Review of Sociology 30.
Misch et Thron. Watts, D. and Strogatz, S.H. (1998) ‘Collective dynamics of
Stokman, F., Ziegler, R. and Scott, J. (eds.) (1985) Networks of “small-world” networks’, Nature 393: 440–42.
Corporate Power. Cambridge: Polity Press. Wellman, B. and Berkowitz, S. (eds.) (1988) Social Structures.
Strogatz, S.H. (2003) Sync: The Emerging Science of New York: Cambridge University Press.
Spontaneous Order. New York: Hyperion. White, H.C. (1963) An Anatomy of Kinship. Englewood Cliffs,
Travers, J. and Milgram, S. (1969) ‘An experimental study of NJ: Prentice-Hall.
the small world problem’, Sociometry 32(4): 425–43. White, H.C. (1992) Identity and Control. Princeton, NJ:
Urry, J. (2004) ‘Small worlds and the new “social physics”’, Princeton University Press.
Global Networks. Wiese, L. and Becker, H.P. (1932) Systematic Sociology, on the
Useem, M. (1984) The Inner Circle. New York: Oxford Basis of the Beziehungslehre and Gebildelehre of Leopold
University Press. Von Wiese, Adapted and Amplified by Howard P. Becker.
Vierkandt, A. (1923) Gesellshaftslehre. Stuttgart: F. Enke. New York: Wiley.

5605-Scott-Chap05.indd 66 4/19/2011 10:10:02 AM


6
Social Networks in Economics
Sanjeev Goyal

INTRODUCTION work.1 The first point is relatively simple: there is


now a wide-ranging body of formal – analytical
While Facebook, SecondLife and LinkedIn give and quantitative – work that rigorously examines
networks a definite contemporary resonance, the consequences of social relations for economic
human beings are gregarious by nature and social action. I will illustrate this by discussing how new
relations have been studied by economists for a models of social relations address questions that
long time. Prominent instances include the study are at the heart of economics. The second point is
of relative consumption by Veblen (1899) and more fundamental and closely related to the points
Dussenbery (1949), and the study of the role of discussed in the above quotation. This new
social contacts in labour markets by Rees (1966) research in economics illustrates how institutions
and Rees and Schultz (1970). In spite of these and social structure shape and are, in turn,
works, until the mid-1980's, most studies in eco- shaped by individual action. In this sense, it
nomics largely ignored the role of social relations. constitutes a rigorous and substantive elaboration
Instead, economists sought to explain economic on the themes explored in the work of Granovetter
phenomena using an approach founded on the (1985), Burt (1994) and Coleman (1994), among
idea that human interaction is centralised (takes others.
place in large markets) and anonymous. Moreover, In this chapter, I restrict myself to economics
prices (sometimes set by a fictitious Walrasian research in which social structure is mathemati-
auctioneer!) were the principal device of coordi- cally modelled as a network/graph and the focus
nation among individuals. The theory of general is on understanding the relation between features
equilibrium and the theory of oligopoly epitomize of the network – such as centrality, the number
this paradigm. This state of affairs is reflected in and distribution of connections, distance, connect-
the following lines taken from Granovetter (1985): edness – and individual behaviour and aggregate
‘How behaviour and institutions are affected by economic outcomes. There is a large body of work
social relations is one of the classic questions of in economics that studies informal institutions
social theory . . . the utilitarian tradition, including such as business groups in developing countries,
classical and neoclassical economics, assumes country formation, crime and social interaction,
rational, self-interested behaviour is affected min- social and personal identity; see, for example,
imally by social relations’. Much has changed Akerlof (1997), Akerlof and Kranton (2000),
since the mid-1980s; social relations and informal Alesina and Spolaore (2003), Dasgupta and
institutions occupy centre stage in economics, Serageldin (1999), Ghatak and Kali (2001),
today. Glasear and Scheinkman (2002), Kali (1999),
A comprehensive overview of this work is clearly Rauch and Casella (2001) and Taylor (2000). Due
beyond the scope of a single chapter. Here, my to space constraints, I will not be discussing this
aim is to develop two general points about this work here.

5605-Scott-Chap06.indd 67 4/13/2011 2:23:42 PM


68 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

THE CONSEQUENCES OF Evidence: Social Networks in Labour Markets


SOCIAL STRUCTURE Empirical work on the sources of information
about jobs and about workers has a long and dis-
In the last decade, economists have explored the tinguished history. Early contributions to this
role of social networks in understanding a variety body of work include Rees (1966), Myers and
of questions. This section takes up two important Shultz (1951), Rees and Schultz (1970) and
economic questions: one, employment and ine- Granovetter (1974). These early studies presented
quality and two, diffusion and innovation.2 I first evidence for specific geographical locations and/
discuss research on these issues and then turn to or particular occupations; in recent years, the
conceptual issues in the empirical identification of research covers a wider range of professions and
network effects. skill levels and a number of countries as well.
Taken together, this research establishes that
social networks are used extensively across skill
levels and across countries in labour markets.
Unemployment and Wage Inequality This work has looked at the use of contacts by
both employees as well as employers. With regard
Workers like jobs that suit their skills and location to the use of personal contacts by workers, the
preferences, while firms are keen to hire workers literature has focussed on three themes. One, to
who have the right abilities for jobs. However, what extent do workers rely on personal sources
workers do not know which firms have vacancies, of information in obtaining jobs? Two, how does
and finding the right job takes time and effort. the use of personal contacts vary with the nature
Similarly, firms do not know which workers are of the job and across countries? Three, how pro-
looking for jobs. Faced with this lack of informa- ductive is the use of contacts in terms of wages
tion, workers look for job advertisements in news- and jobs obtained? Rees (1966), Rees and Shultz
papers and magazines. They also spread the word (1970) and Granovetter (1974) explored the
among their friends and acquaintances that they extensive use of social connections in obtaining
are looking for a job, and indeed there is substan- information about jobs. In a study of textile
tial evidence that they often get information on job works, Myers and Shultz (1951) showed that
vacancies via their personal connections. A second almost 62 per cent of those surveyed obtained
type of information problem concerns the ability their first job via personal contacts, in contrast to
of workers: a person generally knows more about only 15 per cent who obtained their jobs from
his own ability as compared to a potential agencies and advertisements. Similarly, in a
employer. Indeed, this asymmetry in information widely cited study, Granovetter (1974) showed
leads workers to invest in signals of their quality that almost one half of the people he surveyed
(such as educational degrees, certificates, and received information about their current jobs from
licenses), and it leads potential employers to ask personal acquaintances. These findings have
for references and recommendation letters.3 inspired an extensive body of empirical research
Empirical work also shows that referrals (refer- across countries over the years; Granovetter
ences and recommendation letters) are widely (1994) and Pellizzari (2004) provide an extensive
used in the process of matching workers and set of references on information sources of job
firms. A letter of reference is only valuable insofar vacancies across countries.
as the employer can trust the writer of the letter; The empirical work on variations in the use of
this suggests that the structure of personal connec- contacts across types of jobs suggests that personal
tions is likely to play an important role in match- contacts are used less often for higher-salary jobs:
ing workers and firms. in those cases a negative correlation exists between
These observations raise the question of how age, education and occupational status and the
the pattern of social contacts affects the flow of likelihood of finding one’s job through personal
information about jobs. The flow of information contacts. This finding is observed in the 1978
across persons will influence how quickly work- Panel Study on Income Dynamics (Corcoran et al.,
ers are matched with jobs, which will in turn 1980) and in other studies for the United States;
shape the level of employment The patterns of a similar negative correlation is also observed
social connections will also determine who gets across European countries (Pellizzari, 2004).
information and when; this in turn may deter- A number of papers have studied the effective-
mine who gets a job and who is left unemployed, ness of personal contacts both with regard to the
which will have a bearing on the distribution success of finding a job as well as with regard to
of earnings and overall inequality in a society. the wages obtained. The studies use different
I start with a discussion of empirical evidence methods and have different concerns, so it is dif-
and then turn to theoretical models of social ficult to compare them directly. However, a
networks. number of the studies find that personal contacts

5605-Scott-Chap06.indd 68 4/13/2011 2:23:42 PM


SOCIAL NETWORKS IN ECONOMICS 69

are an efficient way of finding jobs: a higher pro- status within social communities or geographi-
portion of jobs found via contacts are likely to be cally contiguous city districts (see, for example,
accepted (Blau and Robins, 1990; Holzer, 1988). Conley and Topa, 2002; Topa, 2001). Geographical
With regard to the relation between relative wages proximity overlaps highly with social connections
of jobs found via personal contacts, the evidence and so this first insight provides a theoretical
here is mixed. Early work by Ullman (1966) sug- account for how local information sharing can
gested that there is a positive relation between generate such correlations in employment status.
wages and hiring via contacts. In more recent The second insight is that the probability of find-
work, Pellizzari (2004) finds that in some coun- ing a job is declining with the duration of unem-
tries such as Austria, Belgium and the Netherlands ployment. Duration dependence of unemployment
there exists a wage premium for jobs found via has been widely documented (see, for example,
personal contacts, while in other countries such as Heckman and Borjas, 1980). The reason that
Greece, Italy, Portugal and the United Kingdom duration dependence arises in a context of social
there exists a wage penalty for jobs obtained via information sharing is that a longer spell of unem-
contacts. ployment reveals that a person’s social contacts
Moving on to the other side of the market, there are less likely to be employed, which in turn
is also evidence about how employers use makes it less likely that they will pass on informa-
referrals in their recruitment. Indeed, a study by tion concerning vacancies. This in turn lowers the
Holzer (1987) found that over 35 per cent of the probability of the individual moving out of unem-
firms interviewed filled their last vacancy via ployment and into an employed status.
referral. Similarly, Marsden and Campbell (1990) The second model studies the role of social
in their study of 53 Indiana establishments (in the networks in resolving adverse selection problems
United States) found that roughly 51 per cent of in hiring and recruitment. A worker has informa-
the jobs had been filled through referrals. tion on her friends and cohorts, and employees
may find it profitable to use such information. The
following model taken from Montgomery (1991)
Theoretical Models takes as its starting point the idea that workers
I now present two theoretical models that explore know their own abilities, while potential employ-
the consequences of the use of social networks for ers do not know this information. However, work-
employment and inequality. In the first model, the ing in a firm reveals the ability of the worker to the
interest is in the transmission of information on firm. Now consider a firm who needs to hire a new
job vacancies, while the second model focuses on worker. This firm can place an advertisement in
the use of referrals by firms to hire workers whose the newspapers and/or it can ask its current
quality is unknown. employees if they know someone who is suitable
The model of information transmission on job for the job. Empirical work suggests that there is
vacancies is taken from Cálvo-Armengol and considerable similarity in attributes between work-
Jackson (2004). Individual workers have personal ers who know each other (see, for example, Rees,
connections and these connections taken together 1966; Marsden, 1988). This motivates the idea
define a social network. Information about new that a firm with a higher-ability worker expects its
jobs arrives randomly to individuals. If they are current workers to recommend someone of higher
unemployed they apply for the jobs; if they are ability on average, as compared to a firm whose
employed and do not need the job, they send this current employee is of low ability. This difference
information to their unemployed friends and in expectation may lead some firms to use refer-
acquaintances. There is also a chance that some- rals while others go to the market. If some firms
one who is employed may lose his job. The proc- hire via referrals and these referrals pick out
ess of job loss, arrival of new job information, the higher-ability workers on average, then the ability
transmission of this information via the network, of workers who go to the market will be lower on
and the matching of worker to this job, defines a average. These differences are reflected in the
dynamic process the outcome of which is sum- wages that different workers make. The model
marised in terms of the employment status of dif- explores these ideas and brings out the aggregate
ferent individuals at any point in time. The interest implications of social connections for wage ine-
is in understanding how the properties of the quality and firm profits.
social network affect the employment prospects of The analysis of this model yields two key
individuals. insights. The first insight is that workers with
The analysis of this model yields two main more connections will earn a higher wage and that
insights. The first insight is that the employment firms who hire through contacts (of their existing
status of individuals in a social network is posi- higher-quality workers) will earn higher profits.
tively correlated. Empirical work suggests that The reason for this relation between connections
there is significant correlation in employment and wages is simple: more connections implies a

5605-Scott-Chap06.indd 69 4/13/2011 2:23:42 PM


70 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

higher number of referral wage offers from firms the technology in question is complicated and
(on average) and this translates into a higher involves substantial resources (such as adoption of
accepted wage (on average). Firms that hire crops or prescription of medicines) then it is clear
through contacts make higher profits due to imper- that an individual is likely to place much greater
fect competition between firms (due to a positive faith in information from close friends, colleagues
probability of a person receiving only one offer); and neighbours, and others in a similar decision
on the other hand, firms hiring workers in the open situation.
market are perfect competitors and therefore make These ideas have inspired a large and ambitious
zero profits. The second insight is that an increase literature on the role of social structure in shaping
in the density of social connections raises the ine- diffusion and innovation.5 Let us consider the
quality in wages. This is a reflection of the lemons general framework introduced in Bala and Goyal
effect: an increase in social ties means that more (1998): suppose that individuals are located on
higher-ability workers are hired via referrals, and nodes of a network and the links between the
this lowers the quality of workers who go into the nodes reflect information flows between them. At
open market, thereby pushing down their wages regular intervals, individuals choose an action
(relatively). from a set of alternatives. Actions include
the choice of alternative crops, medicines and
consumer products. Since they are uncertain about
the rewards from different actions, individuals use
Social Learning and Diffusion their own past experience as well as gather infor-
mation from their neighbours. A variety of issues
Technological change is central to economic growth
have been studied by this literature. Here I will
and social development. The process of techno-
focus on the following question: Are there
logical change is complicated and involves many
features of networks that facilitate/hinder the
steps starting from basic research and going on to
adoption of optimal actions?
wide-scale adoption. But it is generally agreed
I will restrict attention to connected societies,
that wide diffusion is important for the full gains
that is, societies in which every individual is
of a new technology to be realised. This rate of
linked either directly or indirectly to everyone
diffusion, however, seems to vary greatly. Consider
else.6 The first finding is that in such societies
the following examples:
every person earns the same payoffs and chooses
the same action (except when there are several
• The spread of new hybrid seeds has been central payoff equivalent actions) in the long run. The
to the increase in agricultural productivity over intuition for this general result is as follows: if A
the past century. Classic work by Griliches (1957), observes the choices and outcomes experienced
Hagerstrand (1967) and Ryan and Gross (1943) by B, then over time she can infer whatever B
document that hybrid corn seeds were adopted actually learns from those she is observing. So in
over a period of several years in the early twentieth the long run A must be able to do as well as B. But
century in the United States. Moreover, diffusion in a connected society every pair of individuals
of these seeds displayed clear spatial patterns: ini- mutually observes each other: our reasoning then
tially a small group of farmers adopted the seed, implies that they must earn equal payoffs in the
followed by their neighbours adopting it, and this long run.
was followed by the neighbours of the neighbours This basic result sets the stage for an examina-
adopting it and so on.4 tion of the role of structure in facilitating/hinder-
• The period before first prescription of new drugs ing diffusion. Connected societies take on a
or medicines by doctors within the same town variety of forms and it is possible to show that
can range from six months to three years, as some structures get locked into suboptimal actions
observed in the classical study of the spread of a while others are always able to choose the optimal
drug, by Coleman et al. (1966). action in the long run. These examples bring out
• The facsimile technology was available in 1843. the following idea: information blockages arise
AT&T introduced wire photo service in 1925. due to the presence of individuals who observe
However, fax machines remained a niche product only a few others but are observed by a great many
until the mid-1980s. At that point, there was an other people. This pattern of linkages is of practi-
explosion in the use of fax machines. cal interest as it is empirically observed on the
World Wide Web as well as in social communica-
The research on the determinants of diffusion tion more generally.
suggests that the critical factor in the diffusion These examples lead to the study of network
of a new technology is the uncertainty about its features that facilitate social learning. The princi-
profitability. Information from governments and pal finding is that an information network in
firms will alleviate this uncertainty. However, if which individuals learn the optimal actions and

5605-Scott-Chap06.indd 70 4/13/2011 2:23:42 PM


SOCIAL NETWORKS IN ECONOMICS 71

earn the maximum payoffs has two general prop- empirically identifying social interaction effects.
erties. The first property is local independence. In the research on social networks the point of
Local independence captures the idea that indi- departure is that we look at differences in social
viduals have distinct sources of information and connections within a group to understand differ-
that these distinct sources are relatively important ences in individual behaviour.
as compared to common sources of information. These difficulties on inference are greatly com-
Local independence facilitates experimentation pounded when we begin to study the effects of
and gathering of new information. The second different aspects of social networks, such as cen-
property is the existence of links that act as trality in the network, proximity to others, or the
bridges between the distinct sources of informa- relative connectedness of different individuals.10
tion. These bridge links facilitate the diffusion of A key new element is that the ties between indi-
useful information across a society.7 vidual actors are typically endogenous. To see the
nature of this problem consider the well-known
study on survival and social embeddedness of gar-
ment manufacturers in New York by Uzzi (1996).
The Identification of Network Effects In this study an interesting finding is that survival
is positively related to the number of social con-
We discussed the use of social networks in hiring nections that a firm has. The interpretation is that
and job searches and in social learning; more greater connections (embeddedness) help a firm to
generally, there is evidence for the use of social share risks more effectively and this in turn leads
networks in a variety of social and economic con- to greater survival. However, a moment’s reflec-
texts.8 For the most part, this evidence takes the tion suggests a natural potential confounding ele-
form of survey data or correlations between net- ment about the connections: they are not exogenous
works and outcomes. While this evidence is plau- to the system. Indeed, it is plausible to suppose
sible, establishing causal relations from networks that firms that are relatively healthy may be better
to economic outcomes has proven to be much connected than weaker and more vulnerable firms.
more difficult. I discuss the conceptual issues Thus the positive correlation between connected-
involved. Identification of these effects is central ness and survival may simply be a reflection of
to the research programme on networks across the some unobservable characteristics of firms, which
social sciences. are positively related to financial health and sur-
To see why identification of social network vival.
effects is difficult let us consider an example from This example points to a key conceptual prob-
a job search: suppose that we observe that the flow lem with establishing network effects: the network
of worker immigrants from country A to country is itself endogenous and often shaped by individ-
B is positive correlated with the stock of workers ual choice. It may therefore be related in system-
from country A in country B. Social networks atic ways to important unobserved individual
(e.g. better information in country A about country characteristics. The economics literature has tried
B, or lower costs of adjustment in a new country) to address this problem of identification in a
are a natural interpretation for such an observed number of different ways. I now briefly discuss
positive correlation. However, an alternative and some of them and also provide references to
equally plausible explanation for the observed related papers. A natural route to addressing the
correlation is that workers from A have particular identification issue is to exploit the time structure
skills that are especially in demand in country B. of the data. This route has been used by Conley
A greater existing stock reflects this better match and Udry (2008) to study the influence of social
quality between source country A and destination networks in the adoption of pineapple in West
country B and implies a greater flow. Identification Africa. Fafchamps and colleagues (2008) exploit
of network effects thus raises delicate problems of the time structure of the data to study the forma-
inference even in simple contexts.9 tion of new collaborations in academic research. I
These issues are at the heart of the large litera- elaborate on their strategy to illustrate the use of
ture on social interactions—see Manski (2000) timing for identification of network effects.
and Brock and Durlauf (2001) for overviews. Research collaboration is an environment
Their work argues that a significant part of the where much public information is available on
variation in behaviour across individuals faced individual ability (e.g. publications record,
with similar incentives is due to their being a employment history). Consequently we would
member of one group rather than another (e.g. expect matching frictions to be less prevalent than
Glaeser and Scheinkman, 2002; Fafchamps, 2004; in other team formation processes. If network
Munshi, 2003). This literature seeks to explain proximity affects the formation of new teams even
behavioural differences across well-defined in such a favourable environment, we expect that
groups, paying special attention to the difficulty of social networks will also matter for matching

5605-Scott-Chap06.indd 71 4/13/2011 2:23:42 PM


72 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

processes more generally. It is reasonable to sup- scientific collaborations; network effects should
pose that, to economize on friction costs, individ- only affect the first collaboration. Their key find-
uals will use information easily available in their ing is that network proximity is only significantly
circle of friends and acquaintances. positive for the first collaboration.
Fafchamps et al. (2010) examine data on co-
authorship among economists over a 30-year
period, from 1970 to 1999. They show that two
economists are more likely to publish together if
they are close in the network of all economics THE ORIGINS OF SOCIAL STRUCTURE
co-authors. This result is robust and statistically
significant. Network distance coefficients are I have argued that social structure has profound
large in magnitude: being at a network distance of effects on individual behaviour and payoffs as
2 instead of 3 raises the probability of initiating a well as on aggregate social outcomes. We observed
collaboration by 27 per cent. They develop a that individuals occupying certain positions in a
number of arguments (based on a variety of con- network have access to substantial advantages. For
trols of time invariant as well as time-varying example, two workers with the same ability would
factors) to show that this proximity effect can be earn different wages depending on the number of
interpreted as reflecting flows of information their personal connections. Similarly, at the aggre-
about individuals as well as about the quality of gate level, two villagers may exhibit very different
the match. To identify such social network effects, patterns of adoption of new technology due to dif-
they need to convincingly control for the other ferences in social connections. These findings
confounding factors discussed above. suggest that individual entities – firms, workers,
First, they control for pairwise fixed effects. managers or countries – will have an incentive to
This takes care of all time-invariant complementa- form connections with others to shape the network
rity and social proximity effects, such as similarity in ways that are advantageous to themselves.
in age, place of education, stable research interest These general considerations suggest an economic
and so on. With pairwise fixed effects, identifica- approach in which individuals will trade off the
tion of network effects is achieved solely from the costs and benefits of forming connections.
timing of collaboration, that is, they ask whether, The strategic aspect of link formation arises
conditional on eventually publishing together, a from the observation that links between a pair of
pair of authors is more likely to initiate a collabo- individual entities will influence the payoffs of
ration after they got closer in the network of co- others, that is, a link can generate externalities, in
authorship. Second, using the available data they ways that are sensitive to the structure of the net-
construct control variables for time-varying work. A game of network formation specifies a set
effects, such as changes in productivity and of players, the link formation actions available to
research interests. This takes care of the most seri- each player and the payoffs to each player from
ous time-varying confounding factors. Third, they the networks that arise out of individual linking
take up the unobserved time-varying effects (such decisions.
as non-measurable changes in research interests) The origins of an economic approach to net-
that affect the likelihood of collaboration and are work formation can be traced to the early work of
correlated with network proximity. Because these Boorman (1975), Aumann and Myerson (1988)
effects capture unobserved forces that induce and Myerson (1991).11 Boorman (1975) studied a
researchers to work together, they should affect setting in which individuals chose to allocate a
the likelihood of all collaborations, not just the fixed set of resources across links; these links
first one. In contrast, network effects should only yield information on jobs. Larger resource alloca-
affect the likelihood of the first collaboration tion to a link makes it stronger, which in turn
between two authors: social networks carry rele- yields more information (on average). However,
vant information and create opportunities for face- an increase in the number of links that a person
to-face interaction that may induce two authors to has implies that each of her contacts has a lower
begin to work together; but once two authors have probability of receiving information. Hence link
published together, they have a lot of information formation involves private resources and gener-
about match quality and network proximity should ates externalities on other players. The main find-
no longer matter. ing of Boorman’s analysis was that individual
Building on this observation, they conduct a linking can generate an inefficient flow of infor-
placebo-like experiment by contrasting the effect mation about jobs and this has implications for the
of network proximity on first and subsequent col- level of employment in an economy. The model
laborations. Time-varying confounding factors studied by Boorman is quite specific but it cap-
that are correlated with network proximity should tures the following general ideas: link formation
have a similar effect on first and subsequent has costs and benefits for the individual and it also

5605-Scott-Chap06.indd 72 4/13/2011 2:23:43 PM


SOCIAL NETWORKS IN ECONOMICS 73

generates externalities on others. These two ideas Moreover, it turns out that equilibrium net-
and the principle of individual optimization works have striking efficiency and distributional
together constitute the key conceptual elements in properties: stars are efficient but exhibit signifi-
the economic theory of network formation. cant payoff inequality (since the central player
The distinctive feature of the economics typically earns very different payoffs as compared
approach is its emphasis on individual incentives in to the peripheral ones). Finally, a study of the
shaping link formation decisions and therefore in dynamics reveals that, starting from any network,
understanding how a network arises out of pur- a simple process of best responses by individuals
poseful individual actions. The central role of leads eventually to the star network; in other
individual choice requires that we explicitly take words, individuals can through trial and error
into account the preferences, the knowledge and arrive at a simple social structure that is fully
the rationality of individuals. This explicit formula- characterized.
tion in turn permits the examination of a number of The simplicity of the model and the sharpness
normative questions such as whether the networks of its predictions have motivated an extensive
that arise are good or bad and if something should theoretical literature that seeks to examine their
be done to modify individual incentives to facilitate robustness. The basic model assumes that all play-
the emergence of other (better) networks. ers are homogenous in terms of value as well as
These issues can be illustrated through a dis- costs of forming links. More generally, heteroge-
cussion of the following model, due to Goyal neity offers a natural way to incorporate the idea
(1993) and Bala and Goyal (2000).12 There are n of restrictions placed by existing social structures.
individuals, each of whom can form a link with A simple way to model existing social structure is
any subset of the remaining players. Link forma- to suppose that individuals live on islands or
tion is unilateral: an individual i can decide to belong to groups (Galeotti et al., 2006; Jackson
form a link with any player j by paying for the and Rogers, 2005; Johnson and Gilles, 2000). The
link. While there are some interesting practical costs to forming links within a group are lower
examples of this type of link formation – such as than the costs of forming links across groups. The
forming links across Web pages, citations, tele- idea of group here is very general and may reflect
phone calls, the sending of gifts in the context of geographic distance, or ethnic, linguistic, or reli-
social relations – it must be emphasised that the gious difference. The interest is in understanding
principal appeal of this model is its simplicity. how such difference shapes the structure of social
This simplicity is an important virtue as it permits networks that arise due to individual choice. The
an exploration of a number of important questions analysis of the model suggests that cost differ-
concerning the process of network formation and ences with regard to linking may lead to relatively
its welfare implications in a straightforward more clustering within groups and less across
manner. A second feature of the model is that it groups. They may also lead to few links across
allows for a fairly general description of payoffs. groups, which may be interpreted as ‘weak ties’.
Individual payoffs are assumed to be increasing in Finally, within each group, a few individuals may
the number of other people accessed via the net- constitute hubs and the hubs across different
work and they are falling in the number of links groups may form connections to create a core.
formed by an individual; no assumptions are made These results illustrate the scope of the general
on the curvature of the returns to linking. approach to strategic network formation outlined
A third attractive feature of the model is that it above and also illustrate how choice and existing
yields sharp predictions on the architecture of structure together shape the emergence of a new
networks. In particular, simple network architec- structure.14
tures such as stars and variants of the star (such as
interlinked stars) arise naturally and the economic
reasons underlying their emergence is easily
understood.13 Two types of economic pressures TOWARDS A GENERAL SOCIAL THEORY
have been identified in the literature: distance-
related pressures and diminishing returns from Social structure is a description of the relations
linking. Bala and Goyal (2000), Jackson and among individuals in a society. At birth, individu-
Wolinsky (1996) and Hojman and Sziedl (2008) als inherit a variety of social relations; while this
show that if payoffs are falling in distance from varies considerably across societies and across
others, individuals have incentives to get close to history, it will generally include their parents,
others. In addition, if there are diminishing returns extended family and the immediate social circle of
then small-world networks are supported by a few their parents. As the individual grows and matures,
links, each formed by a great many people but he will choose to retain some of the inherited ties
pointing to only a few key players. This is the while others will slowly dissolve, and he will form
foundation of periphery-sponsored star networks. new ties. These choices will take place along with

5605-Scott-Chap06.indd 73 4/13/2011 2:23:43 PM


74 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

other choices in regard to behaviour along a range observed a significant fraction of time in the long
of different dimensions. The freedom with which run must be complete.17 This implies that partially
an individual can exercise these different choices connected networks are just ephemeral situations
will vary across societies and over time. It is likely in the long run. Second, we find that in long-run
that in traditional societies with little geographic states, players always coordinate on the same
and economic mobility, the range of choices is action, that is, social conformism obtains.
more limited than in modern societies. These dif- However, the specific nature of coordination
ferences in the space for choice will shape choice sharply depends on the costs of link formation.
and in turn have a bearing on how the social struc- There is a threshold value in the interior of the
ture evolves over time. payoff range such that, if the costs of link forma-
The recent research in economics has made tion are below the threshold, players coordinate on
important progress in understanding the processes the risk-dominant action B. In contrast, if those
through which choice is shaped and, in turn, costs are above that threshold, players coordinate
shapes social structure and institutions. I discuss on the efficient action A.
two models to illustrate the scope of this new line The main insight of this analysis is the role of
of research.15 dynamics of link formation: note that the only
social architecture that we observe in the long run
is complete, but players’ behaviour in the coordi-
nation game is different depending on the costs of
The Co-Evolution of Social forming links. Indeed, if the social network was
Structure and Behaviour fixed throughout, standard arguments indicate that
the risk-dominant action must prevail in the long
This section considers a dynamic model in which run (cf. Young, 1998). Thus it is the co-evolution
individuals choose actions in interaction with of the links and actions that decisively shapes
others as well as with whom to interact. Our inter- individual behaviour in our model.
est is in understanding how individual behaviour The discussion above focused on coordination
and social structure co-evolve over time. games, but a similar approach can be used to study
Consider the following simple framework taken games of conflict. In such games, individuals can
from Goyal and Vega-Redondo (2005):16 there is a condition their links on good behaviour in the
group of players who have the opportunity to play past. Deleting a link is then a form of ostracism,
a simple two-action coordination game. Let the while maintaining a link constitutes a gesture of
two actions be denoted by A and B. This game has goodwill. There is an interesting line of research
two (pure-strategy Nash) equilibria, correspond- that studies co-evolution of social structure and
ing to the two actions. Let us suppose that an cooperation (see, for example, Mengel and Fosco,
individual’s payoffs are larger if everyone chooses 2008; Ule, 2008 and Vega-Redondo, 2006).
action A as compared to the case when everyone
chooses B. However, action B yields an individual
high payoff if one half of the population chooses
each action (in other words, action B is risk- Individual Choice,
dominant). Two players can only play with one Networks and Markets
another if they have a ‘link’ between them. These
links are made by individual initiative. They are Research collaboration among firms takes on a
also costly to form, in the sense that it takes effort variety of forms (such as joint ventures, technol-
and resources to create and maintain them. A link ogy sharing, cross licensing and joint R&D). In
permits several interpretations; examples include recent years, joint R&D has become especially
communication links (with messages sent from prominent.18 Moreover, a general feature of
one person to another), investments of time and research collaboration is that firms enter into dif-
effort by two persons in building a common ferent projects with non-overlapping sets of part-
understanding of a research problem, or travel by ners. Thus it is natural to represent collaboration
one person to the location of another to carry out relations as a network. Empirical work shows that
some joint project. the networks of collaboration links exhibit several
At regular intervals, individuals choose links striking features: the average degree is relatively
and actions to maximize (myopically) their respec- small (as compared to the total number of firms),
tive payoffs. Occasionally, they also make errors the degrees are unequally distributed, the architec-
or experiment. Our interest is in the nature of tures resemble a core-periphery network and the
long-run outcomes, when the probability of these average distance between firms is relatively small.
errors is small. First, we show that, provided the These empirical findings motivate an enquiry into
costs of link formation are not too high, any net- the economic origins and the implications of inter-
work architecture that is robust enough to be firm research collaboration networks.

5605-Scott-Chap06.indd 74 4/13/2011 2:23:43 PM


SOCIAL NETWORKS IN ECONOMICS 75

A simple model of network formation is devel- is that the marginal returns from an additional link
oped using the following ideas. Firms compete to a firm are increasing in its own links and are
in a market, and having lower costs is advanta- decreasing in the links of other firms. In a context
geous, as it leads to larger market share and where the cost of a new link is either constant or
profits. Collaboration between firms is a way to only increasing slowly it then follows that an equi-
share knowledge and skills and this lowers costs librium network has the dominant group architec-
of production. Thus a collaboration between two ture: there is a group of fully linked firms and the
firms makes them relatively more competitive vis- rest of the firms are isolated. Moreover, it is pos-
à-vis other firms. On the other hand, collaboration sible to show that firms with more degrees have a
with other firms involves resources and is costly. higher market share and earn higher profits as
So a firm compares the costs and returns from compared to isolated firms.
collaboration when deciding on how many links Let us explore further the implication of the
to form. At the heart of the analysis is the issue observation that marginal returns to new links are
of how a collaboration link between two firms increasing in the number of own links and decreas-
alters the incentives of other firms to form col- ing in the links of others. This suggests the possi-
laboration links. bility that a network may be sustained by transfers
These externalities from a collaboration link from highly linked firms to poorly linked firms.
arise from the disadvantages that a firm suffers in The main finding is that transfers facilitate the
competing with firms that have lower costs. The emergence of star and variations on the star net-
economic effects of cost differentials depend on the work such as interlinked stars. These networks are
nature of market competition. Thus in the two-way indeed sustained by the transfers from highly con-
flow of influence between markets and networks it nected core firms to poorly connected peripheral
is important to note that the nature of market com- firms. Moreover, these transfers allow the core
petition shapes the incentives for collaboration. firms to make larger profits as compared to the
However, the pattern of collaboration among firms peripheral firms.
determines the cost structure in an industry and this These findings are obtained in a theoretical
in turn shapes the nature of market competition. framework where firms know the structure of the
The following discussion is based on a model network as well as the value of linking with other
due to Goyal and Joshi (2003).19 Let us first illus- firms, and there is no problem in eliciting efforts
trate the ways in which the choice of firms is from partner firms in a collaboration. These are
shaped by and, in turn, shapes the network and the strong assumptions, as, in actual practice, incom-
market. To see this in the simplest form consider plete information and the attendant incentives
the two classical models of oligopolistic competi- problems are likely to be important factors.
tion: price competition and quantity competition. In actual practice, a firm is more likely to know
Suppose that there is a small but positive cost that about the knowledge and skills of other firms with
must be incurred by both firms that form the link. whom it has had past collaborations. Similarly,
Goyal and Joshi (2003) show that in a market with individual firms are likely to have significant pri-
price competition, firms will choose to form no vate knowledge about their own efforts and skills:
links as the competition is too great and the firms this private knowledge is likely to create the famil-
that form a link cannot recover the costs of the iar incentive relating to moral hazard and adverse
link. By contrast, in a market with quantity com- selection. In the context of research and develop-
petition, every firm will form a link with every ment, formal contracts will typically not be able to
other firm, and the network will be complete! address these problems fully. This suggests that
Thus the form of market competition (price or firms may prefer repeated collaboration with
quantity) shapes incentives to form collaboration existing collaboration partners or with firms about
ties, which in turn shape the nature of competi- whom they can get reliable information via exist-
tion. An important consequence is that the out- ing and past common partners. In other words, the
come under quantity competition will exhibit network structure of past collaborations may well
higher quantities and lower prices as compared to play an important role in shaping the performance
the outcome with price competition! of existing collaborations as well as the pattern of
Let us now examine the case of large costs of new collaborations.
forming links. Following from the earlier discus- These considerations constitute key elements in
sion, it is easy to see that in a market with price the work of Granovetter (1985) on the social
competition, the same result obtains: no firm will embeddedness of economic activity.20 Broadly
form any links and the empty network is realised. speaking, three questions have been explored in
However, in the market with quantity competition this research. The first question is, what types of
we need now to examine the curvature of the mar- firms enter into collaborative agreements and with
ginal returns from collaboration with the possibly whom? The second question is, how does the
large costs of forming links. The key insight here existing pattern of collaboration links relate to the

5605-Scott-Chap06.indd 75 4/13/2011 2:23:43 PM


76 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

governance structure of a new collaboration part- offer the prospect for major progress on this criti-
nership (is there a formal contract, or are loose cal question.
research-sharing agreements used?). The third ques-
tion is, how is the network position of the partners
related to performance of a collaboration link? These
questions have been addressed in interesting empir- ACKNOWLEDGEMENTS
ical work in sociology and organization theory; for
a survey of this work, see Gulati (2007).
I thank Bryony Reich, Peter Carrington and John
Theoretical research in this area lags behind the
Scott for comments on an earlier draft.
empirical work. Gradual building of trust in bilat-
eral links has been explored by economists (see,
for example, Ghosh and Ray, 1996).21 However, in
these models an individual only takes part in one
interaction at any point in time, and if this rela- NOTES
tionship breaks down then there is no information
flow across different partnerships. In contrast to 1 This chapter builds on the arguments devel-
the above setting, information flow across firms oped in Goyal (2007). The study of networks is one
(both about skills as well as about actions) is a key of the most active fields of research in many disci-
element of the process. The formal study of evolv- plines; other book-length treatments include Barabási
ing network relations in a context characterised by (2002), Gulati (2007), Jackson (2008), Scott (2000),
informational asymmetries appears to be an open Vega-Redondo (2006), Wasserman and Faust (1994)
problem. and Watts (1999).
2 A number of other economic applications have
been studied. For effects of networks on research
and market competition, see Goyal and Moraga-
Gonzalez (2001); for an application to criminal activ-
CONCLUDING REMARKS ity, see Ballester et al. (2006); on financial contagion,
see Allen and Gale (2000); for the effects of con-
Economists have been successful at developing sumer networks on market competition, see Galeotti
concepts for the study of interaction in small (2005); on the use of social networks for marketing,
groups (game theory) and interaction among large see Campbell (2008) and Galeotti and Goyal (2009);
groups (competitive markets and general equilib- for effects of networks on bidding and markets, see
rium). Social networks appear to fall in between Kranton and Minehart (2001); for effects of net-
these two extremes. A social network typically works on bargaining power, see Manea (2008).
consists of a large number of individuals and any 3 For a classical study of the effects of asymmet-
individual interacts only with a small subset of ric information on the functioning of markets, see
them. The analysis of many actors located within Akerlof (1970).
complex networks strains the plausibility of deli- 4 For a recent study on the use of social net-
cate chains of strategic reasoning, which are typi- works in agriculture, see Conley and Udry (2008).
cal in game theory. Similarly, the ‘local’ interaction 5 See for example, Acemoglu et al. (2008), Bala
in social networks makes anonymous competitive and Goyal (1998), De Marzo et al. (2003), Ellison and
equilibrium analysis implausible. This tension Fudenberg (1993, 1995), Golub and Jackson (2010);
between the large and the small is fundamental to for a recent survey of this work, see Goyal (2009).
understanding behaviour at the intersection of mar- 6 This covers a wide range of structures. A star
kets and social networks. It offers a fertile ground network (with one central hub), a circle (in which
for exciting theoretical work in the years to come. everyone is linked to two others) and the complete
There is a large body of evidence for the cor- network (in which everyone is linked to everyone
relation between social networks on the one hand else) are all instances of connected societies.
and individual behaviour and outcomes on the 7 The bridges may be seen as weak links con-
other hand. However, establishing a causal link necting communities, as Granovetter (1974) found.
from social networks has proved harder and I have The above result may then be interpreted as making
briefly discussed the issues involved. The identifi- precise an insight relating to the ‘strength of weak
cation of network effects is an important ongoing ties’: societies with many weak ties will exhibit better
research programme in economics but also in diffusion of new innovations.
many other disciplines such as health, business 8 For a discussion of this work, see Fafchamps
strategy, organization theory and sociology. The (2003, 2004), Goyal (2007) and Jackson (2008). The
availability of large longitudinal data sets on net- empirical study of the architecture of empirical
works as well as behaviour taken together with social networks is relatively new in economics. For a
continuing improvements in computing power study of the evolution of large social networks, see

5605-Scott-Chap06.indd 76 4/13/2011 2:23:43 PM


SOCIAL NETWORKS IN ECONOMICS 77

Goyal et al. (2006). In recent work, Krishnan and Akerlof, G. (1970) ‘The market for lemons’, Quarterly Journal
Sciubba (2009), Comola (2007) and Mayer and Puller of Economics 84(3): 488–500.
(2008) study the formation of links. Akerlof, G. (1997) ‘Social distance and social decisions’,
9 For an influential contribution to the study of Econometrica 65: 1005–27.
social networks in international labour migration, see Akerlof, G. and Kranton, R. (2000) ‘Economics and identity’,
Munshi (2003). Quarterly Journal of Economics 115(3): 715–53.
10 However, see Bramoulle et al. (2009) who Alesina, A. and Spolaore, E. (2003) Size of Nations. MIT Press.
show that, in contrast to the use of group affiliation Allen, F. and Gale, D. (2000) ‘Financial contagion’. Journal of
data, the use of detailed network data allows Political Economy 108(1): 1–34.
stronger identification of contextual network effects. Aumann, R. and Myerson, R. (1988) ‘Endogenous formation
For an interesting attempt at estimation of network of links between players and coalitions: An application to
effects in education and crime, see Cálvo-Armengol the Shapley Value’, in The Shapley Value, A. Roth (ed.),
et al. (2008). Cambridge University Press. pp. 175–91.
11 In recent years, the study of network forma- Bala, V. and Goyal, S. (1998) ‘Learning from neighbours’,
tion has been a very active field of study in econom- Review of Economic Studies 65: 595–621.
ics and a number of different questions have been Bala, V. and Goyal, S. (2000) ‘A non-cooperative model of
explored; see Demange and Wooders (2005) and network formation’, Econometrica 68(5): 1181–231.
Dutta and Jackson (2003) for references. Ballester, C., Cálvo-Armengol, A. and Zenou, Y. (2006) ‘Who’s
12 This model has been extended in a number of who in networks. Wanted: The key player’, Econometrica
directions by many researchers. Important contribu- 74(5): 1403–17.
tions include Hojman and Szeidl (2008) and Ferri Barabási, A.L. (2002) Linked. Boston: Perseus Books.
(2004). This model is very close in spirit to the model Blau, D. and Robins, P.K. (1990) ‘Job search outcomes for the
of connections developed in Jackson and Wolinsky unemployed and the employed’, Journal of Political
(1996). For a survey of strategic network formation, Economy 98(3): 637–55.
see Goyal (2007). Belleamme, P. and Bloch, F. (2004) ‘Market sharing agree-
13 A star has one central/hub player: all other ments and collusive networks’, International Economic
players form a single link to this central player and Review 45(2): 387–411.
have no other links. Boorman, S. (1975) ‘A combinatorial optimization model
14 These theoretical findings have led to a for transmission of job information through contact
number of experimental investigations of network networks’, Bell Journal of Economics 6(1): 216–49.
formation; for a survey, see Kosfeld (2004). Bramoulle, Y., Djebbari, H. and Fortin, B. (2009) ‘Identification
15 See Schelling (1975) for an early attempt at of peer effects through social networks’, Journal of
understanding social structure through the lens of Econometrics 150(1): 41–55.
individual choice. See Young (1998) for a study of the Brock, W. and Durlauf, S. (2001) ‘Interactions-based models’,
relations between individual choice and social struc- in Heckman and Leamer (eds.), Handbook of Econometrics:
ture and Kirman (1997) for an early discussion of the Volume V. Amsterdam.
network approach to the study of economic activity. Burt, R. (1994) The social structure of competition. Boston:
16 In independent work, Droste et al. (1999), Harvard University Press.
Hojman and Szeidl (2006), Jackson and Watts (2002) Cálvo-Armengol, A., Patacchini, E. and Zenou, Y. (2008) ‘Peer
and Skyrms and Pemantle (2000) study a similar model effects and social networks in education’. Review of
of co-evolution of social structure and behaviour. Economic Studies.
17 In a complete network, every pair of players Cálvo-Armengol, A. and Jackson, M.O. (2004) ‘The effects of
is directly linked. social networks on employment and inequality’, American
18 For a survey of these developments, see Economic Review 94(3): 426–54.
Hagedoorn (2002). Campbell, A. (2008) ‘Tell your friends! Word of mouth and
19 For related work on networks and markets, percolation in social networks’, mimeo, MIT Press.
see Belleamme and Bloch (2004) and Deroian and Carrington, P.J. (1981) ‘Horizontal co-optation through corpo-
Gannon (2006). rate interlocks’. Unpublished PhD thesis, University of Toronto.
20 For an early empirical study on interlocking Coleman, J. (1994) Foundations of Social Theory. Cambridge,
boards and firm performance, see Carrington (1981). MA: Harvard University Press.
21 For theoretical work in sociology, see Raub Coleman, J., Katz, E. and Mentzel, H. (1966) Medical
and Weesie (1990). Innovation: Diffusion of a Medical Drug Among Doctors.
Indianapolis. MN. Bobbs-Merrill.
Comola, M. (2007) ‘The network structure of informal
arrangements: Evidence from rural Tanzania’, mimeo,
REFERENCES Universitat Pompeu Fabra.
Conley, T. and Topa, G. (2002) ‘Socio-economic distance and
Acemoglu, D., Dahleh, M., Lobel, I. and Ozdaglar, A. (2008) spatial patterns in unemployment’, Journal of Applied
‘Bayesian learning in social networks’, mimeo. MIT Press. Econometrics 17: 303–27.

5605-Scott-Chap06.indd 77 4/13/2011 2:23:43 PM


78 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Conley, T.G. and Udry, C.R. (2008) ‘Learning about a new Golub, B. and Jackson, M.O. (2010) ‘Naive learning and the
technology: Pineapple in Ghana’, American Economic wisdom of crowds’. American Economic Journal:
Review, to appear. Microeconomics 2(1): 112–149.
Corcoran, M., Datcher, L. and Duncan, G. (1980) ‘Information Goyal, S. (1993) ‘Sustainable communication networks’,
and influence networks in labour markets’, in G. Duncan Tinbergen Institute Discussion Paper’, TI, pp. 93–250.
and J. Morgan (eds.), Five Thousand American Families: Goyal, S. (2007) Connections: An Introduction to the
Patterns of Economic Progress, Volume 7. Ann Arbor, Economics of Networks. Princeton, NJ: Princeton University
MI: Institute for Social Research. Press.
Dasgupta, P. and Serageldin, I. (1999) Social Capital: A Goyal, S. (2009) ‘Learning in networks’, in Handbook of Social
Multifaceted Perspective. Washington: World Bank. Economics, J. BenHabib, A. Bisin, M.O. Jackson (eds.)
De Marzo, Peter, Dimitri Vayanos and Jerry Zweibel (2003) Elsevier Press.
‘Persuasion bias, social influence, and unidimensional Goyal, S. and Joshi, S. (2003) ‘Networks of collaboration in
opinions’, Quarterly Journal of Economics 118: 909–68. oligopoly’, Games and Economic Behaviour 43(1): 57–85.
Demange, G. and Wooders, M. (2005) Group Formation in Goyal, S., van der, L.M. and Moraga-Gonzalez, J.L. (2006)
Economics: Networks, Cubs and Coalitions. Cambridge ‘Economics: Emerging small world’, Journal of Political
University Press. Economy 114: 403–12.
Deroian, F. and Gannon, F. (2006) ‘Quality improving alliances Goyal, S. and Moraga-Gonzalez, J.L. (2001) ‘R&D networks’,
in differentiated oligopoly’, International Journal of Rand Journal of Economics 32(4): 686–707.
Industrial Organization 24(3): 629–637. Goyal, S. and Vega-Redondo, F. (2005) ‘Network formation
Droste, E., Gilles, R. and Johnson, K. (1999) ‘Endogenous and social coordination’, Games and Economic Behaviour
interaction and the evolution of conventions’, in Adaptive 50: 178–207.
Behaviour in Economic and Social Environments, PhD Granovetter, M. (1974) Getting a Job: A Study of Contacts and
thesis. University of Tilburg. Careers. Cambridge, MA: Harvard University Press.
Dussenbery, J. (1949) Income, Savings and the Theory of Con- Granovetter, M. (1985) ‘Economic action and social structure:
sumer Behaviour. Cambridge, MA: Harvard University Press. The problem of embeddedness’, American Journal of
Dutta, B. and Jackson, M. (eds.) (2003) Models of the Strategic Sociology 3: 481–510.
Formation of Networks and Groups. Springer-Verlag. Granovetter, M. (1994) Getting a Job: A Study of Contacts and
Ellison, G. and Fudenberg, D. (1993) ‘Rules of thumb for social Careers. Second Edition. Chicago: University of Chicago
learning’, Journal of Political Economy 101: 612–44. Press.
Ellison, G. and Fudenberg, D. (1995) ‘Word-of-mouth com- Griliches, Z. (1957) ‘Hybrid corn: An exploration in the
munication and social learning’, Quarterly Journal of economics of technological change’, Econometrica 25:
Economics 109: 93–125. 501–22.
Fafchamps, M. (2003) Rural Poverty, Risk, and Development. Gulati, R. (2007) Managing Network Resources. Oxford, NY:
New York: Elgar Publishing. Oxford University Press.
Fafchamps, M. (2004) Market Institutions and Sub-Saharan Hagedoorn, J. (2002) ‘Inter-firm R&D partnerships: An
Africa: Theory and Evidence. MIT Press. overview of major trends and patterns since 1960’,
Fafchamps, M., Goyal, S. and van der, L.M. (2010) ‘Matching Research Policy 31: 477–92.
and network effects’, Journal of European Economic Hagerstrand, J. (1967) Innovation Diffusion as a Spatial
Association 8(1): 203–231. Process. Translated by A. Pred. University of Chicago Press.
Ferri, F. (2004) ‘Stochastic stability in networks with decay’, Heckman, J. and Borjas, G. (1980) ‘Does unemployment cause
mimeo, University of Venice. future unemployment? Definitions, questions and answers
Galeotti, A. (2005) ‘Consumer networks and search from a continuous time model of heterogeneity and state
equilibria’, Tinbergen Institute Discussion Paper 2004–75. dependence’, Economica 47: 247–83.
Galeotti, A. and Goyal, S. (2009) ‘Influencing the influencers: Hojman, D. and Szeidl, A. (2006) ‘Endogenous networks,
A theory of strategic diffusion’, Rand Journal of Economics social games and evolution’, Games and Economic
40(3): 509–532. Behaviour 551: 112–30.
Galeotti, A., Goyal, S. and Kamphorst, J. (2005) ‘Network Hojman, D. and Szeidl, A. (2008) ‘Core and periphery
formation with heterogeneous players’, Games and in endogenous networks’, Journal of Economic Theory
Economic Behaviour 54(2): 353–372. 139(1): 295–309.
Ghatak, M. and Kali, R. (2001) ‘Financially interlinked Holzer, H.J. (1987) ‘Hiring procedures in the firms: Their
business groups’, Journal of Economics and Management economic determinants and outcomes’, NBER Research
Strategy 10: 4. Working Paper No 2185.
Ghosh, P. and Ray, D. (1996) ‘Cooperation in community Holzer, H.J. (1988) ‘Search method use by unemployed youth’,
interaction without information flows’, Review of Economic Journal of Labour Economics 6: 1–20.
Studies 63: 491–519. Jackson, M.O. (2008) Social and Economic Networks. New
Glasear, E. and Scheinkman, J. (2002) ‘Non-market interac- Jersey: Princeton University Press.
tions’, in Dewatripont, Hansen, and Turnovsky (eds.), Jackson, M. and Rogers, B. (2005) ‘The economics of
Advances in Economics and Econometrics: Theory and small worlds’, Journal of European Economic Association
Applications. Cambridge University Press. 32(2): 617–27.

5605-Scott-Chap06.indd 78 4/13/2011 2:23:43 PM


SOCIAL NETWORKS IN ECONOMICS 79

Jackson, M. and Watts, A. (2002) ‘On the formation of inter- Pellizzari, M. (2004) ‘Do friends and relatives really help in
action networks in social coordination games’, Games and getting a good job?’ CEP Discussion Paper, no. 623.
Economic Behaviour 41(2): 265–91. Raub, W. and Weesie, J. (1990) ‘Reputation and efficiency in
Jackson, M. and Wolinsky, A. (1996) ‘A strategic model of social interactions: An example of network effects’,
economic and social networks’, Journal of Economic Theory American Journal of Sociology 96: 626–54.
71(1): 44–74. Rauch, J. and Casella, A. (2001) Networks and Markets.
Johnson, C. and Gilles, R. (2000) ‘Spatial social networks’, New York: Russell Sage Foundation.
Review of Economic Design 5: 273–300. Rees, A. (1966) ‘Information networks in labour markets’,
Kali, R. (1999) ‘Endogenous business networks’, Journal of American Economic Review 56: 559–66.
Law, Economics and Organization 15:3. Rees, A. and Schultz, G.P. (1970) Workers in an Urban Labour
Kirman, A. (1997) ‘The economy as an evolving network’, Market. University of Chicago Press.
Journal of Evolutionary Economics 7: 339–53. Ryan, B. and Gross, N. (1943) ‘The diffusion of hybrid seed
Kosfeld, M. (2004) ‘Economic networks in the laboratory: corn in two Iowa communities’, Rural Sociology 8: 15–24.
A survey’, Review of Network Economics 3: 20–42. Schelling, T. (1975) Micromotives and Macrobehavior. New
Kranton, R. and Minehart, D. (2001) ‘A theory of buyer- York: Norton.
seller networks’, American Economic Review 91(3): Scott, J. (2000) Social Network Analysis. London: Sage.
485–508. Skyrms, B. and Pemantle, R. (2000) ‘A dynamic model of
Krishnan, P. and Sciubba, E. (2000) ‘Links and architecture social network formation’, Proceedings of the National
in village economies’, Economic Journal 119(4): 917–949. Academy of Sciences 97(16): 9340–46.
Manea, M. (2008) ‘Bargaining in stationary environments’, Taylor, C.R. (2000) ‘The old-boy network and the young-gun
mimeo’, Harvard University. effect international’, Economic Review 41(4): 871–91.
Manski, C. (2000) ‘Economic analysis of social interactions’, Topa, G. (2001) ‘Social interactions, local spillovers and unem-
Journal of Economic Perspectives 14(3): 115–36. ployment’, Review of Economic Studies 68(2): 261–95.
Marsden, P.V. (1988) ‘Homogeneity in confiding relations’, Ule, E. (2008) Partner Choice and Cooperation in Networks:
Social Networks 10: 57–76. Theory and Experimental Evidence. Springer.
Marsden, P.V. and Campbell, K. (1990) ‘Recruitment and Ullman, J.C. (1966) ‘Employee referrals: Prime tool for
selection processes: The organizational side of the job recruiting workers’, Personnel 43: 30–35.
searches’, in R. Breiger (ed.) Social Mobility and Social Uzzi, B. (1996) ‘The sources and consequences of embedded-
Structure. Cambridge University Press, pp. 50–79. ness: The network effect’, American Sociological Review
Mayer, A. and Puller, S.L. (2008) ‘The old boy (and girl) 61(4): 674–98.
network: Social network formation on university cam- Veblen, T. (1899) The Theory of the Leisure Class. New York:
puses’, Journal of Public Economics 92: 329–47. Macmillan.
Mengel, F. and Fosco, C. (2008) ‘Cooperation through Vega-Redondo, F. (2006) ‘Building social capital in a chang-
imitation and exclusion in networks’, mimeo, University ing world’, Journal of Economic Dynamics and Control
of Alicante. 30: 2305–38.
Montgomery, J. (1991) ‘Social networks and labour-market Vega-Redondo, F. (2007) Complex Social Networks. Cambridge
outcomes: Toward an economic analysis’, American University Press.
Economic Review 81(5): 1408–18. Wasserman, S. and Faust, K. (1994) Social Network Analysis:
Munshi, K. (2003) ‘Networks in the modern economy: Methods and Applications. Cambridge, NY: Cambridge
Mexican migrants in the U.S. labour market’, Quarterly University Press.
Journal of Economics 118(2): 549–97. Watts, D. (1999) Small Worlds: The Dynamics of Networks
Myers, C. and Schultz, G. (1951) The Dynamics of a Labor Between Order and Randomness. Princeton, NJ: Princeton
Market. Englewood Cliffs. NJ. University Press.
Myerson, R. (1991) Game Theory: Analysis of Conflict. Harvard Young, P. (1998) Individual Strategy and Social Structure.
University Press. Princeton, NJ: Princeton University Press.

5605-Scott-Chap06.indd 79 4/13/2011 2:23:43 PM


7
Relational Sociology, Culture,
and Agency
Ann Mische

One of the debates surrounding social network deeply, that relational thinking is a way to over-
analysis has been whether it consists of a method come stale antinomies between structure and
or a theory. Is network analysis merely a cluster of agency through a focus on the dynamics of social
techniques for analyzing the structure of social interactions in different kinds of social settings.
relationships, or does it constitute a broader con- In this chapter, I will explore the historical
ceptual framework, theoretical orientation, or even origins of this perspective and its positioning in
philosophy of life? In an article two decades ago broader intellectual networks. While a relational
synthesizing emerging work on social networks, orientation has germinated in a number of differ-
Barry Wellman argued that network analysis goes ent intellectual hubs (and is certainly not limited
beyond methodology to inform a new theoretical to sociology),1 I will focus in particular on the
paradigm: “structural analysis does not derive its emergence of what might be called “the New York
power from the partial application of this concept School” of relational sociology during the 1990s
or that measure. It is a comprehensive paradigmatic and the constitution of a cluster of scholars work-
way of taking social structure seriously by studying ing in diverse subfields who elaborated this per-
directly how patterns of ties allocate resources in a spective in partially intersecting ways. I go on to
social system” (1988: 20). This paradigm, he goes explore four distinct ways in which scholars have
on to argue, takes relations—rather than individu- conceptualized the relationship between networks
als, groups, attributes, or categories—as the funda- and culture, with implications for different kinds
mental unit of social analysis. This argument was of substantive research. I argue that these conver-
taken up a few years later by Mustafa Emirbayer sations propose a new theoretical agenda that
and Jeff Goodwin (1994), who described the new highlights the way in which communicative inter-
“anti-categorical imperative” introduced by net- action and the performance of social relations
work analysis and explored its relationship to mediate between structure and agency across a
research on cultural and historical change. wide range of social phenomena.
While disagreement remains among network
analysts regarding this issue, a broader “relational
perspective” within sociology has been simmering
for the past three decades, often involving schol-
ars who themselves do not use formal network THE NEW YORK SCHOOL
methodology or who use it only marginally in
their research. Inspired by such eminent figures as To explain the emergence of what I am calling the
Harrison White and Charles Tilly, this perspective “New York School” of relational analysis, we can
has taken some of the broader theoretical insights use the conceptual framework that was elaborated
of network analysis and extended them to the in its own conversations and debates. New York in
realms of culture, history, politics, economics, and the 1990s was home to a set of interstitial spaces
social psychology. Fundamental to this theoretical of conversation and debate, composing what some
orientation (if it can be called that) is not merely within this perspective might call “publics,” using
the insistence that what sociologists call “structure” a particular networked meaning of that term that
is intrinsically relational, but also, perhaps more I will discuss in more detail below. These publics

5605-Scott-Chap07.indd 80 4/6/2011 11:42:01 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 81

brought together senior scholars – notably, White mid-2000s. Moreover, cultural sociology often
and Tilly – who were undergoing intensive refor- overlapped with other subareas, especially politi-
mulation of their own theoretical frameworks, in cal sociology, comparative-historical sociology,
(sometimes contentious) dialogue with emerging and the study of collective behavior and social
younger scholars who were advancing new theo- movements, thus creating significant subfield
retical syntheses and critiques, as well as graduate cross-fertilization. While a handful of researchers
students composing original frameworks for in the late 1980s and early 1990s pioneered the use
empirical research. of network analytic techniques to study cultural
To borrow from two strongly relational and historical processes (notably Erickson, 1988,
(although somewhat discordant) theories of intel- 1996; Carley, 1993, 1994); Bearman, 1993; Mohr,
lectual innovation, these publics were sources of 1994; Gould, 1995), a sizeable gap remained
intellectual opposition, energy, and excitement between formal network analysis and more inter-
(Collins, 1998), and also of experimental probing pretively oriented cultural research.
of fractal divides in theoretical perspectives, par- These streams converged in the mid-1990s in
ticularly those related to realism and constructiv- New York City, as a cluster of scholars across
ism as well as positivism and interpretivism several universities in the area engaged in a series
(Abbott, 2001a). Participants in these discussions of intensive exchanges related to networks, cul-
were linked by multiple ties that were forged and ture, and historical analysis. One center for these
enacted in a series of partially overlapping discur- debates was Columbia University, where Harrison
sive settings (workshops, miniconferences, study White arrived from Harvard (via Arizona) in
groups, dissertation committees), facilitated by a 1988, taking on the directorship of the Paul F.
set of prominent scholars who were extraordinar- Lazarsfeld Center for the Social Sciences.2 Under
ily attuned to the democratic exchange of ideas. White’s leadership, the Lazarsfeld Center spon-
As participants wrestled with the tensions gener- sored a series of ongoing interdisciplinary work-
ated in these conversations, they developed not a shops on topics including social networks,
unified theory (important differences remain sociolinguistics, complex systems, and political
among them), but rather a shared focus on the economy. These workshops brought in outside
communicative grounding of network relations speakers while sponsoring graduate students and
and the implications of these relations for under- nurturing local research and debate across inter-
standing dynamic social processes. secting intellectual domains. During this period,
To trace the emergence of this perspective, we White began thinking deeply about the origins and
need to examine the structural holes that it was transformations of language, involving many
bridging, as well as the intersecting intellectual young scholars in these discussions.3
streams that gave it a distinctive voice. During the Likewise, the Graduate Faculty of the New
mid-1990s, social network analysis was maturing School for Social Research was a sometimes tem-
as a field, with the publication of several handbooks pestuous hub of interdisciplinary debate. In the
and edited volumes (Wellman and Berkowitz, 1988; mid-1980s, then Dean Ira Katznelson recruited a
Scott, 1991; Wasserman and Faust, 1994), the cluster of top scholars – including Charles and
development of software packages such as UCINet, Louise Tilly, Janet Abu-Lughod, Ari Zolberg,
and the expansion of its professional association, Talal Asad, Richard Bensel, Elizabeth Sanders,
the International Network for Social Network Eric Hobsbawm, and others – that added new
Analysis (founded in 1978, but growing beyond its voices to the Graduate Faculty’s already strong
initial tight-knit base in the 1990s). However, much grounding in normative theories of civil society.
of the work in the field was highly formal and tech- Debates between critical theorists, poststructural-
nical, thus making it relatively inaccessible to non- ists, and structurally oriented historical scholars
mathematical researchers who otherwise might were frequent and intense, and, as I argue below,
have gravitated toward its core ideas. Most cultural helped to push Tilly toward a re-examination of
theorists saw network analysis as located squarely the role of identities, narratives, and discourse in
in the positivist camp, reducing cultural richness to theories of contentious politics, as he developed
1s and 0s and lacking attention to processes of the synthesis he labeled “relational realism.” In
interpretation and meaning-construction. 1991, Mustafa Emirbayer arrived at the New
At the same time, the subfield of cultural soci- School as an assistant professor. While he himself
ology in the United States was undergoing a rapid came from a strongly interpretive tradition, he
expansion and shift in orientation, moving beyond became interested in network analysis from watch-
the study of artistic production to encompass prac- ing his White-inspired peers at Harvard. He and
tice and discourse more generally. The Culture his fellow Harvard alum Jeff Goodwin, who was
Section of the American Sociological Association then at NYU, began writing an article to explore
grew from a relatively marginal section in the what all this fuss about network analysis was about
early 1990s to one of the largest sections by the (Emirbayer and Goodwin, 1994). The conversations

5605-Scott-Chap07.indd 81 4/6/2011 11:42:01 AM


82 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

sparked by this network of New York area scholars working papers that focused on the relationship
– in dialogue with a broader circle of researchers between language, time, and social relations
elsewhere – set the stage for the consolidation of (White, 1993, 1994, 1995) as well as an article
a perspective that crossed a series of fractal with Ann Mische highlighting the disruptive
divides, linking network relations with discourse, potential of conversational “situations” (Mische
identities, and social interaction. and White, 1998). These papers propose the
Harrison White began what might be called his notion of “network domains” as specialized sets
“linguistic turn” in the early 1990s with the publi- of ties and associated story-sets that keep those
cation of his major theoretical statement, Identity ties moving forward in time through a continuous
and Control (1992). White had been preoccupied process of reflection, reporting, and updating.
since the 1970s with the lack of theoretical under- With the complexity of modern life, White argues,
standing of what he called “types of ties,” the we are continuously forced to switch between
basic measurement unit of the mathematical multiple network domains (or “netdoms”), thus
approach to network analysis that he and his stu- creating the need for buffering in the transitional
dents pioneered at Harvard in the 1970s. In zones of “publics.”
Identity and Control, he wrestles with this ques- White’s notion of publics is an innovative twist
tion by proposing the narrative constitution of on Goffman’s work on interaction in public
social networks. Social ties, he argues, are gener- spaces; within the bubble of publics, participants
ated by reporting attempts in relation to contend- experience a momentary sense of connectedness
ing efforts at control: “a tie becomes constituted due to the suspension of surrounding ties. Such
by story, which defines a social time by its narra- publics can range from silent encounters in an
tive of ties” (White, 1992: 67). Because ties are elevator to cocktail parties, carnivals, or protest
multiple, fluid, and narratively constructed (and rallies, all of which involve a provisional equaliza-
reconstructed) in relation to evolving time frames, tion of relationships and decoupling from stories
the new challenge for network analysis, White and relations around them, which nevertheless
argued, was to understand this link between tem- may threaten to impinge on and disrupt the situa-
porality, language, and social relations. tion at hand (White, 1995; Mische and White,
Fascinated by these connections, he began to 1998). “The social network of the public is per-
probe more deeply into work on language usage, ceived as fully connected, because other network-
function, and evolution. In conjunction with a domains and their particular histories are
group of graduate students, he carried out an inten- suppressed. Essential to its mechanism is a decou-
sive reading of sociolinguistics, discourse analysis, pling of times, whereby time in public is always a
and theories of linguistic change. He was espe- continuing present time, an historic present”
cially attuned to work on the link between seman- (White, 1995: 1054). Empirical work building on
tics, grammar, and interaction context (Halliday, Goffman’s notion of publics has since been devel-
1976, 1978; Goodwin and Duranti, 1992; Schriffen, oped by several participants in those discussions,
1987), as well as studies of tense (Comrie, 1985) including Mische on communicative styles in
and the indexical (or “deictic”) nature of language Brazilian activist publics, Gibson on turn-taking
use (Hanks, 1992; Silverstein, 2003). He saw in dynamics in managerial groups, Ikegami on
contextualized grammatical references to time, Japanese aesthetic publics, and Sheller on black
space, and relations the link between language, antislavery publics in Haiti and Jamaica (described
networks, and what he called “social times.” His in more detail below).
attention to linguistic work on code switching Between 1993 and 1996, White organized a
(Gumperz, 1982) inspired some of his ideas on series of miniconferences at the Lazarsfeld Center
switching dynamics between network domain (see around the themes of time, language, identities,
below). Moreover, he saw work on “grammaticali- and networks. A broad range of outside scholars
zation” (Hopper and Traugott, 1993) as important took part (see note 4), thus helping cross-fertilize
for understanding how language emerges and the emerging “relational” perspective.4 At one of
shifts in relation to usage patterns in particular these miniconferences, Mustafa Emirbayer was
relational contexts. He also engaged with Bakhtin’s inspired to write a programmatic statement that
(1981, 1986) dialogic theory, seeing the notion of systematized some of the ideas that were being
“speech genre” as grounded in a relational semiot- discussed in the group. The resulting “Manifesto
ics attuned to multiple and shifting ties. for a Relational Sociology” (Emirbayer, 1997)
Many of these ideas were elaborated in White’s draws on pragmatist, linguistic, and interactionist
ongoing graduate seminar on “Identity and philosophies as well as historical and network
Control” at Columbia, as well as in the student- analysis to develop a critique of “substantialist”
organized workshops on sociolinguistics and approaches to social analysis. He calls instead for
social networks at the Lazarsfeld Center. These a “transactional” approach focusing on the dynam-
workshops contributed to a series of articles and ics of “supra-personal” relations that transcend

5605-Scott-Chap07.indd 82 4/6/2011 11:42:01 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 83

individual actors, and he discusses the implica- (developed in opposition to the normative orienta-
tions of this approach for historical, cultural, and tion of Parsonian functionalism) to a deep engage-
social psychological analysis. This widely cited ment with cultural processes of identity formation,
article has become one of the rallying cries of the storytelling, and boundary construction, rethought
“new relational” approach in sociology, articulat- in dynamic, relational terms.
ing its underlying philosophy in an expansive While a focus on relations and interaction was
manner that goes beyond the use of mathematical integral to Tilly’s thinking from the beginning
techniques. (Diani, 2007; Tarrow, 2008), at the New School he
While he was working on this article, Emirbayer began to pay closer attention to the ways in which
was also organizing a study group on Theory and such relations are constructed through processes
Culture at the New School that brought in gradu- of meaning making. Tilly responded to what he
ate students and some faculty from the broader saw as the solipsistic dangers of poststructuralism
New York area (including the New School, by, as he described it, “tunneling under the post-
Columbia, NYU, Princeton, CUNY, and other modern challenge.” As Viviana Zelizer writes, this
schools). Most of the authors discussed by the meant not only recognizing “that a great deal of
group were strongly relational in orientation, social construction goes into the formation of enti-
including Andrew Abbott, Pierre Bourdieu, Hans ties – groups, institutions markets, selves,” but
Joas, Alessandro Pizzorno, William Sewell, also calling on social scientists “to explain how
Margaret Somers, and Norbert Wiley. This group that construction actually works and produces its
also discussed drafts of Emirbayer’s “Manifesto,” effects” (2006a: 531). This is the perspective that
as well as a series of related articles exploring the Tilly called “relational realism,” which he con-
interface between relations and culture. His now- trasted to “methodological individualism,” “phe-
classic article with Jeff Goodwin was followed by nomenological individualism,” and “holism” in a
an article with Ann Mische that develops a rela- series of broad theoretical statements in the highly
tional theory of human agency, focusing on the productive final decade of his life. He defines
embedding of actors in multiple sociotemporal relational realism as “the doctrine that transac-
contexts, with varied orientations toward past, tions, interactions, social ties and conversations
present, and future (Emirbayer and Mische, 1998). constitute the central stuff of social life” (2004:
Emirbayer also published a paper with Mimi 72; see also Tilly, 1995, 2008a; Somers, 1998).
Sheller exploring the network composition of The evolution of this shift can be seen in a series
publics as interstitial locations for the exchange of of essays, books, and working papers that addressed
ideas (Emirbayer and Sheller, 1999). Sheller the relational dimensions of identities, narratives,
(2000) extends these ideas in her comparison of and boundaries (many of which are collected in
the linguistic markers and network embedding of Tilly, 2004, 2006a). In these papers, he continually
black antislavery counterpublics in Haiti and stressed that political process is best understood as
Jamaica, showing how these influenced the differ- a “conversation,” a trope that captures the dynamic
ing trajectories of post-abolition civil societies. association between discourse, relations, and inter-
Several study group participants (including action (Tilly, 1998a). In Durable Inequality
Mische and Sheller) were also students of Charles (1998b), Tilly turns his attention away from con-
Tilly at the New School, where they participated tentious politics to look at the relational origins of
in another essential public for discussion of rela- inequality, focusing on how durable, exclusionary
tional sociology: Tilly’s Workshop on Contentious categories emerge as solutions to relational and
Politics. This workshop was started by Chuck and institutional problems. Early chapter drafts of this
Louise Tilly at Michigan in the 1970s, trans- book were workshopped by White and others at
planted to the New School in the late 1980s, and the Lazarsfeld Center at Columbia – showing
then relocated again when Tilly moved to again the multiple intersections in the New York
Columbia in 1996 (with several name changes milieu. The emphasis on the dynamic dimension of
along the way). This famously democratic work- relationships – including discursive mechanisms
shop drew in faculty and students from the greater of attribution, identity activation, and boundary
New York region, in addition to many notable shift – is forcefully expressed in Tilly’s collabora-
international scholars. Students and younger tive work with Doug McAdam and Sidney Tarrow,
researchers presented work-in-progress alongside Dynamics of Contention (McAdam et al., 2001), as
senior scholars and were encouraged to offer com- well as in a series of other articles describing “rela-
mentary and critique. During the 1990s, Tilly was tional mechanisms” as key elements in explaining
undergoing an important transition in his thinking, political processes. Tilly’s attention to the social
spurred by debates in the workshop as well as dynamics of stories can also be seen in his later
challenges he was receiving from normative and popular work, Why? (Tilly, 2006b), which describes
poststructuralist scholars at the New School. the relational underpinnings of different kinds of
He was moving from a resolute structuralism reason giving.

5605-Scott-Chap07.indd 83 4/6/2011 11:42:01 AM


84 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Several other prominent New York area schol- for relational sociology. David Stark came to
ars engaged in this local dialogue on culture, rela- Columbia from Cornell in 1997, bringing a focus
tions, and contentious politics, often participating on the complex network combinatorics involved
in several of the workshops described above. in political and economic transitions. Duncan
Karen Barkey (at Columbia) and Eiko Ikegami Watts was a postdoctoral fellow in 1997–98 and
(at Yale) completed major historical works on the joined the faculty in 2000, contributing additional
relational dimensions of the transformation of mathematical expertise in relation to his work on
state bureaucratic control in the Ottoman Empire small-world networks (Watts, 1999). And in 1999
and Japan, respectively (Barkey, 1994; Barkey Peter Bearman arrived at Columbia from Chapel
and van Rossem, 1997; Ikegami, 1995, 2000). Hill, adding an important voice to the local contin-
Ikegami’s second book (2005) builds directly on gent working at the border of networks and cul-
White’s language work by examining the emer- ture (see below). Many other Columbia PhDs
gence of new forms of civility across aesthetic since 2000 have studied with some combination
networks in Tokugawa Japan. Francesca Polletta of White, Tilly, and these relationally oriented
finished several important books and articles scholars.5 Most of these students have combined
while at Columbia focusing on communicative attention to networks and discourse in some way,
processes of deliberation and storytelling in polit- building on the work from the previous decade
ical protest; her work has a strongly relational described above.
focus, albeit with a more interpretive grounding In short, the New York area in the 1990s and
than either White or Tilly (Polletta, 2002, 2006). 2000s was a rich hub of conversation that contrib-
Polletta collaborated with Jeff Goodwin and James uted to a reformulation of the link between net-
Jasper (at NYU) in a volume on the role of emo- works, culture, and social interaction. I would
tions in social movements (Goodwin et al., 2001); suggest that we can explain these conceptual inno-
this theme was taken further by Goodwin and vations by drawing on the core concepts developed
Jasper in a series of critical articles challenging in these discussions, described in more detail
the structural bias of social movement theory and below. The “publics” convened across these New
arguing for a revived focus on culture, creativity, York universities were characterized by a complex
strategy, and emotions (Goodwin and Jasper, web of overlapping ties (colleagueship, co-author-
1999, 2004; see also Jasper, 1997, 2006). ship, dissertation advising, workshop participa-
In addition, other Tilly students from the New tion, and study group membership) as well as
School and Columbia during that period blend a frequent cross-fertilization by visiting scholars
focus on relations, culture, and interaction without from allied perspectives. The equalizing dynamic
using mathematical network analytic techniques. that was famously characteristic of White and Tilly
Javier Auyero (2001, 2003) examines interpreta- is analogous to the “open regimes” – combined
tion, performance, and networks in his study of with geographic proximity – which institutional
poor people’s protest and politics in Latin America, scholars have seen as critical to innovation (e.g.,
drawing heavily on Tilly’s notion of “relational Owen-Smith and Powell, 2004). While Columbia
mechanisms.” John Krinsky (2007) studies the co- and the New School served as key incubators,
constitution of discourse, relations, and conten- researchers from area universities (NYU, Princeton,
tious events in struggles over welfare-to-work Yale, SUNY, CUNY, Rutgers, Penn, and others)
programs in New York City. Chad Goldberg (2007) joined in these partially overlapping conversations.
examines the reconstruction of the discourse of What emerged was a perspective that straddled
citizenship through struggles over class, race, and positivist and interpretivist positions, stressing the
welfare rights. And Victoria Johnson (2008) mutual constitution of networks and discourse, the
explores the relationship between organizations, communicative nature of social ties, and the inter-
culture, and social relations in her study of the play between multiple relations in social action. As
historical transformations of the Paris Opera. In I argue below, these researchers also show how a
addition to their work with Tilly, these scholars are focus on interaction, performance, and social
all strongly influenced by Bourdieu’s work on the dynamics helps to mediate (if not resolve) the ten-
relational sources of cultural distinction; Goldberg sion between structure and agency.
and Johnson co-authored articles with Emirbayer
exploring the links between Bourdieu and other
branches of research (Emirbayer and Goldberg,
2005; Emirbayer and Johnson, 2008). Goldberg, FOUR APPROACHES TO THE LINK
Johnson, and Krinsky were also participants in the BETWEEN NETWORKS AND CULTURE
New School Theory and Culture group, along with
Mische, Gibson, and Sheller. While I have been focusing so far on the emer-
Additional scholars arriving at Columbia in the gence in the 1990s of a cluster of scholars in the
late 1990s helped to cement its position as a hub New York area, this group is embedded in a much

5605-Scott-Chap07.indd 84 4/6/2011 11:42:01 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 85

broader intellectual network of researchers who relationships (Coleman et al., 1966) to competi-
have been contributing to discussions about net- tive mimicry based on structural equivalence
works, culture, and agency for the past three dec- (Burt, 1987). The idea of networks as conduits for
ades. Although this work is international in scope cultural transmission has been extended to the dif-
and has developed in dialogue with the highly fusion of social movement participation and rep-
relational work of European scholars such as ertoires of contention, often drawing upon rational
Bourdieu, Luhmann, and Elias (see Fuchs, 2001; choice theories of the critical mass (Granovetter,
Fuhse, 2009; Fuhse and Mützel, 2010), the link 1978; Marwell et al., 1988; Oliver and Myers,
between networks and culture has been most 2003; Kim and Bearman, 1997). The concept of
clearly elaborated in a set of closely linked “tipping points,” taken from critical mass theory,
American universities. Harvard has repeatedly has been popularized by Malcolm Gladwell (2000)
served as a hub for the development of network and has been heavily influential in studies of mar-
analysis since the 1970s; many early scholars keting and consumption, although some tenets of
linking networks and culture (such as Bearman, this theory have been recently challenged by
Carley, Emirbayer, Goodwin, Gould, Ikegami, Duncan Watts and colleagues using models of
Morrill, and Somers) have come out of the second influence in small-world networks (Watts and
wave of White-inspired conversation in the 1980s. Dodds, 2007; Watts, 1999; see also Gibson,
Chicago has been a second hub, housing impor- 2005b).
tant debates about contingency, creativity, and What characterizes these approaches is the
multiple networks, while Princeton has been cen- assumption that cultural elements (information,
tral in linking social ties to culture, institutions, ideas, attitudes, practices) are something external
inequality, and economic relations. Toronto, Stony to the networks. Network relations serve as con-
Brook, Arizona, UC Irvine, Michigan, Berkeley, duits of transmission or influence from one node
UNC-Chapel Hill, Stanford, and Rutgers have to the next, but the nodes and ties have an exist-
also been important centers for relational sociol- ence that is independent of the cultural object,
ogy at different periods in time. attitude, or practice that travels across them.
I will incorporate this expanded group in dis- Social ties contribute to the adoption and diffusion
cussing four distinct ways in which the link of cultural elements but are not themselves com-
between networks and culture has been conceptu- posed by cultural practices. While this approach
alized over this period. Because much work in this has provided valuable insights into the dynamics
area is detailed in other chapters in this volume of cultural flows, it is grounded in a limited and
(especially those by Valente and DiMaggio), my substantialist account of the relationship between
analysis will be schematic rather than exhaustive, networks and culture. Network nodes and ties are
sketching some of the main analytic tendencies seen as pre-given and unproblematic, as are the
linking culture, networks, and agency. Many of cultural goods that move between nodes; as a
my examples come from the field of social move- result both networks and cultural processes take
ments and contentious politics, since this is the on a reified quality that eclipses their mutual con-
work I know best; however, work in this area stitution.
extends to other substantive subfields as well. I
will demonstrate how each of these perspectives
builds on the shortcomings of the others in con-
structing a more dynamic, processual account of Networks as Shaping Culture
the culture-network link. (or Vice Versa)
A second major theoretical perspective focuses on
the causal relationship between networks and cul-
Networks as Conduits for Culture ture, that is, how networks shape culture, or vice
versa. While this perspective shares some charac-
One of the earliest and most straightforward ways teristics with the “cultural conduit” approach –
of linking culture with networks has been to see particularly the role of social influence – it places
networks as carriers or “pipelines” of social influ- a stronger emphasis on the culturally generative
ence, in the form of attitudes, ideas, and innova- dimension of network structures. There are three
tions. As other chapters discuss in more depth main variants of this approach: a focus on network
(e.g., Valente in this volume), a variety of mecha- clusters as incubators of culture; on network posi-
nisms for the transmission and diffusion of cultural tions as generating categorical identities (or cat-
ideas have been proposed by network researchers nets); and on network bridges as a source of
since the 1950s. These range from simple contact, cultural resources and creativity. Finally, there has
information flow, and opinion leadership (Katz recently been a move in the other direction, show-
and Lazarsfeld, 1955) to normative pressure in ing how cultural factors (such as tastes and moral

5605-Scott-Chap07.indd 85 4/6/2011 11:42:01 AM


86 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

frameworks) create relational affinities that shape networks contribute both to diversity in taste and
network structure. genre differentiation. Bonnie Erickson (1996)
The first of these variations, which I’ll call the builds on this insight by demonstrating that high-
incubator approach, focuses on the intense com- er-status actors tend to have more diverse cultural
mitments and solidarities generated by location repertoires, due to a greater variety in network
within particular network clusters or enclaves. ties. Recent work on social movements has shown
Alberto Melucci (1989), for example, describes that interorganizational bridging and network
how social movement identities develop in sub- desegmentation can contribute to the multivalent
merged countercultural networks (see also Taylor symbolism and brokerage activity useful for coali-
and Whittier, 1992). Donatella della Porta (1988) tions (Ansell, 1997; Mische, 1996; Mische and
notes that tight-knit, strong-tie networks may be Pattison, 2000; Diani, 2003; Hillmann, 2008).
especially important for supporting engagement in What we consider “good ideas” are often bor-
high-risk activism. Overlapping involvements can rowed from other networks, thus making network
intensify the incubator effect (Fernandez and bridging (or interstitial locations in institutional
McAdam, 1988; Gould, 1991, 1995; Meyer and fields) the key to innovation (Burt, 2004, 2005;
Whittier, 1994; Diani, 1995, 2003; Osa, 2001, Clemens and Cook, 1999; Uzzi and Spiro, 2005;
2003; Mische, 2003, 2007; Baldassari and Diani, Mische, 2007; Morrill, forthcoming). And Internet
2007) since densely overlapping relations bring communication has made network diversity and
identities, loyalties, and solidarities generated in weak ties the keys to the emergence of a new
one network domain (home, neighborhood, reli- “networked individualism” (Wellman et al., 2003;
gion, school) to bear on another (e.g., social Boase and Wellman, 2006). In these cases, theo-
movement mobilization). Friedman and McAdam rists focus on the generation of culture through
(1992) argue that strong preexisting ties in social relational intersections, rather than through intra-
movement networks provide “identity incentives” cluster solidarities or categorical positioning.
for social movement participation; McAdam and Finally, recent work turns the causal arrow in
Paulsen (1993) look at the flip side of this, explor- the other direction by arguing that cultural tastes,
ing how salient countervailing identities devel- values, and moral frameworks can shape network
oped in competing strong-tie networks can impede structure. Building on deeply relational work by
mobilization. Bourdieu (1984) and DiMaggio (1987), Omar
However, enclaves of strong or overlapping ties Lizardo (2006) takes a “constructionist” approach
are not the only source of identities and discourse; to the relationship between culture and networks.
other researchers take what I call the catnet He argues that “highbrow” cultural tastes are
approach, building upon the early idea proposed more easily “converted” into exclusionary and
by Harrison White (2008 [1965]) and developed solidaristic strong-tie networks than tastes for
by Tilly (1978) that identities are born from popular culture, which facilitate weak ties that
emerging awareness of structural equivalence in bridge locations in social space. Vaisey and
network position. For example, Roger Gould Lizardo (2009) extend these insights to the realm
(1995) shows how “participatory identities” in of moral values, arguing that deep-seated (and
nineteenth-century Paris insurrections shifted from largely unconscious) moral worldviews provide
class to urban community, based on the changing the basis for the emotional “click” that leads
network positions of participants in relation to to the selection of friendship relations, as well as
work, neighborhood, and the state. Likewise, Peter the effort (or lack of effort) that contributes to
Bearman (1993) uses blockmodeling techniques the cultivation or decay of those ties over time.
to show how the shifting rhetorical orientations of In both cases, cultural tastes or values shape
pre–civil war English elites were rooted in chang- network structure, rather than the other way
ing network positions. In both cases, position in around.
relation to other blocks of actors is an important What links these approaches is a nuanced
generator of shared identities and discourse, rather examination of the mutual influence between net-
than simply solidarities and pressures within an work structures (enclaves, positions, bridges) and
enclave. cultural elements (identities, tastes, moral values).
A third approach stresses network intersec- Networks and culture are seen as autonomous
tions, or bridges, as creators of cultural resources, variables that impact each other but that are onto-
contributing to status, mobility, coalition building, logically distinguishable components of social
and cultural innovation. This can be seen as the life. This assumption of causal autonomy simpli-
opposite of the enclave approach, because it fies analysis and allows for the use of network
focuses on weak ties, network diversity, and struc- measures in models containing cultural indicators.
tural holes rather than on dense network clusters However, it does not go as far as other recent work
(Granovetter, 1973; Burt, 1992). For example, in seeing networks themselves as composed of
Paul DiMaggio (1987) argues that wide-ranging cultural processes, as I discuss below.

5605-Scott-Chap07.indd 86 4/6/2011 11:42:01 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 87

Networks of Cultural Forms his analysis deeper into cultural and institutional
theory by applying blockmodeling techniques to
A third major analytical perspective conceives Foucault’s notion of institutional power (Mohr
of culture itself as organized into networks of and Neely, 2009) and co-authoring with Harrison
cultural forms, including concepts, categories, White on the modeling of institutional change
practices, and narrative events. Margaret Somers, (Mohr and White, 2008).
for example, describes a “conceptual network” as A number of other researchers have applied the
“a structured relational matrix of theoretical prin- notion of duality in mapping cultural elements.
ciples and conceptual assumptions.” She argues Breiger (2000) uses correspondence analysis and
that these networks deeply constrain historical Galois lattices to show deep mathematical simi-
processes of interpretation and concept formation: larities between the theories of Bourdieu and
“concepts cannot be defined on their own as single Coleman. Martin (2000) examines the dual asso-
ontological entities; rather, the meaning of one ciation between the symbolic representation of
concept can be deciphered only in terms of its animals and job occupations in a Richard Scarry
‘place’ in relation to the other concepts in its web” children’s book, using an entropy-based disper-
(1995: 135–36). Working from this premise, a sion measure to reconstruct “the logic of the
wide array of scholars has applied formal rela- dispersion of species across the occupational
tional techniques to the study of cultural networks. map” (Martin, 2000: 206; see also Martin, 2002).
Some approaches examine the structure of direct Ann Mische and Philippa Pattison (2000) propose
connections among cultural elements, while others a tripartite version of lattice analysis to examine
analyze the “dual” or interpenetrating relations intersections among political organizations, their
of cultural forms with other kinds of elements projects, and coalition-building events during the
(e.g., people, groups, events). Among the varied Brazilian impeachment movement. King-to Yeung
approaches to this analysis, I’ll focus here on two: (2005) uses Galois lattices to map relations
techniques for cognitive and discursive mapping between meanings attributed to persons and to
and analysis of narrative or sequential relations. relationships, showing how a group’s “meaning
Kathleen Carley has been a pioneer in the area structure” is associated with variation in leader-
of cognitive mapping, beginning with her early ship structure and group stability. John Sonnett
work in extracting mental models from cultural (2004) uses correspondence analysis to show the
texts (Carley and Palmquist, 1992; Carley, 1993, association between genre configurations and
1994; Carley and Kaufer, 1993). Carley goes boundary drawing in musical tastes. And Craig
beyond conventional content analysis by examin- Rawlings and Michael Bourgeois (2004) demon-
ing relations between concepts, writing that “the strate how the dual association between organiza-
meaning of a concept for an individual is embed- tions and credentialing categories differentiate an
ded in its relationship to other concepts in the institutional field into distinct niche positions.
individual’s mental model” (Carley and Palmquist, A more temporal approach to cultural mapping
1992: 602). These mental models, she argues, uses formal relational methods to analyze the nar-
serve as samples of the representation of the indi- rative or sequential structure of discourse and
vidual’s cognitive structure, and they can be ana- interaction. For example, Roberto Franzosi (1997,
lyzed using network analytic measures such as 2004) has developed a formal methodology for
density, consensus, and conductivity (Carley, analyzing “semantic grammars,” focusing on rela-
1993; Hill and Carley, 1999). More recently, she tions between subjects, actions, and objects. As he
has examined complex intersections between dif- argues, such a methodology is intrinsically rela-
ferent kinds and levels of relations, focusing on tional, first for “expressing mathematically the
communication and learning in an “ecology of complex relations between words” (1997: 293),
networks” (e.g., Carley, 1999). but also more substantively in mapping relations
John Mohr has been another pioneer in mode- among sets of actors, linked by different kinds of
ling cultural forms, using blockmodeling and historical actions. Charles Tilly (1997, 2008b)
Galois lattices to examine relations between dis- combines semantic grammars with network ana-
course and practice in changing institutional lytic tools, using blockmodeling techniques to
fields. Using a cultural adaptation of the Simmelian compose partitions on sets of actors linked by dif-
notion of “duality” elaborated by Breiger (1974, ferent kinds of actions (e.g., claim, attack, control,
2000), Mohr studies the dual association between cheer), thus mapping the changing relationships
historical representations of identity categories involved in the parliamentarization process in
and poverty relief services (Mohr, 1994; Mohr and Great Britain (see also Tilly and Wood, 2003;
Duquenne, 1997), as well as the changing rela- Wada, 2004).
tional logic of affirmative action categories and Other mapping strategies focus on the sequen-
practices (Mohr and Lee, 2000; Breiger and Mohr, tial character of narrative and interaction. For
2004; Mohr et al., 2004). Recently, he has carried example, Peter Bearman and Kate Stovel (2000)

5605-Scott-Chap07.indd 87 4/6/2011 11:42:01 AM


88 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

treat autobiographical stories as networks of ele- Here I examine how four younger scholars
ments linked by connective narrative arcs, and have developed this perspective in recent work.
apply network analytic techniques (such as path The commonalities in this work are no accident;
distance, reach, and centrality) to compare their two of these researchers came out of the New York
narrative structures. Bearman et al. (1999) extend School described above, and the other two came
this technique to historical “casing,” showing how out of the closely aligned Chicago milieu, both of
dense clusters of narrative elements (composed of which have genealogical links to the Harvard hub
multiple overlapping autobiographical stories) of relational sociology in the 1970s and 1980s. A
create robust historical cases that are resistant to recent generation of incubatory workshops (organ-
future reinterpretation. Andrew Abbott’s “optimal ized by McLean and Mische at Rutgers and
matching” techniques for comparing sequences of Gibson at Penn) has helped to nourish an innova-
events provide insight into the narrative structure tive perspective focusing on the dynamic con-
of “cultural models” underlying institutional tra- struction and deconstruction of network relations
jectories (Abbott and Hrycak, 1990; Abbott, 1995; through temporally unfolding processes of talk
see also Stovel et al., 1996; Blair-Loy, 1999). and interaction. Strongly influenced by the work
Several scholars have combined sequences meth- of Erving Goffman, this work involves deepening
ods with network analysis to show how both net- attention to communication, setting, performance,
works and careers shift together over time (Giuffre, and interaction, showing how these are simultane-
1999; Stark and Vedres, 2006). ously constitutive of and permeated by network
These techniques are one expression of a relations.
broader theoretical perspective linking temporal One of the most detailed network appropria-
and relational structures with historical contin- tions of Goffman can be seen in Paul McLean’s
gency and theories of social change. Such tech- (1998, 2007) study of the rhetorical construction
niques allow us to conceive of historical process, of patronage ties and self-presentations in
as Abbott describes it, as occurring in “a world of Renaissance Florence. McLean argues that both
socially structured and generated trajectories selves and relations are discursively constructed
linked by occasional turning points: a network in by patronage seekers when they appeal to notions
time” (Abbott, 2001b: 253). This perspective such as “friendship,” “honor,” “respect,” and “def-
focuses on the multiplicity and intersection of erence.” By “keying” (to use Goffman’s term)
social and cultural structures, as well as the particular dimensions of relationships, they signal
resourceful agency of individuals and collectivi- the “type of tie” that people strategically hope to
ties in sustaining and transforming those (Sewell, activate as they build networks capable of provid-
1992; Emirbayer and Mische, 1998). Network ing them with various kinds of material and social
techniques help to show the robust and interlock- rewards. Note here that in this perspective, net-
ing nature of cultural structures, as well as the works themselves are the dynamic and changing
social locations and historical periods in which results of discursive “framing processes,” although
these can be challenged and reformulated. at the same time position in these networks shapes
the kinds of discursive moves one is able and
likely to make.
Networks as Culture via Interaction Likewise, Mische (2003, 2007) studies the dis-
cursive and performative dynamics of network
A final major approach to the network-culture link construction in a multiorganizational field that is
moves beyond the conception of cultural forms as itself undergoing change. In her ethnographic and
autonomous from networks (and thus capable of historical study of Brazilian youth activist net-
being “transmitted” or “incubated” or “trans- works, she maps the trajectories of overlapping
formed” by means of network ties), focusing institutional affiliations among young activists in
rather on networks themselves as constituted by student, religious, partisan, professional, NGO,
cultural processes of communicative interaction. and business groups during a period of democratic
While early work in the symbolic interactionist reconstruction. She builds on Goffman’s notion
tradition (Fine and Kleinman, 1983) examined the of “publics” by showing how activists highlight,
link between networks, meaning, and group inter- suppress, segment, and combine dimensions
action, this connection has recently been revital- of their multiple identities as they create new
ized by younger researchers, often in response to settings for civic and political intervention.
the limitations of the methodologies described Extending the concept of “group style” developed
above. For example, the study of network effects by Eliasoph and Lichterman (2003), she analyzes
on identities and coalitions begs the question of how actors switch between different modes
how actors actively construct relations of solidar- of political communication as they grapple
ity or alliance through the communicative activa- with the relational tensions posed by particular
tion (or deactivation) of network ties. institutional intersections.

5605-Scott-Chap07.indd 88 4/6/2011 11:42:01 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 89

A somewhat different appropriation of Goffman between structure and agency. The study of rela-
can be seen in David Gibson’s work on the tional settings, patterns and constraints can be
sequential dynamics of conversation and the ways linked to a focus on strategic (and sometimes trans-
that these are permeated by different kinds of rela- formative) maneuvering by motivated, culturally
tionships. Gibson (2003, 2005a) offers a formali- embedded actors. Relations in this conception have
zation of Goffman’s “participation framework,” durability, in that they have histories, meanings,
focusing on the moving window of the changing obligations, and projected futures; yet this durabil-
relations between speaker, target, and unaddressed ity requires communicative work and is subject to
recipients within small-group interaction settings. negotiation, contestation, and opportunistic chal-
He shows how conversational dynamics (i.e., who lenge. Both opportunities and constraints result
takes the floor, when, and after whom) are affected from the fact that multiple relations can potentially
both by formal institutional hierarchies and by enter into play, charging relational settings with
network ties such as friendship and co-work. In tension, drama, and potential for change.
this way, he demonstrates how fleeting ties forged
through co-involvement in interaction sequences
enact preexisting ties of a more durable kind. Like
McLean and Mische, he has focused on the strate- FURTHER LINKS AND DIRECTIONS
gic and opportunistic dimension of conversation,
as speakers pursue goals and build relations by The sketch that I have given here of recent devel-
means of particular discursive moves (Gibson, opments in relational sociology is certainly not
2000, 2005c). exhaustive or bounded; rather it represents my
Finally, McFarland (2001, 2004) analyzes the own situated perspective on a sprawling network
relation between networks, discourse, and perfor- of overlapping conversations across several socio-
mative interaction in his study of classroom resist- logical subdisciplines. While network imagery – if
ance in high school settings. Drawing on the work not network analytic techniques – is central in
of Goffman and Victor Turner, he describes how most of the work that I have described, it has close
students switch between “social frames” and kinship with other kinds of relational metaphors
“person frames” in disruptive dramas that chal- that have gained currency among allied scholars,
lenge institutional relations in the classroom including those of fields, ecologies, and circuits.
(McFarland, 2004). In a recent series of articles, In closing, I would like to mention several distinct
he has used network visualization techniques but intersecting streams of research that are also
(Moody et al., 2005) to show how different “dis- deeply relational and have taken some interesting
cursive moves” contribute to the stabilization and turns in recent years.
destabilization of classroom relations, arguing John Levi Martin (2003, 2009), for example,
that it is “through talk that interactional networks traces the genealogy of the “field” metaphor in
shift, stabilize and are potentially undermined” social analysis from Lewin and Bourdieu through
(McFarland and Diehl, 2009: 4). new institutionalism (Powell and DiMaggio, 1991;
While the work of these four scholars provide see also Fligstein, 2001; Owen-Smith and Powell,
especially vivid examples of the dynamic con- 2008; Mohr, 2010). The field perspective, Martin
struction of ties via conversation, others research- argues, offers an alternative to conventional social
ers have explored similar patterns. For example, science models of causality in its focus on the
Bearman and Paolo (2004) demonstrate that subjective alignments and propulsive forces
people segment topic domains in relation to involved in social positioning. Work drawing on
different conversational partners. Smilde (2005, field imagery includes studies of artistic elites
2007) describes how network-based conversations (DiMaggio, 1991, 1992); social movement organ-
influence the construction of conversion narra- izations and repertoires (Ennis, 1987; Klandermans,
tives. Wagner-Pacifici (2000, 2005) examines the 1992; Clemens, 1997; Evans, 1997; Armstrong,
performative and discursive composition 2002; Davis et al., 2005; Schneiberg and
of moments of relational disruption and transfor- Lounsbury, 2008); organizational conflict (Morrill,
mation, such as standoffs and surrenders. Recent 1995; Morrill et al., 2003); and culinary profes-
collaborations with Harrison White address the sionals (Leschziner, 2009). Moreover, the concept
generation of meaning, strategy, and power of social fields has also been central to relationally
through switching across “netdoms” (White et al., oriented historical research that focuses on culture
2007; Fontevila and White, 2010), extending the as discourse and positioning (e.g., Spillman, 1995;
theoretical agenda developed during the 1990s in Steinberg, 1999; Gorski, 2003; Steinmetz, 2008).
the New York School.6 Others have studied links across multiple fields,
The shared focus in this work on the conversa- networks, or institutional “ecologies,” often focus-
tional and performative enactment of ties allows ing on the ways that intersecting relational logics
these scholars to elide traditional dichotomies reinforce, constrain, or transform each other.

5605-Scott-Chap07.indd 89 4/6/2011 11:42:01 AM


90 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

This idea is central to the pathbreaking work of between ontology and epistemology (as with that
John Padgett and his collaborators on the coupling between realism and constructivism, or between
and decoupling of relational logics in Renaissance structure and agency) becomes productive rather
Florence (Padgett and Ansell, 1993; Padgett, than troubling; something is “real” because it pro-
2001; Padgett and McLean, 2006). Many histori- duces actions, which are necessarily grounded in
cal sociologists have similarly sought to combine the interpretation of relations. One exciting vein to
a focus on relational contingency and social struc- be tapped is that of pragmatist semiotics, as pro-
ture by analyzing interactions within “relational posed by Peirce, which focuses on the triadic rela-
settings” (Somers, 1993) or between multiple tion between sign, object, and “interpretant.” The
social orders (see reviews of this extensive litera- interpretant is the product of the action involved in
ture by Clemens, 2007; Adams et al., 2005). Such the “addressing” relation, which brings forth new
multiplicity is also addressed in Abbott’s (2005) interpretations – and thus, by extension, new rela-
concept of “linked ecologies,” in which different tions among actors mediated by interpretations of
institutional arenas are connected through “hinge” objects in the world (Emirbayer, 1997). This move
strategies that work in both ecologies at once. helps us transcend the realist-constructivist divide
The ecological metaphor itself is intrinsically we have inherited from Saussurean semiotics, a
relational, with a long history going back to the move implicit (but not fully elaborated) in Tilly’s
Chicago School (Abbott, 1999) and recently term “relational realism.”7
revived in work on organizational niche formation Because most social science research – including
and population dynamics (Hannon and Freeman, much work on culture and networks – is still
1989; McPherson et al., 1991). rooted in Saussurean (and Kantian) antinomies,
In addition, recent work in economic sociology this poses a number of challenges for the future.
stresses the relational dimension of economic I would argue that we need to craft an approach to
exchange, while paying attention to meaning and theory and research that views relations, interpre-
process. Viviana Zelizer (2004, 2005a, 2005b) tations, and actions as mutually generative, yet
describes how differentiated ties ramify into also subject to what Peirce calls the “resistance”
“circuits of commerce” involving “different under- of objects in the world. As I have demonstrated in
standings, practices, information, obligations, my own work, the formal representations we gain
rights, symbols, and media of exchange.” She from network analytic techniques provide useful
argues that these differ from networks, tradition- insight into the complex patterning of relation-
ally conceived, in that “they consist of dynamic, ships – and thus the structural opportunities, con-
meaningful, incessantly negotiated interactions straints, and dilemmas actors confront. But these
among the sites” (2005a: 293). Other scholars representations need to be complemented by his-
have focused on the moral weighting of exchange torical, ethnographic, and interview research that
relations and their embeddedness in organizations examines the communicative interplay, strategic
and networks (Fourcade and Healy, 2007; Healy, maneuvering, and reflective problem solving car-
2006), as well as on the importance of networks ried out by actors in response to these relational
and meanings in economic restructuring (Bandelj, tensions and dilemmas.
2008). Harrison White’s early work on markets As Jan Fuhse (2009) argues, this requires atten-
(revamped in his 2004 book) also pays attention to tion both to the observable communicative proc-
processes of communication, signaling, and mean- esses that compose networks – which he, like
ing production among networks of producers, Emirbayer, calls “transactions” – and to the “mean-
focusing on local processes of market differentia- ing structure” of networks, grounded in intersub-
tion and niche production (see also Bothner, 2003; jective expectations as well as systems of categories
Bothner et al., 2004; Hsu and Podolny, 2005). and the ongoing interpretive work of situated indi-
Finally, one of the most promising future viduals. This approach also builds on recent theo-
directions of this work is the recent revival of ries of “situated actions” in multilayered social
pragmatist thinking, as informed by this emerging and institutional contexts (Vaughan, 2002; see also
relational perspective (Joas, 1997; Whitford, 2002; Broadbent, 2003). An important future challenge
Lichterman, 2005; Emirbayer and Goldberg, 2005; lies in understanding how the communicative con-
Gross, 2009, 2010; Mische, 2007, 2009; Herrigal, struction of relations is channeled and constrained
2010). Early statements by Emirbayer (1997) and by institutions, which influence the durability,
Somers (1998) make explicit the connection robustness, and constraining power of social ties
between network thinking and the pragmatist the- (Swidler, 2001; Owen-Smith and Powell, 2008;
ories of Dewey, Mead, James, Peirce, and others. see also Stinchcombe, 1997).8 In this light, the
Likewise, Abbott (1999) reminds us that the roots practical and communicative construction of such
of American sociology in the Chicago School durability – along with the multiple temporalities
were pragmatist as well as relational in orienta- in which relations are embedded – become in
tion. In this perspective, the (necessary) tension themselves the focus of sociological attention.

5605-Scott-Chap07.indd 90 4/6/2011 11:42:01 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 91

The work discussed in this chapter brings us to and Martina Morris, although all three of them had
this threshold and suggests a compelling frame- left by the mid-1990s.
work for future research. More than just a set of 3 New York area students centrally involved in
analytical techniques, the new relational sociol- discussions about networks and culture at the
ogy becomes a way of challenging the core theo- Lazarsfeld Center during the mid-1990s included
retical and methodological divides in the discipline. David Gibson, Melissa Fischer, Salvatore Pitruzzello and
The effervescent “New York moment” described Matthew Bothner (from Columbia); Ann Mische and
above was one formative conversational hub in a Mimi Sheller (from the New School); and Shepley Orr,
recent movement that returns sociology to its rela- a visiting scholar from Chicago. Earlier students in this
tional and pragmatist roots, while suggesting a ambit who also worked with Burt, Leifer, and Morris
new agenda for studying the dynamic interplay of included Shin-Kap Han, Holly Raider, Valli Rajah,
networks and culture. Andres Ruj, and Hadya Iglic. While my own degree
was at the New School (supervised by Tilly), I was a
visiting scholar at the Lazarsfeld Center from 1994 to
1998 and I was a postdoc from 1998 to 1999.
ACKNOWLEDGEMENTS 4 According to conference records, outside par-
ticipants in these mid-1990s miniconferences at
I would like to thank Jeff Boase, Phaedra Daipha, Columbia included Andrew Abbott, Ron Breiger,
Mustafa Emirbayer, Jan Fuhse, David Gibson, Jerome Bruner, Kathleen Carley, Aaron Cicourel,
Neha Gondal, John R. Hall, Jim Jasper, Corrine Elisabeth Clemens, Randall Collins, Michael Delli-
Kirchner, John Krinsky, Eloise Linger, Paul Carpini, Paul DiMaggio, Mustafa Emirbayer, Robert
McLean, Dan Nexon, Ignacia Perugorría, John Faulkner, Michael Hechter, Eiko Ikegami, Walter
Scott, Mimi Sheller, Lyn Spillman, Sid Tarrow, Mischel, William Ocasio, John Padgett, Philippa
Dianne Vaughan, Viviana Zelizer, and the partici- Pattison, Richard Schweder, Ann Swidler, Charles
pants in the Rutgers Workshop on Networks, Tilly, Chris Winship, Viviana Zelizer, and others.
Culture and Institutions and the Columbia 5 Other Columbia PhDs since 2000 include Delia
Workshop on Meaning, Language and Socio- Baldassari, Matthew Bothner, Andrew Buck, Emily
cultural Processes for their criticisms and sugges- Erickson, Jorge Fontdevila, Fumiko Fukase-Indergaard,
tions on early drafts of this chapter. Also, thanks Frederic Godart, Hennig Hillman, Jo Kim, Sun-Chul
to the participants in a rollicking debate on the Kim, Jennifer Lena, Denise Milstein, Sophie Mützel,
Contentious Politics listserv that helped me think Paolo Parigi, Joyce Robbins, Tammy Smith, Takeshi
through the ending to this chapter. Wada, Cecilia Walsh-Russo, Leslie Wood, Balazs
Vedres, and others. Most of these scholars have
highly relational approaches building on the perspec-
tive described here; I regret that space constraints
NOTES keep me from going into detail on them all.
6 See the recent special issue of Poetics (2010),
1 Additional relational perspectives in adjacent edited by Corinne Kirschner and John Mohr, with
fields include a budding movement in political sci- articles by Frederic Godart and Harrison White, Jorge
ence (e.g., Nexon and Wright, 2007; Jackson, 2002) Fontdevila, John Mohr, Ronald Breiger, and Jennifer
as well as important work in science and technology Schultz. See also the recent review essay on culture
studies (e.g., Knorr Cetina, 2003). Actor network and networks by Mark Pachucki and Ronald Breiger
theory as developed by Latour, Callon, Law, and (2010).
others shares a deep focus on relations as productive 7 A nice discussion of the links between Tilly’s
of action, including nonhuman objects and sites in its work and American pragmatist theory can be found
network imagery (see Law and Hassard, 1999; in Gross (2010).
Muetzel, 2009). Other relevant European work 8 Arthur Stinchombe notes that both the focus
includes the systemic and configurational perspec- on action and the constraining power of institutions
tives of Luhmann and Elias (see Fuhse, 2009; Fuchs, are important for Tilly’s view of networks: “Tilly
2001), as well as “the new mobilities” literature regards neither the links in networks nor the needs
(Sheller and Urry, 2006), which combines elements of institutions as naturally existing causes, but instead
from anthropology and cultural studies and resists as things brought into existence by human action on
some of the depoliticizing elements in ANT. the links and nodes that are important for institu-
2 In 1999 the name of the Lazarsfeld Center was tions” (1997: 387). While Stinchcombe himself has
changed to the Institute for Social and Economic not theorized the link between networks and culture,
Research and Policy (ISERP), under the direction of he is certainly a fellow traveler in this relational per-
Peter Bearman. Other network analysts at Columbia spective; his work on causality, mechanisms, and
in the late 1980s and early 1990s included Ron Burt institutional flows has been influential for both White
(who helped to bring White to Columbia), Eric Leifer, and Tilly (see Stinchcombe, 1991, 2005).

5605-Scott-Chap07.indd 91 4/6/2011 11:42:01 AM


92 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

REFERENCES Boase, J. and Barry W. (2006) ‘Personal relationships: On and


off the Internet’, pp. 709–23 in D. Perlman and A. L.
Abbott, A. (1995) ‘Sequence analysis: New methods for old Vangelisti (eds.), The Cambridge Handbook of Personal
ideas’, Annual Review of Sociology 21: 93–113. Relationships. Cambridge: Cambridge University Press.
Abbott, A. (1999) Department and Discipline: Chicago Bothner, M. (2003) ‘Competition and social influence: The
Sociology at 100. Chicago: University of Chicago Press. diffusion of the sixth generation processor in the global
Abbott, A. (2001a) Chaos of Disciplines. Chicago: University of computer industry’, American Journal of Sociology 6:
Chicago Press. 1175–210.
Abbott, A. (2001b) Time Matters: On Theory and Method. Bothner, M., Toby S. and Harrison C.W. (2004) ‘Status differ-
Chicago: University of Chicago Press. entiation and the cohesion of social networks’, Journal of
Abbott, A. (2005) ‘Linked Ecologies’, Sociological Theory 23: Mathematical Sociology 28: 261–95.
245–274, 2005. Bourdieu, P. (1984) Distinction: A Social Critique of the Judg-
Abbott, A. and Alexandra H. (1990) ‘Measuring resemblance ment of Taste (translated by Richard Nice). Cambridge,
insequence data: An optimal matching analysis of musi- MA: Harvard University Press.
cians’ careers’, American Journal of Sociology 96: 144–85. Breiger, R.L. (1974) ‘The duality of persons and groups’, Social
Adams, J., Clemens, E.S. and Orloff, A.S. (eds.) (2005) Forces 53: 181–90.
Remaking Modernity: Politics and Processes in Historical Breiger, R.L. (2000) ‘A tool kit for practice theory’, Poetics.
Sociology. Durham, NC: Duke University Press. p. 27.
Ansell, C.K. (1997) ‘Symbolic networks: The realignment of Breiger, R.L. and John W.M. (2004) ‘Institutional logics from
the French working class, 1887–1894’, American Journal the aggregation of organizational networks: Operational
of Sociology 103: 359–90. procedures for the analysis of counted data’, Computational
Armstrong, E.A. (2002) Forging Gay Identities: Organizing and Mathematical Organization Theory 10: 17–43.
Sexuality in San Francisco, 1950–1994. Chicago: University Broadbent, J. (2003) ‘Movement in context: Thick networks
of Chicago Press. and Japanese environmental networks’, pp. 204–29 in
Auyero, J. (2001) Poor People’s Politics: Peronist Networks and Social Movements and Networks: Relational Approaches to
the Legacy of Evita. Durham, NC: Duke University Press. Collective Action, ed. Mario Diani and Doug McAdam.
Auyero, J. (2003) Contentious Lives: Two Argentine Women, Oxford: Oxford University Press.
Two Protests, and the Quest for Recognition. Durham, NC: Burt, R.S. (1987) ‘Social contagion and innovation: Cohesion
Duke University Press. versus structural equivalence’, American Journal of
Bakhtin, M.M. (1981) The Dialogic Imagination: Four Essays. Sociology 92: 1287–335.
Ed. Michael Holquist. Trans. Caryl Emerson and Michael Burt, R.S. (1992) Structural Holes: The Social Structure of
Holquist. Austin: University of Texas Press. Competition. Cambridge, MA: Harvard University Press.
Bakhtin, M.M. (1986) Speech Genres and Other Late Essays. Burt, R.S. (2004) ‘Structural holes and good ideas’, American
Trans. by Vern W. McGee. Austin: University of Texas Press. Journal of Sociology 110: 349–99.
Baldassari, D. and Mario D. (2007) ‘The integrative power of Burt, R.S. (2005) Brokerage and Closure: An Introduction to
civic networks’, American Journal of Sociology 113: 735–80. Social Capital. Oxford: Oxford University Press.
Bandelj, N. (2008) From Communists to Foreign Capitalists: Carley, K. (1993) ‘Coding choices for textual analysis: A
The Social Foundations of Foreign Direct Investment in comparison of content analysis and map analysis’, in
Postsocialist Europe. Princeton: Princeton University Press. Sociological Methodology, vol. 4, ed. Peter Marsden.
Barkey, K. (1994) Bandits and Bureaucrats: The Ottoman Route Oxford: Blackwell.
to State Centralization. Ithaca, NY: Cornell University Press. Carley, K. (1994) ‘Extracting culture through textual analysis’,
Barkey, K. and Ronan van R. (1997) ‘Networks of contention: Poetics 22: 291–312.
Villages and regional structure in the seventeenth century Carley, K. (1999) ‘On the evolution of social and organiza-
Ottoman Empire’, American Journal of Sociology 102: 5. tional networks’, in David Knoke and Steve Andrews (eds.),
Bearman, P. (1993) Relations into Rhetorics: Local Elite Social Special issue of Research in the Sociology of Organizations
Structure in Norfolk, England: 1540–1640. American on Networks In and Around Organizations 16: 3–30,
Sociological Association, Rose Monograph Series. New Stanford, CT: JAI Press.
Brunswick, NJ: Rutgers University Press. Carley, K. and Kaufer, D. (1993) ‘Semantic connectivity: An
Bearman, P., Robert F. and James M. (1999) ‘Blocking the approach for analyzing symbols in semantic networks’,
future: New solutions for old problems in historical social Communication Theory 3: 183–213.
science’, Social Science History 23(4): 501–33. Carley, K. and Michael P. (1992) ‘Extracting, representing and
Bearman, P.S. and Paolo P. (2004) ‘Cloning headless frogs analyzing mental models’, Social Forces 70: 601–36.
and other important matters: Conversation topics and Clemens, E.S. (1997) The People’s Lobby: Organizational
network structure’, Social Forces 83(2): 535–57. Innovation and the Rise of Interest Group Politics in the
Bearman, P.S. and Katherine S. (2000) ‘Becoming a Nazi: United States, 1890–1925. Chicago: University of Chicago
Models for narrative networks’, Poetics 27: 69–90. Press.
Blair-Loy, M. (1999) ‘Career patterns of executive women in Clemens, E.S. (2007) ‘Toward a historicized sociology:
finance: An optimal matching analysis’, American Journal Theorizing events, processes, and emergence’, Annual
of Sociology 104: 1346–97. Review of Sociology 33: 527–49.

5605-Scott-Chap07.indd 92 4/6/2011 11:42:02 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 93

Clemens, E. and James C. (1999) ‘Politics and institutionalism: Erickson, B.H. (1996) ‘Culture, class, and connections’, American
Explaining durability and change’, Annual Review of Journal of Sociology 102: 217–51.
Sociology 25: 441–66. Evans, J. (1997) ‘Multi-organizational fields and social move-
Coleman, J.S., Katz, E. and Menzel, H. (1966) Medical ment organization frame content: The religious pro-choice
Innovation: A Diffusion Study. Indianopolis: Bobbs-Merril. movement’, Sociological Inquiry 67 (4): 451–69.
Collins, R. (1998) The Sociology of Philosophies: A Global Fernandez, R.M. and McAdam, D. (1988) ‘Social networks and
Theory of Intellectual Ch. (1985) Tense. Cambridge: social movements: Multiorganizational fields and recruitment
Cambridge University Press. to freedom summer’, Sociological Forum 3: 257–382.
Davis, G.F., McAdam, D., Scott, W.R. and Zald, M.N. (eds.) Fine, G.A. and Kleinman, S. (1983) ‘Network and meaning: An
(2005) Social Movements and Organization Theory. interactionist approach to structure’, Symbolic Interaction
Cambridge: Cambridge University Press. 6: 97–110.
della Porta, D. (1988) ‘Recruitment processes in clandestine Fligstein, N. (2001) ‘Social skill and the theory of fields’,
political organizations: Italian left-wing terrorism’, in Bert Sociological Theory 19: 105–25.
Klandermans, Hans Kriesi, and Sidney Tarrow (eds.), From Fontdevila, J. and White, H.C. (2010) ‘Power from switching
Structure to Action. Greenwich: JAI Press. across netdoms through reflexive and indexical language’,
Diani, M. (1995) Green Networks: A Structural Analysis of the REDES vol. 18, #13.
Italian Environmental Movement. Edinburgh: Edinburgh Fourcade, M. and Healy, K. (2007) ‘Moral views of market
University Press. society’, Annual Review of Sociology 33: 285–311.
Diani, M. (2003) ‘Leaders or brokers? Positions and influence Franzosi, R. (1997) ‘Mobilization and counter-mobilization
in social movement networks’, pp. 105–22 in Social processes: From the red years (1919–20) to the black years
Movements and Networks: Relational Approaches to (1921–22) in Italy. A new methodological approach to the
Collective Action, ed. Mario Diani and Doug McAdam. study of narrative data’, Theory and Society 26: 275–304.
Oxford: Oxford University Press. Franzosi, R. (2004) From Words to Numbers: Narrative, Data,
Diani, M. (2007) ‘Review essay: The relational element in and Social Science. Cambridge: Cambridge University Press.
Charles Tilly’s recent (and not so recent) work’, Social Friedman, D. and McAdam, D. (1992) ‘Collective identities
Networks 29: 316–23. and activism: Networks, choices, and the life of a social
DiMaggio, P. (1987) ‘Classification in art’, American movement’, pp. 156–73 in Frontiers of Social Movement
Sociological Review 52: 440–55. Theory, ed. Aldon D. Morris and Carol Mueller. New Haven,
DiMaggio, P. (1991) ‘Constructing an organizational field as CT: Yale University Press.
a professional project: U.S. art museums, 1920–1940’, Fuchs, S. (2001) Against Essentialism. Cambridge, MA:
pp. 267–92 in The New Institutionalism in Organizational Harvard University Press.
Analysis, ed. Walter W. Powell and Paul J. DiMaggio. Fuhse, J.A. (2009) ‘The meaning structure of networks’,
Chicago: University of Chicago Press. Sociological Theory 27: 51–73.
DiMaggio, P. (1992) ‘Nadel’s paradox revisited: Relational and Fuhse, J.A. and Sophie Mützel, S. (eds.) (2010) Relationale
cultural aspects of organizational structure’, pp. 118–42 in Soziologie: Zur kulturellen Wende der Netzwerkforschung
Networks and Organizations, ed. Nitin Nohria and Robert G. [Relational Sociology: The Cultural Turn in Network
Eccles. Boston: Harvard Business School Press. Research]. VS Verlag.
Eliasoph, N. and Lichterman, P. (2003) ‘Culture in interaction’, Gibson, D. (2000) ‘Seizing the moment: The problem of con-
American Journal of Sociology 108: 735–94. versational agency’, Sociological Theory 18(3): 368–82.
Emirbayer, M. (1997) ‘Manifesto for a relational sociology’, Gibson, D. (2003) ‘Participation shifts: Order and differentiation
American Journal of Sociology 103: 281–317. in group conversation’, Social Forces 81 (4): 1135–81.
Emirbayer, M. and Goldberg, C. (2005) ‘Pragmatism, Bourdieu, Gibson, D. (2005a) ‘Taking turns and talking ties: Network
and collective emotions in contentious politics’, Theory and structure and conversational sequences’, American Journal
Society 34: 469–518. of Sociology 110(6): 1561–97.
Emirbayer, M. and Goodwin, J. (1994) ‘Network analysis, Gibson, D. (2005b) ‘Concurrency and commitment: Network
culture, and the problem of agency’, American Journal of scheduling and its consequences for diffusion’, Journal of
Sociology 99: 1411–54. Mathematical Sociology 29: 295–323.
Emirbayer, M. and Johnson, V. (2008) ‘Bourdieu and organiza- Gibson, D. (2005c) ‘Opportunistic interruptions: Interactional
tional analysis’, Theory and Society 37: 1–44. vulnerabilities deriving from linearization’, Social Psychology
Emirbayer, M. and Mische, A. (1998) ‘What is agency?’ American Quarterly 68(4): 316–37.
Journal of Sociology 103: 962–1023. Giuffre, K. (1999) ‘Sandpiles of opportunity: Success in the art
Emirbayer, M. and Sheller, M. (1999) ‘Publics in history’, world’, Social Forces 77: 815–32.
Theory and Society 28: 145–97. Gladwell, M. (2000) The Tipping Point: How Little Things Can
Ennis, J.G. (1987) ‘Fields of action: The structure of movements’ Make a Big Difference. New York: Little, Brown.
tactical repertoires’, Sociological Forum 2: 520–33. Godart, F.C. and White, H.C. (forthcoming) ‘Switchings under
Erickson, B.H. (1988) ‘The relational basis of attitudes’, uncertainty: The coming and becoming of meanings’, Poetics.
pp. 99–121 in Social Structures a Network Approach, ed. Goldberg, C.A. (2007) Citizens and Paupers: Relief, Rights,
Barry Wellman and S.D. Berkowitz. Cambridge: Cambridge and Race, from the Freedmen’s Bureau to Workfare.
University Press. Chicago: University of Chicago Press.

5605-Scott-Chap07.indd 93 4/6/2011 11:42:02 AM


94 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Goodwin, C. and Duranti, A. (eds.) (1992) Rethinking Context: Hsu, G. and Podolny, J.M. (2005) ‘Critiquing the critics:
Language as Interactive Phenomenon. Cambridge: An approach for the comparative evaluation of critical
Cambridge University Press. schemas’, Social Science Research 34: 189–214.
Goodwin, J. and Jasper, J.M. (1999) ‘Caught in a winding, Ikegami, E. (1995) The Taming of the Samurai: Honorific
snarling vine: The structural bias of political process Individualism and the Making of Modern Japan.
theory’, Sociological Forum 14: 27–54. Cambridge, MA: Harvard University Press.
Goodwin, J. and Jasper, J.M. (2004) Rethinking Social Ikegami, E. (2000) ‘A sociological theory of publics: Identity
Movements: Structure, Culture, and Emotion. Lanham, MD: and culture as emergent properties in networks’, Social
Rowman & Littlefield. Research 67: 989–1029.
Goodwin, J., Jasper, J.M. and Polletta, F. (eds.) (2001) Ikegami, E. (2005) Bonds of Civility: Aesthetic Publics and
Passionate Politics: Emotions and Social Movements. the Political Origins of Japanese Publics. Cambridge:
Chicago: University of Chicago Press. Cambridge University Press.
Gorski, P.S. (2003) The Disciplinary Revolution: Calvinism and Jackson, P.T. (2002) ‘Rethinking Weber: Towards a non-
the Rise of the State in Early Modern Europe. Chicago: individualist sociology of world politics’, International
University of Chicago Press. Review of Sociology 12: 439–68.
Gould, R. (1991) ‘Multiple networks and mobilization in Jasper, J. (1997) The Art of Moral Protest: Culture, Biography,
the Paris commune, 1871’, American Sociological Review and Creativity in Social Movements. Chicago: University of
56: 716–29. Chicago Press.
Gould, R. (1995) Insurgent identities: Class, Community, and Jasper, J. (2006) Getting Your Way: Strategic Dilemmas in the
Insurrection in Paris from 1848 to the Commune. Chicago: Real World. Chicago: University of Chicago Press.
University of Chicago Press. Joas, H. (1997) The Creativity of Action. Chicago: University of
Granovetter, M.S. (1973) ‘The strength of weak ties’, American Chicago Press.
Journal of Sociology 78: 1360–80. Johnson, V. (2008) Backstage at the Revolution: How the
Granovetter, M.S. (1978) ‘Threshold models of collective Royal Paris Opera Survived the End of the Old Regime.
behavior’, American Journal of Sociology 83: 1420–43. Chicago: University of Chicago Press.
Gross, N. (2009) ‘A pragmatist theory of social mechanisms’, Katz, E. and Lazarsfeld, P.F. (1955) Personal Influence.
American Sociological Review 74: 358–79. Glencoe, IL: Free Press.
Gross, N. (2010) ‘Charles Tilly and American Pragmatism’, Kim, H. and Bearman, P.S. (1997) ‘Who counts in collective
Forthcoming, in The American Sociologist (special issue on action? The structure and dynamics of movement
Charles Tilly, edited by Andreas Koller). participation’, American Sociological Review 62: 70–93.
Gumperz, J.J. (1982) Discourse Strategies. Cambridge: Klandermans, B. (1992) ‘The social construction of protest and
Cambridge University Press. multi-organizational fields’, pp. 77–103 in Frontiers of
Halliday, M.A.K. (1976) System and Function in Language: Social Movement Theory, ed. Aldon D. Morris and Carol
Selected Papers. Ed. G. Kress. London: Oxford University Mueller. New Haven, CT: Yale University Press.
Press. Knorr Cetina, K. (2003) ‘From pipes to scopes: The flow archi-
Halliday, M.A.K. (1978) Language as Social Semiotic: The tecture of financial markets’, Distinktion 7: 7–23.
Social Interpretation of Language and Meaning. Baltimore: Krinsky, J. (2007) Free Labor: Workfare and the Contested
University Park Press, 1978; London: Edward Arnold, 1978. Language of Neoliberalism. Chicago: University of Chicago
Hanks, W.F. (1992) ‘The indexical grounds of deictic Press.
reference’, pp. 43–76 in Charles Goodwin and Alessandro Law, J., and John H. (1999) Actor Network Theory and After.
Duranti (eds.), Rethinking Context: Language as Oxford: Blackwell Publishers.
Interactive Phenomenon. Cambridge: Cambridge University Leschziner, V. (2009) ‘Cooking logics: Cognition and reflexiv-
Press. ity in the culinary field’, Forthcoming in James Farrer (ed.),
Hannon, M.T. and Freeman, J. (1989) Organizational Ecology. Globalization, Food and Social Identities in the Pacific
Cambridge, MA: Harvard University Press. Region. Tokyo: Sophia University Institute of Comparative
Healy, K. (2006) Last Best Gifts: Altruism and the Market for Culture.
Human Blood and Organs. Chicago: University of Chicago Lichterman, P. (2005) Elusive Togetherness: How Religious
Press. Americans Create Civic Ties. Princeton: Princeton University
Herrigal, G.B. (2010) Manufacturing Possibilities: Creative Press.
Action and Industrial Recomposition in the US, Germany Lizardo, O. (2006) ‘How cultural tastes shape personal net-
and Japan. Oxford: Oxford University Press. works’, American Sociological Review 71: 778–807.
Hill, V., and Kathleen, C. (1999) ‘An approach to identifying Marwell, G., Oliver, P.E. and Prahl, R. (1988) ‘Social networks
consensus in a subfield: The case of organizational culture’, and collective action: A theory of the critical mass. III’,
Poetics 27: 1–30. American Journal of Sociology 94: 502–34.
Hillmann, H. (2008) ‘Mediation in multiple networks: Elite Martin, J.L. (2000) ‘What do animals do all day? On the
mobilization before the English civil war’, American totemic logic of class bodies’, Poetics 27: 195–231.
Sociological Review 73: 426–54. Martin, J.L. (2002) ‘Power, authority, and the constraint
Hopper, P.J. and Traugott, E.C. (1993) Grammaticalization. of belief systems’, American Journal of Sociology 107:
Cambridge: Cambridge University Press. 861–904.

5605-Scott-Chap07.indd 94 4/6/2011 11:42:02 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 95

Martin, J.L. (2003) ‘What is field theory?’ American Journal of (eds.) The Economic Sociology of Markets and Industries.
Sociology 109: 1–49. Cambridge: Cambridge University Press.
Martin, J.L. (2009) Social Structures. Princeton: Princeton Mohr, J., Bourgeois, M. and Duquenne, V. (2004) ‘The logic of
University Press. opportunity: A formal analysis of the University of
McAdam, D. and Paulsen, R. (1993) ‘Specifying the relationship California’s outreach and diversity discourse’, Center for
between social ties and activism’, American Journal of Studies in Higher Education, UC Berkeley, Research and
Sociology 99: 640–67. Occasional Papers Series.
McAdam, D., Tarrow, S. and Tilly, C. 2001. Dynamics of Mohr, J. and Duqenne, V. (1997) ‘The duality of culture and
Contention. Cambridge Studies in Contentious Politics. practice: Poverty relief in New York City, 1888–1917’,
Cambridge: Cambridge University Press. Theory and Society 26: 305–56.
McFarland, D.A. (2001) ‘Student resistance: How the formal Mohr, J.W. and Lee, H.K. (2000) ‘From affirmative action to
and informal organization of classrooms facilitate everyday outreach: Discourse shifts at the University of California’,
forms of student defiance’, American Journal of Sociology Poetics 28/1: 47–71.
107(3): 612–78. Mohr, J.W. and Neely, B. (2009) ‘Modeling Foucault: Dualities
McFarland, D.A. (2004) ‘Resistance as a social drama—A of power in institutional fields’, pp. 203–256 in Renate
study of change-oriented encounters’, American Journal of Meyer, Kerstin Sahlin-Andersson, Marc Ventresca, Peter
Sociology 109(6): 1249–318. Walgenbach (eds.), Ideology and Organizational Institu-
McFarland, D.A. and Diehl, D. (2009) ‘Cueing orders: tionalism (Research in the Sociology of Organizations,
Discursive moves and the accomplishment of network Vol. 27 ).
forms in classrooms’, Unpublished paper. Mohr, J.W. and White, H.C. (2008) ‘How to model an
McLean, P. (1998) ‘A frame analysis of favor seeking in the institution’, Theory and Society 37: 485–512.
Renaissance: Agency, networks, and political culture’, Moody, J., McFarland, D.A. and Bender-deMoll, S. (2005)
American Journal of Sociology 104: 51–91. ‘Dynamic network visualization’, American Journal of
McLean, P. (2007) The Art of the Network: Strategic Interaction Sociology 110(4): 1206–41.
and Patronage in Renaissance Florence. Durham, NC: Duke Morrill, C. (1995) The Executive Way: Conflict Management in
University Press. Corporations Chicago: University of Chicago Press.
McPherson, M.J. and Ranger-Moore, J.R. (1991) ‘Evolution on Morrill, C. (forthcoming) ‘Institutional change through intersti-
a dancing landscape: Organizations and networks in tial emergence: The growth of alternative dispute resolu-
dynamic Blau space’, Social Forces 70: 19–42. tion in American law, 1965–1995’, In How Institutions
Melucci, A. (1989) Nomads of the Present: Social Change, ed. Walter W. Powell and Daniel L. Jones.
Movements and Individual Needs in Contemporary Chicago: University of Chicago Press.
Society. Philadelphia: Temple University Press. Morrill, C., Mayer N. Zald and Hayagreeva Rao (2003) ‘Covert
Meyer, D.S. and Whittier, N. (1994) ‘Social movement political conflict in organizations: Challenges from below’,
spillover’, Social Problems 41: 277–98. Annual Review of Sociology 30: 391–415.
Mische, A. (1996) ‘Projecting democracy: The construction of Muetzel, So. (2009) ‘Networks as culturally constituted
citizenship across youth networks in Brazil’, In Citizenship, processes: A comparison of relational sociology and actor-
Identity, and Social History, ed. by Charles Tilly. Cambridge: network theory’, Current Sociology 57 (6): 871–87.
Cambridge University Press. Nexon. D. and Wright, T. (2007) ‘What’s at stake in the
Mische, A. (2003) ‘Cross-talk in movements: Rethinking the American empire debate’, American Political Science
culture-network link’, pp. 258–80 in Social Movements Review 101: 253–71.
and Networks: Relational Approaches to Collective Action, Oliver, P.E. and Myers, D.J. (2003) ‘Networks, diffusion, and
ed. Mario Diani and Doug McAdam. Oxford: Oxford cycles of collective action’, pp. 173–203 in Mario Diani and
University Press. Doug McAdam (eds.), Social Movements and Networks:
Mische, A. (2007) Partisan Publics: Communication and Relational Approaches to Collective Action. Oxford: Oxford
Contention across Brazilian Youth Activist Networks. University Press.
Princeton: Princeton University Press. Osa, M. (2001) ‘Mobilizin structures and cycles of protest: Post
Mische, A. (2009) ‘Projects and possibilities: Researching Stalinist contention in Poland, 1954–1959’, Mobilization
futures in action’, Sociological Forum 24: 694–704. 6: 211–31.
Mische, A. and Pattison, P. (2000) ‘Composing a civic arena: Osa, M. (2003) ‘Networks in opposition: Linking organizations
Publics, projects, and social settings’, Poetics 27: 163–94. through activists in the Polish People’s Republic’, pp. 77–104
Mische, A. and White, H.C. (1998) ‘Between conversation in Social Movements and Networks: Relational Approaches
and situation: Public switching dynamics across network to Collective Action, ed. Mario Diani and Doug McAdam.
domains’, Social Research 65: 695–724. Oxford and New York: Oxford University Press.
Mohr, J. (1994) ‘Soldiers, mothers, tramps, and others: Owen-Smith, J. and Powell, W.W. (2004) ‘Knowledge net-
Discourse roles in the 1907 New York City charity works as channels and conduits: The effects of spillovers
directory’, Poetics 22: 327–57. in the Boston biotechnology community’, Organization
Mohr, J. (2010) ‘Implicit terrains: Meaning, measurement, and Science 15(1): 5–21.
spatial metaphors in organizational theory’, Forthcoming in Owen-Smith, J. and Powell, W.W. (2008) ‘Networks and
Marc Ventresca, Kamal A. Munir and Michael Lounsbury institutions’, pp. 596–623 in Royston Greenwood,

5605-Scott-Chap07.indd 95 4/6/2011 11:42:02 AM


96 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Christine Oliver, Roy Suddaby and Kerstin Sahlin-Andersson Somers, M.R. (1995) ‘What’s political or cultural about the
(eds.) The Handbook of Organizational Institutionalism. political culture concept? Toward an historical sociology of
New York: Sage. concept formation’, Sociological Theory 13(2): 113–44.
Pachucki, M.A. and Breiger, R.L. (2010) ‘Cultural holes: Beyond Somers, M.R. (1998) ‘We’re no angels: Realism, rational
relationality in social networks and culture’, Annual Review choice, and relationality in social science’, American
of Sociology 36: 205–24. Journal of Sociology 104(3): 722–84.
Padgett, J.F. (2001) ‘Organizational genesis, identity and Sonnett, J. (2004) ‘Musical boundaries: Intersections of form
control: The transformation of banking in Renaissance and content’, Poetics 32: 247–64.
Florence’, pp. 211–57 in Networks and Markets, ed. Spillman, L. (1995) ‘Culture, social structure, and discursive
James E. Rauch and Alessandra Casella. New York: Russell fields’, Current Perspectives in Social Theory 15: 129–54.
Sage. Stark, D. and Vedres, B. (2006) ‘Social times of network spaces:
Padgett, J.F. and. Ansell, C.K. (1993) ‘Robust action and the Network sequences and foreign investment in Hungary’,
rise of the Medici, 1400–1434’, American Journal of American Journal of Sociology 111(5): 1367–412.
Sociology 98: 1259–319. Steinberg, M.W. (1999) ’The talk and back talk of collective
Padgett, J.F. and McLean, P.D. (2006) ‘Organizational inven- action: A dialogic analysis of repertoires of discourse
tion and elite transformation: The birth of partnership sys- among nineteenth-century English cotton spinners’,
tems in Renaissance Florence’, American Journal of American Journal of Sociology 105: 736–80.
Sociology 111: 1463–568. Steinmetz, G. (2008) ‘The colonial state as a social field’,
Polletta, F. (2002) Freedom Is an Endless Meeting: Democracy American Sociological Review 73: 589–612.
in American Social Movements. Chicago: University of Stinchcombe, A.L. (1991) ‘The conditions of fruitfulness
Chicago Press. of theorizing about mechanisms in social science’,
Polletta, F. (2006) It Was Like a Fever: Storytelling in Protest Philosophy of the Social Sciences 21: 367–88.
and Politics. Chicago: University of Chicago Press. Stinchcombe, A.L. (1997) ‘Tilly on the past as a sequence of
Powell, W.W. and DiMaggio, P.J. (eds.) (1991) The New futures’, pp. 387–410 in Roads from Past to Future (by
Institutionalism in Organizational Analysis. Chicago: Charles Tilly). Lanham, MD: Rowman and Littlefield.
University of Chicago Press. Stinchcombe, A.L. (2005) The Logic of Social Research.
Rawlings, C.M. and Bourgeois, M.D. (2004) ‘The complexity Chicago: University of Chicago Press.
of institutional niches: Credentials and organizational Stovel, K.W., Savage, M. and Bearman, P.S. (1996) ’Ascription
differentiation in a field of U.S. higher education’, Poetics into achievement: Models of career systems at Lloyds Bank,
32: 411–37. 1890–1970’, American Journal of Sociology 102: 358–99.
Sewell, W.H., Jr. (1992) ‘A theory of structure: Duality, agency, Swidler, A. (2001) Talk of Love: How Culture Matters.
and transformation’, American Journal of Sociology Chicago: University of Chicago Press.
98: 1–29. Tarrow, Sidney (2008) ’Charles Tilly and the practice of con-
Schneiberg, M. and Lounsbury, M.( 2008) ‘Social movements tentious politics’, Social Movement Studies 7(3): 225–46.
and institutional analysis’, pp. 648–70 in Royston Taylor, V. and Whittier, N. (1992) ’Collective identity in social
Greenwood, Christine Oliver, Roy Suddaby and Kerstin movement communities’, pp. 104–29 in Aldon D. Morris
Sahlin-Andersson (eds.), The Handbook of Organizational and Carol Mueller (eds.), Frontiers of Social Movement
Institutionalism. New York: Sage. Theory. New Haven, CT: Yale University Press.
Schriffen, D. (1987) Discourse Markers. Cambridge: Cambridge Tilly, C. (1978) From Mobilization to Revolution. Reading, MA:
University Press. Addison-Wesley.
Scott, J. (1991) Social Network Analysis: A Handbook. London: Tilly, C. (1995) ’Macrosociology, past and future’, pp. 1–3 in
Sage. The Relational Turn in Macrosociology: A Symposium.
Sheller, M. (2000) Democracy After Slavery: Black Publics and Working Paper No. 215. New York: Center for Studies of
Peasant Radicalism in Haiti and Jamaica. Oxford: Macmillan. Social Change.
Sheller, Mimi and John Urry. (2006) ‘The new mobilities Tilly, C. (1997) ‘Parliamentarization of popular contention in
paradigm’, Environment and Planning A 38: 207–26. Great Britain, 1758–1834’, Theory and Society 26: 245–73.
Silverstein, M. (2003) ‘Indexical order and the dialectics Tilly, C. (1998a) ‘Contentious conversation’, Social Research
of sociolinguistic life’, Language and Communication 65: 491–510.
233–4: 193–229. Tilly, C. (1998b) Durable Inequality. Berkeley: University of
Smilde, D. (2005). ‘A qualitative comparative analysis of California Press.
conversion to Venezuelan evangelicalism: How networks Tilly, C. (2004) Stories, Identities, and Political Change.
matter’, American Journal of Sociology 111: 757–96. Lanham, MD: Rowman & Littlefield.
Smilde, D. (2007) Reason to Believe: Cultural Agency in Latin Tilly, C. (2006a) Identities, Boundaries, and Social Ties.
American Evangelicalism. Berkeley: University of California Boulder: Paradigm.
Press. Tilly, C. (2006b) Why? Princeton: Princeton University Press.
Somers, M.R. (1993) ‘Citizenship and the place of the public Tilly, C. (2008a) Explaining Social Processes. Boulder:
sphere: Law, community, and political culture in the Paradigm.
transition to democracy’, American Sociological Review Tilly, C. (2008b) Contentious Performances. Cambridge:
58(5): 587–620. Cambridge University Press.

5605-Scott-Chap07.indd 96 4/6/2011 11:42:02 AM


RELATIONAL SOCIOLOGY, CULTURE, AND AGENCY 97

Tilly, C. and Wood, L. (2003) ’Contentious connections in Wellman, B., Quan-Haase, A., Boase, J., Chen, W., Hampton,
Great Britain, 1828–34’, pp. 147–72 in Social Movements K., Diaz de Isla, I. and Miyata, K. (2003) ‘The social
and Networks: Relational Approaches to Collective Action, affordances of the Internet for networked individualism’,
ed. Mario Diani and Doug McAdam. Oxford: Oxford Journal of Computer Mediated Communication 8:3.
University Press. Whitford, J. (2002) ‘Pragmatism and the untenable dualism
Uzzi, B. and Spiro, J. (2005) ‘Collaboration and creativity: of means and ends: Why rational choice theory does
The small world problem’, American Journal of Sociology not deserve paradigmatic privilege’, Theory and Society
111: 447–504. 31: 325–63.
Vaisey, S. and Lizardo, O. (2009) ‘‘‘Can cultural worldviews White, H.C. (1992) Identity and Control: A Structural Theory
influence network composition?’” Social Forces 88: of Social Action. Princeton: Princeton University Press.
1595–1618. White, H.C. (1993) ‘Network moves’, Revised version of paper
Vaughan, D. (2002) ‘Signals and interpretive work: The role of prepared for the ‘Workshop: Time as a Social Tapestry’,
culture in a theory of practical action’, pp. 28–54 in Karen Center for the Social Sciences, March 12–13, 1993.
Cerulo (ed.) Culture in Mind: Toward a Sociology of Culture White, H.C. (1994) ‘Talk and ties: Change through publics’,
and Cognition. New York: Routledge. Unpublished paper.
Wada, T. (2004) ‘Event analysis of claim making in Mexico: White, H.C. (1995) ‘Network switchings and Bayesian forks:
How are social protests transformed into political pro- Reconstructing the social and behavioral sciences’, Social
tests?’ Mobilization 9(3): 241–57. Research 62: 1035–63.
Wagner-Pacifici, R.E. (2000) Theorizing the Standoff: White, H.C. (2004) Markets from Networks: Socioeconomic
Contingency in Action. Cambridge, UK: Cambridge Models of Production. Princeton: Princeton University
University Press. Press.
Wagner-Pacifici, R.E. (2005) The Art of Surrender: Decomposing White, H.C. (2008) ‘Notes on the constituents of social struc-
Sovereignty at Conflict’s End. Chicago: University of ture: Soc. Rel. 10—Spring ’65’, Sociologica 1/2008: 1–14.
Chicago Press. White, H.C., Godart, F.C. and Corona, V.P. (2007) ‘Mobilizing
Wasserman, S. and Faust, K. (1994). Social Network Analysis: identities: Uncertainty and control in strategy’, Theory,
Methods and Applications. Cambridge: Cambridge Culture & Society 24(7–8): 181–202.
University Press. Yeung, K. (2005) ‘What does love mean? Exploring
Watts, D.J. (1999) ‘Networks, dynamics, and the small- network culture in two network settings’, Social Forces
world phenomenon’, American Journal of Sociology 105: 84(1): 391–420.
493–527. Zelizer, V. (2004) ‘Circuits of commerce’, pp. 122–44 in
Watts, D.J. and Dodds, P.S. (2007) ‘Networks, influence, and Jeffrey C. Alexander, Gary T. Marx, and Christine Williams
public opinion formation’, Journal of Consumer Research (eds.), Self, Social Structure, and Beliefs. Explorations in
34: 441–58. Sociology. Berkeley: University of California Press.
Wellman, B. (1988) ‘Structural analysis: From method and Zelizer, V. (2005a) ‘Circuits within capitalism’,
metaphor to theory and substance’, pp. 19–61 in Social pp. 289–322 in Victor Nee and Richard Swedberg (eds.),
Structures a Network Approach, ed. Barry Wellman The Economic Sociology of Capitalism. Princeton: Princeton
and S.D. Berkowitz. Cambridge: Cambridge University University Press.
Press. Zelizer, V. (2005b) The Purchase of Intimacy. Princeton:
Wellman, B. and Berkowitz, S.D. (eds.) (1988) Social Structures Princeton University Press.
a Network Approach. Cambridge: Cambridge University Zelizer, V. (2006a) ‘Why and how to read Why?’ Qualitative
Press. Sociology 29: 531–34.

5605-Scott-Chap07.indd 97 4/6/2011 11:42:02 AM


5605-Scott-Chap07.indd 98 4/6/2011 11:42:02 AM
SECTION II

Substantive Topics

5605-Scott-Chap08.indd 99 4/7/2011 4:48:23 PM


5605-Scott-Chap08.indd 100 4/7/2011 4:48:24 PM
8
Personal Communities:
The World According to Me
Vincent Chua, Julia Madej, and
Barry Wellman

Except for saintly altruists, the world revolves communities. These personal communities are
around ‘Me’. We keep a mental network map of social networks defined as an individual set of ties
our friends and enemies. Who are the people I will (Figure 8.1). Such personal communities have
see today or contact by the Internet or mobile become more palpably visible with the advent of
phone? Who can I count on for different kinds of the Internet. Facebook and similar social media
help? Which of my friends and relatives know organise people’s social worlds in terms of lists of
each other, and which get along with each other? friends and acquaintances.
Networks built around ‘Me’ – personal com- While some scholars continue to study com-
munities – have always been with us. But, nowa- munity in terms of spatially bounded units such as
days, with Facebook and its ilk, people are groups, neighbourhoods and villages, others focus
becoming very aware that communities can on community as an interpenetrating combination
consist of a person’s network of relationships, of online and offline worlds managed by autono-
wherever such communities are located. mous individuals at their respective centres (Boase
In fact, there are three ways of looking at and Wellman, 2006). Hence, the traditional repre-
communities: sentation of community as a distinct set of local
ties is often usefully replaced by looking at
• Once upon a time, almost all people believed personal communities characterised by a combi-
that communities were rooted in neighbour- nation of local, regional and distant ties, no matter
hoods: the traditional spatially bounded areas how far-flung (Wellman, 2002).
in which, at least in principle, most people To be sure, such personal communities have
know each other and can walk or make a short always existed (e.g. Bender, 1978), but their form
drive to each other’s homes. has changed drastically with time. In an earlier
• Communities can consist of people with a period, personal communities were mostly geo-
shared interest, such as communities of people graphically bound, densely knit and broadly based
who drift cars. ties organised around discrete social units such as
• The less traditional way we discuss here is that bars and taverns or neighbourhoods (Keller, 1968).
personal communities are defined as those Today, many personal communities are geograph-
connected to the individuals at their centres. ically dispersed, sparsely knit and specialised
From this standpoint, friends, neighbours, kin, (Wellman, 1979). The growth of social affordances
acquaintances, co-workers and fellow members that facilitate personal communication – such
of organisations are personal community mem- as mobile phones, email and social software
bers and are often connected to each other. such as Facebook and Twitter – has radically
facilitated this transformation. Where landline
There has been a shift in perception from spatially phones link households to households, mobile
defined communities to relationally defined phones and the Internet directly link people,

5605-Scott-Chap08.indd 101 4/7/2011 4:48:24 PM


102 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Kin
Neighbors
Immediate

Extended

Ego

Active
intimate ties

Active
Friends nonintimate ties Co-workers

Figure 8.1 Typical personal community (© Barry Wellman 2011)

giving rise to a contemporary form of community the time when it was believed that automobiles
we call ‘networked individualism’ (Wellman, took people away from face-to-face interactions
2001a, 2001b). on streets and streetcars. The culprit du jour is
The most persistent concern about contempo- the Internet, with some commentators fearing
rary communities has been their alleged decline in that excessive use of email, Facebook et al., would
the past hundred years. Different commentators lure people away from face-to-face contact and
have offered different causes for the decline, perhaps even ensnare some by causing online
ranging from industrialisation, capitalism, social- addictions (Pope Benedict XVI, 2009; Sigman,
ism, urbanisation, bureaucratisation, feminism 2009).
and technological change (Wellman, 2001b). In Yet most studies show that personal commun-
2000, political scientist Robert Putnam argued ities continue to be a central part of people’s lives.
that Americans were now ‘bowling alone’ and that The data are consistent from Western Europe,
civic activities such as voting, social club Latin America, China, Japan, Iran, Canada or the
memberships and family dinners were declining. United States (Fischer, 1982; Wellman, 1999;
More recently, McPherson et al. (2006) repeated Boase et al., 2006; Wellman, 2007). The losses in
the caution, showing that the number of people involvement in formal organisations (such as
with whom Americans discuss ‘important matters’ Rotary Clubs) have been supplanted by more
had decreased from 2.8 to 2.1 in the span of two informal means of communicating and socialis-
decades from the mid-1980s to the mid-2000s. ing, and large networks of specialised ties are
Putative technological explanations for the alleged flourishing. With Internet and email, distance
decline of community have been proffered since poses less hindrance as communication comes to

5605-Scott-Chap08.indd 102 4/7/2011 4:48:24 PM


PERSONAL COMMUNITIES: THE WORLD ACCORDING TO ME 103

be increasingly defined by social accessibility with friends being announced, shared and recom-
rather than spatial accessibility (Hogan, 2008b; mended across networks. It has become quite
Mok et al., 2010). While personal communities common among Facebook friends to peruse one
may have gone indoors, from cafés to living another’s personal networks during their free
rooms and computer screens, this does not mean time. Facebook and MySpace help to facilitate
that community has disappeared. People conti- transitive relations; that is, if Jane knows Bob and
nue to be social when they are indoors. They Alice, then over time, Bob and Alice will likely
chat online with friends, keep up with them via get to know each other.
their Facebook pages, tweet them (via Twitter) Sharing between networks allows different
about where they are going, meet them offline parts of the social structure to overlap and inter-
to round out discussions, and then meet online sect, with a particular person, or ego, as the focal
again to talk about other things (Robinson et al., point. Such intertwining possibly breaks down
2002). barriers between groups and unites individuals
In this chapter, we describe the nature of per- through the sharing of new information and
sonal communities as well as their characteristics friendship, creating opportunities for developing
and consequences. For reasons of space, we focus diverse personal communities – to have diverse
on personal communities in the developed world, friends is to have diverse experiences and all these
but bring in some comparative information from add to a broad and enriching life (Erickson,
elsewhere. 2003).

COMMUNITIES AS PERSONAL The community question


COMMUNITIES The early nineteenth century was a time of
tumultuous change in Western societies. Towns
Personal community research invokes a certain and cottages had quickly evolved into industrial
understanding of ‘community’. Instead of regard- centres and were engaged in the mass production
ing communities as bound up with organised of goods and services. Over time, the production
institutions such as family, neighbourhood, work and consumer markets became increasingly
or voluntary organisations, personal community specialised, with workers filling unique occupa-
research treats communities as ‘personal tional roles. Scholars and policymakers feared that
networks’. The personal network approach views interpersonal relations would atrophy as relation-
networks from the standpoint of an individual ships specialised, neighbourhoods were flooded
(ego) managing his or her ties with alters. This with strangers, and people turned to governments
contrasts with the ‘whole network’ approach that and large organisations for support. Social
observes an entire set of ties, such as in a neigh- scientists feared that this new role-based approach
bourhood, workplace or organisation. reduced the quality of interpersonal relations
One practical way to understand the personal within society, leading to a loss of community
network approach is to think about a person’s (Wellman, 2001b).
friends on Facebook. His or her personal network While compelling, these fears rarely were
would include all fellow Facebook users person- based on a systematic evaluation of people’s
ally linked to him or her as ‘friends’ (Hogan, everyday lives. In the 1960s, several ethnogra-
2008a). These ‘friends’ may be anyone ranging phies challenged these fears by highlighting the
from an acquaintance barely met, a long-lost persistence of tight-knit communities in urban
friend who has recently contacted you, a neigh- areas such as working-class London (Young and
bour next door or a sibling living within the same Willmot, 1957), Italian-American ‘urban villages’,
house. Because personal networks on Facebook (Gans, 1962) and suburban white America
(or of professionally gregarious folks such as (Gans, 1967).
politicians or salespeople) can include thousands Although these ethnographies were successful
of weak ties, we follow Hogan’s (2008a) distinc- in demonstrating the persistence of community,
tion here between ‘personal networks’ and our by adhering to a neighbourhood-based approach,
subject, ‘personal communities’ that consist of the they neglected other important bases of
ties that are meaningful to egos. community such as workplaces, voluntary organi-
Facebook and similar social media have sations and online worlds. Moreover, by treating
privacy issues. Such is the world we live in that communities as coterminous with spatially defined
communities have become personal and private neighbourhoods, they deflected attention away
and yet, in some ways, significantly publicised from the large number of friendship and kinship

5605-Scott-Chap08.indd 103 4/7/2011 4:48:24 PM


104 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

ties that were not local. On a wider scale, plane – were ‘place-to-place’, involving the entire
globalised communication and extensive air travel household.
now facilitate the growth of transnational net- A third type has proliferated in the past decade.
works and entrepreneurial activity across With the widespread use of the Internet and
continents (Chen and Wellman, 2009). Immigration mobile phones, people may be reached directly,
need not imply the loss of ties with the home creating a situation whereby ‘networked individu-
country but rather the expansion of personal als’ communicate as individuals. Such ‘person-to-
communities to include both host and home coun- person’ interactions create a unique way of life.
try ties (Salaff et al., 1999). They privilege interpersonal interaction among
The historical trajectory of community forma- individuals rather than interaction between house-
tion can be seen as a series of three ideal types, holds. It is common to see individuals conversing
reflecting changes in technology and human on their mobile phones while walking down the
mobility (Figure 8.2). The first type, ‘little boxes’, street and sending emails through their phones
was especially prevalent before the advent of the while on the run – not isolated, but connected (see
telephone. It involved reaching others through Wellman et al., 2006). With digital media such as
traveling by foot (or horseback), trudging from the Internet and mobile phone, people remain
door to door. reachable regardless of their physical
In the second type, ‘glocalisation’, the location. Whether such accessibility is a boon or a
telephone, car and plane liberated a portion of bane remains an open question. While some
this constraint and allowed communications to scholars argue that person-to-person affordances
take place between households (Wellman and create flexibility in social relations and work
Tindall, 1993). However, one characteristic of schedules, others have pointed to the social
the telephone is that the person on the other control that such affordances create by allowing
side may not actually be the intended recipient people to be located and contacted at any time
but the family member who happens to be and almost any place (Olson-Buchanan and
nearest the ringing phone. Thus, such inter- Boswell, 2006). For example, software such as
actions – whether mediated by phone, car or Google Latitudes can immediately inform people

Little boxes Glocalization

Networked individualism

Figure 8.2 Three forms of networked communities (© Barry Wellman 2011)

5605-Scott-Chap08.indd 104 4/7/2011 4:48:24 PM


PERSONAL COMMUNITIES: THE WORLD ACCORDING TO ME 105

about the locations of others in their personal 2008; Collins and Wellman, 2010; Wang and
communities. Wellman, 2010).
Analysts continue to fear that online communi-
cation will replace face-to-face interaction among
individuals (Sigman, 2009). This fear is unfounded,
Personal communities online for Internet users usually report that the Internet
makes life easier, more social, makes learning
and offline easier, and facilitates the connection of members
Although we often deal with media queries about within a personal community (Kraut et al., 2002;
the supposedly isolating nature of the media (e.g. Wellman et al., 2006; Veenhof et al., 2008; the
Anderssen, 2009), research has made it clear that many reports at www.pewinternet.org). Most
the Internet is in fact seamlessly integrated with relationships formed via face-to-face interactions
personal communities and is rarely a separate during the day are continued and extended via
second life in itself (Veenhof et al., 2008; Quan- ICTs such as emailing, texting, instant messaging,
Haase et al., 2002). One over-time study shows or calling via mobile phones. Therefore, ICTs add
that for American adults, the mean number of to face-to-face contact, rather than replace it
friends in weekly in-person contact has increased (Boase et al., 2006; Wellman et al., 2006; Wang
by 20 per cent between 2002 and 2007: from 9.4 and Wellman, 2010).
to 11.3 friends. At the same time, the median The increasing use of the Internet as a commu-
number of friends slightly decreased, from 6 to 5. nication medium has made distance less of a
Taken together, these statistics indicate that while limiting constraint on communication. The social
the number of friends slightly decreased for about affordances associated with email include high
half of Americans, the number of friends increased velocity and zero additional costs above the
appreciably for many Americans (Wang and monthly rate, the ability to contact many people at
Wellman, 2010). once (and for those contacted to respond to one or
This increase may well be related to Internet to many), the ability of communications to be
use, for the increase in the number of friends stored and retrieved later, the lack of visual and
is greater as the amount of Internet activity audio barriers to making contact, and the ease of
increases. For example, heavy Internet users had a contacting, replying and forwarding (Wellman,
38 per cent increase in the number of friends 1999, 2001a, 2001b). This makes communication
during this period (from 9.0 to 12.4) while nonus- between people accessible regardless of the dis-
ers had a more modest 7 per cent increase (from tance separating them (Gotham and Brumley,
9.5 to 10.2). Not only do Internet users have more 2002). On average, email contact is less sensitive
friends, their friendship networks are growing at to distance although other modes of communica-
an accelerated pace (Wang and Wellman, 2010). tion are not. Face-to-face contact drops off after a
These data suggest that the Internet not only 5-mile cut-off point, phone contact is most sensi-
enables people to maintain and strengthen existing tive only within 100 miles, and email is largely
ties but it also aids some to forge new ties. The insensitive to distance (Mok et al., 2010).
time that people spend online is not reducing The issue of how the Internet affects communi-
time spent in face-to-face contact but rather is cation at a distance has become especially salient
redeploying time formerly spent in less social in the 21st century. Prior to the Internet, migration
activities such as eating, television watching, and over long distances meant a disruption to relation-
sleeping (Boase et al., 2006; Rainie and Wellman, ships in one’s personal community because visits
forthcoming). However, one large Canadian study and continuous contact were expensive and
did show heavy Internet users spending somewhat cumbersome (Hiller and Franz, 2004). More
less time seeing friends and family (Veenhof recently, the notion of transnational community
et al., 2008). has replaced the old concept of migration as
Whether or not there is some time displacement severing social ties. Immigrants and rural people
from the Internet, it is now apparent that the particularly value the Internet’s effortless
addition of Internet and mobile phone communi- long-distance connectivity (Veenhof et al., 2008;
cation to traditional face-to-face and phone Collins and Wellman, 2010; Stern and Messer,
contact means that there is more overall commu- 2009).
nication between friends and relatives now than For example, the 2003 General Social Survey
before the coming of the Internet. Interactions via found that 56 per cent of Canadians aged 25 to
information and communication technologies 54 who immigrated to Canada between 1990 and
(ICTs) have become cheaper, quicker and much 2003 used the Internet in the previous month to
more efficient than visiting, telephoning, or communicate with friends, as compared with only
writing letters the old fashioned pen-to-paper 48 per cent of Canadian-born individuals (Veenhof
way (Boase et al., 2006; Baron, 2008; Stern, et al., 2008). It is now possible to return home to

5605-Scott-Chap08.indd 105 4/7/2011 4:48:24 PM


106 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Trinidad (Miller and Slater, 2000), the Philippines Name generators ask respondents to provide a
(Ignacio, 2005), or anywhere else in the world, by list of contacts with whom they share one or
virtual visits via webcam, email or the sharing of more criterion relations, such as ‘close with’ or
electronic photographs through online sites such ‘friendship’ (Burt, 1984; Marsden, 1987; Wellman,
as Facebook and Flickr. It is no longer necessary 2001b).
to rely solely on memories and letters to remain Name generator studies began in the late 1960s.
connected with friends and folk back home. Within a decade, several personal community
Personal community ties are maintained both studies appeared, such as Edward Laumann’s
online and offline, with relationships formed Detroit-area study (1973), Barry Wellman’s first
online spilling into the physical realm and ties in East York (Toronto) study (1979) and Claude
the physical realm continuing as online interac- Fischer’s Detroit and Northern California studies
tions (Wellman and Haythornthwaite, 2002). (Fischer et al., 1977, Fischer, 1982). These studies
Some ties start online and remain online, but they treated communities as personal communities and
usually constitute only a small part of a person’s found them to have a variety of ties with friends,
personal community. American Internet users kin, neighbours and workmates.
have on average about four online-only friendship Two approaches to collecting name generator
ties (Wang and Wellman, 2010). Critics of involve- information differentially affect which alters are
ment with online ties often fail to contextualize described (Ferligoj and Hlebec, 1999; Straits,
the online relationship as a medium of communi- 2000). One approach asks respondents who are
cation, like the telephone, that largely fills the their ‘best friends’ (Laumann, 1973) or socially
gaps between face-to-face interactions and close ‘intimates’ (Wellman, 1979). The second
helps to arrange future meetings (Wellman and approach asks respondents to name alters with
Tindall, 1993). whom they exchange specific resources, such as
Sites such as Facebook and Twitter are now borrowing a large sum of money or getting advice
major sites of communication in North America. on a work-related decision (Fischer, 1982). It
They have often superseded email and instant yields a somewhat larger and more diversified set
messaging as the main way for students and of names, although at risk of neglecting those who
young adults to keep track and stay connected to are socially close but do not provide the kinds of
their personal communities (Lenhart et al., 2005). supportive resources that are being examined.
In Canada, Facebook adoption within urban cen- Both name generator approaches focus on
tres is especially high. For example, the core regions of personal networks, although
22 per cent of Toronto’s population (aged 18+) questions about finding a job usually locate a
have Facebook profiles (Zinc Research and weaker but important set of ties (Granovetter,
Dufferin Research, 2008). 1995). Overall, name generators tend to be biased
Such social networking sites do not suppress towards eliciting alters who are socially closer to
offline social contact, but they are integrated with the respondents, who have known the respondents
it, as many relationships are migratory: moving longer and who know more of the respondents’
from being online only to combining online with other alters (Marin, 2004).
offline contact. A 38 per cent increase in the Name generators are typically followed up with
number of such migratory friends reported by name interpreters, which elicit information about
heavy Internet users, from a mean of 1.6 friends in each named contact and the nature of the ego-alter
2002 to 2.2 in 2007, is one indication of the seam- relationship (Marsden, 2005). Name interpreters
less integration of social networking sites into our may include items such as the personal character-
daily communication repertoire (Wang and istics of the named contact (gender, age, educa-
Wellman, 2010). Moreover, the heavy Internet tion, socioeconomic background) and the attributes
users’ number of online-only friends more than describing the tie, things such as the role-relation
doubled: from 4.1 in 2002 to 8.7 in 2007, an connecting ego and alter (whether parent, child,
increase of 112 per cent (Wang and Wellman, relative, co-worker, friend or spouse etc.), the
2010). frequency of contact, level of intimacy, longevity
of the tie (Marsden and Campbell, 1984) and the
origin of the tie (Fischer, 1982).
Although name generators gather detailed
information about individuals in an ego’s network,
COLLECTING PERSONAL this can be tedious. One innovation has been to
COMMUNITY DATA use ‘participant-aided sociograms’ (Hogan et al.,
2007). With just paper, pencil and removable tags,
The two most popular instruments for collecting this low-technology method requires respondents
personal community data are the name generator to place their contacts within a given set of
and the position generator. concentric circles, each circle representing a

5605-Scott-Chap08.indd 106 4/7/2011 4:48:24 PM


PERSONAL COMMUNITIES: THE WORLD ACCORDING TO ME 107

Figure 8.3 Concentric zone paper and pencil way of collecting personal community data
(© Barry Wellman 2011)

different level of intimacy (Figure 8.3). While in mind: (1) choose occupations that suitably
laptop computers were initially used, pretests cover a range of low- to high-prestige occupa-
showed that they made many respondents uncom- tions; (2) select those occupations that have fairly
fortable. Hence, the research team used paper and large populations so that respondents have a rea-
pencil. Respondents started by providing a list of sonable chance of knowing a person in that occu-
names, each of which was written on removable pational category; (3) ensure that occupations
Post-It notes. These tags were then placed within have clear titles that all respondents will under-
the concentric circles and adjusted iteratively as stand; (4) create a list that is fairly long because
respondents added other names to the chart. This adding more occupations will hardly increase data
iterative approach induces respondents to think collection time (Erickson, 2004b).
about their alters in relation to one another. Given There are important differences between name
that people tend to classify alters according to generators and position generators. Name genera-
groups (McCarty, 2002) it became relatively easy tors tend to be more demanding because of the
to collect all the relevant alter information once name interpreters that follow. People can usually
every name was set in place. give detailed reports only on a small number of
By contrast to the name generator approach, connections, typically as few as three to five
the position generator approach asks respondents strong ties, and rarely more than a dozen or so
to report whether or not they have linkages to (see Lin and Erickson, 2008: 12). By contrast,
specific locations in the social structure (Lin and position generators are easier to administer and
Erickson, 2008). Operationally, the position gen- are better suited for measuring weak ties.
erator asks respondents if they know any alters Structurally, weak ties are more likely to bridge
occupying a range of low- to high-status occupa- race, gender and class divides, and are channels
tions: ‘lawyer’, ‘security guard’, ‘cashier’, ‘physi- through which individuals gain access to
cian’, ‘secretary’, etc. Cultural variations in important resources (Granovetter, 1973; Lin and
occupations notwithstanding, position generators Dumin, 1986; Erickson, 2004a; Moren-Cross and
should be designed with several principles Lin, 2008).

5605-Scott-Chap08.indd 107 4/7/2011 4:48:24 PM


108 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Other ways to collect personal community data their email contact with face-to-face meetings and
include the more recent contact diary and resource phone calls in everyday life. With such integra-
generator approaches. One study using the con- tion, personal communities are becoming more
tact diary approach asked respondents to keep ‘glocalised’ – both extensively global and intensely
records of every single interpersonal contact daily local (Wellman, 2001a, 2001b; Hampton and
for three to four consecutive months (Fu, 2008). Wellman, 2002; Hampton and Wellman, 2003;
While a labour-intensive task, the information Wellman et al., 2006; Collins and Wellman, 2010).
valuably captures a whole range of strong, medium
and weak ties that may not appear in either a name
generator or position generator. It is particularly
useful for measuring ‘seasonal’ contacts of weak Sparsely knit
to medium strength, such as a tax consultant or a
Many personal communities are ‘sparsely knit’,
summer vacation friend.
meaning that most network members are not
The resource generator is another effort to
directly connected with one another. A 1968 study
combine aspects of the position generator (its
in Toronto found that among socially close inti-
economy and extensive reach) and the name gen-
mates, only one-third of all possible alter-to-alter
erator (its detailed resource information).
links were present (Wellman, 1979; Wellman et al.,
A resource generator measures the extent to which
1988). A 1979 re-study in the same area, found
an individual has access to specific resources such
density to be even lower, at 0.13, although the
as whether he or she knows anyone who ‘can repair
study investigated a larger set of alters, including
a car’, ‘play an instrument’ or ‘has knowledge of
somewhat less socially close ties: the larger the
literature’, etc. One advantage of the resource gen-
network, the less likely that two alters would be
erator is that it is easier to administer than a name
connected (Wellman, 2001b).
generator and more concrete and directly interpret-
able than a position generator (van der Gaag and
Snijders, 2005; van der Gaag et al., 2008).
Specialised ties
Personal communities are usually specialised,
with different community members supplying
WHAT DO PERSONAL COMMUNITIES different kinds of social support (Wellman and
LOOK LIKE? Wortley, 1990). In these specialised relationships,
the guiding principle is ‘tit-for-tit’ and not ‘tit-
Geographically dispersed for-tat’: people tend to reciprocate with the same
kind of help that an alter has given to them
Contemporary communities are rarely found (Plickert et al., 2007). In general, neighbours are
within neighbourhoods alone, but they usually conveniently suited for handling unexpected
include a significant number of network members emergencies because their proximity to ego ena-
living as far as an hour’s drive or even a few con- bles them to react quickly with goods and services
tinents away (Fischer, 1982; Wellman et al., 1988; (Wellman and Wortley, 1990). Close kinship is a
Chen and Wellman, 2009). Short distances remain bastion of emotional and long-term support: par-
advantageous because they facilitate face-to-face ents and adult children especially exchange finan-
interactions and exchanges of goods and services. cial aid, emotional aid, large services and small
Where such contact is not readily available, there services involving things such as childcare and
is always the Internet. The Connected Lives study financial support (Wellman, 1990; Wellman and
of personal communities in Toronto found that Wortley, 1990). Spouses supply each other with
email contact is generally insensitive to distance, many types of support (Wellman and Wellman,
though it tends to increase for transoceanic 1992). Friends are valued as confidants and social
relationships greater than 3,000 miles apart. The companions, especially among singles (de Vries,
study also shows that email has somewhat 1996). They are also valued for the non-redundant
altered the way people maintain their relationships information they sometimes provide about job
(Mok et al., 2009). Transnational families see openings (Granovetter, 1995).
ICTs as improving the overall quantity and quality
of contact – they encourage a wider range of kin
to become involved in kin work typically
performed by women and they strengthen bonds
A few ties among many
between family members separated by distance
(Wilding, 2006). Despite the ostensibly imper- While most Americans can name 200 to 300 alters
sonal nature of email, people continue to integrate in their personal networks (McCarty et al., 2001),

5605-Scott-Chap08.indd 108 4/7/2011 4:48:25 PM


PERSONAL COMMUNITIES: THE WORLD ACCORDING TO ME 109

personal community studies examine at most a On average, men and women have the same
small percentage of ties that are intimate and number of alters, but differences exist in the com-
active. Depending on the actual study design, dif- position and dynamics of these networks.
ferent name generator strategies elicit different American women tend to have more kin, and they
kinds and numbers of names (Straits, 2000). are also active networkers with their kin. Even as
Fischer’s (1982) Northern California study, which dual-income households have become common,
used a diverse set of 10 name generators, elicited women still have more ties with neighbours and
a mean of 12.8 names per person, while a more extended kin, while men have more ties to cow-
recent study by Hogan et al. (2007) elicited 6 to 66 orkers (Fischer, 1982; Wellman, 1985; Marsden,
names. Yet, in neither case do the numbers 1987; Moore, 1990). In France, men confide in
approach the more than 1,000 names that workmates about as much as they confide in kin
Boissevain (1974) discovered when he followed while women are three times more likely to con-
two people for a year, or even the 150 ties fide in kin than in workmates (Ferrand et al.,
that British anthropologist Dunbar (1996) posits 1999). In Taiwan, women tend to have less access
as the maximum number of members that to influential contacts relative to men, because
cohesive groups (such as subsistence villages, they are less likely to be in the workforce and
nomadic tribes and military units) can success- more likely to be tied down with household
fully accommodate. obligations (Lin et al., 2001).
Personal communities differ according to
stages in life such as the teenaged years, marriage
and parenthood. Marriage and early parenthood
People like us often entail high levels of commitment to kin,
Personal relations are more homogeneous than exerting strenuous demands on both time and
chance would predict. The circumstances and energy for both spouses (de Vries, 1996). Whereas
situations in which individuals find themselves singles use weekends for socialising with friends,
intersect with their personal choices to influence married couples use weekends and weekday
homogeneous networks (Blau, 1977; McPherson evenings for childcare and visits to their parents
and Smith-Lovin, 1987; Marsden, 1988). Egos and in-laws. Particularly for working mothers,
and alters are typically matched on attributes such there is hardly time after working hours to
as race, class and cultural interests (Lin and spend socialising with friends (Hochschild, 1997).
Dumin, 1986; Erickson, 1988; Marsden, 1988). When mothers are pressed for time, it is friend-
Often, these social contexts are already presorted ship that gives way and kinship that remains
according to some specific set of personal (Wellman, 1985).
attributes. For example, institutions such as work- Age is also an important predictor of network
places, schools, neighbourhoods and voluntary composition. Elderly people tend to have smaller
organisations tend to bring people of similar edu- networks because retirement removes an impor-
cation, age, race and gender together, creating a tant sphere of non-kin contact in workplaces
relatively homogeneous pool of ‘eligibles’ from (Pickard, 1995), and their participation in
which choice then exerts its secondary impact voluntary organisations declines significantly
(Feld, 1981; Laumann et al., 1994). Depending on (Mirowsky and Ross, 1999). Young single people
the context, some aspects of homophily may be tend to have larger and more diverse networks
more salient than others. For example, in the because they tend to gravitate towards cities
United States, racial homophily is a robust (Fischer, 1982) and are more likely to have friend-
phenomenon (Moren-Cross and Lin, 2008). centered networks (de Vries, 1996).
Yet many ties cut across homogeneous groups, Personal communities also differ by egos’
and such ties both help prevent homogeneous income, education and ethnicity. The wealthy and
clusters from becoming insular and also integrate educated have more friends and acquaintances
social systems by providing links between groups than the less well-off (Fischer, 1982; Moore,
(Granovetter, 1973; Laumann, 1973; Ferrand et al., 1990). People with higher education are more
1999). Homophily on one dimension will not likely to know people from a greater diversity of
guarantee homophily on other dimensions. occupations (Lin and Dumin, 1986) and to know
high-status people (Ferrand et al., 1999). Ethnic
minorities such as African Americans and Hispanic
Americans tend to have lower access to high-sta-
Variation in network composition by tus contacts than whites (Lin, 2000; Erickson,
individuals’ social location 2004a; Moren-Cross and Lin, 2008). African
Americans’ networks are highly focused on kin
The composition of personal networks differs and neighbours (Martineau, 1977; Lee et al.,
according to individuals’ social locations. 1991). Consequently, their networks tend to be

5605-Scott-Chap08.indd 109 4/7/2011 4:48:25 PM


110 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

more dense and localised (Stack, 1974; Green among middle-class Iranians who share social and
et al., 1995). economic resources amid unstable state condi-
tions (Bastani, 2007). In Toulouse, kin predomi-
nate in personal communities, especially among
highly educated individuals (Grossetti, 2007).
Variation in networks by Both kinship and friendship remain important in
national context German modern life, working interdependently
with family to provide a range of social and emo-
Institutional contexts affect the manner in which tional resources to egos (Hennig, 2007). One
individuals build their personal communities. reason why kinship and friendship are so comple-
Changes in these institutions are usually accompa- mentary is that they constitute somewhat distinct
nied by changes in network composition. For systems of activity characterised by relatively
example, as the Chinese economy began its shift unique structural properties, exchange processes
from socialist to free-market, people became more and resources.
likely to discuss important matters with friends
rather than with co-workers or kin. Within the
space of just seven years, the percentage of friends
within the observed Tianjin-based networks had Differences in structure
increased from 5 per cent in 1986 to 34 per cent in
1993 – a 700 per cent change (Ruan et al., 1997). Personal communities often contain distinct
In an increasingly capitalist economy, Chinese clusters of activity and interests. Kin may rarely
workers have gravitated towards friends and acti- know friends, and some friends may not know
vating new forms of guanxi that can serve as better each other. At times, segregation allows egos
bridges to job opportunities (also see Wellman to maintain discreet associations with friends
et al., 2002; Gold et al., 2002). At the same time, unbeknownst to the ego’s inner circle (Hannerz,
with state-driven work-assignment programs being 1980).
gradually phased out, the role of co-workers has Kinship networks tend to be densely knit
receded, with strong friendship ties becoming clusters with close bonds between network
more important (Ruan et al., 1997). members, while friendship networks tend to be
East Germany provides another case. Before sparsely knit, creating holes within broad network
the fall of the Berlin Wall, East German personal structures. Given that family and friends are
communities were characterised by distinct niche important in everyday life, both aspects of
and provisioning components. Whereas the niche network structure are typically found within many
component was a set of densely knit ties that the personal communities – they are characterised by
East Germans used circumspectly while exchang- a dense inner core made of immediate kin
ing sensitive political views among close friends and a separate middle and outer core containing
and relatives, the provisioning component was a a range of close to superficial friendship relations
set of sparsely knit ties that they used to garner (Wellman and Wortley, 1990; Bastani, 2007;
instrumental resources such as job information Grossetti, 2007; Hennig, 2007; Hogan, 2008b).
and financial aid. This changed after the fall of
communism when the East Germans’ personal
communities were no longer linked to highly con-
trolled institutional conditions. As a result, differ- Differences in exchange processes
ences between niche and weaker ties began to Kinship and friendship tend to be marked by
disappear (Völker and Flap, 2001). distinct exchange processes, due in part to the
structural contexts in which they are embedded.
Because between-kin relations are more likely to
revolve around densely knit contexts, these ties
FRIENDSHIP AND KINSHIP IN are mostly governed by diffuse reciprocity norms,
PERSONAL COMMUNITIES whereby favours given to a beneficiary are not
repaid directly by the beneficiary but by other
The upsurge of education and physical mobility in community members (Uehara, 1990).
contemporary times has not suppressed the impor-
tance of family in personal communities. Kinship
continues to be important even among socially Differences in resources
mobile people. In the United States, highly edu-
cated individuals continue to consult immediate Friendship and kinship networks tend to be sources
kin on important matters (McPherson et al., of different kinds of resources (Wellman and
2006). In Tehran, kin remains a central concern Wortley, 1990). Immediate kin are often high on

5605-Scott-Chap08.indd 110 4/7/2011 4:48:25 PM


PERSONAL COMMUNITIES: THE WORLD ACCORDING TO ME 111

solidarity, trust and commitment, whereas friends Personal community and inequality
and acquaintances often constitute loosely coupled
networks that provide channels to things such as While personal communities are channels for the
job information (Granovetter, 1995). In many transmission of many benefits, they are also con-
instances, friendship networks serve as bridges duits for social control and the reproduction of
connecting individuals to different strata of society, inequalities. They can be mechanisms through
thus facilitating social mobility (Bian, 1997; Ferrand which inequalities are transmitted in the labour
et al., 1999; Lin, 2001). Yet the distinction between market. With many employers preferring to use
instrumental friendship and affective kinship is insider networks in addition to formal hiring
more fluid. Friends often make good social methods, personal recommendations have become
companions and providers of emotional support, a popular form of hiring in both high-status and
while immediate kin can be important sources of low-status jobs (Burt, 1997; Fernández et al.,
instrumental support, particularly in the areas 2000; Erickson, 2001).
of financial aid and knowledge acquisition In job searches, information holders with
(Coleman, 1988; Wellman and Wortley, 1990; diverse networks (the ego knows others from a
Ferrand et al., 1999). wide range of occupations) and specialised
networks (the ego knows others within the same
industry) are more likely to be aware of job open-
ings, but they do not necessarily identify potential
applicants or share these job openings with job
CONSEQUENCES OF PERSONAL seekers (Marin, 2008). Much depends on whether
COMMUNITIES information holders are willing to share their
information. Sometimes, they may be reluctant to
share because they think that the job seekers are
Personal community and not reliable and will not be good candidates
social support (Smith, 2005).
Personal communities are important to the routine Homogeneous networks often reproduce
operations of households, crucial to the manage- inequalities in job searches. For example, male
ment of crises, and sometimes instrumental in managers are more likely to hire members of their
helping change situations. They provide havens ‘old boy networks,’ preventing equally qualified
and a sense of belonging and being helped. People women from moving up (Reskin and McBrier,
count on family and close friends to provide 2000). Here, an overreliance on networks
routine emotional aid and small services to help suppresses the impact of meritocratic hiring,
cope with a variety of stresses and strains. For preventing women from gaining access to mana-
example, when faced with a medical crisis, people gerial positions. Homogeneous class-stratified
typically consult close friends and family. These networks are especially disadvantageous for
network members constitute a ‘therapy managing lower-status groups, who tend to have relatively
group’ (Pescosolido, 1992: 1124), and are impor- little access to higher-status contacts (Ferrand
tant partners in the health management process et al., 1999; Lin, 2001). Given their relative lack
(Pescosolido, 1992; Antonucci and Akiyama, of education, the job success of lower-status job
1995; Rainie and Wellman, forthcoming). seekers is often closely bound up with their ability
Personal communities can also help to change to reach up to more influential contacts.
situations. As conduits through which resources
such as money, skills, information and services
are exchanged, personal communities can often Personal community and
lead to enhanced life chances such as receiving diverse functions
advice on important matters (Fischer, 1982),
having more diverse knowledge (Erickson, 1996) A personal community is typically composed of a
and getting a job (Granovetter, 1995). They are dual combination of network arrangements,
useful for negotiating barriers in everyday life differentiated roughly by an inner and outer
such as formal bureaucratic structures. In pre- core. The inner core tends to have ties with
market China, close connections with influential multiple role relations knotted together in densely
friends and family were often invoked to expedite knit clusters, while the outer core tends to have
illegal job changes amid tight governmental specialised ties in sparsely knit network
control (Bian, 1997). During the authoritarian structures (Wellman and Wortley, 1990; Hogan,
regime in Chile, neighbours provided each other 2008b). As modern societies have become
with food and childcare, as well as helped in differentiated, the functions of personal communi-
building homes and finding work (Espinoza, ties have likewise become specialised and diverse.
1999). Personal communities have not declined in

5605-Scott-Chap08.indd 111 4/7/2011 4:48:25 PM


112 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

contemporary times; they have complex structures the mobile revolution ensures that people never
and processes. lose touch with either their home bases or their
Reflecting modern trends in marketing and other important social worlds.
community, individuals now shop for support at These technological changes are in reciprocal
specialised interpersonal boutiques rather than at acceleration with the social network revolution.
general stores. Diverse ties fulfill diverse func- While social networks have always been with us,
tions. Strong ties in the form of immediate kin are the Internet and mobile revolutions are both weak-
typically associated with long-term care and small ening group boundaries and expanding the reach,
services. Friends, siblings and organisational number and velocity of interpersonal ties. Modern
members, especially those with strong ties, are individuals have become networked, managing
likely to be social companions. Physically acces- their personal communities with the help of com-
sible relations are more likely to provide large and munication technologies as social affordances.
small services and women are more likely to pro- Taken together, the personal community approach
vide emotional aid. As necessarily individual accurately reflects the habits of modern people
managers of their personal communities, people who are profoundly and individually mobile and
come to learn about what kinds of networks work networked.
for what kinds of purposes, and they thereby
invest in diverse combinations of relationships
according to their priorities and needs in life.
NOTES

We appreciate the financial support of the Intel


CONCLUSIONS Corporation’s People and Practices unit, the Social
Sciences and Humanities Research Council of Canada
Personal communities are personal, yet they are and the National University of Singapore. We
also intensively social, spanning continents, social have learned much from our NetLab colleagues,
divisions, and other networks. In reality, personal present and past, at the Department of Sociology,
communities are not like the thousands of isolated University of Toronto. We thank Natalie Zinko for
islands in the Indonesian archipelago. Rather, they her editorial help.
overlap with other social networks to create a
system of social interactions resembling a loosely
coupled but unmistakably linked social whole.
The birth and development of communication REFERENCES
technologies such as the Internet, email, mobile
phones and smartphones now allow people to Anderssen, E. (2009) ‘Lent’s most controversial sacrifice:
build communities in new and exciting ways. Facebook’, Toronto Globe and Mail, March 7.
Because these technologies enable people to talk Antonucci, T. and Akiyama, H. (1995) ‘Convoys of social
over large distances as well as keep short-distance relations’, in Rosemary Blieszner and Victoria H. Bedford
ties, distance has become less of a barrier to the (eds.), Handbook of Aging and the Family. Westport, CT:
cultivation and maintenance of personal commu- Greenwood Press. pp. 355–72.
nities (Mok et al., 2009). Baron, N. (2008) Always On. Oxford: Oxford University Press.
With the explosive growth of new communica- Bastani, S. (2007) ‘Family comes first: men’s and women’s
tions technologies, the contemporary world is personal networks in Tehran’, Social Networks 29(3):
undergoing a ‘triple revolution’: an Internet revo- 357–74.
lution, a mobile revolution and a social network Bender, T. (1978) Community and Social Change in America.
revolution (Rainie and Wellman, forthcoming). New Brunswick NJ: Rutgers University Press.
The Internet revolution has opened up renewed Benedict XVI, Pope (2009) Message for the World Day
ways of communicating and finding information. of Communication. http://www.vatican.va/holy_father/
The power of knowledge is no longer the monop- benedict_xvi/messages/communications/documents/hf_
oly of professionals, because common folk can ben-xvi_mes_20090124_43rd-world-communicationsday_
now research on the Internet and compare notes en.html.
with healthcare and financial experts. This Internet Bian, Y. (1997) ‘Bringing strong ties back in: indirect ties,
revolution is bound up with the mobile revolution, network bridges, and job searches in China’, American
which allows individuals to communicate and Sociological Review 62(3): 366–85.
gather information while on the move. With Blau, P. (1977) Inequality and Heterogeneity. New York: Free
greater connectivity all around, people can engage Press.
their networks and access information regardless Boase, J., Horrigan, J., Wellman, B. and Rainie, L. (2006) ‘The
of their physical locations. Home bases are still strength of Internet ties’, The Pew Internet and American
important as sources of ideas and inspiration, but Life Project. Washington, DC.

5605-Scott-Chap08.indd 112 4/7/2011 4:48:25 PM


PERSONAL COMMUNITIES: THE WORLD ACCORDING TO ME 113

Boase, J. and Wellman, B. (2006) ‘Personal relationships: On Fischer, C., Jackson, R.M., Steuve, C.A., Gerson, K.,
and off the Internet’, in Anita Vangelisti and Dan Perlman McCallister, L.J. and Baldassare, M. (1977) Networks and
(eds.), Cambridge Handbook of Personal Relationships. Places. New York: Free Press.
Cambridge: Cambridge University Press. pp. 709–23. Fu, Y.-C. (2008) ‘Position generator and actual networks in
Boissevain, J. (1974) Friends of Friends. Oxford: Blackwell. everyday life: an evaluation with contact diary’, in Nan Lin
Burt, R. (1984) ‘Network items and the General Social Survey’, and Bonnie H. Erickson (eds.), Social Capital. New York:
Social Networks 6: 293–339. Oxford University Press. pp. 49–64.
Burt, R. (1997) ‘The contingent value of social capital’, Gans, H. (1962) The Urban Villagers. New York: Free
Administrative Science Quarterly 42(2): 339–65. Press.
Chen, W. and Wellman, B. (2009) ‘Net and jet: the Internet Gans, H. (1967) The Levittowners. New York: Pantheon.
use, travel and social networks of Chinese Canadian Gold, T., Guthrie, D. and Wank, D. (eds.) (2002) Social
entrepreneurs’, Information, Communication and Society Connections in China. Cambridge: Cambridge University
12(4): 525–47. Press.
Coleman, J. (1988) ‘Social capital in the creation of human Gotham, K.F. and Brumley, K. (2002) ‘Using space’, City and
capital’, American Journal of Sociology 94: S95–S120. Community 1(3): 267–89.
Collins, J. and Wellman, B. (2010) ‘Small town in the Internet Granovetter, M. (1973) ‘The strength of weak ties’, American
society‘, American Behavioral Scientist 53(9): 1344–66. Journal of Sociology 78: 1360–80.
de Vries, B. (1996) ‘The understanding of friendship: an adult Granovetter, M. (1995) Getting a Job, 2nd ed. Chicago:
life course perspective’, in Carol Margai and Susan University of Chicago Press.
McFadden (eds.), Handbook of Emotion, Adult Development Green, G., Tigges, L. and Browne, I. (1995) ‘Social resources,
and Aging. San Diego, CA: Academic Press. pp. 249–68. job search, and poverty in Atlanta’, Research in Community
Dunbar, R. (1996) Grooming, Gossip, and the Evolution of Sociology 5: 161–82.
Language. London: Faber and Faber. Grossetti, M. (2007) ‘Are French networks different?’ Social
Erickson, B. (1988) ‘The relational basis of attitudes’, in Barry Networks 29(3): 391–404.
Wellman and Stephen Berkowitz (eds.), Social Structures. Hampton, K. and Wellman, B. (2002) ‘The not so global
New York: Cambridge University Press. pp. 99–121. village of Netville’, in Barry Wellman and Caroline
Erickson, B. (1996) ‘Culture, class, and connections’, American Haythornthwaite (eds.), The Internet in Everyday Life.
Journal of Sociology 102(1): 217–51. Oxford: Blackwell. pp. 345–71.
Erickson, B. (2001) ‘Good networks and good jobs: the value Hampton, K. and Wellman, B. (2003) ‘Neighbouring in
of social capital to employers and employees’, in Nan Lin, Netville’, City and Community 2(4): 277–311.
Ronald S. Burt and Karen Cook (eds.), Social Capital: Hannerz, U. (1980) Exploring the City. New York: Columbia
Theory and Research. New York: Aldine de Gruyter. University Press.
pp. 127–57. Hennig, M. (2007) ‘Re-evaluating the community question
Erickson, B. (2003) ‘Social networks: the value of variety’, from a German perspective’, Social Networks 29(3):
Contexts 2(1): 25–31. 375–90.
Erickson, B. (2004a) ‘A report on measuring the social capital Hiller, H. and Franz, T. (2004) ‘New ties, old ties and lost
in weak ties’, Policy Research Initiative, Ottawa, Canada. ties: the use of the Internet in diaspora’, New Media &
pp. 1–16. Society 6: 731–52.
Erickson, B. (2004b) ‘The distribution of gendered social Hochschild, A.R. (1997) The Time Bind. New York:
capital in Canada’, in Henk Flap and Beate Völker (eds.), Metropolitan.
Creation and Returns of Social Capital. New York: Hogan, B. (2008a). ‘A comparison of on and offline
Routledge. pp. 27–50. networks using the Facebook API’. QMSS2: Communication
Espinoza, V. (1999) ‘Social networks among the urban poor: Networks on the Web. Amsterdam, December.
Inequality and integration in a Latin American city’, in Barry Hogan, B. (2008b) ‘Networking in everyday life’. PhD
Wellman (ed.), Networks in the Global Village. Boulder, dissertation, University of Toronto, Toronto.
CO: Westview. pp. 147–84. Hogan, B., Carrasco, J.-A. and Wellman, B. (2007) ‘Visualizing
Feld, S. (1981) ‘The focused organization of social ties’, personal networks: working with participant-aided
American Journal of Sociology 86: 1015–35. sociograms’, Field Methods 19(2): 116–44.
Ferligoj, A. and Hlebec, V. (1999) ‘Evaluation of social network Ignacio, E.N. (2005) Building Diaspora: Filipino Community
measurement instruments’, Social Networks 21: 111–30. Formation on the Internet. New Brunswick, NJ: Rutgers
Fernández, R.M., Castilla, E.J. and Moore, P. (2000) ‘Social University Press.
capital at work: networks and employment at a phone Keller, S. (1968) The Urban Neighborhood. New York:
center’, American Journal of Sociology 105(5): 1288–356. Random House.
Ferrand, A., Mounier, L. and Degenne, A. (1999) ‘The diversity Kraut, R., Kiesler, S., Boneva, B., Cummings, J., Helgeson, V.
of personal networks in France’, in Barry Wellman (ed.), and Crawford, A. (2002) ‘Internet paradox revisited’,
Networks in the Global Village. Boulder, CO: Westview. Journal of Social Issues 58(1): 49–74.
pp. 185–224. Laumann, E. (1973) Bonds of Pluralism. New York: Wiley.
Fischer, C. (1982) To Dwell Among Friends. Berkeley: University Laumann, E., Gagnon, J., Michael, R. and Michaels, S.
of California Press. (1994) The Social Organization of Sexuality: Sexual

5605-Scott-Chap08.indd 113 4/7/2011 4:48:25 PM


114 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Practices in the United States. Chicago: University of Mok, D., Wellman, B. and Carrasco, J.-A. (2010) ‘Does
Chicago Press. distance still matter in the age of the Internet?’, Urban
Lee, B., Campbell, K. and Miller, O. (1991) ‘Racial differences Studies 47 (13): 2743–83.
in urban neighboring’, Sociological Forum 6: 525–50. Moore, G. (1990) ‘Structural determinants of men’s and
Lenhart, A., Madden, M. and Hitlin, P. (2005) ‘Teens and women’s personal networks’, American Sociological Review
technology’, Pew Internet and American Life Project, 55: 726–35.
Washington. Moren-Cross, J.L. and Lin, N. (2008) ‘Access to social capital
Lin, N. (2000) ‘Inequality in social capital’, Contemporary and status attainment in the United States’, in Nan Lin and
Society 29(6): 785–95. Bonnie Erickson (eds.), Social Capital: An International
Lin, N. (2001) Social Capital. Cambridge: Cambridge University Research Program. New York: Oxford University Press.
Press. pp. 364–79.
Lin, N. and Dumin, M. (1986) ‘Access to occupations through Olson-Buchanan, J. and Boswell, W. (2006) ‘Blurring
social ties’, Social Networks 8: 365–83. boundaries ‘, Journal of Vocational Behavior 68: 432–45.
Lin, N. and Erickson, B. (2008) ‘Theory, measurement, and the Pescosolido, B. (1992) ‘Beyond rational choice’, American
research enterprise on social capital’, in Nan Lin and Journal of Sociology 97: 1096–138.
Bonnie H. Erickson (eds.), Social Capital: An International Pickard, S. (1995) Living on the Front Line. Aldershot:
Research Program. New York: Oxford University Press. Avebury.
1–24. Plickert, G., Côté, R. and Wellman, B. (2007) ‘It’s not who
Lin, N., Fu, Y.-C. and Hsung, R.-M. (2001) ‘The position gen- you know, it’s how you know them’, Social Networks
erator: measurement techniques for investigations of social 29(3): 405–29.
capital’, in Nan Lin, Karen Cook, and Ronald Burt (eds.), Putnam, R. (2000) Bowling Alone. New York: Simon and
Social Capital: Theory and Research. New York: Aldine de Schuster.
Gruyter. pp. 57–81. Quan-Haase, A., Wellman, B., Witte, J. and Hampton, K.
Marin, A. (2004) ‘Are respondents more likely to list alters with (2002) ‘Capitalizing on the net’, in Barry Wellman and
certain characteristics?’ Social Networks 26: 289–307. Caroline Haythornthwaite (eds.), The Internet in Everyday
Marin, A. (2008) ‘Depth, breadth, and social capital’. Paper Life. Oxford: Blackwell. pp. 291–324.
presented at the American Sociological Association Annual Rainie, L. and Wellman, B. (forthcoming) Networked: The New
Meeting, Boston. Social Operating System. Cambridge, MA: MIT Press.
Marsden, P. (1987) ‘Core discussions networks of Americans’, Reskin, B. and McBrier, D.B. (2000) ‘Why not ascription?’
American Sociological Review 52: 122–31. American Sociological Review 62: 210–33.
Marsden, P. (1988) ‘Homogeneity in confiding networks’, Robinson, J.P., Kestnbaum, M., Neustadl, A. and Alvarez, A.
Social Networks 10(1): 57–76. (2002) ‘The Internet and other uses of time’, in Barry
Marsden, P. (2005) ‘Recent developments in network Wellman and Caroline Haythornthwaite (eds.), The Internet
measurement’, in Peter Carrington, John Scott, and Stanley in Everyday Life. Oxford: Blackwell. pp. 244–62.
Wasserman (eds.), Models and Methods in Social Network Ruan, D., Freeman, L., Dai, X., Pan, Y. and Zhang, W. (1997)
Analysis. Cambridge: Cambridge University Press. ‘On the changing structure of social networks in urban
pp. 8–30. China’, Social Networks 19(1): 75–90.
Marsden, P. and Campbell, K. (1984) ‘Measuring tie strength’, Salaff, J., Fong, E. and Wong, S.-l. (1999) ‘Using social
Social Forces 63: 482–501. networks to exit Hong Kong’, in Barry Wellman (ed.),
Martineau, W. (1977) ‘Informal ties among urban Black Networks in the Global Village. Boulder, Colorado:
Americans’, Journal of Black Studies 8: 83–104. Westview. pp. 299–329.
McCarty, C. (2002) ‘Measuring structure in personal Sigman, A. (2009) ‘Well connected? The biological implica-
networks’, Journal of Social Structure 3: 1. tions of social networking’, Biologist 56(1): 14–20.
McCarty, C., Killworth, P., Bernard, H.R., Shelley, G.A. and Smith, S.S. (2005) ‘Don’t put my name on it: social capital
Johnsen, E. (2001) ‘Comparing two methods for estimating activation and job-finding assistance among the Black
network size’, Human Organization 60: 28–39. urban poor’, American Journal of Sociology 111: 1–57.
McPherson, M. and Smith-Lovin, L. (1987) ‘Homophily in vol- Stack, C. (1974) All Our Kin. New York: Harper & Row.
untary organizations’, American Sociological Review 52: Stern, M. (2008) ‘How locality, frequency of communication,
370–79. and Internet usage affect modes of communication within
McPherson, M., Smith, Lovin, L. and Brashears, M. (2006) core social networks’, Information, Communication, and
‘Social isolation in America’, American Sociological Review Society 11(5): 591–616.
71: 353–75. Stern, M. and Messer, C. (2009) ‘How family members stay in
Miller, D. and Slater, D. (2000) The Internet: An Ethnographic touch’, Marriage and Family Review 45.
Approach. Oxford: Berg. Straits, B. (2000) ‘Ego’s important discussants or
Mirowsky, J. and Ross, C.E. (1999) ‘Well-being across the life significant people’, Social Networks 22: 123–40.
course’, in Allan V. Horwitz and Teresa L. Scheid (eds.), Uehara, E. (1990) ‘Dual exchange theory, social networks, and
A Handbook for the Study of Mental Health. Cambridge: informal social support’, American Journal of Sociology
Cambridge University Press. 328–47. 96(3): 521–57.

5605-Scott-Chap08.indd 114 4/7/2011 4:48:25 PM


PERSONAL COMMUNITIES: THE WORLD ACCORDING TO ME 115

van der Gaag, M. and Snijders, T.A.B. (2005) ‘The resource and Toru Ishida (eds.), Digital Cities II. Berlin: Springer.
generator’, Social Networks 27: 1–27. pp. 10–25.
van der Gaag, M., Snijders, T.A.B. and Flap, H. (2008) Wellman, B. (2007) ‘The network is personal’, Social Networks
‘Position generator measures and their relationship to 29(3): 349–56.
other social capital measures’. In Nan Lin and Bonnie H. Wellman, B., Carrington, P. and Hall, A. (1988) ‘Networks as
Erickson (eds.), Social Capital: An International Research personal communities’, in Barry Wellman and S.D.
Program. New York: Oxford University Press. pp. 27–48. Berkowitz (eds.), Social Structures. Cambridge: Cambridge
Veenhof, B., Wellman, B., Quell, C. and Hogan, B. (2008, University Press. pp. 130–84.
December 4) ‘How Canadians’ use of the Internet affects Wellman, B., Chen, W. and Dong, W. (2002) ‘Networking
social life and civic participation’. Connectedness report Guanxi’, in Thomas Gold, Douglas Guthrie, and David
series. http://www.statcan.gc.ca/pub/56f0004m/6f0004m Wank (eds.), Social Connections in China. Cambridge:
2008016-eng.pdf. Cambridge University Press. pp. 221–41.
Völker, B. and Flap, H. (2001) ‘Weak ties as a liability: the Wellman, B. and Haythornthwaite, C. (eds.) (2002) The
case of East Germany’, Rationality and Society 13(4): Internet in Everyday Life. Oxford: Blackwell.
397–428. Wellman, B., Hogan, B., Berg, K., Boase, J., Carrasco, J.-A.,
Wang, H. and Wellman, B. (2010) ‘Social connectivity Cote, R., Kayahara, J., Kennedy, T. and Tran, P. (2006)
in America’, American Behavioral Scientist 53 (8): ‘Connected lives: the project’, in Patrick Purcell (ed.),
1148–69. Networked Neighbourhoods: The Online Community in
Wellman, B. (1979) ‘The community question’, American Context. Guilford, UK: Springer. pp. 157–211.
Journal of Sociology 84: 1201–31. Wellman, B. and Tindall, D. (1993) ‘Reach out and touch
Wellman, B. (1985) ‘Domestic work, paid work and net work’. some bodies’, Progress in Communication Science 12:
In Steve Duck and Daniel Perlman (eds.), Understanding 63–94.
Personal Relationships. London: Sage. pp.159–91. Wellman, B. and Wellman, B. (1992) ‘Domestic affairs and
Wellman, B. (1990) ‘The place of kinfolk in community network relations’, Journal of Social and Personal
networks’, Marriage and Family Review 15(1/2): 195–228. Relationships 9: 385–409.
Wellman, B. (ed.) (1999) Networks in the Global Village. Wellman, B. and Wortley, S. (1990) ‘Different strokes
Boulder, CO: Westview Press. from different folks’, American Journal of Sociology 96:
Wellman, B. (2001a) ‘Physical place and cyber place: the rise 558–88.
of personalized networking’, International Journal of Urban Wilding, R. (2006) ‘Virtual intimacies? Families communicat-
and Regional Research 25(2): 227–52. ing across transnational contexts’, Global Networks
Wellman, B. (2001b) ‘The persistence and transformation 6(2): 125–42.
of community: from neighbourhood groups to social Young, M. and Willmott, P. (1957) Family and Kinship in East
networks’, Report to the Law Commission of Canada. London. Harmondsworth, UK: Penguin.
Wellman, B. (2002) ‘Little boxes, glocalization, and networked Zinc Research and Dufferin Research. (2008) ‘Canadians and
individualism’, in Makoto Tanabe, Peter van den Besselaar, social networking sites’. Toronto: Zinc Research.

5605-Scott-Chap08.indd 115 4/7/2011 4:48:25 PM


9
Social Support
Lijun Song, Joonmo Son, and Nan Lin

Social support, a network-based social phenome- Despite its substantial popularity and volumi-
non, has become the focus of research attention in nous development, “social support” still stimu-
the last three decades. As shown by a search of the lates debates on its conceptualization and
Social Sciences Citation Index for articles whose operationalization. Social support is confounded
topics include “social support,” there were only with other network-based but distinct social fac-
three such articles in the 1950s and ten in the tors without clear discrimination, such as social
1960s. The number rose to 76 in the 1970s. cohesion, social integration, social networks, and
Following this, on average per year, there were social capital. Empirical results on its health
94 such articles in the 1980s, 1,394 in the 1990s, returns are abundant but inconsistent across stud-
and 2,687 from 2000 to 2008. Social support ies. We thus begin this review by clarifying the
has attracted burgeoning attention especially in nature and forms of social support. We then turn
health literature, and the lack of social support to its distinction from and association with other
is regarded as a potential fundamental cause of network-based factors. Next, we examine the
disease (Link and Phelan, 1995). In another operation of social support in the social produc-
search of the Social Sciences Citation Index for tion process of disease and illness. We conclude
articles with “social support” and “health” in their with a brief discussion of future research direc-
topics reports (see Figure 9.1), on average per tions of social support research. Even though
year, there were less than six articles from 1976 to social support is a sociological phenomenon
1989; the number increased to 445 in the 1990s in nature, the existing literature on the topic has
and dramatically jumped to 1,135 from 2000 to been dominated by epidemiologists, psychiatrists,
2008. A few books explored the relationship and psychologists, as Umberson et al. (1988a)
between social support and its health conse- observed two decades ago. Sociologists are
quences (Caplan, 1974; Caplan and Killilea, expected to play a crucial role in the advancement
1976; Cohen and Syme, 1985; Cohen, Underwood of future studies on social support.
et al., 2000; Gottlieb, 1981, 1983; House, 1981;
Lin et al., 1986). Many reviews from different
disciplinary backgrounds have surveyed the
associations of social support with various
health-related outcomes (Alcalay, 1983; Berkman, CONCEPT OF SOCIAL SUPPORT: NATURE
1984, 2000; Coyne and Downey, 1991; Ell, 1984; AND FORMS
Faber and Wasserman, 2002; Green, 1993;
House, 1987; Umberson et al., 1988a; Kessler The idea of social support has achieved great
et al., 1985; Schwarzer and Leppin, 1991; Smith currency since the mid-1970s (for reviews,
et al., 1994; Thoits, 1995; Turner and Turner, see Barrera, 1981, 1986; Gottlieb et al., 2000;
1999). Dean and Lin, 1977; Gottlieb, 1981; Lin, 1986a;

5605-Scott-Chap09.indd 116 4/7/2011 4:49:19 PM


SOCIAL SUPPORT 117

1800
1600

Number of publications
1400
1200
1000
800
600
400
200
0
76
78
80
82
84
86
88
90
92
94
96
98
00
02
04
06
08
19
19
19
19
19
19
19
19
19
19
19
19
20
20
20
20
20
Year of publication

Figure 9.1 Articles with “social support” and “health” in topic: social sciences citation index

Thoits, 1982). Epidemiologist John Cassel, physi- skills, and cognitive guidance to improve his
cian and epidemiologist Sidney Cobb, and psy- handling of his situation.”
chiatrist Gerald Caplan make groundbreaking More attempts to conceptualize the substance
contributions to its popularity. Cassel and Cobb of social support from different perspectives
summarize accumulating empirical evidence on quickly followed. Dean and Lin (1977) consider
the promising impact of relational factors in social support as functions of primary groups that
health maintenance and promotion, and under- meet instrumental and expressive needs. Lin and
score social support as one such protective ante- colleagues later reconstruct social support at
cedent. Cassel (1974, 1976) dichotomizes various multiple levels of social networks as “support
social conditions relevant to health from a func- accessible to an individual through social ties to
tionalist perspective: one category protects health, other individuals, groups, and the larger commu-
while the other one produces disease. He speaks nity” (Lin et al., 1979: 109). Kaplan and
broadly of social support as the first category, “the colleagues (Kaplan et al., 1977: 54) point out that
protective factors buffering or cushioning the indi- social support is the content of social ties (i.e.,
vidual from the physiologic or psychological “the meanings that persons in the network give
consequences of exposure to the stressor situa- their relationships”), and it is contingent on
tion” (1976: 113). Cobb (1974, 1976) uses a com- structural and interactional characteristics of
munication perspective. He (1976) conceives of social networks (i.e., anchorage, reachability,
social support as information, and he classifies density, range, directedness, intensity, and fre-
three types of information in terms of their func- quency). Henderson (1977) applies attachment
tions: information leading a person to believe that theory and views social support as affectively
he or she is cared for and loved (i.e., emotional positive social interaction with others under stress-
support), is esteemed and valued (i.e., esteem sup- ful conditions. Gottlieb (1978) lists four forms of
port), and belongs to a network of communication informal social support derived from 26 helping
and mutual obligation. Similar to Cassel’s defini- behaviors: emotionally sustaining behaviors,
tion, Cobb argues that the major protective role of problem-solving behaviors, indirect personal
social support lies in its moderating effect on life influence, and environmental actions. Wellman
stress instead of its main health effect. In addition, (1981) dichotomizes the content of social ties. He
Caplan (1974: 6–7) addresses the concept of the asserts that social support is only one type of con-
support system as “an enduring pattern of continu- tent; the other is nonsupport. He lists five forms of
ous or intermittent ties that play a significant part social support derived from 21 interactional
in maintaining the psychological and physical strands: doing things, giving and lending things,
integrity of the individual over time,” and he lists helping with personal problems, helping with
three types of support activities: “The significant information, and sharing activities, values, inter-
others help the individual mobilize his psycho- ests, and interaction. He also highlights the varia-
logical resources and master his emotional bur- tion of social support with network properties
dens; they share his tasks; and they provide him (i.e., tie strength, tie symmetry, density). Pearlin
with extra supplies of money, materials, tools, and colleagues view social support as “the access

5605-Scott-Chap09.indd 117 4/7/2011 4:49:19 PM


118 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

to and use of individuals, groups, or organizations (information relevant to self-evaluation) (House,


in dealing with life’s vicissitudes” (1981: 340). 1981). In terms of its degree of subjectivity, social
House and his colleagues define social support support is dichotomized into perceived support
as one type of relational content, “the emotionally and objective or actual support (Caplan, 1979). In
or instrumentally sustaining quality of social terms of the role relationship between the recipi-
relationships” (Umberson et al., 1988a: 293). ent and the donor (Dean and Lin, 1977; LaRocco
Berkman (1984) sees social support as the emo- et al., 1980; Thoits, 1982), social support could be
tional, instrumental, and financial aid that is kin-based (e.g., parents, spouses, children, sib-
obtained from one’s social network. More recently, lings, other relatives) or nonkin-based (e.g.,
Turner (1999) defines social support as social friends, neighbors, co-workers). In terms of its
bonds, social integration, and primary group rela- contexts, social support could be routine support
tions. Cohen and colleagues refer to social support within an ordinary situation or nonroutine support
as “any process through which social relationships within a crisis situation (Lin et al., 1986). Social
might promote health and well-being” (Gottlieb support is thus a multidimensional construct. Its
et al., 2000: 4). exhaustive typology is beyond the scope of this
These different conceptualizations reflect an chapter. A cross-tabulation following the forego-
ambiguous construction of the social support con- ing strategies produces 32 forms of social support.
cept. Despite the inconsistent framing, most of Also, social support is traditionally used as a
these efforts explicitly or implicitly converge on single directional concept and refers only to
the relationship-based, assisting nature of social received support, which is support egos get
support. Based on the above review, we are more from their network members. Some argue that
attracted to a strict synthetic definition of social social support is bidirectional (Pearlin, 1985;
support as the aid – the supply of tangible or Wellman, 1981). Egos not only receive support
intangible resources – individuals gain from their from alters but also give support to alters or
network members (Berkman, 1984; House, 1981). reciprocate support with alters. Providing or recip-
This definition narrows down social support to a rocating support has received limited attention.
specific relational content, separates its nature We will focus on received support in the rest
from its preceding social structures such as social of this chapter.
networks and social integration, and eliminates its
tautological assumption that social support
protects against disease and that what fosters
health is social support. The stretching of social DISTINCTION FROM OTHER
support as general environmental factors (Cassel, NETWORK-BASED CONCEPTS
1976), relational content (Kaplan et al., 1977;
Henderson, 1977), or relational process (Gottlieb Theoretical distinction
et al., 2000) paves the way for diverse measure-
ments and mixed evidence, and endangers the Social support thus rigorously conceived allows
unique theoretical value of social support. The us to distinguish it from other network-based but
functionalist framing of social support (Cassel, distinct preconditions of disease and illness such
1976; Gottlieb et al., 2000; Henderson, 1977) as social cohesion, social integration, social net-
mixes social support with its consequences, and works, and another recently popular construct,
this overlooks the fact that social support does not social capital. The health consequences of these
always function in a positive direction to meet four factors have also been well documented
needs or to intervene between stressors and health. (for reviews, see Berkman, 1995; Berkman and
The disease- or stress-related definition (Cassel, Glass, 2000; Berkman et al., 2000; Greenblatt
1976; Cobb, 1976; Gottlieb et al., 2000; Henderson, et al., 1982; Landis et al., 1988b; Kawachi et al.,
1977; Pearlin et al., 1981) constrains the signifi- 2008; Kawachi and Berkman, 2001; Lin and Peek,
cance of social support within the health area, 1999; Luke and Harris, 2007; Pescosolido and
which would be applicable to the production of Levy, 2002; Smith and Christakis, 2008; Song et
other consequences and the general stratification al., 2010; Stansfeld, 2006). However, the distinc-
process. tion between social support and these factors
Most conceptualizing efforts also converge on tends to be blurred in recent health literature.
multifaceted forms of social support. Social Some put social networks, social integration, and
support can be categorized in different ways. In social resources under the rubric of social support
terms of its content, for example, social support (e.g., Elliott, 2000; Lin et al., 1999; Roxburgh,
can be divided into emotional support (liking, 2006; Turner, 1999). One recent fashionable
love, empathy); instrumental support (goods and trend is to subsume social support together with
services); informational support (information social cohesion, social integration, and social
about the environment); or appraisal support networks under the popular umbrella of social

5605-Scott-Chap09.indd 118 4/7/2011 4:49:19 PM


SOCIAL SUPPORT 119

capital (e.g., Carpiano, 2006; Coleman, 1990; factors. Social integration is positively associated
Putnam, 2000; Szreter and Woolcock, 2004). with the quality and quantity of social capital and
Such an entangled conceptualization jeopard- social support by maintaining old relationships
izes the unique heuristic utility of each concept and establishing new relationships. Social capital
and confounds their causal relationships. To over- is a source of social support because network
come this theoretical issue scholars have attempted members’ resources are drawn for various
to distinguish them from each other (Berkman supportive purposes. Social support may therefore
et al., 2000; Umberson et al., 1988a; House and be conceived as a downstream factor subsequent
Kahn, 1985). We have made careful efforts to to the operation of social cohesion, social integra-
differentiate them elsewhere (Song and Lin, 2009). tion, and social capital, and other network
To begin, a social network is “a specific set of features. Certain indicators of social integration,
linkages among a defined set of persons, with the social capital, and other network characteristics
additional property that the characteristics of these may act as proximate measures of social support.
linkages as a whole may be used to interpret the The relationship between these network-based
social behavior of the persons involved” (Mitchell, factors is indeed reciprocal and dynamic from a
1969: 2). Its simplest form is a dyadic social tie. longitudinal perspective. For example, the activa-
A social network is not a theory but a perspective tion process of social support, either satisfying
(Mitchell, 1974). It provides guides to explore and effective or unsatisfying and ineffective may
various network properties, their causes, and con- redirect the degree and form of social integration,
sequences. Network properties may be objective, reconstruct the availability of social capital, and
including tie attributes such as tie strength and finally reshape the strength of social cohesion.
relational contents; structural attributes such as After clarifying the meaning of these terms, we
network size; and compositional attributes such as turn to empirical evidence on the network contin-
network members’ characteristics. They may also gency of social support. Little attention has been
be subjective, such as network norms. Specific paid to the relationship between social cohesion
theories such as social cohesion, social integra- and social support. We review a few studies on the
tion, social capital, and social support are derived associations of social integration, social capital,
from the network perspective (Berkman et al., and other network features with social support.
2000; Lin and Peek, 1999; Pescosolido, 2007).
Social cohesion is the degree of social bonds and
social equality within social networks, indicated
by trust, norms of reciprocity, and the lack of
Empirical evidence: the network
social conflict (Kawachi and Berkman, 2000). contingency of social support
Social integration is the extent of participation in Social integration fosters the production of social
social networks, indicated by active engagement support. Lin and colleagues (Lin et al., 1999) use
in social roles and social activities, and cognitive a community sample of adults. They measure
identification with network members (Brissette social support based on 40 items in a survey, and
et al., 2000). Social capital is resources embedded they derive four latent factors to respectively indi-
in social networks, measured as structural posi- cate perceived instrumental support, actual instru-
tions of one’s network members (Lin, 1999a). mental support, perceived expressive support, and
Thus conceived (see Figure 9.2), social support actual expressive support. As they report, social
is separated from its structural contexts integration (or participation in community organi-
(Dohrenwood and Dohrenwood, 1981; House and zations, in their own words) directly leads to more
Kahn, 1985; Lin et al., 1999). Social cohesion as actual instrumental support, indirectly increases
a norm is more upstream in the causal chain, and all types of support through expanding network
it may regulate properties of other network-based size (i.e., the number of weekly contacts), and
indirectly produces perceived and actual instru-
mental support by increasing the chance of the
presence of an intimate relationship. Seeman and
Social Social Berkman (1988) analyze a community sample of
integration capital older adults. Two types of perceived support,
instrumental (i.e., help on daily tasks) and
emotional (i.e., talking over problems and deci-
Social Social sion making), are both positively associated with
cohesion support network size; number of face-to-face contacts;
number of proximal ties; having a confidant rela-
tionship; and direct contacts with children, friends,
Figure 9.2 A conceptual model of social and relatives. One specific form of social integra-
support and its network-based sources tion, religious participation, and its linkage to

5605-Scott-Chap09.indd 119 4/7/2011 4:49:19 PM


120 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

social support has received much attention. Ellison from three indicators of positional networks:
and George (1994) employ a community sample range (i.e., the difference of the highest and lowest
of adults. Their findings vary with the measure- prestige scores among the positions that each
ments and the types of actual support. They pre- respondent could access), extensity (i.e., the
sented a list to respondents of 13 types of support number of different positions each respondent
and asked whether their network members ever could access), and upper reachability (i.e., the
offered these types of support. If each type of highest score among accessed positions). They
received support is measured separately as dummy find a significant positive effect of social capital
variables, the frequency of religious attendance is on the receipt of job information. Another study
positively associated with the supplies of 4 out of (Wellman and Wortley, 1990) collected informa-
13 types of support: gifts or presents, business or tion on 29 respondents’ active network members
financial advice, house maintenance and repair in the East York section of Toronto, the total of
tasks, and running errands. When they measure which is around 335. It finds no association
received support as a summed score ranging from between network members’ socioeconomic posi-
0 to 13, the frequency of religious attendance tions (i.e., education, employment status, and
increases the variety of received support only occupational status) and five indicators of actual
indirectly through expanding the size of networks support (i.e., emotional aid, major services, small
(i.e., number of nonkin ties, in-person contacts, services, financial aid, and companionship). In
and telephone contacts). Nooney and Woodrum addition, one study explores the influence of
(2002) focus on religious participation and church- social capital on actual support in a natural disas-
based support. Using a national sample of adults, ter context (Beggs et al., 1996). The authors inter-
they find that the frequency of church attendance viewed residents in two communities after
is positively associated with perceived support Hurricane Andrew in Louisiana and collected
from their congregations. Taylor and Chatters information on their core networks prior to the
(1988) investigate a national sample of African disaster and on their actual support as well as sup-
Americans, and report that the frequency of port from formal organizations during disaster
church attendance expands the chance of receiv- recovery. They measure 11 network characteris-
ing support from people in the church. In a study tics. Among them, the proportion of alters with
of national longitudinal data of adolescents (Petts less than a high school education reflects struc-
and Julliff, 2008), social support (i.e., how much tural locations of network members and is the
adults, teachers, parents, and friends care about most proximate indicator of social capital. That
them; and how much their family understands proportion is positively associated with the receipt
them, cares about them, and has fun together) of informal recovery support. This finding seems
explains away the effect of religious participation to disconfirm our previous causal argument on
on depression. the positive association of social capital with
The positive linkage of social capital to health social support. As the authors explain, that finding
and economic well-being has been documented is consistent with previous disaster studies.
(Lin, 1999b; Song et al., 2010). As social capital The underlying rationale is that individuals with
researchers generally assume, social capital con- less education may possess disaster-relevant
tributes to various returns by providing a higher occupational skills. Such a finding implies that
level of different forms of social support, such as the function of social capital in the social
information, influence, social credential, and rein- distribution of social support varies across social
forced identity (Lin, 2001). However, direct contexts.
examinations of the impact of social capital on Apart from social integration and social capital,
social support are very limited if we operational- other network features also shape the process of
ize social capital strictly as structural positions of social support. Haines and Hurlbert (1992) study
network members (Lin, 2001). Empirical results a community sample of adults. They measure
are also mixed. One study examines the relation- three indicators of perceived support: instrumental
ship between social capital and informational (i.e., having enough people to get help), compan-
support (Lin and Ao, 2008). It employs a national ionship (i.e., having enough people with whom to
sample of currently or previously employed adults socialize), and emotional (i.e., having enough
between 21 and 64 years of age and captures people to talk to). The average number of contents
informational support by asking respondents per tie decreases instrumental support only for
whether they received job information at the time women; the proportion of kin among alters
they started their current job. They map positional increases instrumental support only for men; and
networks through the position generator that density among alters increases companionship
asked respondents to identify contacts, if any, in and emotional aid for men only. Wellman and
each of 22 occupational positions at the time they Wortley’s East York study (1989) observes that
started their current job. Social capital is derived various forms of actual support vary with kinship

5605-Scott-Chap09.indd 120 4/7/2011 4:49:19 PM


SOCIAL SUPPORT 121

relations. Parents and adult children offer higher the crucial operation of social support. From a
levels of emotional aid, services, and financial aid; social causation perspective, social support has
siblings especially supplement the provision of four major roles in the production of health: main
services; and extended kin are least supportive and effect, mediating effect, indirect effect, and mod-
less companionable. They further report (Wellman erating effect. The main effect hypothesis states
and Wortley, 1990) that stronger ties, measured as that social support can protect health net of other
a higher degree of intimacy and voluntary interac- social preconditions. In other words, social sup-
tion within diverse contexts, supply wider support port adds a unique explanatory power to the social
and offer more emotional aid, small services, and etiology of health and illness. Personal capital
companionship, and that physically accessible such as socioeconomic status is a fundamental
ties tend to provide services. They do not find cause of disease and illness (Link and Phelan,
significant associations of actual support with 1995). Therefore social support, the use of per-
frequency of contact, group’s interconnections, sonal capital from network members, is expected
and positional similarity between egos and to exert a direct health effect as well. The mediat-
network members. A more recent study (Plickert ing effect hypothesis argues that social support
et al., 2007) investigates determinants of recipro- may act as an intermediate variable, and it may
cal exchange of emotional support, minor intervene in the relationship between its precur-
services, and major services. It reports significant sors and health consuences. As mentioned earlier,
associations between the giving and receiving of other network-based factors such as social inte-
emotional support, the giving and receiving gration or social capital may exert positive health
of minor services, and the giving and receiving of impacts through strengthening social support.
major services. It also finds partial evidence that Personal resources such as socioeconomic status
giving one type of resource is associated with may have similar indirect health effects by deter-
getting other types of resources in turn. Being a mining the quality and quantity of social support.
neighbor, a parent, or an adult child is positively Stressors could play similar roles by either trig-
associated with reciprocal support of major and gering the use of social support or diminishing its
minor services. The number of ties is positively availability. The indirect effect hypothesis holds
associated with reciprocal emotional support. that social support may prevent disease indirectly
Tie strength does not exert a significant effect. by shaping other health risk factors, such as health
We next review the theoretical and empirical behaviors, psychological resources, and the physi-
evidence for the role of social support in the social ological system (Berkman et al., 2000; Umberson
production of disease and illness. et al., 1988a). Also, as the prominent job search
literature in the area of social stratification assumes
(Lin, 2001), social capital advances socioeco-
nomic status attainment through the provision of
HEALTH RETURNS TO SOCIAL SUPPORT social support. In this context, social support may
exert an indirect health effect by increasing socio-
Theoretical modeling economic positions that are fundamental causes of
disease and illness (Link and Phelan, 1995). The
Social support initially received research attention moderating effect hypothesis assumes that social
only as a buffer in the association of stressors with support may mitigate or exacerbate the health
mental health (Cassel, 1976; Cobb, 1976; Kaplan effects of other risk factors. For example, disad-
et al., 1977). Most individuals have limited vantaged individuals with lower personal capital
personal capital. When encountering undesirable may be more motivated to use social support in
life events they are expected to use social capital the protection of health. In this case social support
(i.e., personal capital of their network members) equalizes the inequality effect of personal capital.
to supplement their personal capital through the On the other hand, advantaged individuals may
process of social support. This process may invest more resources in social networking and
reduce the negative health effects of stressful life may be able to use social support more success-
events. In the last three decades diverse models fully and more efficiently in their access to health
linking social support to health have been devel- resources. Social support could thus intensify the
oped (Barrera, 1986; Berkman, 2000; Gottlieb inequality effect of personal capital. Take
et al., 2000; Dohrenwend and Dohrenwend, 1981; the stress paradigm as another example. Social
Ensel and Lin, 1991; Umberson et al., 1988a; Lin, support may ameliorate the negative health effect
1986b; Thoits, 1982; Wheaton, 1985). Most of of stressors by helping individuals successfully
these modeling efforts focus on the health func- deal with undesirable life situations. It may also
tions of social support in the stressor-distress enlarge that negative effect on mental health espe-
framework. We attempt to summarize these efforts, cially, for example, by increasing the recipients’
extend them beyond that framework, and focus on psychological burden. Furthermore, from a social

5605-Scott-Chap09.indd 121 4/7/2011 4:49:19 PM


122 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

selection perspective, health status may also influ- strain, economic strain, physical health strain).
ence the availability and activation of social Roxburgh (2006) investigates perceived support
support (Thoits, 1995). There are two possibili- from co-workers and partners. Partner support
ties. On one hand, poorer health may provoke the exerts a main negative effect on depression for
recognition and mobilization of social support. On both gender groups and does not have moderating
the other hand, poorer health may produce lower effects. Co-worker support has a main negative
perceived and received social support, because of effect on depression only for men, and it buffers
resultant higher needs for help or because of its the positive depression effect of the stressor time
constraint on social interaction with network pressure only for men. Turner and colleagues
members. Finally, as mentioned earlier, the main- (Turner and Lloyd, 1999; Turner and Marino,
stream social support literature focuses on received 1994) measure perceived support from partners,
support rather than on providing support. The relatives, friends, and co-workers based on
foregoing theoretical modeling applies to received 25 items. Perceived support has main negative
support. Some have argued for the direct and effects on both depressive symptoms and major
mediating effect of providing social support on depressive disorder. It mediates some effects of
health (Krause et al., 1999). Supporting others gender, age, marital status, and soioeconomic
may protect health directly through fostering status on depressive symptoms but does not medi-
personal control, sustaining a sense of self-worth, ate their effects on major depressive disorder. It
maintaining network ties, and improving immune does not moderate the linkages of stressors, age,
functioning. It may also mediate the relationship sex, marital status, and socioeconomic status to
between religious practice and health. both measures of mental health. Haines and
Next, we selectively review recent empirical Hurlbert (1992) use three indicators of perceived
evidence. We include only quantitative studies support: instrumental (i.e., having enough people
using a noninstitutionalized sample of adults due to get help), companionship (i.e., having enough
to limited space and for the purpose of stronger people with whom to socialize), and emotional
generalizability and more rigorous theoretical (i.e., having enough people to talk to). Among
examination (Dean and Lin, 1977). We also them, only companionship exerts a main negative
choose to highlight varying specifications of effect on distress. Only this indicator buffers the
social support by summarizing these studies one effect of stressors. Landerman and colleagues
by one. (1989) measure perceived support (e.g., the
frequency of feeling lonely, feeling understood,
feeling useful, feeling listened to, feeling one has
Empirical evidence a definite role, knowing what is going on with
family and friends, and talking about problems)
Most studies explore received support. They and satisfaction with social support. The negative
employ data from cross-sectional surveys and interaction effects of those two indicators with
report inconsistent evidence. The health impact of life events on depression are significant in linear
perceived support receives much more attention, probability models but not in logistic regression
and most studies use data from community sur- models. Elliott (2000) uses two indicators of
veys. In one study (Ross and Mirowsky, 1989), social support: emotional support (i.e., presence
perceived support (i.e., having someone to talk to of a confidant) and social integration (i.e.,
or run to for support) has a main negative effect on frequency of social interaction). Both types of
depression. It mediates some positive effects of social support reduce depressive symptoms and
marriage and education but not those of family protect physical health, but only for residents
income or race/ethnicity. Perceived support also of higher-socioeconomic neighborhoods. It is
interacts in a complementary manner with the speculated that disadvantaged neighborhoods are
level of control. The positive depression effect of less likely to foster social interactions between
a low level of control is significantly reduced by residents, and residents there are less able to offer
access to a higher level of perceived support. support.
Another study (Jackson, 1992) examines four- Four studies investigate perceived support using
item perceived spouse support and also four-item national samples. Gorman and Sivaganesan (2007)
perceived friend support. The relationship of sup- report that social support (i.e., the frequency of
port with depression depends on the sources of getting social or emotional support) does not
support and the nature of stressors. Spouse sup- exert a main effect on both hypertension and
port reduces the depression effect of all five kinds self-reported health. Ferraro and Koch (1994)
of stressors (i.e., marital strain, parental strain, measure perceived emotional support based on a
work strain, economic strain, and physical health four-item scale (i.e., feeling loved, feeling listened
strain), while friend support plays similar roles to, feeling demanded, and feeling criticized). This
only for three kinds of stressors (i.e., marital indicator has a direct positive effect on health

5605-Scott-Chap09.indd 122 4/7/2011 4:49:19 PM


SOCIAL SUPPORT 123

status (i.e., subjective health, chronic conditions, not moderate the effect of stressors. Another study
activity limitation) for both black and white (Lin et al., 1999) distinguishes two components of
respondents. In contrast, another study (Lincoln social support: structural support and functional
et al., 2003) reports racial/ethnic differences. support. It measures three layers of structural sup-
Their latent social support factor is derived from port: belonging relationship (i.e., participation in
three indicators (i.e., the extent to which respond- seven types of formal organizations), bonding
ents feel that relatives understand the way they relationship (i.e., the number of weekly contacts),
feel, appreciate them, and can be relied on for and binding relationship (i.e., the presence of an
help). Social support exerts a main effect on psy- intimate tie). It uses 40 items of social support
chological distress only for African Americans. It from which four latent factors are derived: per-
mediates the effect of personality only for African ceived and actual instrumental support, and per-
Americans in that neuroticism decreases social ceived and actual expressive support. Among
support. It has an indirect negative effect on psy- these indicators, bonding and binding relation-
chological distress only for whites in that it ships as well as perceived expressive support and
increases personal control, which decreases dis- actual instrumental support exert main negative
tress. Furthermore, Ross and Willigen (1997) effects on depression. Three layers of structural
analyze two national data sets simultaneously. support also have indirect effects on depression by
Both data sets have information on perceived producing actual instrumental support, and the
emotional support (i.e., having someone to turn bonding relationship exerts an indirect effect
to for help and talk to), and one on perceived through enhancing perceived emotional support.
instrumental support (i.e., having someone to help The third study (Lin et al., 1985) asked respond-
with daily tasks and care in sickness). Social ents to identify their most important life event in
support as a sum of emotional and instrumental the last six months, then asked them about people
support in one data set has a main negative effect they interacted with following that event. This
on four forms of psychological distress such collected information on respondents’ support
as depression, anxiety, malaise, and aches and networks. The study measures social support in
pains. In another data set social support as two ways: the strength of ties and the homophily
emotional support exerts a similar effect on all between egos and helpers, assuming that such
outcomes except for aches and pains. They fail to indicators capture the quality of social support.
find evidence from both data sets for social As the authors observe, strong ties decrease the
support as a significant mediator between educa- negative effect of undesirable life events on
tion and distress. depression but only for those in a stable marital
A few studies examine both perceived and status. Age and educational homophily reduce
actual support. Wethington and Kessler (1986) use depressive symptoms only for the married, while
a national sample of married adults. They have occupational homophily exerts a similar effect
one indicator of perceived support (i.e., the only for the unmarried.
presence of someone to count on for help), and Longitudinal studies are limited and also report
six indicators of actual support: support from mixed evidence. In one study of a two-wave
providers, support from spouses, support from community sample (Thoits, 1984), stable emo-
close relatives, support from others, emotional tional support (i.e., the presence of an intimate
support, and instrumental support. For those relationship) over time directly reduces the level
experiencing undesirable life events, perceived of anxiety and depression at Time 2. It does not
instead of actual support has a direct negative interact with stressors. In another study of a two-
effect on psychological distress. Actual spouse wave community sample (Pearlin et al., 1981),
support exerts an indirect effect by increasing emotional support (i.e., the presence of someone
perceived support. who provides understanding and advice; intimate
Lin and colleagues also examine both per- exchange with spouses) does not have a main
ceived and actual support in three cross-sectional effect on changes in depression over time while
studies. One study (Lin et al., 1979) uses a com- decreasing economic strain and increasing mas-
munity sample of Chinese American adults. Social tery. It also does not moderate the relationship
support is measured by a nine-item scale (i.e., between the stressor (i.e., job disruption) and
feelings about the neighborhood, feelings about depression. One study uses a four-wave commu-
people nearby, frequency of talking with neigh- nity sample (Aneshensel and Frerichs, 1982).
bors, having close friends in D.C. area, interaction Its latent variable of social support is derived
with friends from old country, involvement from three measures: number of close friends,
in Chinese activities, involvement in Chinese number of close relatives, and received socioemo-
association, being an officer in Chinese associa- tional and instrumental assistance. As it reports,
tion, and being satisfied with job. It has a main current social support has a main negative effect
negative effect on psychiatric symptoms. It does on current depression at Time 1 and Time 4.

5605-Scott-Chap09.indd 123 4/7/2011 4:49:19 PM


124 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Current social support also has indirect effects on people who wish to talk about worry or trouble,
subsequent depression as a result of the impact of and how often respondents encourage and comfort
current depression on subsequent depression over people experiencing hardship). Providing emo-
time. Depression does not seem to influence the tional support is positively associated with self-
social support factor over time. Current stressors reported health for both men and women. It also
result in a higher level of current social support at mediates the positive health effect of religious
Time 1 and Time 4, which may imply that stres- practice, but only for men.
sors trigger the use of social support. In summary, the above empirical studies focus
Lin and colleagues (Ensel and Lin, 1991; Lin, on received support. They are concerned more
1986b; Lin and Ensel, 1984, 1989; Tausig, 1986) with mental health outcomes than with physical
collected a three-wave community sample. Three health outcomes. Most studies assume a social
of their studies use the first two waves of data. causation explanation. They pay more attention to
One (Lin, 1986b) measures social support as a the main and moderating health effect of social
latent variable derived from 39 items covering support than its mediating and indirect impact.
community support, network support, confidant The results of these studies are inconsistent. There
support, and instrumental-expressive support. is more confirming than disconfirming evidence
Social support thus measured has a main negative that social support exerts a direct protective effect
effect on depression and its change over time. It on health, mental health in particular. The signifi-
mediates the effect of prior undesirable life events, cance of that effect may vary with samples,
which indirectly increase depressive symptoms by outcomes, measures of social support; sociodemo-
decreasing social support. It also exerts an indirect graphic groups; and even neighborhood contexts.
effect by suppressing current life events. There is Some studies demonstrate that social support
no evidence for the interaction of social support mitigates the effect of psychological resources
with undesirable life events. In the other two stud- and stressors, but more studies do not. The impor-
ies (Lin and Ensel, 1984; Tausig, 1986), social tance of the moderating role of social support
support is indicated by a two-item perceived differs across gender groups, statistical methods,
strong-tie support (i.e., perception of having and types of social support. A few studies on the
enough close companions or friends). Prior social mediating function of social support report that
support and change in social support have a main social support may help explain some health
negative effect on the change in depression over effects of sociodemographic and socioeconomic
time. Prior social support also has an indirect variables, psychological resources, social integra-
effect on the change in depression by suppressing tion, tie and network attributes, and precedent
the change in undesirable life events. Change in stressors. Furthermore, social support may act as
social support mediates some effects of prior a precursor and affect health indirectly by
social support, prior undesirable life events, the influencing psychological resources and reducing
change in undesirable life events, and prior depres- stressors. Longitudinal research designs are
sion, which decreases the change in social sup- limited. As a result, the social selection argument
port. Furthermore, prior physical health has a receives very little attention. Such limited studies
positive association with current social support. also report conflicting evidence. Aneshensel
Two more studies use the three waves of data and and Frerichs (1982) do not find an impact of
measure social support using the foregoing two- depression on social support, while Lin and
item strong-tie support scale. One study (Lin and colleagues (Lin, 1986b; Tausig, 1986) find that
Ensel, 1989) focuses on physical health. It fails to better physical and mental health brings in more
find a main effect of social support on physical social support. In addition, providing support
symptoms at Time 3. Social support at Time 2, seems to have a direct or mediating effect
however, does buffer the effects of stressors on health.
and depression at Time 1. The second study (Ensel
and Lin, 1991) explores depression. Social
support at Time 2 has a main negative effect on
depression at Time 3. It also mediates the effect of CONCLUSION
stressors at Time 1 that decreases social support.
The study fails to find evidence for any moderat- Social support has triggered a burgeoning multi-
ing effect. disciplinary research literature, especially in the
In addition, providing support and its health area of health during the last three decades. Social
effects receives little attention. For example, support initially arose as a post hoc explanation
Krause and colleagues (1999) examine a national for the emerging relationships that linked social
sample of the elderly in Japan. They measure factors, especially relational factors to health and
emotional support provided to others based on well-being. Since the appearance of the seminal
two items (i.e., how often respondents listen to works, scholars have made significant advances in

5605-Scott-Chap09.indd 124 4/7/2011 4:49:19 PM


SOCIAL SUPPORT 125

exploring the substance and dimensions of social concepts to our outcomes of interests. Some of the
support, developing diverse measurement instru- above-reviewed empirical studies use other
ments, and examining its multiple functions in network terms as proximate measures of social
the social distribution of health using a variety support, but they do not examine social support
of data. However, they have accumulated mixed directly. Their results in making stronger causal
evidence. Further efforts are needed to clarify inferences regarding social support are limited.
and expand our current understanding of social Future studies should measure network concepts
support. independently and examine their relationships
Social support is a unique social concept. As is systematically in a causal sequence. Thus the
the case with relatively new concepts in social urgent task in the area of health research is to
sciences, social support has been defined in examine how divergent types of social support
diverse ways. The intellectual value of a concept mediate the effect of dissimilar network-based
is evaluated not by its widening meaning or its antecedents. The application of network analysis
potential role as a panacea, but by its uniqueness to social support research is undoubtedly a prom-
and originality. Rather than going as far as Barrera ising direction (Hall and Wellman, 1985; Wellman,
(1986) in proposing the abandonment of the 1981). The caveat is that social support should be
general concept of social support, we suggest a captured more accurately through support-related
rigorous strategy in which future studies should network instruments than by general network
define social support by its precise nature and the instruments (Bearman and Parigi, 2004).
supply of resources from network members and Social support is dynamic over time rather than
then separate it from its structural preconditions being a constant feature (Dean and Lin, 1977;
and functional consequences. The priority of Pearlin, 1985). Most empirical studies are still
a reliable and valid social support scale was cross-sectional, which leaves us questioning the
recognized decades ago (Dean and Lin, 1977). As robustness of their results. We are also aware of
the reviewed empirical studies illustrate, the limited information about, for example, how
indicators of social support were still quite diverse, health and well-being shape the availability or
probably due to the use of secondary data and mobilization of social support (Thoits, 1995), or
post hoc measurements (Berkman, 1984). A strict how social support and its change may be in a
definition may help us overcome such inconsist- reciprocal causal relationship with the change of
ency in operational measurements of social other network-based terms. Refined longitudinal
support and empirical results. research designs are therefore needed to disentan-
Social support is a multidimensional factor gle these complicated causality puzzles.
in its intrinsic features. More theoretical and Finally, social support goes beyond its tradi-
empirical attention has been paid to received sup- tional function as a stress buffer and plays
port than providing or reciprocal support. Note multiple roles in the social organization of health
that providing or reciprocal support influences and illness. It may protect health directly or it may
health through different mechanisms than received protect indirectly by reducing other health risks. It
support. Among the literature on received support, may mediate and moderate health effects of other
there are more studies on perceived than actual determinants. There is further but mixed evidence
support, and on emotional than instrumental or for its direct and moderating effects, and fewer but
other types of support. Different kinds of support also conflicting findings for its mediating and
appear to be outcomes of disparate network-based direct effect. For a thorough understanding
preconditions. Perceived and emotional support of social dynamics through which social support
seem to have stronger explanatory power in the maintains or changes health status, future
social distribution of health than other types. To studies should explore various models simultane-
achieve a more complete picture of social support, ously in single studies as far as their data allow,
such multiple kinds of support concepts and and report all relevant results, either confirming
measures need to be simultaneously subjected to a or disconfirming.
rigorous empirical test in order to distinguish their
network-based antecedents and further compare
their effects on specific health outcomes.
Social support is a distinctive network-based REFERENCES
factor. Its precise definition is crucial for a
coherent and comprehensive understanding of the Alcalay, R. (1983) ‘Health and social support networks: A case
general literature from a social network perspec- for improving interpersonal communication’, Social
tive. Various network-based concepts, including Networks, 5: 71–88.
social support, are different constructs. Social Aneshensel, C.S. and Frerichs, R.R. (1982) ‘Stress, support,
support is expected to be a meaningful pathway and depression: A longitudinal causal model’, Journal of
that links other prominent network-derived Community Psychology, 10: 363–76.

5605-Scott-Chap09.indd 125 4/7/2011 4:49:19 PM


126 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Barrera, M. Jr. (1981) ‘Social support in the adjustment of Health and Social Scientists. New York: Oxford University
pregnant adolescents: Assessment issue’, in Benjamin H. Press.
Gottlieb (ed.), Social Networks and Social Support. Beverly Cohen, S., Gottlieb, B.H. and Underwood LG. (2000) ‘Social
Hills: Sage. pp. 69–96. relationships and health’, in Sheldon Cohen, Lynn G.
Barrera, M. Jr. (1986) ‘Distinctions between social support Underwood, and Benjamin H. Gottlieb (eds), Social Support
concepts, measures, and models’, American Journal of Measurement and Intervention: A Guide for Health and
Community Psychology, 14: 413–45. Social Scientists. New York: Oxford University Press.
Bearman, P. and Parigi, P. (2004) ‘Cloning headless frogs and pp. 3–25.
other important matters: Conversation topics and network Coleman, J.S. (1990) Foundations of Social Theory. Cambridge:
structure’, Social Forces, 83: 535–57. Belknap Press of Harvard University Press.
Beggs, J.J., Haines, V.A. and Hurlbert, J.S. (1996) ‘Situational Coyne, J.C. and Downey, G. (1991) ‘Social factors and
contingencies surrounding the receipt of informal support’, psychopathology: Stress, social support, and coping
Social Forces, 75: 201–22. processes’, Annual Review of Psychology, 42: 401–25.
Berkman, L.F. (1984) ‘Assessing the physical health effects of Dean, A. and Lin, N. (1977) ‘The stress-buffering role of
social networks and social support’, Annual Review of social support: Problems and prospects for systematic
Public Health, 5: 413–32. investigation’, Journal of Nervous and Mental Disease,
Berkman, L.F. (2000) ‘Social support, social networks, social 165: 403–17.
cohesion and health’, Social Work in Health Care, 31: Dohrenwend, S.B. and Dohrenwend, B.P. (1981) ‘Life stress
3–14. and illness: Formulation of the issues’, in B.S. Dohrenwend
Berkman, L.F. and Glass, T. (2000) ‘Social integration, social and B.P. Dohrenwend (eds), Stressful Life Events and Their
networks, social support and health’, in L. F. Berkman and Contexts. New York: Prodist. pp. 1–27.
I. Kawachi (eds), Social Epidemiology. New York: Oxford Ell, K. (1984) ‘Social networks, social support, and health
University Press. pp. 137–73. status: A review’, The Social Service Review, 58: 133–49.
Berkman, L.F., Glass, T., Brissette, I. and Seeman, T.E. (2000) Elliott, M. (2000) ‘The stress process in neighborhood
‘From social integration to health: Durkheim in the new context’, Health & Place, 6: 287–99.
millennium’, Social Science & Medicine, 51: 843–57. Ellison, C.G. and George, L.K. (1994) ‘Religious involvement,
Brissette, I., Cohen, S. and Seeman, T.E. (2000) ‘Measuring social ties, and social support in a Southeastern
social integration and social networks’, in Sheldon Cohen, community’, Journal for the Scientific Study of Religion,
Lynn G. Underwood, and Benjamin H. Gottlieb (eds), Social 33: 46–61.
Support Measurement and Intervention. New York: Oxford Ensel, W.M. and Lin, N. (1991) ‘The life stress paradigm and
University Press. pp. 53–85. psychological distress’, Journal of Health and Social
Caplan, G. (1974) Support Systems and Community Mental Behavior, 32: 321–41.
Health. New York: Behavioral Publications. Faber, A.D. and Wasserman, S. (2002) ‘Social support and
Caplan, G. and Killilea, M. (1976) Support Systems and social networks: Synthesis and review’, in Judith A. Levy
Mutual Help: Multidisciplinary Explorations. New York: and Bernice A. Pescosolido (eds), Social Networks and
Grune & Stratton. Health. New York: JAI Press. pp. 29–72.
Caplan, R.D. (1979) ‘Social support, person-environment fit, Ferraro, K.F. and Koch, J.R. (1994) ‘Religion and health among
and coping’, in L.A. Ferman and J.P. Gordus (eds), Mental black and white adults: Examining social support and
Health and the Economy. Michigan: W.E. Upjohn Institute consolation’, Journal for the Scientific Study of Religion,
for Employment Research. pp. 89–138. 33: 362–75.
Carpiano, R.M. (2006) ‘Toward a neighborhood resource- Gorman, B.K. and Sivaganesan, A. (2007) ‘The role of social
based theory of social capital for health: Can Bourdieu support and integration for understanding socioeconomic
and sociology help?’ Social Science & Medicine, 62: disparities in self-rated health and hypertension’, Social
165–75. Science & Medicine, 65: 958–75.
Cassel, J. (1974) ‘An epidemiological perspective of psychoso- Gottlieb, B.H. (1978) ‘The development and application of a
cial factors in disease etiology’, American Journal of Public classification scheme of informal helping behaviours’,
Health, 64: 1040–43. Canadian Journal of Behavioural Science, 10: 105–15.
Cassel, J. (1976) ‘The contribution of the social environment Gottlieb, B.H. (ed.) (1981) Social Networks and Social Support.
to host resistance’, American Journal of Epidemiology, Beverly Hills: Sage.
104: 107–23. Gottlieb, B.H. (1983) Social Support Strategies: Guidelines for
Cobb, S. (1974) ‘Physiologic changes in men whose jobs Mental Health Practice. Beverly Hills: Sage.
were abolished’, Journal of Psychosomatic Research, 18: Green, G. (1993) ‘Editorial review: Social support and HIV’,
245–58. AIDS Care, 5: 87–104.
Cobb, S. (1976) ‘Social support as a moderator of life stress’, Greenblatt, M., Becerra, R.M. and Serafetinides, E.A. (1982)
Psychosomatic Medicine 38: 300–314. ‘Social networks and mental health: An overview’, American
Cohen, S. and Syme, S.L. (eds) (1985) Social Support and Journal of Psychiatry,139: 977–84.
Health. Orlando: Academic Press. Haines, V.A. and Hurlbert, J.S. (1992) ‘Network range
Cohen, S., Underwood, L.G. and Gottlieb, B.H. (eds) (2000) and health’, Journal of Health and Social Behavior, 33:
Social Support Measurement and Intervention: A Guide for 254–66.

5605-Scott-Chap09.indd 126 4/7/2011 4:49:20 PM


SOCIAL SUPPORT 127

Hall, A. and Wellman, B. (1985) ‘Social networks and social Lin, N. (2001) Social Capital: A Theory of Social Structure and
support’, in S. Cohen and S.L. Syme (eds), Social Support Action. Cambridge: Cambridge University Press.
and Health. New York: Academic Press. pp. 23–41. Lin, N. and Ao, D. (2008) ‘The invisible hand of study: An
Henderson, S. (1977) ‘The social network, support and exploratory study’, in Nan Lin and Bonnie Erickson (eds),
neurosis: The function of attachment in adult life’, The Social Capital: Advances in Research. Oxford University
British Journal of Psychiatry, 131: 185–91. Press. pp.107–32.
House, J.S. (1981) Work Stress and Social Support. Reading, Lin, N. and Ensel, W.M. (1984) ‘Depression-mobility and
MA: Addison-Wesley. its social etiology: The role of life events and social
House, J.S. (1987) ‘Social support and social structure’, support’, Journal of Health and Social Behavior, 25:
Sociological Forum, 2: 135–46. 176–88.
House, J.S. and Robert, L. (1985) ‘Measures and concepts of Lin, N. and Ensel, W.M. (1989) ‘Life stress and health:
social support’, in S. Cohen and S.L. Syme (eds), Social Support Stressors and resources’, American Sociological Review,
and Health. New York: Academic Press. pp. 83–108. 54: 382–99.
House, J.S., Landis, K.R. and Umberson, D. (1988a) ‘Social Lin, N. and Peek, M.K. (1999) ‘Social networks and mental
relationships and health’, Science, 241: 540–45. health’, in A.V. Horwitz and T.L. Scheid (eds), A Handbook
House, J.S., Umberson, D. and Landis, K.R. (1988b) ‘Structures for the Study of Mental Health: Social Contexts, Theories,
and processes of social support’, Annual Review of and Systems. Cambridge: Cambridge University Press.
Sociology, 14: 293–318. pp. 241–58.
Kaplan, B.H., Cassel, J.C. and Gore, S. (1977) ‘Social support Lin, N., Dean, A. and Ensel, W. (1986) Social Support, Life
and health’, Medical Care, 15: 47–58. Events and Depression. Orlando: Academic Press.
Krause, N., Berit, I.-D., Jersey, L. and Hidehiro, S. (1999) Lin, N., Ensel, W.M., Simeone, R.S. and Kuo, W. (1979) ‘Social
‘Religion, social support, and health among the Japanese support, stressful life events, and illness: A model and
elderly’, Journal of Health and Social Behavior, 40: an empirical test’, Journal of Health and Social Behavior
405–21. 20: 108–19.
Jackson, P.B. (1992) ‘Specifying the buffering hypothesis: Lin, N., Woelfel, M.W. and Light, S.C. (1985) ‘The buffering
Support, strain, and depression’, Social Psychology effect of social support subsequent to an important
Quarterly, 55: 363–78. life event’, Journal of Health and Social Behavior, 26:
Kawachi, I. and Berkman, L. (2000) ‘Social cohesion, social 247–63.
capital and health’, in L.F. Berkman and I. Kawachi (eds), Lin, N., Ye, X. and Ensel, W.M. (1999) ‘Social support and
Social Epidemiology. New York: Oxford University Press. depressed mood: A structural analysis’, Journal of Health
pp. 174–90. and Social Behavior, 40: 344–59.
Kawachi, I. and Berkman, L. (2001) ‘Social ties and mental Lincoln, K.D., Chatters, L.M. and Taylor, R.J. (2003)
health’, Journal of Urban Health: Bulletin of the New York ‘Psychological distress among black and white Americans:
Academy of Medicine, 78: 458–67. Differential effects of social support, negative interaction
Kawachi, I., Subramanian, S.V. and Kim, D. (eds) (2008) Social and personal control’, Journal of Health and Social
Capital and Health. New York: Springer. Behavior, 44: 390–407.
Kessler, R.C., Price, R.H. and Wortman, Camille, B. (1985) Link, B.G. and Phelan, Jo.C. (1995) ‘Social conditions as
‘Social factors in psychopathology: Stress, social support, fundamental causes of disease’, Journal of Health and
and coping processes’, Annual Review of Psychology, Social Behavior, Extra Issue: 80–94.
36: 531–72. Luke, D.A. and Harris, J.K. (2007) ‘Network analysis in public
Landerman, R., George, L.K., Campbell, R.T. and Blazer, D.G. health: History, methods, and applications’, Annual Review
(1989) ‘Alternative models of the stress buffering of Public Health, 28: 69–93.
hypothesis’, American Journal of Community Psychology, Mitchell, J.C. (1969) ‘The concept and use of social
17: 625–41. networks’, in J.C. Mitchell (ed.), Social Networks in Urban
LaRocco, J.M., House, J.S., French, Jr. and John, R.P. (1980) Situations. Manchester, England: Manchester University
‘Social support, occupational stress, and health’, Journal Press. pp. 1–50.
of Health and Social Behavior, 21: 202–18. Mitchell, J.C. (1974) ‘Social networks’, Annual Review of
Lin, N. (1986a) ‘Conceptualizing social support’, in Nan Lin, Anthropology, 3: 279–99.
Alfred Dean, and Walter Ensel (eds), Social Support, Nooney, J. and Woodrum, E. (2002) ‘Religious coping and
Life Events and Depression. Orlando: Academic Press. church-based social support as predictors of mental health
pp. 17–30. outcomes: Testing a conceptual model’, Journal for the
Lin, N. (1986b) ‘Modeling the effects of social support’, Scientific Study of Religion, 41: 359–68.
in Nan Lin, Alfred Dean, and Walter Ensel (eds), Social Pearlin, L.I. (1985) ‘Social structure and processes of social
Support, Life Events and Depression. Orlando: Academic support’, in Sheldon Cohen and S. Leonard Syme (eds),
Press. pp. 173–209. Social Support and Health. Orlando: Academic Press.
Lin, N. (1999a) ‘Building a network theory of social capital’, pp. 43–60.
Connections, 22: 28–51. Pearlin, L.I., Menaghan, E.G., Lieberman, M.A. and
Lin, N. (1999b) ‘Social networks and status attainment’, Mullan, J.T. (1981) ‘The stress process’, Journal of Health
Annual Review of Sociology, 25: 467–88. and Social Behavior, 22: 337–56.

5605-Scott-Chap09.indd 127 4/7/2011 4:49:20 PM


128 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Pescosolido, B.A. (2007) ‘Sociology of social networks’, in of Health. 2nd edition. New York: Oxford University Press.
Clifton D. Bryant and Dennis L. Peck (eds), 21st Century pp. 148–71.
Sociology: A Reference Book. Thousand Oaks: SAGE. Szreter, S. and Woolcock, M. (2004) ‘Health by association?
pp. 208–17. Social capital, social theory, and the political economy
Pescosolido, B.A. and Levy, J.A. (2002) ‘The roles of social of public health’, International Journal of Epidemiology,
networks in health, illness, disease and healing: The 33: 650–67.
accepting present, the forgotten past, and the dangerous Tausig, M. (1986) ‘Prior history of illness in the basic model’,
potential for a complacent future’, in Judith A. Levy and in Nan Lin, Alfred Dean and Walter Ensel (eds), Social
Bernice A. Pescosolido (eds), Social Networks and Health. Support, Life Events and Depression. Orlando: Academic
New York: JAI Press. pp. 3–25. Press. pp. 267–80.
Petts, R.J. and Jolliff, A. (2008) ‘Religion and adolescent Taylor, R.J. and Chatters, L.M. (1988) ‘Church members as a
depression: The impact of race and gender’, Review of source of informal social support’, Review of Religious
Religious Research, 49(4): 395–414. Research, 30: 193–203.
Plickert, G., Côté, R.R. and Wellman, B. (2007) ‘It’s not who Thoits, P.A. (1982) ‘Conceptual, methodological, and
you know, it’s how you know them: Who exchanges what theoretical problems in studying social support as a buffer
with whom?’, Social Networks, 29: 405–29. against life stress’, Journal of Health and Social Behavior,
Putnam, R.D. (2000) Bowling Alone: The Collapse and 23: 145–59.
Revival of American Community. New York: Simon and Thoits, P.A. (1984) ‘Explaining distributions of psychological
Schuster. vulnerability: Lack of social support in the face of life
Ross, C.E. and Mirowsky, J. (1989) ‘Explaining the social stress’, Social Forces, 63: 453–81.
patterns of depression: Control and problem solving—or Thoits, P.A. (1995) ‘Stress, coping, and social support
support and talking?’, Journal of Health and Social Behavior processes: Where are we? What next?’, Journal of Health
30: 206–19. and Social Behavior, Extra Issue: 53–79.
Ross, C.E., and Van Willigen, M. (1997) ‘Education and the Turner, R.J. (1999) ‘Social support and coping’, in
subjective quality of life’, Journal of Health and Social A.V. Horwitz and T.L. Scheid (eds), A Handbook for the Study
Behavior 38: 275–97. of Mental Health: Social Contexts, Theories, and Systems.
Roxburgh, S. (2006) ‘“I wish we had more time to spend New York: Cambridge University Press. pp. 198–210.
together . . .”: The distribution and predictors of perceived Turner, R.J. and Lloyd, D.A. (1999) ‘The stress process and the
family time pressures among married men and women social distribution of depression’, Journal of Health and
in the paid labor force’, Journal of Family Issues, 27: Social Behavior, 40: 374–404.
529–53. Turner, R.J. and Marino, F. (1994) ‘Social support and social
Schwarzer, R. and Leppin, A. (1991) ‘Social support and structure: A descriptive epidemiology’, Journal of Health
health: A theoretical and empirical overview’, Journal of and Social Behavior, 35: 193–212.
Social and Personal Relationships, 8: 99–127. Turner, R.J. and Turner, J.B. (1999) ‘Social integration and
Seeman, T.E. and Berkman, L.F. (1988) ‘Structural character- support’, in C.S. Aneshensel and J.C. Phelan (eds),
istics of social networks and their relationship with social Handbook of the Sociology of Mental Illness. New York:
support in the elderly: Who provides support’, Social Kluwer Academic Press. pp. 301–20.
Science & Medicine, 26: 737–49. Wellman, B. (1981) ‘Applying social network analysis to
Smith, C.E., Fernengel, K., Holcroft, C., Gerald, K. and Marien, the study of social support’, in B.H. Gottlieb (ed.), Social
L. (1994) ‘Meta-analysis of the associations between social Networks and Social Support. Beverly Hills: Sage.
support and health outcomes’, Annals of Behavioral pp. 171–200.
Medicine, 16: 352–62. Wellman, B. and Wortley, S. (1989) ‘Brothers’ keepers:
Smith, K.P. and Christakis, N.A. (2008) ‘Social networks and Situating kinship relations in broader networks of social
health’, Annual Review of Sociology, 34: 405–29. support’, Sociological Perspectives, 32: 273–306.
Song, L. and Lin, N. (2009) ‘Social capital and health inequal- Wellman, B. and Wortley, S. (1990) ‘Different strokes from
ity: Evidence from Taiwan’, Journal of Health and Social different folks: Community ties and social support’,
Behavior, 50(2): 149–63. American Journal of Sociology, 96: 558–88.
Song, L., Son, J. and Lin, N. (2010) ‘Social capital and health’, Wethington, E. and Kessler, R.C. (1986) ‘Perceived support,
in William C. Cockerham (eds), The New Blackwell received support, and adjustment to stressful life events’,
Companion to Medical Sociology. London: Blackwell, Journal of Health and Social Behavior, 27: 78–89.
pp. 184–210. Wheaton, B. (1985) ‘Models for the stress-buffering
Stansfeld, S.A. (2006) ‘Social support and social cohesion’, in functions of coping resources’, Journal of Health and Social
M. Marmot and R.G. Wilkinson (eds), Social Determinants Behavior, 26: 352–64.

5605-Scott-Chap09.indd 128 4/7/2011 4:49:20 PM


10
Kinship, Class, and
Community
Douglas R. White

INTRODUCTION: KINSHIP NETWORKS individuals. The latter embeds the matrimonial or


AND COHESION parental couple relation within the appropriate
nodes: a person from a family of orientation
This review presents studies in various world parental-node joins one or more partners to form
regions. Each uses network analysis software their own parental-couple node(s) (families of
designed explicitly for kinship studies with explicit procreation). This makes it easy to trace matrimo-
network measures of cohesion. It presents nial circuits, where one or more couples have
evidence of fundamental differences in the forms common ancestors (see Hamberger et al., 2011:
of marital cohesion that show profoundly variable Chapter 35) so the last in their series of marriages
effects over a wide range of social phenomena, (ordered in time), or a single marriage, relinks the
regional scales, and diverse cultures. Social cohe- families that were already linked. It is these
sion is the basis of mutuality, cooperation, and relinking circuits that create kinship cohesion
well-being in human societies (Council of Europe, through marriage. Ore-graphs have to separate the
2009). It includes the modes by which people are cohesiveness of parent-child 3-cliques (mother-
assimilated into societies, how groups hold power, father-child) from the broader of cohesiveness of
stratify social relations, and manage the flow of shared ancestries, which is directly captured by
resources. Kinship networks embedded in the civil P-graph circuitry. To reconcile these differences,
societies of nation-states, in contrast to smaller- Harary and White (2001) defined a P-system as a
scale societies, are far too rarely studied as a basis parental (kinship) network that orders the inclu-
of social cohesion. Networks, the social tissues of sion relations, at multiple levels of embedding, of
our lives, are only partially visible to us; thus we individuals, marriage, nuclear family, descent
fail to see how these are wrapped and embedded lines, and cohesive groups. People are in one
in larger networks. Thus the importance, as or more family, one or more marriage, and
emphasized here, of an explicit science of social embedded in groups of higher levels of organiza-
network analysis for kinship studies both at local tion. The higher-order analyses of kinship
and larger scales. The analyses of cohesive subsets networks offer integrative perspectives that are
show how kinship networks involve constructions more veridical as to how individuals and commu-
of social class, ethnicity, migration, inheritance, nities are connected, one that also takes into
social movements, and other large- as well as account how different kinds of groups are embed-
small-scale social phenomena. ded in one another.
A kinship network is composed of relations of New ways of imaging and analyzing kinship
parentage (parent-child arcs, oriented by time) networks as objects in their own right, with tens to
and couples (e.g., marriage). The nodes in an millions of people, make it possible to see social
Ore-graph (Ore, 1960) are individuals, or, in a phenomena in ways that open a new series of
P-graph (White and Jorion, 1992), couples and sociological and anthropological questions.

5605-Scott-Chap10.indd 129 4/15/2011 12:00:09 PM


130 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Ninety-odd case studies of kinship network the number of their personal ancestors relative to
research among anthropologists and fellow the current population grows exponentially each
scientists have been contributed on-line (at http:// generation back: N/1, 2N/k, 4N/k2, . . . , N(2g–1)/
kinsource.net) that enable using these new kg–1 = N(2/k)g–1 for successive ancestral genera-
approaches to gain unexpected insights about “big tions g = 1, 2, . . . m. This also holds if kg > 2 for
structures” and “large processes” (Tilly, 1984). each generation. From generation to generation
These allow us to view marriage and descent, with k = 2 there are Ng–Ng–1 = r new relinkings
community, class, and other topics through the and more cohesive marriages.
new lens of kinship cohesion created through
marriage. Some main results presented here in
regional and historical terms give a sense of Definition of cycle rank
spread and variation in social structure. Methods When the number of (ancestral, m) links in a
used are developed and reviewed in White network surpasses the number of (kinship, n)
and Jorion (1992) and Hamberger et al. (2004: parental nodes in a network with c components,
Chapter 35, 2011). The most important of these in the cycle rank = m – n + c of ancestral links –
terms of kinship translates as bounded structural those involved in relinking marriage cycles, as in
endogamy (White, 1997), which derives from Figure 10.1 – will overlap. Here, in P-graph nota-
the general sociological concepts of structural tion, focal marriages A and B (temporally the
cohesion (White and Harary, 2001; Moody and lowermost nodes where the couple represented by
White, 2003). These methods may prove the node was already related before the marriage)
especially useful in new studies needed to gauge are shown to have ancestral male♂ or female♀
the effects of globalization on kinship networks links that lead to common ancestors (two or more
and the new ways in which kinship networks are couples could also have several common ances-
implicated in constructions of community, social tors by which they are relinked). Keeping track of
class, ethnicity, migration, social movements, and those links we see that couple A (persons 3 and 4)
other phenomena. have a MBD (mother’s brother’s daughter)
marriage and B (6 and 7) have a MZD (mother’s
sister’s daughter) marriage. (In a P-graph the
numbered lines represent individuals, offspring of
Relinking theorem, cycle rank, and their parental node, and members of their
measures of cohesion family[ies] of procreation.) Wife 4♀, however, is
M of 6♂, so these two cohesive marriages overlap
Barring sibling unions, marriage cohesion or by sharing a common arc. Adding the arcs and
relinking is unavoidable in human populations nodes of two cycles and removing their overlap
that are not undergoing population collapse. is a graph-union, as shown for marriage C, where
a new matrimonial circuit is created (6–3-1–2-5–
7-6) by the A-B union. Cohesive marriage cycles
Proof with ancestral overlaps, as in graph D, form
This is self-evident if the average number of bicomponents with two or more independent paths
children per couple is k > 2. For N living people, between every pair of nodes. This forms a unit

1 2
2 5
1 4
+ MBD MZD 3 5
3 4 6 7 =focal
cohesive 6 7
marriages
FMBSD
A B C=A+B (a subset of) D

Figure 10.1 Shared-edge cycle unions produce other cycles (e.g., removing the dotted
line 4 ♀ in graph C). The cycle rank γ (cyclomatic number) is the smallest number of edges
that must be removed from a connected graph with m edges and n nodes. Removal
of γ = m – n + 1 leaves only a tree. In this case γ = 2 for the full graph D (C with line 4
restored). γ is also the minimum number of cycles whose iterative unions produce all
the cycles in the graph. The nodes here are couples or families, and the upward-oriented
edges link to parental couples

5605-Scott-Chap10.indd 130 4/15/2011 12:00:10 PM


KINSHIP, CLASS, AND COMMUNITY 131

of structural endogamy. Pairwise cohesion (White densities of endogamy with varying subgroups
and Newman, 2001) in a kinship graph gives the defined by attributes or partitions?
number of disjoint cohesive paths between pairs The bicomponent answer to the question of
of individuals or couples. Thus the persons endogamy (White, 1997) offers a clearly defined
connected by the dotted parent-child link 4♀ in and demarcated form of cohesion within a kinship
Figure 10.1 P-graphs C and D have three disjoint network. A bicomponent of a (kinship) network is
paths with others in these marriage circuits, a(n) (induced) subgraph with a maximal node set
whereas others have only two. Cohesion can thus <S> wherein (1) every pair of nodes is multiply
be measured at the inter-individual or interfamily connected through paths among nodes in S that
levels and measured for pairs or identified for have no common intermediaries; (2) these are the
groups or subnetworks. units of structural endogamy; (3) they conform to
a minimal definition of structural cohesion (White
and Harary, 2001), connectivity-2; and (4) they
are a maximal unit of biconnectedness.
Reconceptualizing endogamy: Bicomponents don’t partition a network but may
segregation and cohesion overlap, and a higher multipath measure k of
structural k-cohesion allows more overlap.
Mapping the skeleton of kinship networks begins Bicomponent computation is subquadratic
with generative genealogical relationships. (Gibbons, 1885), accomplished in networks of
Demographers, historians, geneticists, genealogi- unlimited size.
cal societies, Mormon baptismal projects, Similarly, a cohesive marriage (marital relink-
GEDCOM databases, social registers, and many ing) is a smaller set <S> of nodes in a kinship
other sources provide massive amounts of network, one that includes one or more husband-
genealogical data. They come with varying wife pairs and some of their common ancestors,
amounts of other data of variable quality and for which the induced subgraph <S> (nodes in S
supplementary contextual data. Anthropologists and all edges between them) in the network is a
collect genealogical data of high quality about cycle (White and Jorion, 1992; White, 1997,
communities, with protected or historical personal White, 2004; see also Hamberger et al., 2011:
identities, dense ethnography, narrative, or Chapter 35). These are minimal units of bicon-
household survey data. nectedness in that (1) every node in a cycle has
Speaking of endogamy, sociologists think of degree 2, density is minimal; (2) a cycle is only
intermarriage within or between social units as disconnected by removal of two or more nodes;
defined by attributes that specify loci of endogamy and (3) every pair of nodes is connected by two
(community, territory, occupational group, level paths that have no common intermediaries, that is,
of wealth, or combinations thereof). This leads by one or more cycles.
to a fractured view of social structure, a myriad Given that overlaps of marriage cycles form
of separate attribute-defined groups with varying other cycles, as illustrated in Figure 10.1, with
degrees of overlap depending on the regions sufficient population growth (Relinking theorem),
studied or how samples are drawn. Surprisingly, these will form bicomponents composed of
endogamy has rarely ever been defined in terms of overlapping cohesive marriages, each of which
the boundaries of emergent network entities has well-defined boundaries in the population.
although it is always assumed that endogamous Empirically, temporally deeper and more accurate
marriages do somehow constitute themselves memory of fatherhood and motherhood as
in this way. But how? One approach is the ancestral ties will expand and densify marriage
“segregation measure” game of finding which bicomponents.
individual attributes best partition networks
to detect endogamous groups. Another is
“community detection” (a literature inaugurated Bicomponent scale
by Girvan and Newman, 2002) based on the ques-
tionable assumption that communities must We do not see much marital cohesion or structural
be separately partitioned according to maximum endogamy (marriage within varying degrees
density within and minimum density between such as those of cousinhood) within the extended
groups. These are segregative (even segregation- families or kindreds of European societies. This is
ist) models. The real world is not so categorical: a consequence of the stamping out of polygamy
communities overlap, social modules and roles by the Christian church during the Middle Ages
intersect, individuals are members of multiple and the prohibition of marriages up to six canoni-
communities, and social formations are complex. cal kin degrees. These proscriptions reduced the
What “kinds” or aspects of networks actually internal marital cohesiveness of corporate
define endogamy rather than merely correlate kinship groups and tended to destroy corporate

5605-Scott-Chap10.indd 131 4/15/2011 12:00:10 PM


132 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

kin groups altogether for all but nobilities, royal- Scalability and organization
ties, and merchant elites. “This influence was
[most] profound when the Christian church was Every pair of new descendants that marry in a
backed by the state” (Korotayev, 2003: 12). bicomponent enlarges its structurally endogamous
community through marriage although it may be
reduced by the forgetting of ancestors. It is easy
for the sizes of structurally endogamous commu-
Historical and ethnographic background nities to grow large and for smaller, denser
of world kinship networks communities to combine into a larger bicompo-
The influence on features of kinship by world nent with decreased density. As members of
religions – Christian, Islamic, Hindu, Hinayana, relatively dense socially contiguous communities
and Vajrayana Buddhist (and the extent to which (territorial, religious, class, etc.) migrate away
cultures traditionally combined in different pro- from their home communities, or marry exoga-
portions Mahayana Buddhism and Confucianist mously, local boundaries of structural endogamy
ideology, or varied in the intensity to which may shrink, altering their local densities.
Christianity or Islam were combined with local Features of kinship, however, do not so easily
religions that were not world-scale) – was diffuse through marriage. Kinship is linked to
studied by Korotayev and Kazankov (2002) and beliefs about social rights, privileges, and expecta-
Korotayev (2003, 2004). Once they had coded the tions. The founding charter of Judaism establishes
1,472 societies of the Ethnographic Atlas equal rights for younger sons and the sanctity of
(Murdock, 1967) for world religion, they found, mothers as the transmitters of the covenant (as
for the complex societies of Eurasia, that clusters discussed for Figure 10.2); Christianity has a
of societies with similar features, purely on the belief in the sanctity of the married monogamous
basis of kinship, were extremely well discrimi- couple; Arabic kinship as modified by Islam
nated by world religion. Kinship “systems” and establishes limits of polygamy and the rights
religion (Latin religio = bonds) have the capacity of daughters to inherit half-shares relative to
to spread, diffuse, and extend cohesion through brothers. But kinship establishes an interlock
marriage practices. They can form large-scale of networks at three levels: the actual ties of
subcontinent-level systems in terms of world reli- marriage and parentage; the separate calculus of
gion and can form smaller and more variable the kinship terms; and the role relations estab-
patchworks in areas of nonworld religions. lished by the moral expectations associated with
Lévi-Strauss (1949), for example, identifies huge the kin-naming calculus (“mother,” “sister,” etc).
contiguous areas of matrimonial “dual organiza- These normative but individualized expectations
tion,” and regional axes of directed exchange such (support, love, mediated competition, etc.) apply
as brothers-in-law among whom the marriages to particular persons within the marriage and
involve members of one gender moving in a parentage networks. The first two levels have
coordinated direction to join their spouses, often separate generative structures for their respective
counterbalanced by flows of gifts, obligations, networks: concatenations of actual ties as social
or statuses. Other ethnographers (Leach, 1954; networks and concatenations of terms as semantic
subsequent Cambridge scholars) have found networks (Read, 2000). The social ties have their
that oscillations between directed asymmetric units of network cohesion bounded by bicompo-
and cyclical exchange along these axes may nents; the terminological ties have their limits
coordinate with oscillations between the opening of extension, while the third interlock – role
(asymmetric exchange) and closing (marriage relations – is the mediated outcome of interaction,
cycles) of trade routes. memory, language, and emotion. Kinship interac-
Still, in proximal times and social spaces, at tions within a community do not establish a
moderate and large territorial scales, and with kinship “system” that is somehow culturally
sufficiently dense sampling, we expect and shared through proximity and diffusion but a
see structurally endogamous communities in pragmatic systematicity (Leaf, 2007) both stronger
localities all over the world and also local and restrictive: an organization with established
contrasts in varying proportions of emigrants and members and succession, interlocking roles
immigrants and those who marry locally and and expectations, ways of doing things, and
those who do not. Within multigenerational ways of adjusting rights, obligations, and differ-
community kinship networks today, bicomponent ences. It is within communities and organizations,
cohesion is dissipating in later generations or concrete social institutions where people
with higher globalization rates of outmigration interact more intensively that “cultures” of
so that larger frameworks for study are needed shared meanings are formed in beliefs, cognition,
to see the effects on more broadly distributed the reading of expression, behaviors, and
cohesion. components of structure and dynamics in social

5605-Scott-Chap10.indd 132 4/15/2011 12:00:10 PM


KINSHIP, CLASS, AND COMMUNITY 133

Figure 10.2 Marriage and succession in the Genesis genealogy of Canaan in P-graph format

and kinship networks. Tacit acceptance through to present the relevance of large-scale kinship
usage of the terminology for kin and the network analysis for historical and ethnographic
behavioral interaction within the network of actual sociology – class, community, ethnicity, politics,
parentage and marriage relations solves the and economy – is to look at different regions
coordination problem – who is whom to who and and religions such as Middle Eastern Hebrews and
how to collaborate or compete under mediated Muslims, European-origin Christians, South Asian
supervision – for the organization. The boundaries Buddhists, and Australians of the Dreamtime.
of these organizations, ranging from corporate
groups to loose kindreds and even social classes
linked through marriage, are tighter and often
more exclusive than the well-defined boundaries
of structural endogamy. Kinship organizations, STRUCTURAL ENDOGAMY WITH
however, are much less permeable and more CO-DESCENDANT RELINKING
resilient than the scalability of bicomponents (MIDDLE EAST)
would suggest.
Religion and relinking in
a historical canaanite lineage
Sociological and historical
One variant of bicomponent endogamy, along
examples
with specific organizational features, is exempli-
Given their organizational characteristics, fied in Figure 10.2, from the Old Testament
disjoint communities with the same organization example used by White and Jorion (1992: 456) to
and terminology easily recognize one another show how to construct and analyze kinship
as “the same” spatially extensible “zones” of networks using P-graphs in relation to historical
structural similarity that do not blend gradually narratives. In Figure 10.2 males are shown as solid
but have discrete boundaries. The simplest way lines, and those with several wives (Terah,

5605-Scott-Chap10.indd 133 4/15/2011 12:00:10 PM


134 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Abraham, Lot, Esau, Isaac) have multiple lines at 64 percent of maximum (7/11) as contrasted
connected by a horizontal line below their with 56 percent when lineage-member couples
parental node. Dotted lines are for females, solid outside the bicomponent are included.
circles mark the singles or couples, and the large Hebrew and Islamic social organization, as
circles mark the line of patrilineal succession to noted for the “founder” genealogy in Figure 10.2,
leadership. stem from the same root, according to this tradi-
tion, with Ishmael as an ancestor of Mohammed.
They have kinship patterns that have continued
The story behind the lineage in Figure 10.2 and been embellished in various ways for over
The narrative of this lineage of founders of mono- 4,000 years. Network data from a long-term
theism is often called “the Patriarchs and ethnographic field study (Johansen and White,
Matriarchs,” the latter renowned for establishing a 2002) provides a Turkish case that derives histori-
line of male succession that passes to younger cally from implantation of this system by Arab
sons, not the elder ones, and recognizing that conquest (although Sunni Turks, with fewer
Judaic religious descent passes through mothers, simultaneous marriages, Sunni Arabs, Shi’a
not fathers. This new pattern of succession, Persians, etc., have variant marriage customs,
“arranged” by mothers (the Matriarchs), occurs polygyny being more common in rural areas; yet
with lineage-mate arranged-marriages of their there are broad similarities).
youngest sons to women in their patrilineage.
Marrying women of one’s patriline also conveys a
double ancestry to one’s children, who receive the
religious, cultural, and lineage tradition from both Arab lineages and endoconical clans
the mother and the father. The change of mytho-
An endoconical clan is one where cohesion is
logical themes from the pre- to post-Abrahamic
generated by marital relinking through remem-
narratives include greater equality for lineage-
bered ties, like those in Figure 10.2, that go back
endogamous women (the Arabic Father’s brother’s
to a “founder core” of common ancestral roots
daughter (FBD) marriage-right, see below)
extending from a compact bicomponent of
and younger sons favored by their mothers over
common ancestors. As defined by White and
eldest sons with exogamously political marriages
Johansen (2005: xxxiv), “a loose and flexible
(succession by the most able rather than the
system of interpersonal ranking based on respect
eldest). This pattern reoccurs among the Hebrew
for age and experience” “allows each family line
religious elite and Sumerian, Berber, Maronite,
to bring capable members forward in promoting
Druze, and Arabic lineages again and again for a
alternative adaptations.” Their monographic study
period of 4,000 years (Adams, 1966: 81; Korotayev,
of an Arabized Turkish nomad clan, one of the
2000: 403) up to today, often coinciding with
clans of Aydınlı, shows a social organization very
lineage corporations (and is also found among
similar to that discussed for the Old Testament
the Merina of Madagascar and other scattered
lineage core of patriarchs and matriarchs. The
societies, see Barry, 1998, 2008).
scale at which endogamy is viewed here, however,
The message of this religious-founders network
is expanded from a single lineage to a set of line-
narrative is also marked out by the difference
ages integrated by structural endogamy that now
between the nodes in the large bicomponent,
includes both marital relinking within and between
marked out within the thick lasso, excluding Lot,
lineages and, at a much lower density, to taking
versus the smaller encircled bicomponent in which
wives from outside clans and smaller, less sustain-
Lot’s incestuous fatherhood through his daughters
able families moving out through migration to
occurs “cohesively.” Thus, moral boundaries are
towns. Families with more siblings and siblings-
symbolized by the immorality of drunkard Lot
in-law are more competitive because they have
(with his daughters to wed in Sodom in the bibli-
more allies.
cal story and wife then turned to salt [salty tears?])
reflected by limits to endogamy and the exclusion
of his descendants in later generations from the
larger bicomponent. Thus, the recognition of the Historical background to Arab lineages
bicomponent, added to the original Figure 10.2 and endoconical clans
of White and Jorion (1992: 456), clarifies what The unusual and distinctive feature of Arabized
they called the network “core” of the Canaan and Arabic lineages, which Korotayev (2000) has
genealogy, where the structural endogamy focuses traced out to show correspondence to the limits of
around marriage within a single patrilineage. the Arabic conquests, is matrimonial relinking
White et al.’s (1999) index of relinking for within the patriline. These are male rights to
Figure 10.2 showed marriages in the large bicom- marry with lineage members like FBD rather than
ponent (structurally endogamous group) were obligations (hence the frequency of exercise of

5605-Scott-Chap10.indd 134 4/15/2011 12:00:11 PM


KINSHIP, CLASS, AND COMMUNITY 135

these rights will vary). The lineage segment that is relinking between units at all fractal levels (clan-
cohesively reinforced, when this right is exer- clan, lineage-lineage, sublineage-sublineage, etc.).
cised, varies according to whether the wife shares Women who marry in from other lineages, to the
a patrilineage ancestor two to five generations extent they have reciprocal and repeated
back (i.e., first-, second-, third-, or fourth-cousin marriages, are considered allies and have lineage
patrilineal parallel marriage). This creates, and sisters who are also allies, and are in some sense
does throughout the entire Arabic and Arabized able to negotiate for their home lineage, if it is
zone, a whole series of fractally cohesive allied, thereby gaining greater rights and privilege
marriages generated by marriages at different in their husbands’ lineages. In a segmentary
depths and branches of these deep patrilines. system with reciprocal alliances at all these fractal
(The leadership of classical tribes or clans usually levels, the response to an outside opportunity or
has genealogical scrolls recording ancestries; threat can begin at one place and spread over
these lines are memorized in stylized ways in time, scaling up to a level that will depend on
both classical and nonclassical leading tribal the magnitude of opportunity or threat. When
families.) The ways that different lineages can be crimes or offenses are committed, revenge can be
welded together ancestrally again create fractal mobilized if compensation is not forthcoming, at
patterns of ties between lineage pairs or triples. levels of cooperation that will adjust to the extent
Marriages that family a made with b and b with c of the opposition; and similarly in mobilizing for
may be reciprocated, c to b and b to a, forming new cooperative opportunities. Leadership in this
broadcast strong-tie chains of reciprocated ties context, as among the Aydınlı, can be emergent,
across pairs, triples, and so forth between the with reputation for performance gaining
lineages of these families. These reciprocated ties adherence – often for a lifetime – by people’s
may be repeated between same or different willingness to come to deliberative council in the
branches of the same lineages, or cast anew. White emergent leader’s home. Moreover, this form
and Johansen (2005) found that in the Aydınlı clan of organization, very different from Europe, is one
of some 2,000 people (counting ancestors plus that has been used effectively in business,
others who had settled in towns), these chains business corporations that involve kinship, and
formed a navigable network of hubs (White and in short- and long-range mercantile trade. It is in
Houseman, 2002) that connected everyone in the this manner that Jewish trading families spread
clan by strong (that is, reciprocated) ties. This as an ethnic kin-linked diaspora throughout
contrasts with Granovetter’s (1973) “strength of Islamic territories and then into Europe and
weak ties” model where strong ties tend to cluster elsewhere. White and Johansen (2005) explicate
while the weak ties form the only navigable how network analytic methods are mobilized
long-range paths. The strong ties of the endoconi- to study kinship and complexity in this Judeo-
cal clan thus form a kind of invisible social- Arabic context.
highway system, with routes composed of
reciprocated ties that provide meeting places for
others at different points along the chain, places
to get to know more intimately the men and Preference signatures and
women not only from an ally but the ally’s allies genealogical networks of the
who often visit and thus meet in intermediary Greek gods
families. Ideally, every reciprocally linked pair
of families on these chains, allies due to the The possibility of “preference signatures” left by
reciprocated exchanges, had relations of intimacy the relative frequency of each type of relinking
and mutual trust. In Middle Eastern merchant marriage in kinship networks was investigated by
and commercial networks, kinship “highways” of White and Houseman (2002). They rank-ordered
this sort also provide in large part the most kin-type frequencies for dozens of empirical
common ties for transacting business (Berkowitz kinship networks for two types of marital relink-
et al., 2006). ing: (1) marriage with consanguineal relatives
The Aydınlı society, then, like many in the such as FBD or MBD (more generally:
Arabic region, is a fractally segmentary lineage co-descendant marriage between co-descendants
system (see Peters, 1967 for another classic of a common ancestor) and (2) relinking co-affinal
segmentary lineage study) with subcorporations marriage among multiple descent lines, such as
affiliated with clans and lineages at every fractal BWB (sister exchange) or ZHZ (brothers marry
level, claiming rights over resources and property sisters) in two-family relinkings. Fitting these
through relations of trust based on in-married, distributions by simple regression to power-law
lineage-endogamous women. These women are versus exponential curves (unaware as yet of
important lineage members who exercise rights better procedures, such as to use normalized
in the corporation, and out-married reciprocal cumulative probabilities and bootstrap statistics

5605-Scott-Chap10.indd 135 4/15/2011 12:00:11 PM


136 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 10.3 “Arab/Hebrew” genealogy of Greek gods (temporally ordered “ancestrally,”


center to periphery) in P-graph format

for curve fitting), they discovered two dominant of Democracy” in Greek city-states should take
sortings of societies: into account the earlier foundations of Greek
societies: “in the archaic period, as in the late
1 Societies with a predominance of co-descend- bronze-age, Greece belonged to the single cultural
ant marriage showed a power-law ranking of and intellectual circle of the Near East,” and the
co-descendant marriage-type frequencies, indica- names of Greek gods had Hebrew roots (Sealey,
tive of preferential choice, and an exponential 1976: 29). More generally, kinship network
ranking of co-affinal marriage-type frequencies, analysis may have potentials for historical
expected where there are no preferences (i.e., reconstruction.
random differences in frequencies).
2 Societies with a predominance of co-affinal
marriage showed the reverse.
STRUCTURAL ENDOGAMY WITH
Thus, the overall preference (frequency) for CO-AFFINAL RELINKING
co-descendant versus co-affinal marriage tends to (E.G., THE CHRISTIAN WEST)
correlate with a preference among the marriage
types in the preferred class of cohesive marriage
Here, social class tends to be constituted as
types. Within each class, societies might have a
distributed marital cohesion and elite pedigrees.
similar ranking of preferences, such as FBD as the
leading co-descendant marriage preferences.
A subsequent unpublished finding is quite
amazing: analysis of the genealogical network of The Christian West
the Greek gods (Newman and Newman, 2003)
shows a preference gradient matching that of A more horizontal view of kinship ties, with the
Aydınlı clan marriages and some other Arabized idea of co-affinal relinking and more specific
or Arabic societies, including the gradient first- renchaînement between pairs of families, was
preference for FBD (see also Barry, 2008). Little invented and studied by Jolas et al. (1970) as a
is known about the social organization of preclas- form of social integration in peasant villages in
sical Greeks as tribal societies, but this gives a France and elsewhere in Europe. This has been
clue. Obviously, Western ideas about the “origins found to be common in European, Christian, and

5605-Scott-Chap10.indd 136 4/15/2011 12:00:11 PM


KINSHIP, CLASS, AND COMMUNITY 137

many other societies where intermarried ancestral of relinking to a network analysis of how those
lines are relinked by marriage but not by marriage couples who relinked with one another in an
to blood kin. Across many studies, we find that Austrian farmer village formed a giant bicompo-
relinkings go beyond local alliances through over- nent that constituted most (about half) of the
lapping ancestries to also form horizontal cycles community. Further, they showed it was within the
of intermarriages that repeatedly overlap to form bicomponent, whose members inherited land, “in
larger cohesive units. When they are large and which propertied marriages were an instrument of
cohesive social formations, they may be entwined class formation” (1997: 175), citing Rebel’s
with community, social class, or ethnicity. (1983) distinction between economic and social
class in Austrian farming villages. Thus marital
relinking at the scale of the entire community was
a core feature of the social construction of class as
Genealogy and pedigree constituted in part by cohesively overlapping
relinking marriage cycles. Following White
Many studies of kinship are concerned with
(1997), who coined the term structural endogamy
pedigree and lineage or lines of vertical descent.
for the boundaries of network cohesion created by
This is also a social concern of many elites in
marriages, Brudner and White showed that the
establishing boundaries and social identities.
coefficient of covariation between bicomponent
Lloyd Warner’s Yankee elite ethnographies
membership and “stayers” in the community
(1941–1959, 1949) echoed this obsession. Descent
who inherited parental land and property was
group corporations were then the dominant
highly significant statistically even if underesti-
concern of the descent theory school of British
mated (R2 = .29) because a minority of the
anthropology. Warner, one of the foremost
community who were “stayers” were not inter-
ethnographers of an American city, viewed church
viewed. Interviewing more of the permanent
and voluntary associations as the two great
residents in the community could only have had
institutional organizations of the United States,
the effect of magnifying the size estimate for
one religiously divisive, the other integrative
the structurally endogamous group since the
through special interests. In his “beautiful, static,
exceptions to the hypothesis were almost all
organized community” description, however (as
those of heirs with missing endogamous links,
John Phillips Marquand in the novel Point of No
including the uninterviewed. Simulation analysis
Return [1949] describes the work of Warner’s
(White, 1999) supported the conclusion that
character, Malcolm Bryant), he neglected not
marriage relinking among sets of siblings and
only social change and disorganization but also
cousins occurred far more than expected by
the organizational role of kinship and marriage in
chance. The Turkish nomads study by White
the formation of social class and social strata.
and Johansen (2005), with more complete data,
found a higher “structural endogamy-stayers”
correlation coefficient R2, of .90. Here the “stayer”
Social class category includes the larger families who are
more successful in competition for resources. This
Max Weber, like most theorists of social class, suggests that a Brudner-White type of “structural
was not blind to marital relinking: his two basic endogamy-stayers” correlation at the community
characteristics of class were endogamy (social level could be very widespread and include many
class; often conflated with prestige hierarchies) non-European cases.
and differential access to life chances or access to Analyzing systemic relinking among
productive wealth (economic class, acquired Guatemalan colonial elites, Casasola Vargas and
through inheritance, or achievement indexed by Alcántara Valverde (Casasola Vargas, 2001;
income distinctions). Casasola Vargas and Alcántara Valverde, 2002)
Some large cohesive formations based on showed that both aspects of class elites, social and
marital relinkings are generationally shallow, with economic, were recognized family by family by
large multiply connected sets of siblings or experts in this historical period and as identified
cousins and no need to go back more than two concomitantly through network analyses of
generations in finding the multiconnected ties relinking. Like Brudner and White (1997), these
among overlapping cycles of affines. studies showed conformity between the social
(endogamously bounded) and economic (wealth
and property transmission) aspects of Weberian
Ethnographic examples for social class class. In a direct test of the cohesion/class hypoth-
Brudner and White (1997) used P-graph and esis for a society with co-affinal relinking, White
P-systems analysis (Harary and White, 2001) to (2009) reexamined the San Juan Sur (Turrialba,
move from Jolas et al.’s (1970) more local view Costa Rica) farmer village data of Loomis and

5605-Scott-Chap10.indd 137 4/15/2011 12:00:12 PM


138 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Powell (1949) and found that higher levels of that are mutually exogamous but more globally
structural cohesion (Moody and White, 2003) endogamous.
in kinship visiting patterns among family house-
holds correlated with villager judgments of higher
social class.
Further examination of structural endogamy
Dual organization, divides,
and social class (Fitzgerald, 2004) found distinct sides, and cognatic sides
strata of structural endogamies within the Bevis The view that exogamous exchanges between
Marks (Sephardim) Synagogue in London at marital moieties must be based on principles of
the levels of crafts people and office workers residence or descent (e.g., Fox, 1977: 175–207)
(horizontal adjacent generation relinking) and needed to create clear-cut named oppositions of
elites (generationally deeper relinking), as local groups (e.g., patrilocal) or (patri- or matri-)
Berkowitz (1975, 1980), his teacher, had suspected. lineages assumes that other peoples lack the
In contrast, Widmer et al. (1999) found deep relational logics for understanding their own
ancestral (vertical) relinking and relinking between networks. This view correlates with the insistence
family lines in among the Geneva Scientists of the that that “egocentric” kinship terminologies
seventeenth to nineteenth centuries. consistent with dual organization – kinterms that
systematically distinguish one side, “lines of
relatives I can marry,” from the other side of
Challenges to pluralism unmarriageable relatives – do not entail “socio-
centric” organization. The balance theorem of
Once relinkings are analyzed to show the extent of signed graphs (Harary, 1953, 1969), however,
interfamily cohesion at different class levels, the applied as a principle of network organization,
pluralistic theory of interest groups can be chal- explains the conditions under which cognition and
lenged by ones that explore how interfamily ties behavior do converge in this way for egocentric
intersect to cohesively integrate a social class with and sociocentric relational classes. It shows for a
interest groups and diverse political office holding, context of structural endogamy how the consistent
directorships, and other leadership roles. Systematic individual practice of marital sidedness is coter-
use of kinship network data, in the manner of ana- minous with marital sidedness as a network
lyzing horizontal social cohesion, can provide a outcome. Four new theorems relating egocentric
basis for the study of power elites, as Berkowitz sidedness in kinship terminology to sociocentric
suggested (1975, 1980). Here, the identification of sidedness among consangineally married couples,
cohesive groups provides a basis for causal mod- in relation to their common ancestors, are given
eling of historical contingencies. For comparative by White (2010). The study of empirical kinship
politics, Doyle (2005: 1) finds the White and networks in the following examples shows that the
Johansen (2005) P-graph framework to provide for predicted cognitive-behavioral-network conver-
“detailed assessment of highly decentralized self- gence is very common.
organizing local governance structures” in Central
Asia and “unparalleled examination of sub-national
political behavior,” and European politologists
have since begun to do so. Studies of Mexican Empirical examples for dual
power elites by Alcántara Valverde (2001) and Gil organization, divides, sides, and
and Schmidt (1996, 2005) show the interlocking of cognatic sides
political power and kinship/marriage networks.
Kuper’s (2006) P-system study of the families of Divides and sides were defined for P-graphs by
Bloomsbury found maritally cohesive groups that White and Jorion (1996: 287–88) solely in terms
supported the great English scientific families of principles of balance in signed networks and
(e.g., the Darwin-Wedgewood families) and independently of rules of descent or named
mounted some of the great English scientific, moieties. In a P-graph, if links of opposite gender
political, and literary projects of the nineteenth and are signed + and –, then divides exist in a single
early twentieth centuries. generation connected by sibling and sibling-in-
law links if the product of signs in marriage cycles
is positive. Divides were found to be statistically
significant1 for the Anuta of Polynesia (Houseman
SIDEDNESS AND SECTIONS and White, 1996). Sides extend the principle of
balance to marriage cycles across all generations
Moieties are a form of matrimonial dual organiza- in the network and were found to be statistically
tion that divides a maritally cohesive group into significant (p < .0001) by Houseman and White
two sides that exchange spouses: that is, into sides (1998b) for all nine societies in “Dravidian

5605-Scott-Chap10.indd 138 4/15/2011 12:00:12 PM


KINSHIP, CLASS, AND COMMUNITY 139

Amazonia,” a region where most societies have and on how late men begin (because of male
sided egocentric categories in their kin terms with initiations, for example) and go on having
published genealogies but no named moieties or children relative to women. The Alyawarra of the
dual descent group organization and four other central Australian desert (Denham and White,
cases from elsewhere with Dravidian kin terms 2005), as a result of two years’ fieldwork by
but no moieties. In these 13 cases, “imperfect” Denham, have one of the most complete data sets
sidedness error rates of 1 to 7 percent matched on kinship networks, actual ages, and use of
“imperfect” locally sided behavior. Structural kinship terminology. Women’s average age at
cohesion, dual opposition in local and global childbirth is only two-thirds that of men’s
“balance,” and local marriage cycles or “types” paternity so that men’s generational time span is
of marriage come together in a single package 50 percent longer and slower than women. In any
(in a way that is easily tested with empirical society where a large spousal-age difference is
kinship networks) where egocentric kin terms and present, this will create chains of wives’ brothers
marriage behavior are linked to more global that move forward in time in augmented-
network structures. generational increments (and backward in dimin-
Especially troubling to ethnographers is the ished generational increments for sisters’
occurrence of “sidedness” (supposedly based on husbands).
descent) in complex Eurasian state societies that
are cognatic, lacking descent groups, and with
monogamy or limited polygyny and inheritance Empirical examples for generations
divided between sons and daughters. Leach’s The Alyawarra take siblings and siblings-in-law to
(1961) Sinhalese village ethnography put an define their generations, so that generations are
end to British descent-based theory of kinship most definitely not contemporaries. In Figure 10.4
corporations by showing that Pul Eliyan produc- the two diagonal dash-dotted lines connect
tive systems were egocentrically organized and marriages in the age-slanted generations of WB
based on marriage alliances. He could not find the (wife’s brother) chains (WBWBWB . . . ), with
coda, however, as to how conflicts and alliances vertical solid lines for the patridescent lines of
were organized. Houseman and White (1998a) sons and dotted lines veering from the vertical,
coded his detailed genealogies into P-graphs to diagonally down and left, following a recurrent
test whether Sinhalese two-sided (Dravidian) pattern of MBD- or MMBDD-type marriages, and
egocentric kin terms were associated with those veering to the right breaking this pattern
maritally sided networks in the absence of unilin- with other kinds of marriage. The age slant entails
eal descent groups, and found that couples linked that a WF averages a female half-generation older
through common ancestries included women than his DH and a WB averages a female half-
marrying between opposing sides formed by generation younger than his ZH.
male succession to ownership. Without a male The brother/sister age-to-marriage variations in
heir in a family, however, daughters could receive vertical heights of lines in Figure 10.4 closely
through cognatic inheritance the normally approximate true age, so age differences can be
male-transmitted residential compound, fields, read off the figure. When arranged by classifica-
and irrigation ditches. The exceptions to male- tory descent lines (1–6 for men), it is possible in
sidedness were all “diga” marriages (residence this P-graph to see patterns of marriages, all
with the wife), in which the device to reconcile the of which are consistent with the marriageable-
contradictions with sidedness was to choose category memberships of the kinship terminology.
the husband in these cases from a distant village In some marriages the wife is older than the hus-
whose sidedness was discounted. Rather than band (e.g., widow marriage), or much younger
marrying from the “side” of the father, children (e.g., alternating generation, like MBDDD).
took their side from the mother’s inherited
compound.
Sections

Generations A section system like the marriage classes of the


Alyawarra is a matrimonial organization that gives
Generations in a kinship network are often thought different members of the nuclear family and their
of, alternatively, as relative to ego, as roughly spouses – father, mother, children, and children’s
contemporaries of the ego (assuming men and spouses – four “section” names that govern their
women marry as close to the same age), or as marriages and marital sections of their offspring.
having a different average time span for males and Governing pairs of names create a permutation
females depending, for example, on how early group where each parental pair creates children’s
females marry or have children relative to men, and their spouses’ pairs (Weil, 1949). The naming

5605-Scott-Chap10.indd 139 4/15/2011 12:00:12 PM


140 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 10.4 Alyawarra age-slanted alternating sibling and sibling-in law generations (main
female lines shaded and two) in P-graph format

pairs are doubly sided, with intersecting male and would affect marriage within one’s (or an alternat-
female sides, and marriages only with their oppo- ing) generation and proposed an idealized double
sites. Sides are not descent groups, considering that helix model where classificatory lines of females
the section names in both male and female names in the MBD diagonal would pass through six
alternate between generations. This creates an classificatory male descent groupings and then
equivalence of alternating generations wherein one cycle over back to the first of these groups, con-
can only marry within the generation (normally tinuing indefinitely while only coded for a finite
composed of sibling and sibling-in-law chains) or number of generations in the kinship terminology.
a generation twice removed. Yet, in this small-scale society the possibilities
for continuity, like a generation that wraps around
from the right side to the left in the next
Empirical example for sections alternating generation, are not filled in. There are
Alyawarra have four sections, each divided into too few people. In Figure 10.4 there are many
two subsections, and the data show a nearly breaks where WB links are missing and the WB
perfect correspondence between marriage behav- link pattern does not recur for all the patrilines.
ior and sections/subsection memberships. In Rather than “fill in” imaginary links, as in a
indigenous Australia, where four-, six-, and eight- double helix model, it is better to consider how
section systems (or simple sidedness) are nearly such a system works on the ground: when
universal, ethnographers have tried to model residence is virilocal, with men in the male line
kinship networks as if they had symmetries and living together, then a MBD marriage, within a
regularities beyond the permutation group govern- parallelogram of female shaded lines bounded left
ance of marital sections. Nearly every mathemati- and right by adjacent classificatory male lines,
cal model of Australian kinship networks (e.g., will link to another group in which one’s MB is
H. White, 1963) has exaggerated symmetries. resident and one’s wife was born. In the struggle
Kinship network analysis (e.g., with P-graphs) for survival, this MB group will be a potential
allows networks to be considered as complex rela- place to visit, and an obvious source for exchange
tional systems rather than marriage prescriptions and balancing out of resources. The neighboring
for categorical descent lines of men and women. group in turn may have a similar MB group, to
Figure 10.4 is perhaps the only actual-age which the ego could be redundantly linked through
marriage pattern diagram of an Australian society a wife as an MMBDD relative. In life on the
in existence. Denham et al. (1979) explored the ground, these two-step linkages to a neighbor’s
puzzle of how the age difference between spouses and a neighbor’s neighbor’s groups are sufficient

5605-Scott-Chap10.indd 140 4/15/2011 12:00:12 PM


KINSHIP, CLASS, AND COMMUNITY 141

for survival and correspond to the short chains of model of choices over the target set of marriage
single or double MBD links in the diagram, where types, using bootstrap simulation to generate prob-
empirical pulses of one or two successive MBD ability distributions evaluated against the data.
marriages sum to 18 in all in Figure 10.4.
Having temporally ordered time series data is
of enormous value in social network analysis,
even using heuristic placement of generations Ethnographic example for
(a standard option in Pajek: White, 2008a) and simulations: structure and agency
age-difference adjustment that can be done in the
absence of known dates of births, marriages, For separating structure and agency, structural
deaths, and other events. (Temporal marriage-date “signals” that come from limitations of context
adjustments can be made for FZD marriages, for need not be interpreted in terms of decision-
example, which entail same-age for husband and making agency. Table 10.1 gives an example.
wife, while MBD does not; MBDDD entails Here, the ethnographer (Schweizer) recorded four
wives’ average marriage at half or less the ages of types of cohesive marriage (using the notation
their husbands.) Knowing approximate generations, here and in Table 10.1 of F = Father, B = Brother,
age differences between individuals, and rough D = Daughter, M = Mother, and Z = Sister: FBD,
temporal intervals of contemporaneity is a major MBD, FZDD, ZD) among the 19 marriages of
advantage to kinship network analysis because we Muslim elites in a Javanese village (Sawahan),
can permute marriages randomly or with rules of compared to commoners who had only one such
prohibition (e.g., against marrying prohibited marriage (White and Schweizer, 1998). Is this a
relatives) or with probabilistic biases for contempo- difference in marriage preferences or cultural
raneous men and women whose marriages could rules or strategies for the two groups? Each group
have been different, like within games of musical was partitioned into generations, and marriages in
chairs. Valid estimates of marriage preferences each group and generation were randomly rewired
or aversions/prohibitions can be made with the using controlled simulation (White, 1999). No
statistical controls explained below (White, 1999), marriage frequency was found to significantly
as deviations against this random “musical chair” differ in frequency from those of random marital
baseline of controlled “random rewirings”. rewirings, that is, controlling for difference in the
sizes of the groups and thus noting the smaller
size of the elite group. In marrying within its
status group, each such group will require a
proportionate number of spouses, but in a smaller
SIMULATIONS: STRUCTURE group descended from a common ancestor there
AND AGENCY will be more co-descendant marriages among the
marriages if marriage choices are random. The
Permuting only the element of who women marry result would have been different if the elites chose
(alternately, the men) in each generation or con- to avoid co-descendant marriages, but they did
temporaneous period limits the permuted choices not. Nor did they prefer them, similar to the com-
to only those marriage opportunities indexed by moners, assuming that they followed a preference
actual marriages in that generation. This holds for status endogamy, each preferring to choose
constant the demographic composition of descent spouses from their own groups.
groups in the male (or alternately, female) lines, The Austrian village case (analysis of social
the numbers of sons and daughters in each nuclear class, above) studied by Brudner and White
family, and thus all other structural and demo- (1997) provides an example where controlled
graphic features of the observed marriages. The (“musical chairs”) simulation answered the
resulting frequencies for each type of marriage question: In the competition for heirships how do
(those resulting from the permutated marriages, we know whether some farm family children
all else constant), compared with the actual mar- choose to relink or whether relinking occurred by
riage-type frequencies, give appropriate measures chance? Couldn’t the relinking be the product of a
of preference or aversion (prohibition) for each random assortment of marriages, relative to inher-
type of marriage (White, 1999, 2008b). These can iting, some persons relinking by chance in a giant
be departures from the controlled simulation component and others not? Permuting women’s
frequencies, either for sizes of bicomponents or marriage in each generation, in the latest and prior
for or against specific types of marriage. This historical generations surveyed, showed that
allows a separation of structure and agency by relinking occurred far more frequently than by
means of empirical criteria. Such measures can chance at single, double, and triple generational
also include inferential statistics that improve and depths (i.e., relinking among sets of siblings or
refine these results by positing a probabilistic cousins in the village) but far less frequently than

5605-Scott-Chap10.indd 141 4/15/2011 12:00:13 PM


142 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Table 10.1 Marriage-type comparisons between Javanese Muslim elites (MusElite) in


Dukah Hamlet versus Dukah commoners (DhC) (White, 1999: 13.2, Table 7)
Muslim Elite vs. Dukah Presence of the marriage Absence of the Fisher Marriage Three-way
Commoners for this kin type marriage for this Exact types Fisher test
kin type test

Actual Simul. Actual Simul. p= type p=

1:MusElite 1 0 4 3 .625 FBD


* DhCom 0 1 9 12 .591 “ 1.00
2:MusElite 1 2 2 3 .714 MBD
* DhCom 1 0 11 16 .429 “ 1.00
3:MusElite 2 1 3 2 .714 FZDD
* DhCom 0 0 11 0 n.a. “ 1.00
4:MusElite 0 1 6 7 .571 ZD
* DhCom 0 0 18 24 n.a. “ 1.00
Total MusElite 4 4 15 15 1.00 All
* Total DhCom 1 1 49 52 1.00 “ 1.00

* The three-way Fisher test compares the difference between entries within two 2 x 2 cross-tabs, controlling for
the bivariate marginal totals of each pair of variables (White et al., 1983). Given the number of each type of
marriage and the numbers in each group, none of these pairs of fourfold tables differ as between the two groups.

by chance for relinkings at greater generational and self-reliance is highly valued. The contrast
depths. It is obvious that relatives at shallow depth suggests to Greif that the individualistic system
sets would know each other, and could self-select may be more economically efficient in the long
and marry endogamously, excluding relinking run. The networks he considers include family
with noninheriting members of their sets. Further, relationships, but not kinship networks writ
it is among the sibling and cousin sets that there is large. He fails to take into account that European
competition for parental inheritances that are not kinship networks have a marriage structure that
yet decided. Thus, we can conclude that the statis- facilitates stratified social classes and dominance
tical evidence favors intentional or implicit and by elites. That is very different from systems in
strategic decision making, while relinking fails the which lineages and clans compete and each may
test for randomness. have its elites that not only cooperate within
groups but have broadcast strong ties for coopera-
tion and exchange. Greif’s conclusions may be
premature.
The endoconical clans examined here, in
INSTITUTIONAL AND COHESION contrast, have very high marital relinking indices
ANALYSIS within their bicomponents (Aydınlı, 66 percent;
Canaan, 64 percent) and a power-law spread of
Greif (1994, 2006) treats social networks in the ties that balances intensive relinking for close
context of embedded decision making and a relatives against broadcast links with distant ones.
historical context to derive analyses of economic Up close, these look like segregative networks but
institutions. The systems of co-descendant in fact, in Greif’s terms, the “social structure is
marriage preferences in the Matriarchs and integrated, economic transactions are conducted
Turkish nomads examples fall into his “collectiv- among people of different groups, enforcement is
ist belief system” societies (Grief, 1994), which achieved through specialized organizations,” the
are segregated (they individually, socially, and difference being that it is not only courts but
economically interact with members of specific kinship norms of reciprocity and punishment that
groups), while the systems of co-affinal marriage are operative. The class-stratified Austrian
preferences such as the Austrian farmers example farming village has a lower relinking index (48%),
fall into Grief’s “individualistic belief system” 60% among farmstead heirs. Counterintuitively,
societies, in which social structure is integrated, the “kin-based” Australian Alyawarra have the
economic transactions are conducted among lowest index of relinking, 23 percent, in conse-
people of different groups, enforcement is achieved quence of the fact that polygynous local family
through specialized organizations (courts), groups are large, but the precious kinship ties

5605-Scott-Chap10.indd 142 4/15/2011 12:00:13 PM


KINSHIP, CLASS, AND COMMUNITY 143

between local groups are spread thin, as befits a contrast within the Indonesian Muslim village
low-density scarce-resource society, integrating (Sawahan) between the relatively few rich elites
the Aranda linguistic neighbors of the Alyawarra and the majority of poor commoners. There, the
into their bicomponent as well as the Alyawarra expectation was that marriage choice was within
themselves. one’s status group or class, but the simulation,
controlling for status endogamy, showed no
difference in marriage structure although mar-
riage to a relative is far more probable by chance
OVERVIEW AND CONCLUSIONS in a smaller group with common ancestry than in
a larger group with more distributed ancestry.
Attention to the type of evidence presented Context may mask as agency (“we marry X and Y
here – on how class, political, and religious relatives”) although agency may operate at a
formations are related to the types and boundaries higher level (“we marry our own”, status-wise).
of marital cohesion and structurally endogamous Network studies need to attend to the multiple
groups in the kinship networks of different network levels at which agency engages.
societies – was predicated on expectations from What we find from kinship data is that prefer-
previous research about the effects of cohesive ences or proscriptions in monogamous Christian
blocks in social formations. This research societies not to marry a relative creates horizontal
(motivated by findings from kinship studies) co-affinal relinking at a sufficient spatial scale
examined the effects of variable highest-levels of (given the Relinking theorem) and this stratum
cohesion of individual, family, or firm for the forms the basis of social class. This is no surprise
cohesive blocks to which they belong within in the Weberian view, where endogamy is the
networks of various sorts. Moody and White social tendency in class formation, while inherit-
(2003) showed (1) strong effects of levels of ance and consolidation of wealth through status
cohesion of individual students in their friendship endogamy is the economic tendency. This is true
blocks on their reports of attachment to high for the farming community at a scale of 500
school and (2) how the cohesive strengths of people, half of whom on average, within each
co-memberships in the cohesive blocks of busi- sibling group, inherit property and practice struc-
ness alliances align with similarities in the choices tural endogamy within the village, while the other
of firms in their political party alliances of firms half tend to marry outsiders and immigrate or take
in party politics. The problem of structure up a nonfarming occupation. This is also true for
and agency for this kind of research finding is national societies with populations of millions,
disorienting to many social scientists. Does where subsets of elites (political, intellectual,
membership in a cohesive group “cause” an scientific, occupational) not only practice
individual or firm to alter attitudes or choices? Do structural endogamy within the social class they
similar choices or attitudes “cause” homophilous generate by these choices but as a corollary, as a
affiliations? Is the causation circular? Powell et al. maritally cohesive group, they also wield joint
(2005), using the Moody-White measurement of influence over political parties, governance,
structural cohesion, looked at time-lagged effects. economic power, and industrial ownership.
They showed that choice of partners for strategic Similarly, for some countries, such as England,
collaborations in the biotech industry was heavily for the class strata of laborers, particularly those
predicated from year to year by level of cohesion who wield particular skills, there is a hereditary
in the cohesive blocks to which potential partners component to social and economic class transmis-
belonged the year before but decisions driven by sion. These two aspects weld together through
cohesion may be matters of intent (which entails structural endogamy cum inheritance, a combined
that actors perceive differences in cohesion). For engine of both structure and agency.
kinship, in the most telling case where bicompo- Composed within the kinship network,
nent (more cohesively integrated) members of a marriage choices (which include the universalistic
farming community tended to be those who aspect including the possibility of leaving one’s
inherit productive property, which came first? group) in the context of structural endogamy are
Knowledge that one is an heir, then the cohesively particularistic as to whom one marries (i.e., to
“local” marriage, or the “local” marriage first, someone at a particular distance or position within
disposing the parents to favor one child over the social network). In societies where it is com-
another? In both the biotech and the farming monly a relative who is married, we Westerners
examples, compared to a simulated baseline for are more apt to ascribe prescription or normative
“those eligible,” convergences of structure preferences in marriage. The use of tools for
(cohesion) and the decision to partner occurred marriage census frequencies of different types of
empirically, but were they determined by agency, marriage (described as cycles or marriage motifs,
structural context, or both? A good example is the such as MBD, but including many hundreds

5605-Scott-Chap10.indd 143 4/15/2011 12:00:13 PM


144 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

of more remote relatives), however, reveals con- principles, sections, class stratification through
trastive characteristic probability distributions relinking, etc.). These support variant social proc-
(White and Houseman, 2002), ones that may tend esses, like the effect of horizontal stratification
to be Zipfian in equalizing the sums of close mar- implied by co-affinal marriage relinking on a
riage types of higher individual frequency against stratified mode of social class formation (Brudner
the sums of lower individual frequencies more of and White, 1997) that channels wealth transmis-
the distant marriage types, thereby indicating sion, outmigration, and occupational mobility. By
overall either co-affinal or co-descendant marriage considering how selection processes affect changes
“preferences.” in network structure in a population, rather than
In many co-descendant marriage Middle taking Firth’s idealized approach to structure, we
Eastern clan structures (like the Aydınlı, the Old can study how network structures, organization,
Testament Patriarchs and Matriarchs, or the and agency interact dynamically at different
mythical clan of Greek Gods), marital cohesion scales. We now (see 2011: Chapter 35) have the
also distributes widely, as in co-affinal Christian tools, such as P-graphs, Ore-graphs, P-systems,
marriage and class systems, but with an important Pajek (Batagelj and Mrvar, 1998, 2008), Puck
difference: rather than “strength of weak ties,” the (Hamberger et al., 2009a, 2009b), Tipp (Houseman
broader networks are welded by “navigable strong and Granger, 2008), R programs (White, 2008a,
ties” created through reciprocity between local 2008b) and statistical software (Butts, 2008;
and fractal kinship units with large size inequali- Handcock et al., 2008) to do so in a way that
ties due to polygyny and fecundity. Here, too, as changes the landscape of our understanding of the
with the Aydınlı, those outside the structurally “social” in the social sciences. Bank on the fact that
endogamous cores of communities are more likely with the global financial meltdown of the economy,
to emigrate to cities (structure or agency?). kinship, like ecological sustainability, will be more
It is no surprise, then, that the embeddedness important in people’s lives than ever.
structure of kinship groups, integrated by marital
cohesion at varying scales, marks out distinctive
types of social organizations with different
scalings of structure, and that these organizations ACKNOWLEDGMENTS
are interlocked with large-scale class, clan and
inter-clan, and caste and inter-caste formations
I thank Peter Carrington, Martin Doyle, Robert
(always linked by divisions of labor and occupa-
Adams, Lilyan Brudner, and Klaus Hamberger for
tions), and with political structure, religion, and
feedback on this paper, the teams of collaborators
religious organization. This also provides kinship
on the French kinship projects mentioned in the
frameworks, for politologists like Doyle (2005),
citations for sharing in the development of the
for “examination of sub-national political
methods, the UC Irvine graduate students cited for
behavior . . . the study of comparative politics . . .
dissertation studies, and each of my coauthors of
[and] of inter-governmental organizations, non-
previous kinship studies as cited, for contributing
governmental organizations, or transnational
to this study. Funding for many of the projects
advocacy networks with state government
discussed were supported by NSF Grants
infrastructure.” Korotayev (2003) and the regional
SBR-9310033 1993–95 “Network Analysis of
case studies examined here show that multiple
Kinship, Social Transmission and Exchange:
features of kinship, and network forms of marital
Cooperative Research at UCI, UNI Cologne,
cohesion, are closely interlocked with specific
CNRS Paris” and BCS-9978282 1999–2001
historical religions and regions.
“Longitudinal Network Studies and Predictive
For kinship, Weil (1949) was the first to under-
Social Cohesion Theory.” I had support as an SFI
stand that kinship structures are relations among
External Faculty member from John Padgett,
marriages and groups and not just among people,
Mark Newman, and many other Santa Fe Institute
and that even core relational structures, like
Research Faculty, who discussed with us the con-
sections, are easily transformed (e.g., to subsec-
cepts of cohesion used in this paper as they were
tions, and back to sections). How cohesive units in
being developed.
kinship networks are connected to kin terms,
norms, and prototypical role expectations is part
of the views of social organization discussed by
Firth (1951), H. White (1963), and Leaf (2007).
Variant kinship networks not only serve as funda- NOTES
mental platforms for historically specific forms of
social organization but exhibit general regularities 1 In a random graph, half the chromatic
that derive from how they engage with specific number γ = m – n + 1 of independent cycles are
network principles (e.g., sidedness and balance expected to have a negative product of signs, so an

5605-Scott-Chap10.indd 144 4/15/2011 12:00:13 PM


KINSHIP, CLASS, AND COMMUNITY 145

appropriate test is given by the binomial theorem. Firth, R. (1951) Elements of Social Organization. London:
The Par-side Program (White and Skyhorse, 1997) Watts and Co.
calculates statistical significance as a departure from Fitzgerald, W. (2004) Structural and Non-structural Approaches
randomness in the frequencies of balanced and to Social Class: An Empirical Investigation. PhD Dissertation,
unbalanced cycles. Program in Social Networks. University of California,
Irvine.
Fox, R. (1977) Kinship and Marriage. Harmondsworth:
Penguin.
Gibbons, A. (1985) Algorithmic Graph Theory. Cambridge:
REFERENCES Cambridge University Press.
Gil M.J. and Schmidt, S. (1996) ‘The Mexican network of
Adams, R.McC. (1966) The Evolution of Urban Society: Early power’, Social Networks, 18(4): 355–81.
Mesopotamia and Prehistoric Mexico. Chicago: University Gil M.J. and Schmidt, S. (2005) Estudios sobre la Red Política
of Chicago Press. de Mexico. Mexico: Universidad National de México.
Alcántara V.N. (2001) Kinship, Marriage, and Friendship Ties Girvan, K. and Newman, M.E.J. (2002) ‘Community structure
in the Mexican Power Elite. PhD Dissertation, Program in in social and biological networks’, Proceedings of the
Social Networks. University of California, Irvine. National Academy of Sciences USA, 99: 7821–26.
Barry, L.S. (1998) ‘Les modes de composition de l’alliance. Le Granovetter, M. (1973) ‘The strength of weak ties’, American
“mariage arabe”’ L’Homme, 147: 17–50. Journal of Sociology, 78(6): 1360–80.
Barry, L.S. (2008) La Parenté. New York: Ballantine Books. Greif, A. (1994) ‘Cultural beliefs and the organization of
Batagelj, V. and Mrvar A. (1998) ‘Pajek: A program for large society: A historical and theoretical reflection on collectivist
networks analysis’ Connections, 21: 47–57. and individualist societies’, The Journal of Political Economy,
Batagelj, V. and Mrvar A. (2008) ‘Analysis of kinship relations 102(5): 912–50.
with Pajek’, Social Science Computer Review, 26(2): Greif, A. (2006) Institutions and the Path to the Modern
224–46. Economy: Lessons from Medieval Trade. Cambridge:
Berkowitz, S.D. (1975) The Dynamics of Elite Structure: A Cambridge University Press.
Critique of C. Wright Mills’ “Power Elite” Model. PhD Hamberger, K. and Daillant, I. (2009a) ‘L’analyse de réseaux
Dissertation, Brandeis University. de parenté: concepts et outils’, Annales de Démographie
Berkowitz, S. D. (1980) ‘Structural and non-structural models Historique, Parenté et Informatique.
of elites’, Canadian Journal of Sociology, 5: 13–30. Hamberger K., Houseman, M. and Grange, C. (2009b)
Berkowitz, S.D., Woodward, L.H. and Woodward C. (2006) ‘La parenté radiographiée: un nouveau logiciel pour le
‘The use of formal methods to map, analyze and interpret traitement et l’analyse des structures matrimoniales’,
hawala and terrorist-related alternative remittance L’Homme, 189.
systems’, Structure and Dynamics, 1(2): 291–307. Hamberger, K., Houseman, M., Daillant, I., White, D.R. and
Brudner, L.A. and White D.R. (1997) ‘Class, property and Barry, L. (2004) ‘Matrimonial ring structures’,
structural endogamy: Visualizing networked histories’, Mathématiques et sciences humaines, 43(168): 83–121.
Theory and Society, 25(2): 161–208. Hamberger, K., Houseman, M. and White, D.R. (2011)
Butts, C. (2008) ‘Social network analysis with sna’, Journal of ‘Kinship network analysis’, in P. Carrington and
Statistical Software, 24(6): 1–51. J. Scott (eds.), SAGE Handbook of Social Network
Casasola V.S. (2001) Prominence, Local Power and Family Analysis.
Networks in Santiago de Guatemala: 1630–1820. PhD Handcock, M.S., Hunter, D.R., Butts, C.T., Goodreau, S.M.
Dissertation, Program in Social Networks. University of and Morris, M. (2008) ‘Statnet: Software tools for the
California, Irvine. representation, visualization, analysis and simulation of
Casasola V.S. and N. Alcántara V. (2002) ‘La estrategía network data’, Journal of Statistical Software, 24(1): 1–11.
matrimonial de la red de poder de Guatemala colonial’, Harary, F. (1953) ‘On the notion of balance of a signed graph’.
in J. Gil Mendieta and Samuel Schmidt (eds.), Análysis de Michigan Mathematical Journal, 2: 143–146.
Redes: Aplicaciones en Ciencias Sociales, Mexico: Harary, F. (1969) Graph Theory. Reading, MA: Addison-
Universidad National de México. pp. 158–78. Wesley.
Council of Europe (2009) Well-being for All – Concepts Harary, F. and White, D.R. (2001) ‘P-systems: A structural
and Tools for Social Cohesion (Trends in social cohesion model for kinship studies’, Connections, 24(2): 22–33.
no. 20). Strasbourg, France: Palais de l’Europe. Houseman, M. and Grange, C. (2008) ‘Présentation du
Denham, W.W., McDaniel, C.K. and Atkins, J.R. (1979) programe TIPP’. http://www.kintip.net/content/view/4/2/.
‘Aranda and Alyawarra kinship: A quantitative argument Houseman, M. and White, D.R. (1996) Les structures réticu-
for a double helix model’, American Ethnologist, 6: 1–24. laires de la pratique matrimoniale’, L’Homme, 139: 59–85.
Denham, W.W. and White, D.R. (2005) ‘Multiple measures of Houseman, M. and White, D.R. (1998a) ‘Network mediation
Alyawarra kinship’, Field Methods, 17: 70–101. of exchange structures: Ambilateral sidedness and property
Doyle, T.M. (2005) ‘Network analysis for comparative politics’, flows in Pul Eliya (Sri Lanka)’, in T. Schweizer and
Amazon review of White and Johansen, 2005. http://www. D.R. White (eds.), Kinship Networks and Exchange.
amazon.com/gp/pdp/profile/A3V8ZGN18V6BQ4. Cambridge: Cambridge University Press. pp. 59–89.

5605-Scott-Chap10.indd 145 4/15/2011 12:00:13 PM


146 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Houseman, M. and White, D.R. (1998b) ‘Taking sides: Marriage Read, D. (2000) ‘Formal analysis of kinship terminologies and
networks and Dravidian kinship in Lowland South America’, its’ relationship to what constitutes kinship’. Mathematical
in M. Godelier and T. Trautmann (eds.), Transformations of Anthropology and Cultural Theory, 1(1):1–46.
Kinship. Washington DC: Smithsonian Press. Rebel, H. (1983) Peasant Classes: The Bureaucratization of
Johansen, U. and White, D.R. (2002) ‘Collaborative long-term Property and Family Relations Under Early Habsburg Absolutism,
ethnography and longitudinal social analysis of a nomadic 1511–1636. Princeton: Princeton University Press.
clan in Southeastern Turkey’, in R. van Kemper and Sealey, R. (1976) A History of the Greek City States, 700–338
A. Royce (eds.), Chronicling Cultures: Long-Term Field B.C. Berkeley, CA: University of California Press.
Research in Anthropology. Walnut Creek, CA: AltaMira Tilly, C. (1984) Big Structures, Large Processes, Huge
Press. pp. 81–99. Comparisons. New York: Russell Sage.
Jolas, T., Verdier, Y. and Zonabend, F. (1970) ‘Parler famille’, Warner, W.L. (1949) Democracy in Jonesville: A Study of
L’Homme, 10(3): 5–26. Quality and Inequality. New York: Harper.
Korotayev, A. (2000) ‘Parallel-cousin (FBD) marriage, Warner, W.L., Lunt, P.S., Srole, L. and Low, J.O. (1941–1959)
Islamization, and Arabization’, Ethnology, 39(4): 395–407. The Social Life of a Modern Community. II: The Status
Korotayev, A. (2003) ‘Unilineal descent groups and deep System of a Modern Community. III: The Social Systems of
Christianization: A cross-cultural comparison’, Cross- American Ethnic Groups. IV: The Social System of a Modern
Cultural Research, 37(1): 132–56. Factory. V: The Living and the Dead: A Study in the Symbolic
Korotayev, A. (2004) World Religions and Social Evolution of Life of Americans. New Haven: Yale University Press.
the Old World Oikumene Civilizations: A Cross-Cultural Warner, W.L., Meeker, M. and Eells, K. (1949) Social Class in
Perspective. Lewiston, NY: Edwin Mellen Press. America: A Manual of Procedure for the Measurement of
Korotayev, A. and Kazankov, A. (2002) ‘Regions based on Social Status. New York: Science Research Associates.
social structure: A reconsideration’, Current Anthropology Weil, A. (1949) ‘Sur l’étude algèbrique de certains types de
41: 668–90. lois de mariage’, in C. Lévi-Strauss, Les structures elémen-
Kuper, A. (2006) ‘Endogamy, adultery and homosexuality: taires de la parenté. Paris: Presses Universitaires de
An ethnographic perspective on the Bloomsbury Group’. France. pp. 279–85.
http://intersci.ss.uci.edu/wiki/htm/talks.htm. White, D.R. (1997) ‘Structural endogamy and the graphe
Leach, E.R. (1954) Political Systems of Highland Burma: A de parenté’, Mathématiques, informatique, et sciences
Study of Kachin Social Structure. Cambridge: Harvard humaines, 137: 107–25.
University Press. White, D.R. (1999) ‘Controlled simulation of marriage systems’,
Leach, E.R. (1961) Pul Eliya, A Village in Ceylon: A Study of Journal of Artificial Societies and Social Simulation, 2(3).
Land Tenure and Kinship. Cambridge: Cambridge University White, D.R. (2004) ‘Ring cohesion theory in marriage and
Press. social networks’, Mathématiques et sciences humaines,
Leaf, M. (2007) ‘Empirical formalism’, Structure and Dynamics, 43(168): 5–28.
2(1): 804–24. White, D.R. (2008a) ‘Generation depth partition’, http://
Lévi-Strauss, C. ([1949] 1967) Les structures élémentaires de intersci.ss.uci.edu/wiki/index.php/Generation_depth_
la parenté. 2nd ed. Paris/La Haye: Mouton. partition.
Loomis, C.P. and Powell, R.M. (1949) ‘Sociometric analysis of White, D.R. (2008b) ‘Software: Kinship simulation’, http://
class status in rural Costa Rica – A peasant community intersci.ss.uci.edu/wiki/index.php/Software:_Kinship_
compared with an hacienda community’, Sociometry simulation.
12(1/3): 144–57. White, D.R. (2009) ‘K-cohesion and kinship’, Paper for the
Marquand, J.P. (1949) Point of No Return. Boston, MA: Little, Sunbelt Social Networks Conference, San Diego, CA.
Brown. White, D.R. (2010) ‘Egocentric and sociocentric structure in
Moody, J. and White, D.R. (2003) ‘Structural cohesion and classificatory kinship systems: Four theorems’, Mathematical
embeddedness: A hierarchical conception of social groups’, Anthropology and Cultural Theory, 3(6): 1–19.
American Sociological Review, 68(1):1–25. White, D.R., Batagelj, V. and Mrvar, A. (1999) ‘Analyzing
Murdock, G.P. (1967) Ethnographic Atlas. Pittsburgh, PA: large kinship and marriage networks with P-graph and
University of Pittsburgh Press. Pajek’, Social Science Computer Review, 17(3): 245–74.
Newman, H. and Newman, J.O. (2003) A Genealogical Chart White, D.R. and Harary, F. (2001) ‘The cohesiveness of
of Greek Mythology. Chapel Hill: University of North blocks in social networks: Node connectivity and condi-
Carolina Press. tional density’, Sociological Methodology, 31: 305–59.
Ore, O. (1960) ‘Sex in graphs’, Proceedings of the American White, D.R. and Houseman, M. (2002) ‘Navigability of strong
Mathematical Society, 11: 533–39. ties: Small worlds, tie strength and network topology’,
Peters, E. (1967 [1991]) The Bedouin of Cyrenaica: Studies Complexity, 8(1): 72–81.
in Personal and Corporate Power. 2nd ed. J. Goody and White, D.R. and Johansen, U. (2005) Network Analysis and
E. Marx (eds.). Cambridge: Cambridge University Press. Ethnographic Problems: Process Models of a Turkish
Powell, W.W., White, D.R., Koput, K.W. and Owen-Smith, J. Nomad Clan. Boston, MA: Lexington Press.
(2005) ‘Network dynamics and field evolution: The growth White, D.R. and Jorion, P. (1992) ‘Representing and
of interorganizational collaboration in the life sciences’, computing kinship: A new approach’, Current Anthropology,
American Journal of Sociology, 110(4): 901–75. 33(4): 454–63.

5605-Scott-Chap10.indd 146 4/15/2011 12:00:13 PM


KINSHIP, CLASS, AND COMMUNITY 147

White, D.R. and Jorion, P. (1996) ‘Kinship networks and and D.R. White (eds.), Kinship Networks and Exchange.
discrete structure theory: Applications and implications’. Cambridge: Cambridge University Press. pp. 36–58.
Social Networks, 18(3): 267–314. White, D.R. and Skyhorse, P. (1997) Parenté Suite User’s
White, D.R. and Newman, M.E.J. (2001) ‘Fast approximation Guide, Vol. 1. UC Irvine. http://eclectic.ss.uci.edu/~drwhite/
algorithms for finding node-independent paths in net- pdf/PGMAN2-6.pdf.
works’, Santa Fe Institute Working Paper, 01-07-035. White, H.C. (1963) The Anatomy of Kinship. Englewood Cliffs,
White, D.R., Pesner, R. and Reitz K. (1983) ‘An exact signifi- NJ: Prentice-Hall.
cance test for three-way interaction’, Behavior Science Widmer, E., Sutter, W.D., Sigris, R. and Fitzgerald, W. (1999)
Research, 18: 103–22. ‘The institutionalization of science: Kinship networks of
White, D.R. and Schweizer, T. (1998) ‘Kinship, property and Geneva Scientists’, 24th Sunbelt International Social
stratification in rural java: a network analysis’, in T. Schweizer Networks Conference, Chapel Hill, North Carolina.

5605-Scott-Chap10.indd 147 4/15/2011 12:00:14 PM


11
Animal Social Networks
Katherine Faust

Many species of animals are social and engage in The chapter is organized as follows. The first
associations and interactions with conspecifics. section presents stylized descriptions of social
These associations and interactions are compo- organization for several animal species. The
nents of a species’ social organization and, in turn, second section discusses prerequisites for animal
are prerequisites for the formation of social social networks including collectivities of indi-
networks among individuals of the species. This viduals, associations or interactions among them,
chapter outlines how features of an animal’s social and individual recognizability. The third section
network are circumscribed by its social organiza- describes basic parameters of social organization
tion (including typical group sizes, demographic that circumscribe social networks. The fourth
composition, patterns of dispersal, spatial section reviews historical background and more
proximity and subgrouping arrangements, charac- recent insights from empirical studies of animal
teristic types of social interaction, forms of social networks. The concluding section discusses
communication, and the social contexts in which areas for future investigation.
interactions take place). Since social organization
varies among animal species, it follows that
features of social networks also vary.
Tackling the topic of “animal social networks” STYLIZED DESCRIPTIONS OF SOCIAL
in a chapter is challenging in light of the range of ORGANIZATION
issues it subsumes and the fact that the number of
known animal species is more than one million The social network for a group of animals is con-
(Wilson, 1999: 136). However, the number of strained by the species’ social organization. As
social animals is considerably less than that, Clutton-Brock (1974) observes, “Most species
perhaps several tens of thousands, though exact possess characteristic modal patterns of social
numbers are elusive. Given the number of animal organization” (539) and these forms of social
species, rather than providing an exhaustive organization differ between species. Social organ-
account, this chapter relies on illustrative ization refers to the patterns of relationships
examples of different forms of social organization between individuals of a population, including
and highlights general features that affect social typical group sizes, demographic composition
network structure and variability. (age and sex distributions), patterns of spatial
The chapter focuses on social networks of association, extent of communication, typical
nonhuman animals. However, it refers to animal forms of social interaction, and fluidity of group
social networks rather than specifying nonhuman boundaries (Wilson, 1975; Whitehead, 2008).
animal social networks, with the implicit These aspects of social organization impact how
understanding that Homo sapiens is included as individuals relate to one another and thus con-
matter of course. Indeed, ideas that are useful for strain features of their social networks. In this
understanding animal social networks in general context, constrain means that possible social
are also relevant for understanding human social network configurations are limited by aspects of
networks more particularly. social organization.

5605-Scott-Chap11.indd 148 4/7/2011 4:50:11 PM


ANIMAL SOCIAL NETWORKS 149

As a point of departure for understanding bonds might endure for many years. Florida scrub
animal social networks it is useful to consider jays (Aphelocoma coerulescens) provide an
stylized descriptions for several species, or taxa. example. Florida scrub jays are a territorial
This overview is intended to highlight both species that practices cooperative breeding. A
variability between species and suggest common mated pair raises young and their older male off-
features that operate as structural parameters spring might help defend territory and provide
affecting social networks regardless of species. food for younger siblings. Groups average three
individuals but can be as large as eight (Goodwin,
1986; Schoech, 1998). Parents distinguish calls of
Social insects (eusociality): Ants their own offspring from other young (Barg and
Social insects — isoptera (termites) and some Mumme, 1994). Generally, females disperse
species of hymenoptera (ants, some bees, and farther from their natal location than do males.
wasps) — represent one “pinnacle” of animal Males are more likely than females to remain in or
social organization (Wilson, 1975; Grier, 1984). near their natal area, and males might inherit
These eusocial (truly social) species provide stark vacated parental territory or move into adjacent
examples of extremes of social living; individuals areas (Schoech, 1998; Woolfenden and
only exist collectively. As a taxa, the ant family Fitzpatrick, 1978, 1984). This form of social
Formicidae illustrates eusociality. In ant colonies, organization, referred to as “group breeding,”
castes perform different roles: queen(s) (reproduc- (Woolfenden, 1975; Woolfenden and Fitzpatrick,
tive female/s), workers (nonreproductive females), 1978) or “cooperative breeding” (Schoech, 1998),
and drones (males). Only queens reproduce, while is found in a number of bird species (Stacey and
a caste of sterile workers provisions the nest, tends Koenig, 1990).
pupae and larvae, and provides defense. Behaviors Social network implications of this form of
might be differentiated within castes, for example, social organization include long-term social
by age (Fresneau and Dupuy, 1988; Sendova- bonds between mated pairs, sex-biased dispersal,
Franks et al., 2010). Ants communicate using continued social relations between parents and
pheromones (chemical signals) to coordinate (male) offspring, helping relations between
activities such as foraging, signaling danger, or siblings, and recognition of individuals.
tending larvae (Wilson, 1975: 414). Ant species
differ in longevity of the queen and means for her
replacement, formation of new colonies, group
Shoaling: Guppies
size, and intergroup relations, among other Many fish species form schools or congregate in
characteristics (Hölldobler and Wilson, 1994). shoals. Guppies (Poecilia reticulata) are illustra-
For ants, a social network probably is most tive. Croft et al. (2004) describe the shoaling
appropriately expressed as relations between and network of a guppy population in the Arima River
within castes rather than between individuals. in Trinidad: “shoals are usually small (2–20
Indeed, ants are unlikely to recognize particular fishes) and encounter each other approximately
individuals (Wilson, 1975: 379). With respect to every 14 [seconds]. They also disperse overnight,
social networks, important features of eusociality resulting in the breakdown of shoal composition
include coresidence of multiple generations, social and a reassembly every morning” (S516). Despite
roles of castes and their relationships, and forms the daily breakdown of shoals, females have
of communication. preferred associates who are found together more
Eusociality is found mostly in social insects often than expected (Croft et al., 2004; Griffiths
and is extremely rare in other species. One and Magurran, 1997, 1998; Morrell et al., 2008)
mammal species provides a provocative excep- and female associates cooperate in the hazardous
tion: parallels to eusociality are seen in the naked activity of inspecting potential predators (Croft
mole rat, a subterranean rodent from Kenya, et al., 2006). Males are more likely than females
Ethiopia, and Somalia (Jarvis, 1981). A naked to move between shoals.
mole rat population consists of a single reproduc- Important features of guppy social organization
tive female along with her immature and adult include the ability to recognize individuals and
male and female offspring. Adults cooperatively associate differentially, assortativity by sex (for
tend the colony and raise young. females), and sex differences in the spatial extent
of movement.
Cooperative breeding: Florida
scrub jays Solitary mammals: Black bears
In many bird species the strongest adult social Species that are generally solitary occupy one end
relationships occur in mated pairs, and these of a continuum of sociality. In solitary animals,

5605-Scott-Chap11.indd 149 4/7/2011 4:50:11 PM


150 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

individuals spend a considerable portion of time multiple alliances occasionally join together in
on their own. Examples of relatively solitary super-alliances to monopolize females or to attack
species include bobcats (Bailey, 1974), black other alliances (Connor et al., 1992, 1999). In
bears (Rogers, 1987), raccoons (Barash, 1974), contrast, the social organization of females is
red foxes (Barash, 1974), some species of bees “better described as a network rather than discrete
and wasps, and many other species. Some solitary subgroups” (Smolker et al., 1992: 1). Dolphins
species recognize neighbors and respond in differ- communicate by whistles that are individually
ent ways to familiar individuals than to strangers. distinctive and recognizable to others over long
Sociality can also depend on resource availability distances (Sayigh et al., 1998; Janik et al., 2006).
or point in the life cycle (Barash, 1974) or vary Important features of dolphin social networks
seasonally. Thus, solitariness is a matter of the include fluid social organization of a large popula-
degree of gregariousness and does not imply that tion in which associations are generally in smaller
individuals are socially isolated. subsets, individually recognizable communication
Black bears (Ursus americanus) illustrate a signals, assortativity by sex, long-lasting associa-
solitary mammal species. As Rogers (1987) tions or alliances between males, and networks
reports for a black bear population in northern rather than subgrouping relations between
Minnesota, females inhabit home ranges and females.
males occupy larger areas that overlap multiple
females’ ranges. Juveniles leave their natal loca-
tion and disperse as yearlings, with males moving Matrilines: African savannah
farther away than females. Independent adult elephants
females can inhabit areas near their natal range,
and a female black bear might cede some territory A number of mammal species are organized
to her daughter(s). Females recognize their adult around sets of related females, called matrilines.
offspring (Larivière, 2001). Black bear females Matrilines consist of an adult female with her
defend territories (Rogers, 1987: 14). Black bears juvenile offspring and grown female offspring, or
encounter each other at concentrated food multiple females with their offspring, along with
locations such as garbage dumps or seasonal food one or more adult males. Females form the core of
sources where they might form dominance matrilineal societies.
relations (Rogers, 1987). The social organization of African savannah
From the perspective of social networks, elephants (Loxodonta africana) provides an
important features of black bear social organiza- example. As described by Archie et al. (2006),
tion include relatively solitary individuals, sex “For female elephants, ‘families’ represent one of
differences in dispersal and territoriality, maternal the most predictable levels of social association.
kinship as a basis for spatial location of females, Families are composed of around 2–20 adult
female recognition of adult offspring, and females and their immature offspring. . . . [M]ost
dominance relations. social interactions, both competitive and affilia-
tive, occur within family groups, indicating that
most of the relevant forces shaping female rela-
Social marine mammals: Bottlenose tionships occur there” (p. 120). Since females
dolphins remain in their natal area whereas males disperse,
families contain maternal kin (Archie et al., 2006;
Cetaceans (dolphins, whales, and porpoises) are Moss and Poole, 1983). Maternal kin form “female
social marine mammals. As an illustrative species, bonded kin groups,” which might join together in
consider bottlenose dolphins (Tursiops truncates), larger “bond groups” of multiple families (Payne,
which are found in temperate oceans around the 2003). Elephant social organization consists of a
world. The social organization of bottlenose dol- large population of individuals who often
phins has been well studied in several populations associate in smaller subsets, organized in “tiers”
(Smolker et al., 1992; Lusseau, 2003, 2007; (Wittemyer et al., 2005). Genetically related
Lusseau and Newman, 2004; Diaz-Lopez et al., females tend to remain together when the
2008; Sayigh et al., 1998; Wells, 2003). Bottlenose population fissions (Archie et al., 2006). Males
dolphins live in pods of several dozen individuals disperse from their natal area and have a very
but generally are found in smaller collections different form of organization from females.
(Lusseau, 2003; Smolker et al., 1992). Females Males are generally single, found in small unsta-
associate with their offspring and other females ble groups called “bull groups” (Payne, 2003: 70),
(Smolker et al., 1992; Wells, 2003), whereas males or with females, depending on age and reproduc-
tend to associate with other males. Males can form tive state (Moss and Poole, 1983). Among adult
long-lasting associations or alliances with other male elephants, there is “little evidence of social
males (Wells, 2003; Smolker et al., 1992), and structure above the level of one-on-one contests”

5605-Scott-Chap11.indd 150 4/7/2011 4:50:11 PM


ANIMAL SOCIAL NETWORKS 151

(Payne, 2003: 73). Seasonal changes in resource relationships within and between sexes, coordi-
availability affect interactions between family nated activities among males, relatively weak ties
units and larger aggregations (McComb et al., between females, and a large population of indi-
2001). Elephants communicate over long dis- viduals organized around smaller social units.
tances and recognize other individuals (McComb Male-centered reproductive units are also found
et al., 2000, 2001), leading to “mutual recognition in the closely related species, geladas (Kummer,
in a large social network” (Payne, 2003: 66). 1968; Dunbar, 1983). However, despite the super-
Elephants are long-lived, and older females are ficial similarity, gelada females generally are
important to the group due to their extensive related to each other, interact frequently with one
knowledge of natural resources and social rela- another, and might join or leave a male together.
tionships (McComb et al., 2001; Payne, 2003). Thus the social networks of hamadryas baboons
Social network implications of this form of and geladas differ in important ways.
social organization include individual recogniza-
bility, long-distance communication, enduring
bonds between related females, sex differences in
social organization, fluid organization of a larger Implications for Social Networks
population in a multitiered structure, assortativity
As these descriptions illustrate, there are many
by age and sex, dominance relations, and impor-
different forms of animal social organization.
tance of older females due to social experience
Variability occurs along multiple dimensions
and knowledge.
(group size, demographic composition, dispersal,
Many other mammal species have a matrilineal
and pattern and strength of ties among individu-
social organization: spotted hyenas (Engh et al.,
als) with consequences for social network
2005), lions (Pusey and Packer, 1987), and most
structure. Figure 11.1 shows idealized social
cercopithecine primates (e.g., macaques [Thierry
networks for some forms of social organization.
et al., 2004; Cheverud et al., 1988] and savanna
Although these stylized descriptions gloss over
baboons [Cheney and Seyfarth, 2007]).
many details, they suggest structural parameters
underlying differences in ways that individuals
interact and therefore lead us to expect differences
in social networks.
Male-centered social units:
Hamadryas baboons
In contrast to species organized around matrilines,
in some species males form the social core. In PREREQUISITES FOR ANIMAL
this form of social organization, males are accom- SOCIAL NETWORKS
panied by multiple females, who might or might
not be related to each other, depending on the
Several conditions are required for animals to
species.
form a social network. These include collectivities
In hamadryas baboons (Papio hamadryas
of individuals of the same species along with
hamadryas) the basic social unit is the one-male
associations or interactions among them. In addi-
group, consisting of an adult male, one or more
tion, a social network representation will likely be
adult females, and their offspring (Kummer, 1968;
most useful when individuals recognize specific
Dunbar, 1983; Swedell, 2002). Multiple one-male
others and differentially direct their associations
groups are found in association to form troops of
and interactions accordingly.
many dozen individuals, within which males have
relatively frequent interactions with each other
and coordinate daily movements (Kummer, 1968;
Swedell, 2002; Dunbar, 1983). Relationships Collectivities
among adult females can be quite limited (Dunbar,
1983). In hamadryas baboons, both males and Sociality is an obvious prerequisite for an animal
females disperse from their natal units and females species to form a social network. This implies that
transfer to different populations (Kummer, 1968; members of the species spend time together and
Greenwood, 1980). In some populations, individ- relate to conspecifics in ways that are usefully
uals congregate in large aggregations during the conceptualized as a social network. This require-
night and forage in smaller subsets during the day ment is not as trivial as it first appears. A species
(Kummer, 1968). might or might not be social; indeed, apart from
With respect to social networks, important mating and infant care, many animals are solitary
aspects of this form of social organization for a substantial portion of their lives (Poole,
include different patterns and strengths of social 1985). However, the distinction between social

5605-Scott-Chap11.indd 151 4/7/2011 4:50:11 PM


152 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Male centered reproductive unit Matrilineal social organization

Mated pair with offspring Assortativity by sex

Figure 11.1 Stylized animal social networks. ♀: Female; ♂: Male. Solid lines indicate close
social bonds; dashed lines show reproductive pairs. Dotted hulls surround subsets

and solitary is best viewed as a continuum: in spe- “gathered in the same place but not internally
cies that are generally solitary, individuals have organized or engaged in cooperative behavior”
social contact with others, and in species that are (Wilson, 1975: 8). Members of an aggregation
usually social, individuals might spend consider- might be gathered at a seasonal food source but
able time alone, especially at particular points in would not otherwise be found together. In con-
the life cycle (Barash, 1974). trast, individuals who tend to associate with one
The nature of social groupings varies across another rather than with outsiders over an extended
species, from populations with relatively fixed period of time constitute a population or group
membership (langurs or meerkats) to more fluid (terms vary across disciplines) (Wilson, 1975;
arrangements (elephants, dolphins, or chimpan- Whitehead, 2008).
zees). As a consequence, exactly how collectivi- Understanding a species’ grouping patterns
ties of individuals are identified can be problematic presents a challenge in studying animal social
(Wey et al., 2008; Wolf et al., 2007; Whitehead, organization. In some cases, groupings can be
1997). This is especially true for species with determined by observing space use (Cross et al.,
flexible forms of social organization, multiple 2005), patterns of association among subsets
levels of organization in which smaller subsets (Cairns and Schweger, 1987), or differences in
aggregate into larger populations, or patterns of social interactions within versus between groups
sociality that vary by age or sex. (e.g., Hrdy, 1977; Herbinger et al., 2009).
From the perspective of animal social net-
works, it is useful to distinguish collections of
individuals that are in close physical proximity but Associations and interactions
not interacting, communicating, or coordinating
their activities, from collections of individuals Relations between or among individuals are
who associate for longer periods of time, another social network prerequisite, and animals
communicate with one another, and coordinate relate to one another in a variety of ways. Close
their actions. The first type of collectivity is physical proximity, facial expressions, body
an aggregate (Krause and Ruxton, 2002) or aggre- postures, gestures, dominance displays, physical
gation (Whitehead, 2008; Wilson, 1975). An contact (grooming, hitting), and vocalizations are
aggregation is a collection of individuals all types of social behavior. Two general forms of

5605-Scott-Chap11.indd 152 4/7/2011 4:50:11 PM


ANIMAL SOCIAL NETWORKS 153

animal sociality are widely used in studying also found in chimpanzees, hamadryas baboons
animal social networks (Croft et al., 2008; Wey (Kummer, 1968), kangaroos (Carter et al., 2009),
et al., 2008; Whitehead, 2008). First, association bats (Kerth and König, 1999), dolphins (Smolker
is a form of sociality among subsets of individuals et al., 1992), and many other species. Fission-
indicated by spatial proximity. Associations are fusion social organization exhibits multiple
useful for detecting subgrouping patterns within a dimensions of association: variation in social
population. Second, interactions are dyadic social cohesion, subgroup sizes, and subgroup composi-
behaviors, generally directed from one individual tion (Aureli et al., 2008).
to another, which can take on stereotypic forms With respect to social networks, patterns of
for a particular species. Interactions are useful for associations indicate whether there are pairs of
studying social differentiation or dominance individuals who tend to associate at rates higher
orderings among individuals. (or lower) than expected by chance, subsets who
associate with each other forming cohesive group-
ings or “communities,” or differential assortativity
Associations by demographic characteristics (e.g., age/sex
Association is a form of affiliative relationship classes) (Whitehead, 1999, 2008; Sailer and
among subsets of individuals (Smolker et al., Gaulin, 1984; Bejder et al., 1998).
1992; Whitehead, 2008). Associations within
a population are not homogeneous since some
subsets of individuals tend to differentially Interactions
associate with one another; they spend considera- Social interactions are dyadic who-to-whom
ble time together in close proximity. behaviors that are generally directed from one
Spatial proximity is a basic indicator of differ- individual to another. Examples include both
ential association and is used to identify subgroup affiliative acts (grooming, contact) and agonistic
membership and dyadic patterns of association behaviors (dominance displays, threats, physical
(Smolker et al., 1992; Whitehead, 2008; Slooten contests). Patterns of social interactions in a group
et al., 1993; Sailer and Gaulin, 1984; Cross et al., can reveal prominent individuals, asymmetries in
2005). Obviously, the distance indicating spatial dyadic arrangements, or overall network structure
proximity differs between species: “close” for a (such as dominance hierarchies).
32-meter-long blue whale is different from “close” Social interactions of a species can be more or
for a few-millimeters-long ant. The operative less stereotyped, in that characteristic forms of
distance for association depends on distances over behavior are enacted under specific circumstances.
which individuals can communicate and coordi- Along with nonsocial acts, these constitute the
nate their actions. In practice, associations are “behavioral repertoire” of a species (Grier, 1984:
determined by examining typical spatial arrange- 69). A behavioral repertoire is described in
ments. Often the distribution of distances between an ethogram, which includes all behaviors of a
individuals shows discontinuities indicating a species: for example, feeding, movement, and
distance beyond which individuals are not likely intraspecific interactions (Grier, 1984; Banks,
to be associating (Cross et al., 2005; Slooten 1982). Of most relevance for animal social
et al., 1993). For example, Wolf et al. (2007) used networks are the intraspecific social behaviors:
spatial proximity to study subgrouping patterns of the ways in which individuals interact with
the Galápagos sea lion. “Operationally, we defined conspecifics. The following excerpt describes
a group using a chain rule . . . such that animals some dyadic agonistic behaviors of the emperor
within one body length (between 1 and 2 m) of tamarin monkey and shows the level of detail in
each other shared the same group” (Wolf et al., a typical ethogram (Knox and Sade, 1991: 447,
2007: 1294–95). Table II).
Associations are especially salient in fission-
fusion societies (Kerth and König, 1999; Kummer, ”Lunge . . . The tamarin’s head and shoulders are
1968, 1971; Aureli et al., 2008). In a fission- rapidly thrust toward another animal. The mouth
fusion society members of a larger population may be partially opened. The vertebral column is
usually associate in smaller subsets, which travel somewhat arched.”
and interact relatively independently of others “Grab Face . . . The hand is extended toward the
for some time before rejoining the larger group. face of another tamarin and the claws are used
The composition of subsets during fission to grab the pelage, which is then immediately
events indicates stronger associations between released.”
individuals. For example, among African “Bat . . . A tamarin swiftly cuffs another tamarin,
savannah elephants genetically related females usually on the face.”
tend to remain together during fusion events “Head Shake . . . The head is rapidly turned from side
(Archie et al., 2006). Fission-fusion societies are to side while staring at the target tamarin.”

5605-Scott-Chap11.indd 153 4/7/2011 4:50:11 PM


154 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Ethograms enable systematic observation and That animals recognize particular individuals
recording of social interactions between members and react in different ways to them is important
of a population and thus provide relational data to for understanding animal social networks. As
construct a social network. Heinrich observes from his research on recruit-
Associations and interactions are prerequisite ment and social dynamics in ravens, “Almost
building blocks for social networks since they nothing of the ravens’ observed social behavior
indicate relations between or among members of makes sense without the capacity of individual
a population. However, differential associations recognition among their own kind” (2000: A13).
or interactions are required for patterned social Recognition and differential reaction to others
networks. indicate substantial cognitive capacities as social
actors. In addition, animals of some species
know about social relationships between other
Individual recognition individuals, a point discussed in more detail
below. These capacities lead to interdependencies
Arrangement of an animal population into a in social relationships and thus affect social
patterned social network presumes that associa- network properties.
tions and interactions among individuals are not Collectivities, associations (or interactions),
random; some pairs or subsets have a greater or and the capacity for individual recognition are
lesser than expected tendency to interact in prerequisites for forming social networks. Beyond
particular ways. Nonrandom associations or inter- these basics, several social structural parameters
actions indicate that individuals differentially limit social network configurations that can
relate to others and suggest that they can occur.
distinguish individuals and act accordingly.
Multiple lines of evidence show that, in many
species, individuals emit distinctive signals that
are recognizable to others, can distinguish PARAMETERS OF SOCIAL
familiar individuals from strangers, and know ORGANIZATION
about specific individuals and react in different
ways to them. Evidence for these capabilities is Several features of animal social organization
widespread. provide structural parameters that limit possible
Many species have distinctive characteristics or social networks in which an animal species can
signals: for example, vocalizations or scents that engage. These features vary among species and
are individually recognizable. Bird songs differ therefore lead us to expect differences in social
among individuals of the same species and can be networks between species. Topics discussed in
distinguished by others (Weeden and Falls, 1959). this section parallel Wilson’s “qualities of social-
Bottlenose dolphins have “distinctive signature ity” (Wilson, 1975; also Whitehead, 2008).
whistles” (Sayigh et al., 1998). Spotted hyenas
make individual “whoops” that are recognized by
members of their clan (East and Hofer, 1991) and Group size
have distinctive anal gland scents (Burgener et al.,
2009). Calls of vervet monkeys, including In all networks, the number of individuals is a
juveniles, are distinctive and recognizable (Cheney structural parameter that constrains other network
and Seyfarth, 1990). Signals and recognition can properties (Mayhew and Levinger, 1976).
involve multiple modalities. For example, horses Therefore, typical group sizes restrict many
recognize individuals both visually and by the features of a species’ social network (Lehmann
sounds of their whinnies (Proops et al., 2009). et al., 2007). Indeed, Pollard and Blumstein
Recognizable differences between individuals observe “group size is a core trait defining social
result in differentiated patterns of interactions and systems, social complexity and social structure”
associations. Guppies recognize and prefer to (2008: 1683). The size of a group generally refers
school with familiar individuals (Griffiths and to the typical population size or “the size of the
Magurran, 1997). Cichlid fish react differently to largest stable exclusive group” (1686). Group size
a mate than to a neighbor or strange fish (Balshine- is quite variable (Dunbar, 2003). In a survey of
Earn and Lotem, 1998). Mantis shrimp respond several dozen animal species, Reiczigel et al.
differently to individuals who have bested them in (2008: 716) report median observed group sizes
agonistic encounters, avoiding water that has been ranging from 1 (feeding Adelie penguins; bush-
occupied by the winning shrimp (Caldwell, 1979). bucks) to 300 (American white pelicans). For 50
Red foxes and raccoons resolve dominance dis- species of diurnal primates, Pollard and Blumstein
putes with neighbors more quickly than with (2008: 1693–94) report group sizes ranging from
strangers (Barash, 1974). around 4 (agile gibbons) to over 100 (geladas).

5605-Scott-Chap11.indd 154 4/7/2011 4:50:11 PM


ANIMAL SOCIAL NETWORKS 155

Most basically, group size determines the dispersal, the departure of individuals from their
potential number of contacts that an individual natal group, affects animal social networks
can have. Individuals in large groups obviously through the capability to maintain associations
have more opportunities to interact with conspe- and interactions.
cifics than do individuals in small groups. In In most animal species some individuals leave
addition, regardless of whether or not interactions their natal group around the time of sexual
take place, group size determines the number of maturity or for breeding (Shields, 1987). A conse-
others an individual is exposed to. Group size quence of nondispersal is philopatry, the tendency
also governs the number of pairs, triples, and sub- for individuals to remain at or near their natal
sets that can be formed from a population, and location (Greenwood, 1980; Shields, 1987; Wasser
thus limits subgrouping arrangements. There are and Jones, 1983). From the perspective of
more possibilities for fissioning into subsets in social networks, remaining individuals have the
large groups than in small groups. Therefore, the opportunity to retain social relationships with
social combinations in which individuals of a members of their population, including relation-
species can engage depend on the species’ typical ships with remaining kin.
group sizes. Dispersal is related to the permeability of group
boundaries and networks since “increased perme-
ability is . . . associated with a reduction in the
stability of such interpersonal relationships . . . as
Demographic composition dominance hierarchies, coalitions, and kin groups”
The demographic composition of a population (Wilson, 1975: 17). Thus, dispersal, especially
refers to the age and sex distribution of its sex-biased dispersal, has important consequences
members. This composition is affected by a spe- for social networks, because it fundamentally
cies’ social organization: for example, whether alters social relationships. Dispersal affects the
there are monogamous mated pairs, an adult male social network of the dispersing individual (by
accompanied by multiple adult females and severing or greatly reducing the frequency of
immature offspring, or matrilines of related interactions with members of its former group)
females. Social behaviors generally differ by the and dispersing individuals can become socially
age and sex of individuals involved, including isolated for a period of time (Wilson, 1975;
dependence of infants, differences between Colvin, 1983). Dispersal also can be accompanied
sexually mature and immature individuals, by striking differences in relative social positions.
age-related participation in dominance hierar- Spotted hyenas provide an example. A “hyaena
chies, and sex differences in forms of interaction. clan can be appropriately described as consisting
Thus, demographic characteristics are related to of two classes of animals, a relatively high-
the social “roles” of individuals (Blumstein and ranking natal class, and a relatively low ranking
Armitage, 1997, 1998). immigrant class” (Smale et al., 1993: 476).
The age and sex distribution of members of a However, social isolation of dispersing individu-
group also affect combinations for associations als need not be permanent. In long-lived species
and interactions and thus relational possibilities where dispersal happens only once (e.g., chim-
in a social network. Availability of partners panzees) close bonds can develop between previ-
for affiliative relationships or coalitions depends ously unfamiliar (and unrelated) individuals
on population composition. For example, (Lehmann and Boesch, 2009).
availability of kin as social partners or allies Occasionally, both sexes disperse, but often
depends on kin group sizes (Silk et al., 2006; there is a sex bias such that one sex is more likely
Cheney and Seyfarth, 1990). In addition, because than the other to leave (Packer, 1979; Pusey and
individuals of many species tend to associate Packer, 1987; Greenwood, 1980; Shields, 1987).
with others who are similar in age or sex, the Sex-biased dispersal has important consequences
demographic composition of a population affects for social organization and networks. For
possibilities for assortativity by demographic example, in species where males transfer and
characteristics. females remain with their natal group, maternally
related kin can form the core of a matrilineal
social organization.
Dispersal Dispersal from a natal group might involve
transfer to a different group, and there is evidence
Social networks depend on interactions between that movement between groups is not random
individuals, which in turn require spatial and (Cheney and Seyfarth, 1983, 1990). Individuals
temporal proximity, therefore factors that affect might disperse together (Pusey and Packer, 1987)
group membership, movement, and spatial loca- or join some groups in preference to others
tions also affect social networks. In particular, (Cheney and Seyfarth, 1983).

5605-Scott-Chap11.indd 155 4/7/2011 4:50:11 PM


156 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Communication INSIGHTS FROM EMPIRICAL STUDIES


Communication is a social behavior conveying OF ANIMAL SOCIAL NETWORKS
information from one individual to others
within range of the signal (McGregor, 2005). This section briefly reviews historical foundations
Animals have many means of communication, and discusses recent contributions from empirical
including chemical and olfactory signals research on animal social networks.
(pheromones, scent markings), vocalizations,
gestures, facial expressions, and postures. The
“amount and pattern” of communication is
related to the connectedness of a species’ social
Historical background and
network (Wilson, 1975: 16). Communication recent contributions
serves many social functions: affiliative Studies of animal social organization and social
gestures of support, indications of status order- networks have a long and fruitful history, dating at
ings, expressions of location and territory, least to the early twentieth century. The Norwegian
recruiting allies, or coordinating movement, for zoologist Schjelderup-Ebbe is widely acknowl-
example. edged as one of the first people to systematically
As noted above, many animal vocalizations and observe and record patterns of social interactions
signals are individually recognizable, so commu- between individually identified animals, in this
nications are not anonymous. In addition, although case dozens of bird species (Schjelderup-Ebbe,
communication can be directed from one individ- 1922, 1935; Allee, 1938; Price, 1995). His
ual to another, many signals occur in a social particular interest concerned the observation that
context and can be received by all individuals pairs of birds often exhibit persistent asymmetry
within range of the signal (McGregor, 2005). in outcomes such that one generally directs pecks
Thus, communications are observable by bystand- at the other more than the reverse. These dyadic
ers or eavesdroppers who might adapt their own asymmetries are components of pairwise
behaviors accordingly. dominance relationships. For a flock of birds,
pairwise dominance might or might not align
into a consistent linear hierarchy (Noble et al.,
Social context 1938; Allee, 1938; Schjelderup-Ebbe, 1935).
This line of research reputedly gave rise to the
Sociality implies that associations and interac- phrase “pecking order” (Perrin, 1955). It also
tions frequently take place within a social context spawned numerous studies of social relations in
and therefore are observable by others. Individuals birds, many of which recorded dominance
not only witness what others do but can intervene relations using sociograms or sociomatrices
and participate. Passive observation includes being (Masure and Allee, 1934; Noble et al., 1938;
a bystander to social interactions or eavesdrop- Marler, 1955).
ping on encounters between others (Chase et al., Around the same time in the social sciences,
2002, 2003; McGregor, 2005; Lindquist and animal social behavior was often included among
Chase, 2009; Dugatkin, 2001). Bystanders are topics in standard social psychology texts.
privy to information about the outcomes of others’ (Murchison’s 1935 Handbook of Social Psychology
interactions and might adjust their own behavior had seven chapters on nonhuman social systems
in response. In addition, participants themselves including Schjelderup-Ebbe’s “Social behavior of
can be influenced by the presence of others, which birds,” and Lindzey’s 1954 Handbook of Social
inhibits or encourages their own interactions. Psychology included Hebb and Thompson’s
Social context thus provides conditions for social chapter “The social significance of animal
network interdependencies beyond individuals studies.”) In 1945, an issue of Sociometry was
and dyads. devoted to animal social organization. In that
In summary, a number of general features volume, Jacob Moreno suggested that “human
are important components of a species’ social and nonhuman social structures formed by actual
organization, social relations, and thus social individuals have a characteristic type of organiza-
networks. Some of these parameters, such as tion which differs significantly from structures
group size, demographic composition, patterns which are formed by ‘chance’ or by imaginary
of dispersal, extent of communication, and individuals. . . . There must be a factor, ‘tele,’
social context, limit possible social network operating between individuals . . . which
arrangements that can occur. Therefore, animal draws them to form more positive or negative
social networks should be expected to vary relations. . . . A parallel process should be demon-
in predictable ways with variation in these strable for non-human groups as well” (1945: 75).
parameters. In the same volume, the primatologist C. Ray

5605-Scott-Chap11.indd 156 4/7/2011 4:50:11 PM


ANIMAL SOCIAL NETWORKS 157

Carpenter (1945: 57) argued that “to map the Dominance


pattern or form of a group” required identifying
individuals and systematically recording associa- Pairwise asymmetry, in which a behavior is
tions and interactions between all animals in the generally directed from one individual to another,
group, advice that has informed studies of animal is widely observed in animal social interactions.
social networks ever since. Consistency in the direction of agonistic asym-
In the field of social networks, largely in the metry can indicate a pairwise dominance relation-
social and behavioral sciences, many people have ship. Dominance refers to “an attribute of the
used social networks to study animal social organ- pattern of repeated, agonistic interactions between
ization and contributed to methodology (Sailer two individuals, characterized by a consistent
and Gaulin, 1984; Dow and de Waal, 1989; outcome in favor of the same dyad member and a
Freeman et al., 1992; Jameson et al., 1999; default yielding response of its opponent rather
Roberts, 1990), theory (Chase, 1974, 1980; Chase than escalation” (Drews, 1993: 308). Dominance
et al., 2002; Cheverud et al., 1988), and substance has been a prominent concern in animal social
(Sade, 1972, 1989; Sade et al., 1988; Chepko- networks for decades (Schjelderup-Ebbe, 1922;
Sade et al., 1989; Maryanski, 1987; Maryanski Chase, 1974, 1980; de Vries, 1995, 1998).
and Ishii-Kuntz, 1991). In 1988–89, the journals Several features of dominance are relevant for
Social Networks and The American Journal of social networks. First, dominance relations can
Physical Anthropology published special issues on be summarized at multiple levels: pairwise
animal social networks. directionality; individual position in a dominance
Behavioral biology, ethology, primatology, ordering; or the extent to which a group adheres to
and related disciplines are concerned with a linear order or other ideal form (e.g., a partial
animal social relations, but explicit use of social order). Pairwise dominance is indicated by many
network concepts has been more limited. Only forms of social interaction, including threats,
recently has the approach come to the forefront. attacks, displays, victories in contests, or gestures
However, many researchers in these fields of deferral, which vary across species. The
view patterns of interactions between individuals position of an individual in a dominance ordering
as critical for understanding animal social for a group depends on the others it dominates and
organization (e.g., Allee, 1938; Imanishi, 1960; their own positions (Clutton-Brock et al., 1979).
Hrdy, 1977; Goodall, 1971, 1986; Seyfarth, For a group, pairwise dominance might or
1977; Fossey, 1983; Cheney and Seyfarth, 1990, might not be consistently ordered; cycles, incon-
2007; de Waal, 1982; Heinrich, 2000; Wilson, sistencies, and unresolved pairwise orderings
1975). occur (Lahti et al., 1994). The dominance pattern
Social network studies of animal social organi- for a group can be summarized quantitatively by
zation have increased dramatically in recent years, its departure from linearity (de Vries, 1998)
as seen in a number of books and review articles or descriptively, for example, whether it is
on the topic (Whitehead, 2008; Croft et al., 2008; “despotic” or “egalitarian” (Flack and de Waal,
Wey et al., 2008; Krause et al., 2007, 2009; 2004).
Coleing, 2009; Sih et al., 2009). Empirical studies Second, once established, the dominance
of animal social networks have also increased, ordering in a group can remain stable for substan-
with studies of a variety of species: bottlenose tial periods of time, especially in populations with
dolphins (Lusseau, 2003), African elephants relatively consistent membership. Stability tends
(Wittemyer et al., 2005), guppies (Croft et al., to be associated with philopatry; dominance
2004), Grevy’s zebras and onagers (Sundrasen relations are more stable among nondispersing
et al., 2007), cowbirds (Miller et al., 2008), rhesus individuals. For example, stable dominance
macaques (McCowan et al., 2008), pigtailed hierarchies among females tend to be found in
macaques (Flack et al., 2006), ground squirrels species with male dispersal and female philopatry,
(Manno, 2008), giraffes (Shorrocks and Croft, such as macaques or savannah baboons (Chapais,
2009), yellow-bellied marmots (Wey and 2004; Cheney and Seyfarth, 2007).
Blumstein, 2009), bats (Rhodes et al., 2006), Third, dominance relations are often contingent
Galápagos sea lions (Wolf et al., 2007; Wolf and on the social context, presence of observers, or
Trillmich, 2008), Asian elephants (Coleing, 2009), actions of others who intervene or take sides in an
African buffalos (Cross et al., 2005), Tasmanian encounter. Individual capacities or winner/loser
devils (Hamede et al., 2009), and kangaroos effects are not sufficient to account for near-linear
(Carter et al., 2009), for example. hierarchies (Lindquist and Chase, 2009).
Empirical studies provide insights into aspects Moreover, pairwise dominance orderings formed
of animal social networks that appear to hold in isolation from others are unlikely to combine
across many species. Some of these insights are into linear or near-linear hierarchies (Chase et al.,
summarized in the following sections. 2002). Dependencies among triples, which arise

5605-Scott-Chap11.indd 157 4/7/2011 4:50:12 PM


158 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

through bystander effects, transitive inference, or individuals (Cheney et al., 1986; Bejder et al.,
systematic interventions, are necessary for near- 1998; Croft et al., 2005; Cross et al., 2005;
linearity (Chase, 1974; Lindquist and Chase, Sundrasen et al., 2007; Whitehead, 1999; Lehmann
2009; Skvoretz et al., 1996; Dugatkin, 2001). and Boesch, 2009). Associations show preferred
Bystander effects occur when an observer adjusts dyadic partnerships (Silk, 2002) or cohesive
his or her own behavior in response to outcomes subsets (Croft et al., 2005; Whitehead, 2008). In
of encounters between other pairs, for instance, addition, associations are often patterned by demo-
attacking the loser rather than the winner from an graphic categories (age and sex classes) such that
earlier dyadic encounter. Social context and there is homophily (positive assortativity) along
interventions can reinforce existing hierarchies these traits (Conradt, 1998; Whitehead, 1997; Croft
and even lead to “inheritance” of dominance et al., 2005). Kinship is also a basis for association
positions across generations (Cheney, 1977; in many species, with higher rates of association
Horrocks and Hunte, 1983; Chapais, 1988; Engh between related individuals (Cheney et al., 1986;
et al., 2000; Engh and Holekamp, 2003). For Archie et al., 2006). Dispersal and philopatry affect
example, Chapais observes that among macaques close associations, with enduring associations more
a “female’s relative rank is determined by the likely among remaining individuals (Wasser and
patterning of interventions by third parties in her Jones, 1983). Sex bias in dispersal results in sex
conflicts with other females” (2004: 186). difference in strength and pattern of relationships,
Interventions by high-ranking females reinforce an important feature of many animal social
the relative standing of individuals they support networks (Thierry et al., 2004).
(their female relatives), contributing to inheritance The flip side of preferred associations (strong
of dominance rank. ties) is social cleavage where ties are weak or
absent. For example, Cheney and Seyfarth (1990)
observe that in vervet monkeys (a matrilineally
organized species with male dispersal) close
Social roles and important bonds do not occur between adult males and adult
individuals females.
As the presence of dominance orderings suggests,
there is variability among individuals in their
social network positions and roles. In addition to Kinship and nepotism
position in a dominance hierarchy, individuals can Kinship is associated with many aspects of animal
be socially important due to accumulated knowl- social networks, including close associations
edge of resources or social relationships (African (Archie et al., 2006; Payne, 2003; Wolf and
elephant matriarchs [McComb et al., 2001]), Trillmich, 2008), individual recognition (Cheney
network positions that make them effective in and Seyfarth, 1990; Janik et al., 2006), affiliative
interventions during conflicts (policing in macaques acts such as grooming (Silk et al., 1999, 2002,
[Flack et al., 2006]), or bridging locations between 2006), interventions (Cheney and Seyfarth, 1986),
subgroups in a population (young female killer helping across generations (Woolfenden and
whales [Williams and Lusseau, 2006]). Fitzpatrick, 1978; Jarvis, 1981), alliances (Parsons
The importance of individuals is convincingly et al., 2003), inheritance of dominance rank
demonstrated by “knockout” experiments, in (Cheney and Seyfarth, 2007; Chapais, 1988;
which social consequences of removal of particu- Holekamp et al., 2007), and stability of social
lar individuals are studied. For example, Flack relationships (Silk et al., 2006). Close bonds and
et al. (2006) examined effects of removing high- preferential interactions based on kinship are
ranking males from captive groups of pigtailed referred to as nepotism and provide a primary
macaques and found that stable affiliative social “axis” of social organization (Silk, 2002).
relations in the group were diminished when these Genetic relatedness per se is not a necessary
individuals were not present. Network disruption condition for some kinship effects. “Adopted”
also results from the natural loss of high-ranking spotted hyenas attain dominance ranks of their
individuals (Barrett et al., 2009). adoptive rather than their biological mothers (East
et al., 2009) and strong bonds can develop among
nonkin in long-lived species such as chimpanzees
(Lehmann and Boesch, 2009).
Preferred associations and
assortativity
Multiple relations
Animal sociality is not homogeneous and is
characterized by greater than chance levels of Individuals of a population interact in many
association between some pairs or subsets of ways, giving rise to multiple social relations.

5605-Scott-Chap11.indd 158 4/7/2011 4:50:12 PM


ANIMAL SOCIAL NETWORKS 159

Multiplexity in these relations takes several forms, summaries without considering both internal
including reciprocity (Packer, 1977; Cheney social differentiation and linkages to external
and Seyfarth, 1990; Hemelrijk, 1990), exchange social contexts.
of different social acts (e.g., supporting prior
grooming partners or exchanging food for groom-
ing [Cheney and Seyfarth, 1986, 1990; Hemelrijk,
1990; de Waal, 1997; Schino, 2007]), association Third parties and higher-order
between kinship and affiliation (see above), network dependencies
or multiple behaviors indicating degrees of ago-
As noted in the section on social context, interac-
nistic severity (Knox and Sade, 1991). How and
tions often take place in the presence of other
why different social relations are associated
individuals. As a consequence, social acts and
remain important questions for theoretical under-
dyadic relations are seldom independent of what
standing of animal social organization and social
others do. Animals gain information about others
networks.
and act accordingly. Bystanders, eavesdropping,
In studies of animal social networks, the meth-
triadic configurations, interventions, alliances, coa-
odology for relational comparison uses matrix
litions, and redirected aggression are all features of
permutations and their extensions (Hemelrijk,
animal social organization. Because these effects
1990; Dow and de Waal, 1989; Knox and Sade,
entail linkages among multiple social actors, they
1991). One might anticipate that statistical models
lead to network dependencies beyond individuals
for multirelational social networks will be more
or dyads. These higher-order effects have been
widely used in the future.
well documented in animal social interactions.
Beyond recognizing particular individuals (see
above), many species of animals are aware of how
Complex networks and levels other members of their population are related to
of social organization each other: for example, their relative dominance
positions (Chase et al., 2002, 2003; Cheney and
Animal social organization is often described as
Seyfarth, 1990, 2007; Jennings et al., 2009;
“complex” (Blumstein and Armitage, 1997, 1998;
Holekamp et al., 2007) or whether they have close
Whitehead, 2008) or consisting of multiple levels
bonds, such as kinship relations (Cheney and
of organization (Hill et al., 2008; Wittemyer et al.,
Seyfarth, 2007; Holekamp et al., 2007). This
2005; Wolf et al., 2007; Croft et al., 2008; Zhou
enables social interactions such as bystander
et al., 2005). “Complex” in this context generally
effects in which a losing party is more likely to be
connotes differentiated social organization con-
the target of future attacks (Chase, 1974, 1980;
sisting of multiple forms of social behavior in
Clotfelter and Paolino, 2003); differential recruit-
which individuals assume different social roles
ment to coalitions (Silk et al., 2004; Harcourt and
(Blumstein and Armitage, 1997, 1998). As noted
de Waal, 1992); displacement of aggression toward
above, social roles differ across age and sex
relatives of one’s prior agonistic opponents (Engh
classes and affect patterns of social interactions
et al., 2005; Cheney and Seyfarth, 1983, 1988);
between individuals. The number of different
or targeted interventions in support of particular
social roles is one indicator of a species’ social
participants (Holekamp et al., 2007; Jennings
complexity (Blumstein and Armitage, 1997,
et al., 2009; van Dierendonck et al., 2009).
1998). Observations about layered or multilevel
These social interdependencies indicate
social organization credit the influential concep-
substantial actor capacities for perceiving social
tual framework of Hinde (1976), linking interac-
relations and altering behaviors in response (Byrne
tions, relationships, and social structure. In a
and Whitten, 1988; de Waal and Tyack, 2003;
multilevel society, social units are nested or aggre-
Seyfarth and Cheney, 2000; Lindquist and Chase,
gated from individuals, to pairs, small subsets, and
2009; Holekamp et al., 2007). From a social
larger populations. For example, male-centered
network perspective, this means that simple
reproductive units of hamadryas baboons (see
individual and dyadic summaries are unlikely to
above) combine into larger populations (Kummer,
provide sufficient accounts of animal social
1968), or fission-fusion societies (such as African
networks; higher-order effects are necessary.
elephants or bottlenose dolphins, described
earlier) are organized around large populations
of individuals who usually are found in much
smaller associations. Network instability and change
From the perspective of social networks,
researchers have found that complex social organ- Despite persistent forms of social organization,
ization suggests that animal social networks will animal social networks are not static. Networks
not be well characterized by simple group-level change membership and composition through

5605-Scott-Chap11.indd 159 4/7/2011 4:50:12 PM


160 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

natural demographic events (birth, death, matura- relatively rare. The hurdles are daunting but
tion), dispersal (immigration and emigration), and include at least being able to identify individuals,
other disruptions (seasonality, ecological shifts, catalog their characteristic forms of social behav-
disease outbreaks, anthropogenic effects). These ior, and systematically record their interactions
changes have substantial consequences for social and associations over time (hopefully, with
networks. A number of examples are informative. detailed information about individual characteris-
Turnover in membership (e.g., loss through tics and environmental factors). Despite the hur-
predation) leads to reconfiguration of social rela- dles, applications of social network approaches to
tionships as former partners are lost and popula- animal social organization are beginning to
tion sizes change (Carter et al., 2009). Dominance blossom in the biological sciences, and there are
positions in a group change through time and are many fruitful areas for further investigation.
dynamically associated with individual centrality Social animals provide excellent systems in
(Sade et al., 1988). Removal of structurally impor- which to investigate hypotheses about social
tant individuals (noted above) disrupts affiliative network processes. Controlled comparisons are
relationships (Flack et al., 2006). Imbalance in more feasible, and behavioral, biological, and
demographic distributions might result in group social data often are more accessible, than for
fission (Fedigan and Asquith, 1991), which, along human social systems. Automated social network
with unresolved dominance relationships, can data collection using sensors (e.g., Hamede et al.,
lead to increased serious aggression or “cage 2009) and availability of biological and genetic
wars” in captive populations (McCowan et al., data (e.g., Parker et al., 1995) should provide
2008). important insights into factors associated with
Understanding dynamic network processes is social network structure and dynamics.
an active research area across disciplines. Given Extended studies by ethologists and behavioral
the number of long-term studies of animal social biologists have yielded rich, detailed, and
organization this is a promising arena for further multifaceted information about animal social
investigation. organization, and appropriate social network
approaches are needed to deal with the substantive
and theoretical concerns of those fields. Social
Comparing social networks network concepts and methods tailored to the
study of particular animal species and contexts
Social organization has been characterized in have been developed for many properties: for
general ways for various animal taxa; however, example, behavioral sampling (Altmann, 1974),
systematic formal comparisons of social network dominance (de Vries et al., 1993), or associations
structure across species or meta-analyses of (Cairns and Schwager, 1987; Whitehead, 2008). It
multiple cases are rare (Skvoretz and Faust, 2002; seems likely that, in the future, rather than
Faust and Skvoretz, 2002; Schino, 2001, 2007; borrowing off-the-shelf methods designed for
Faust, 2007; Bhadra et al., 2009; Kasper and other kinds of network systems, approaches will
Voelkl, 2009). Social network comparisons be specifically tailored to appropriately study
suggest that general characterizations of network animal social networks, as happened earlier in the
structure across species are likely to be fruitful, social and behavioral sciences. To the extent
though appropriate methodologies are still emerg- that these methods address general properties of
ing. Results include statistical summaries of local social organization and social networks, they
structural signatures contrasting “positive” and should also prove useful for studying human
“negative” relations (Skvoretz and Faust, 2002) or social networks.
triadic configurations (Faust, 2007); the generality A broad consideration of animal social
of theoretical predictions about associations networks points a different lens on social
between social grooming, status, and kinship networks than is usually used by social and behav-
(Schino, 2001, 2007); structural patterns charac- ioral scientists. In particular, it puts general
terizing primate networks (Kasper and Voelkl, aspects of sociality at the center of investigation.
2009); and comparative properties of wasps and For example, behavioral biology is concerned
school rooms (Bhadra et al., 2009). with the adaptive basis of sociality. From the
perspective of social and behavioral sciences,
studying animal social behavior turns attention
on general aspects of social behaviors and
FUTURE DIRECTIONS interactions and seeks explanations for the
relational basis of social organization, regardless
Despite the volume of research on animal social of species.
organization, comprehensive studies that From the perspective of other kinds of network
explicitly take a social network perspective are systems, considering animal social networks leads

5605-Scott-Chap11.indd 160 4/7/2011 4:50:12 PM


ANIMAL SOCIAL NETWORKS 161

one to distinguish social networks from other REFERENCES


sorts of networks and to focus on those features
that are distinctly characteristic of social Allee, W.C. (1938) The Social Life of Animals. Boston, MA:
situations and social relations. Although network Beacon Press.
and graph theoretic formalization might be Altmann, J. (1974) ‘Observational study of behavior: Sampling
equally appropriate for representing particular methods’, Behaviour, 49: 227–67.
aspects of networked physical systems, semantic Anindita, B., Jordán, F., Sumana, A., Deshpande, Sujata, A.
networks, molecular networks, and social and Gadagkar, R. (2009) ‘A comparative social network
networks, many aspects of sociality, and by analysis of wasp colonies and classrooms: Linking network
implication social networks, probably require structure to functioning’, Ecological Complexity, 6(1):
theories and theoretical models to appropriately 48–55.
study their social aspects. As a consequence, it is Archie, E.A., Moss, C.J. and Alberts, S.C. (2006) ‘The ties that
worth attending to aspects of social organization bind: Genetic relatedness predicts the fission and fusion of
that are especially pertinent for understanding social groups in wild African elephants’, Proceedings of the
social networks. Royal Society B, 273: 513–22.
One is then naturally led to ask “What is social Aureli, F., Schaffner, C.M., Boesch, C., Bearder, S.K., Call, J.,
about social networks?” I suggest that sociality of Chapman, C.A. et al. (2008) ‘Fission-fusion dynamics’,
animals entails several characteristics that make Current Anthropology, 49(4): 627–54.
social networks distinctive. Sociality implies that Bailey, T.N. (1974) ‘Social organization in a bobcat popula-
behavior occurs in a collective context that makes tion’, Journal of Wildlife Management, 38(3): 435–46.
it observable to participants and bystanders alike. Balshine-Earn, S. and Lotem, A. (1998) ‘Individual recognition
Given sufficient perceptual and cognitive capaci- in a cooperatively breeding cichlid: Evidence from video
ties, actors acquire information about others and playback experiments’, Behaviour, 135(3): 369–86.
their relationships. When individuals adjust their Banks, E.M. (1982) ‘Behavioral research to answer questions
own behaviors in response to this information and about animal welfare’, Journal of Animal Science, 54:
coordinate their actions with others, higher-order 434–46.
network dependencies arise. This means that Barash, D.P. (1974) ‘Neighbor recognition in two ‘solitary’
social networks must include network effects carnivores: The raccoon (Procyon lotor) and the red fox
and interdependencies beyond individuals and (Vulpes fulva)’, Science, 185(4153): 794–96.
dyads, along with sufficient actor capacities to Barg, J.J. and Mumme, R.L. (1994) ‘Parental recognition of
enable these interdependencies. These features juvenile begging calls in the Florida scrub jay’, The Auk,
distinguish networks that we quite likely agree 111(2): 459–64.
are social (enduring patterns of interaction and Barrett, L., Lusseau, D. and Henzi, S.P. (2009) ‘Natural knock-
affiliation among members of a baboon troop) out: Changes in female social networks as a consequence
from those we generally agree are not (networks of mortality in female chacma baboons’, American Journal
of cracks in a dried mudflat). They leave room of Physical Anthropology, 48: 84.
for discussion about other networks, such as Bejder, L., Fletcher, D. and Brager, S. (1998) ‘A method for
computer systems, in which nodes are endowed testing association patterns of social animals’, Animal
with substantial capabilities for assessing the Behaviour, 56: 1718–25.
status of other nodes, monitoring flows, and Blumstein, D.T. and Armitage, K.B. (1997) ‘Does sociality drive
interacting in ways that respond to states of the the evolution of communicative complexity? A comparative
network. test with ground dwelling sciurid alarm calls’, The American
Systematic studies of animal social networks Naturalist, 150(2): 179–200.
give excellent insights into both differences and Blumstein, D.T. and Armitage, K.B. (1998) ‘Life history conse-
commonalities across species. In particular, quences of social complexity: A comparative study of
they lead to general insights about social organi- ground-dwelling sciurids’, Behavioral Ecology, 9(1): 8–19.
zation that are perhaps lost on researchers who Burgener, N., Dehnhard, M., Hofer, H. and East, M.L. (2009)
restrict attention to a single species (e.g., on ‘Does anal gland scent signal identity in the spotted
Homo sapiens). However, with a few exceptions, hyaena?’ Animal Behaviour, 77(3): 707–15.
researchers in the social and behavioral sciences Byrne, R. and Whiten, A. (eds.) (1988) Machiavellian
are largely unaware of major advances in Intelligence: Social Expertise and the Evolution of Intellect
studies of animal social organization and in Monkeys, Apes, and Humans. Oxford: Oxford University
animal social networks. There is considerable Press.
room for expanding perspectives. Complementary Cairns, S.J. and Schwager, S.J. (1987) ‘A comparison of
investigations of social networks by social association indices’, Animal Behaviour, 35: 1454–69.
scientists and behavioral biologists will provide Caldwell, R.L. (1979) ‘Cavity occupation and defensive
fertile ground for sharing theoretical, behaviour in the stomatopod Gonodactylus festai: Evidence
substantive, and methodological advances in the for chemically mediated individual recognition’, Animal
future. Behaviour, 27: 194–201.

5605-Scott-Chap11.indd 161 4/7/2011 4:50:12 PM


162 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Carpenter, C.R. (1945) ‘Concepts and problems of primate aggression in male fighting fish’, Animal Behaviour, 66:
sociometry’, Sociometry, 8(1): 56–61. 343–47.
Carter, A.J., Macdonald, S.L., Thomson, V.A. and Clutton-Brock, T.H. (1974) ‘Primate social organization and
Goldizen, A.W. (2009) ‘Structured association patterns ecology’, Nature, 250: 539–42.
and their energetic benefits in female eastern grey Clutton-Brock, T.H., Albon, S.D., Gibson, R.M. and
kangaroos’, Macropus giganteus, Animal Behaviour, 77(4): Guinness, F.E. (1979) ‘The logical stag: Adaptive aspects of
839–46. fighting in red deer (Cervus elaphus L.)’, Animal Behaviour,
Chapais, B. (1988) ‘Rank maintenance in female Japanese 27(1): 211–25.
macaques: Experimental evidence for social dependency’, Coleing, A. (2009) ‘The application of social network theory to
Behaviour, 104(1/2): 41–59. animal behaviour’, Bioscience Horizons, 2(1): 32–43.
Chapais, B. (2004) ‘How kinship generates dominance Colvin, John. (1983) ‘Influences of the social situation on male
structures: A comparative perspective’, in Bernard, Thierry, emigration’, in Robert A. Hinde (ed.), Primate Social
Mewa Singh, and Werner Kaumanns (eds.), Macaque Relationships: An Integrated Approach. Oxford: Blackwell.
Societies: A Model for the Study of Social Organization. pp. 160–70.
Cambridge: Cambridge University Press. pp. 186–204. Connor, R.C., Heithaus, M.R. and Barre, L.M. (1999) ‘Superalliance
Chase, I.D. (1974) ‘Models of hierarchy formation in animal of bottlenose dolphins’, Nature, 397: 571–72.
societies’, Behavioral Science, 19(6): 374–82. Connor, R.C., Smolker, R.A. and Richards, A.F. (1992)
Chase, I.D. (1980) ‘Social-process and hierarchy formation in ‘Dolphin alliances and coalitions’, in Alexander H. Harcourt
small-groups: A comparative perspective’, American and Frans B.M de Waal (eds.), Coalitions and Alliances in
Sociological Review, 45(6): 905–24. Humans and Other Animals. Oxford: Oxford University
Chase, I.D., Tovey, C. and Murch, P. (2003) ‘Two’s company, Press. pp. 415–43.
three’s a crowd: Differences in dominance relationships in Conradt, L. (1998) ‘Measuring the degree of sexual segrega-
isolated versus socially embedded pairs of fish’, Behaviour, tion in group-living animals’, Journal of Animal Ecology,
140: 1193–217. 67(2): 217–26.
Chase, I.D., Tovey, C., Spangler-Martin, D. and Manfredonia, M. Croft, D.P., James, R. and Krause, J. (2008) Exploring Animal
(2002) ‘Individual differences versus social dynamics in the Social Networks. Princeton, NJ: Princeton University Press.
formation of animal dominance hierarchies’, Proceedings Croft, D.P., James, R., Thomas, P.O.R., Hathaway, C.,
of the National Academy, 99(8): 5744–49. Mawdsley, D., Laland, K.N. and Krause, J. (2006) ‘Social
Cheney, D.L. (1977) ‘The acquisition of rank and the develop- structure and co-operative interactions in a wild population
ment of reciprocal alliances among free-ranging immature of guppies (Poecilia reticulata)’, Behavioral Ecology and
baboons’, Behavioral Ecology and Sociobiology, 2(3): Sociobiology, 59(5): 644–50.
303–18. Croft, D.P., James, R., Ward, A.J.W., Botham, M.S., Mawdsley,
Cheney, D.L. and Seyfarth, R.M. (1983) ‘Nonrandom dispersal D., and Krause J. (2005) ‘Assortative interactions and social
in free-ranging vervet monkeys: Social and genetic conse- networks in fish’, Oecologia, 143(2): 211–19.
quences’, The American Naturalist, 122(3): 392–412. Croft, D.P., Krause, J. and James, R. (2004) ‘Social networks
Cheney, D.L. and Seyfarth, R.M. (1988) ‘Social and non-social in the guppy (Poecilia reticulata)’, Proceedings of the Royal
knowledge in vervey monkeys’, in Richard Byrne and Society of London Series B-Biological Sciences, 271:
Andrew Whiten (eds.), Machiavellian Intelligence: Social S516–S519.
Expertise and the Evolution of Intellect in Monkeys, Apes, Cross, Paul C., Lloyd-Smith, James O. and Getz, Wayne M.
and Humans. Oxford: Oxford University Press. pp. 255–70. (2005) ‘Disentangling association patterns in fission-fusion
Cheney, D.L. and Seyfarth, R.M. (1990) How Monkeys See the societies using African buffalo as an example’, Animal
World. Chicago: University of Chicago. Behavior, 69: 499–506.
Cheney, D.L. and Seyfarth, R.M. (2007) Baboon Metaphysics: de Vries, H. (1995) ‘An improved test of linearity in dominance
The Evolution of a Social Mind. Chicago: University of hierarchies containing unknown or tied relationships’,
Chicago Press. Animal Behaviour, 50: 1375–89.
Cheney, D., Seyfarth, R.M. and Smuts, B. (1986) ‘Social rela- de Vries, H. (1998) ‘Finding a dominance order most consist-
tionships and social cognition in nonhuman-primates’, ent with a linear hierarchy: A new procedure and review’,
Science, 234(4782): 1361–66. Animal Behaviour, 55: 827–43.
Chepko-Sade, B.D., Reitz, K.P. and Sade, D.S. (1989) de Vries H., Netto, W.J. and Hanegraaf, P.L.H. (1993)
‘Sociometrics of Macaca Mulatta IV: Network analysis of ‘Matman: A program for the analysis of sociometric
social structure of a pre-fission group’, Social Networks, matrices and behavioural transition matrices’, Behaviour,
11(3): 293–314. 125(3/4): 157–75.
Cheverud, James, Chepko-Sade, M.B., Diane, D., Malcolm, M. de Waal, F. (1997) ‘The chimpanzee’s service economy: Food
and Sade, D.S. (1988) ‘Group selection models with for grooming’, Evolution and Human Behavior, 19: 375–86.
population substructure based on social-interaction de Waal, F. (1982) Chimpanzee Politics: Power and Sex among
networks’, American Journal of Physical Anthropology, Apes. Baltimore, MD: Johns Hopkins University Press.
77(4): 427–33. de Waal, F. and Tyack, P.L. (2003) Animal Social Complexity:
Clotfelter, E.D. and Paolino, A.D. (2003) ‘Bystanders to Intelligence, Culture, and Individualized Societies.
contests between conspecifics are primed for increased Cambridge, MA: Harvard University Press.

5605-Scott-Chap11.indd 162 4/7/2011 4:50:12 PM


ANIMAL SOCIAL NETWORKS 163

Diaz-Lopez, B. and Shirai, J.A.B. (2008) ‘Marine aquaculture Freeman, L.C., Freeman, S.C. and Romney A.K. (1992) ‘The
and bottlenose dolphins (Tursiops truncates) social struc- implications of social-structure for dominance hierarchies
ture’, Behavioral Ecology and Sociobiology, 62: 887–94. in red deer, Cervus-Elaphus L.’, Animal Behaviour, 44(2):
Dow, M.M. and de Waal, F.B.M. (1989) ‘Assignment methods 239–45.
for the analysis of network subgroup interactions’, Social Fresneau D. and Dupuy, P. (1988) ‘A study of polyethism in
Networks, 11(3): 237–55. a ponerine ant: Neoponera apicalis (Hymenoptera,
Drews, C. (1993) ‘The concept and definition of dominance in Formicidae)’, Animal Behaviour, 36: 1389–99.
animal behavior’, Behaviour, 125: 283–313. Goodall, J. (1971) In the Shadow of Man. Boston, MA:
Dugatkin, L.A. (2001) ‘Bystander effects and the structure of Houghton Mifflin.
dominance hierarchies’, Behavioral Ecology, 12(3): 348–52. Goodall, J. (1986) The Chimpanzees of Gombe. Cambridge,
Dunbar, R.I.M. (1983) ‘Relationships and social structure in MA: Belknap.
gelada and hamadryas baboons ‘, in Robert A. Hinde (ed.), Goodwin, D. (1986) Crows of the World. London: British
Primate Social Relationships: An Integrated Approach. Museum of Natural History.
Oxford: Blackwell. pp. 299–307. Greenwood, P.J. (1980) ‘Mating systems, philopatry and
Dunbar, R.I.M. (2003) ‘The social brain: Mind, language, and dispersal in birds and mammals’, Animal Behaviour, 28:
society in evolutionary perspective’, Annual Review of 1140–62.
Anthropology, 32: 163–81. Grier, J.W. (1984) Biology of Animal Behavior. St. Louis, MO:
East, M.L. and Hofer, H. (1991) ‘Loud calling in a female- Times Mirror.
dominated mammalian society: II. Behavioural contexts Griffiths, S.W. and Magurran, A.E. (1997) ‘Schooling prefer-
and functions of whooping of spotted hyaenas, Crocuta ences for familiar fish vary with group size in a wild guppy
crocuta’, Animal Behaviour, 42(4): 651–69. population’, Proceedings of the Royal Society: Biological
East, M.L., Höner, O.P., Wachter, B., Wilhelm, K., Burke, T. Sciences, 264(1381): 547–51.
and Hofer, H. (2009) ‘Maternal effects on offspring social Griffiths, S.W. and Magurran, A.E. (1998) ‘Sex and schooling
status in spotted hyenas’, Behavioral Ecology, 20(3): behavior in the Trinidadian guppy’, Animal Behaviour,
478–83. 56: 689–93.
Engh, A.L., Esch, K., Smale, L. and Holekamp, K.E. (2000) Hamede, R., Bashford, K.J., McCallum, H. and Jones, M.
‘Mechanisms of maternal rank ‘inheritance’, in the (2009) ‘Contact networks in a wild Tasmanian devil
spotted hyaena, Crocuta crocuta’, Animal Behaviour, (Sarcophilus harrisii) population: Using social network
60(3): 323–32. analysis to reveal seasonal variability in social behaviour
Engh, A.L. and Holekamp, K.E. (2003) ‘Maternal rank and its implications for transmission of devil facial tumour
“inheritance”, in the spotted hyena case study’, in Frans disease’, Ecology Letters, 12: 1147–57.
B.M. de Waal and Peter L. Tyack (eds.), Animal Social Harcourt, A.H. and de Waal, F.B.M. (eds.). (1992) Coalitions
Complexity: Intelligence, Culture, and Individualized and Alliances in Humans and other Animals. Oxford:
Societies. Harvard, MA: Harvard University Press. Oxford University Press.
pp. 149–52. Heinrich, B. (2000) Mind of the Raven. New York: Harper.
Engh, A.L., Siebert, E.R., Greenberg, D.A. and Holekamp, K.E. Hemelrijk, C.K. (1990) ‘A matrix partial correlation test used in
(2005) ‘Patterns of alliance formation and postconflict investigations of reciprocity and other social interaction
aggression indicate spotted hyaenas recognize third-party patterns at group level’, Journal of Theoretical Biology,
relationships’, Animal Behaviour, 69: 209–17. 143: 405–20.
Faust, K. (2007) ‘Very local structure in social networks’, Herbinger, I., Papworth, S., Boesch, C. and Zuberbühler, K.
in Sociological Methodology 2007, volume 32, edited by (2009) ‘Vocal, gestural and locomotor responses of wild
Yu Xie. Cambridge, MA: Basil Blackwell. pp. 209–56. chimpanzees to familiar and unfamiliar intruders: a
Faust, K. and Skvoretz, J.V. (2002) ‘Comparing networks playback study’, Animal Behaviour, 78(6): 1389–96.
across space and time, size and species’, Sociological Hill, R.A., Bentley, R.A. and Dunbar, R.I.M. (2008) ‘Network
Methodology, (32): 267–99. scaling reveals consistent fractal pattern in hierarchical
Fedigan, L.M. and Asquith, P.J. (1991) The Monkeys of mammalian societies’, Biology Letters, 4(6): 748–51.
Arashiyama: Thirty-Five Years of Research in Japan and the Hinde, R.A. (1976) ‘Interaction, relationships and social
West. Albany, NY: State University of New York Press. structure’, Man, 11(1): 1–17.
Flack, J.C. and de Waal, F.B.M. (2004) ‘Dominance style, Holekamp, K.E., Sakai, S.T. and Lundrigan, B.L. (2007) ‘Social
social power, and conflict management: A conceptual intelligence in the spotted hyena (Crocuta crocuta)’,
framework’, in Bernard Thierry, Mewa Singh and Werner Philosophical Transactions of the Royal Society B, 362:
Kaumanns (eds.), Macaque Societies: A Model for the 523–38.
Study of Social Organization. Cambridge: Cambridge Hölldobler, B. and Wilson, E.O. (1994) Journey to the Ants: A
University Press. pp. 157–82. Story of Scientific Exploration. Cambridge, MA: Belknap
Flack, J.C., Girvan, M., de Waal, Frans B.M. and Krakaurer, D.C. Press.
(2006) ‘Policing stabilizes construction of social niches in Horrocks, J. and Hunte, W. (1983) ‘Maternal rank and
primates’, Nature, 439(7075): 426–29. offspring rank in vervet monkeys: An appraisal of the
Fossey, Dian. (1983) Gorillas in the Mist. Boston, MA: mechanisms of rank acquisition’, Animal Behaviour 31:
Houghton Mifflin. 772–82.

5605-Scott-Chap11.indd 163 4/7/2011 4:50:12 PM


164 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Hrdy, S.B. (1977) The Langurs of Abu: Female and Male Lindquist, W.B. and Chase, I.D. (2009) ‘Data-based analysis of
Strategies of Reproduction. Cambridge, MA: Harvard winner-loser models of hierarchy formation in animals’,
University Press. Bulletin of Mathematical Biology, 71(3): 556–84.
Imanishi, K. (1960) ‘Social organization of subhuman primates Lindzey, G. (1954) Handbook of Social Psychology, Vol. I.
in their natural habitat’, Current Anthropology, 1(5/6): Cambridge, MA: Addison-Wesley.
393–407. Lusseau, D. (2003) ‘The emergent properties of a dolphin
Jameson, K.A., Appleby, M.C. and Freeman L.C. (1999) social network’, Proceedings of the Royal Society of London
‘Finding an appropriate order for a hierarchy based on Series B-Biological Sciences, 270: S186–S188.
probabilistic dominance’, Animal Behaviour, 57: 991–98. Lusseau, D. (2007) ‘Evidence for social role in a dolphin social
Janik, V.M., Sayigh, L.S. and Wells, R.S. (2006) ‘Signature network’, Evolutionary Ecology, 21(3): 357–66.
whistle shape conveys identity information to bottlenose Lusseau, D. and Newman, M.E.J. (2004) ‘Identifying the role
dolphins’, Proceedings of the National Academy of that animals play in their social networks’, Proceedings of
Sciences, 103(21): 8293–97. the Royal Society of London Series B-Biological Sciences,
Jarvis, J.U.M. (1981) ‘Eusociality in a mammal: Cooperative 271: S477–S481.
breeding in naked mole-rat colonies’, Science, 212(4494): Manno, T.G. (2008) ‘Social networking in the Columbian
571–73. ground squirrel, Spermophilus columbianus’, Animal
Jennings, D., Carlin, C.M. and Grammell, M.P. (2009) ‘A Behaviour, 75(4): 1221–28.
winner effect supports third-party intervention behaviour Marler, P. (1955) ‘Studies of fighting in chaffinches. (1)
during fallow deer, Dama dama, fights’, Animal Behaviour, Behaviour in relation to the social hierarchy’, The British
77: 343–48. Journal of Animal Behaviour, 3: 111–17.
Kasper, C. and Voelkl, B. (2009) ‘A social network analysis of Maryanski, A.R. (1987) ‘African ape social-structure: Is there
primate groups’, Primates, 50(4): 343–56. strength in weak ties’, Social Networks, 9(3): 191–215.
Kerth, G. and Konig, B. (1999) ‘Fission, fusion and nonrandom Maryanski, A.R. and Ishii-Kuntz, M. (1991) ‘A cross-species
associations in female Bechstein’s bats (Myotis application of Bott hypothesis on role segregation and
bechsteinii)’, Behaviour, 136: 1187–202. social networks’, Sociological Perspectives, 34(4): 403–25.
Knox, K.L. and Sade, D.S. (1991) ‘Social behavior of the Masure, R.H. and Allee, W.C. (1934) ‘The social order in
emperor tamarin in captivity: Components of agonistic flocks of the common chicken and the pigeon’, The Auk,
display and the agonistic network’, International Journal of 51: 306–25.
Primatology, 12(5): 439–80. Mayhew, B.H. and Levinger, R.L. (1976) ‘Size and the density
Krause, J., Croft, D.P. and James, R. (2007) ‘Social network of interaction in human aggregates’, American Journal of
theory in the behavioural sciences: potential applications’, Sociology, 82: 86–110.
Behavioral Ecology and Sociobiology, 62(1): 15–27. McComb, K., Moss, C., Durant, S.M., Baker, L. and Sayialel, S.
Krause, J., Lusseau, D. and James, R. (2009) ‘Animal social (2001) ‘Matriarchs as repositories of social knowledge in
networks: An introduction’, Behavioral Ecology and African elephants’, Science, 292: 491–94.
Sociobiology, 63(7): 967–973. McComb, K., Moss, C., Sayialel, S. and Baker, L. (2000)
Krause, J. and Ruxton, G.D. (2002) Living in Groups. Oxford: ‘Unusually extensive networks of vocal recognition in
Oxford University Press. African elephants’, Animal Behaviour, 59(6): 1103–9.
Kummer, H. (1968) Social Organization of Hamadryas McCowan, B., Anderson, K., Heagarty, A. and Cameron, A.
Baboons: A Field Study. Chicago, IL: University of Chicago (2008) ‘Utility of social network analysis for primate behav-
Press. ioral management and well-being’, Applied Animal
Kummer, H. (1971) Primate Societies: Group Techniques of Behaviour Science, 109(2–4): 396–405.
Ecological Adaptation. Chicago, IL: Aldine. McGregor, P. (ed.) (2005) Animal Communication Networks.
Lahti, K., Koivula, K. and Orell, M. (1994) ‘Is the social Cambridge: Cambridge University Press.
hierarchy always linear in tits’, Journal of Avian Biology, 25: Miller, J.L., King, A.P. and West, M.J. (2008) ‘Female social
347–48. networks influence male vocal development in brown-
Larivière, S. (2001) Ursus americanus. Mammalian Species, headed cowbirds, Molothrus ater’, Animal Behaviour,
647: 1–100. 76(3): 931–41.
Lehmann, J. and Boesch, C. (2009) ‘Sociality of the dispersing Moreno, J.L. (1945) ‘The two sociometries, human and
sex: The nature of social bonds in West African female subhuman’, Sociometry, 8(1): 64–75.
chimpanzees, Pan troglodytes’, Animal Behaviour, 77(2): Moss, C.J. and Poole, J.H. (1983) ‘Relationships and social
377–87. structure of African elephants’, in Robert A. Hinde (ed.),
Lehmann, J., Korstjens, A.H. and Dunbar, R.I.M. (2007) Primate Social Relationships: An Integrated Approach.
‘Group size, grooming and social cohesion in primates’, Oxford: Blackwell. pp. 307–13.
Animal Behaviour, 74(6): 1617–29. Murchison, Carl. (1935) A Handbook of Social Psychology.
Lesley, J.M., Croft, D.P., Dyer, J.R.G., Chapman, B.B., Worcester, MA: Clark University Press.
Kelley, J.L., Laland, K.N. and Krause, J. (2008) ‘Association Noble, G.K., Wurm, A. and Schmidt, M. (1938) ‘Social
patterns and foraging behaviour in natural and artificial behavior of the black-crowned night heron’, The Auk,
guppy shoals’, Animal Behaviour, 76: 855–64. 55(1): 7–40.

5605-Scott-Chap11.indd 164 4/7/2011 4:50:12 PM


ANIMAL SOCIAL NETWORKS 165

Packer, C. (1977) ‘Reciprocal altruism in Papio anubis’, rhesus-monkey social networks’, American Journal of
Nature, 265: 441–43. Physical Anthropology, 77(4): 409–25.
Packer, C. (1979) ‘Inter-troop transfer and inbreeding avoid- Sailer, L.D. and Gaulin, S.J.C. (1984) ‘Proximity, sociality, and
ance in Papio anubis’, Animal Behaviour, 27: 1–36. observation: The definition of social groups’, American
Parker, P.G., Waite, T.A. and Decker, M.D. (1995) ‘Kinship Anthropologist. 86: 91–98.
and association in communally roosting black vultures’, Sayigh, L.S., Tyack, P.L., Wells, R.S., Solow, A.R., Scott, M.D.
Animal Behaviour, 49(2): 395–401. and Irvine, A.B. (1998) ‘Individual recognition in wild
Parsons, K.M., Durban, J.W. et al. (2003) ‘Kinship as a basis bottlenose dolphins: A field test using playback experi-
for alliance formation between male bottlenose dolphins, ments’, Animal Behaviour, 57: 41–50.
Tursiops truncatus, in the Bahamas’, Animal Behaviour, Schino, G. (2001) ‘Grooming, competition and social rank
66: 185–94. among female primates: A meta-analysis’, Animal
Payne, K. (2003) ‘Sources of social complexity in the three Behaviour, 62: 265–71.
elephant species’, in Frans B.M. de Waal and Peter L. Tyack Schino, G. (2007) ‘Grooming and agonistic support: A meta-
(eds.), Animal Social Complexity: Intelligence, Culture, and analysis of primate reciprocal altruism’, Behavioral Ecology,
Individualized Societies. Cambridge, MA: Harvard University 115–20.
Press. pp. 57–85. Schjelderup-Ebbe, T. (1922) ‘Beiträge zur Sozialpsychologie
Perrin, P. (1955) ‘Pecking order’, American Speech, 30(4): des Haushuhns’, Zeitschrift für Psychologie, 88: 225–52.
265–68. Schjelderup-Ebbe, T. (1935) ‘Social behavior of birds’, in
Pollard, K.A. and Blumstein, D.T. (2008) ‘Time allocation Murchison, Carl (ed.), A Handbook of Social Psychology.
and the evolution of group size’, Animal Behaviour, 76: Worcester, MA: Clark University Press. pp. 947–72.
1683–99. Schoech, S.J. (1998) ‘Physiology of helping in Florida
Poole, T.B. (1985) Social Behavior in Mammals. Glasgow: scrub-jays’, American Scientist, 86: 70–77.
Blackie. Sendova-Franks, H., Rebecca K., Wulf, B., Klimek, T.,
Price, J. (1995) ‘A remembrance of Thorleif Schjelderup-Ebbe’, James, R., Planqué, R., Britton, N.F. and Franks, N.R.
Human Ethology Bulletin, 10(1): 1–6. (2010) ‘Emergency networking: Famine relief in ant colo-
Proops, L., McComb, K. and Reby, D. (2009) ‘Cross-modal nies’, Animal Behaviour, 79(2): 473–85.
individual recognition in domestic horses (Equus caballus)’, Seyfarth, R.M. (1977) ‘Model of social grooming among adult
Proceedings of the National Academy of Sciences, 106(3): female monkeys’, Journal of Theoretical Biology, 65(4):
947–51. 671–98.
Pusey, A.E. and Packer, C. (1987) ‘Dispersal and philopatry’, Seyfarth, R.M. and Cheney, D.L. (2000) ‘Social awareness in
in Barbara B. Smuts, Dorothy L. Cheney, Robert M. monkeys’, American Zoologist, 40(6): 902–9.
Seyfarth, Richard W. Wrangham, Thomas T. Struhsaker Shields, W.M. (1987) ‘Dispersal and mating systems:
(eds.), Primate Societies. Chicago, IL: University of Chicago Investigating their causal connections’, in B. Diane Chepko-
Press. pp. 250–66. Sade and Zuleyma Tang Halpin (eds.), Mammalian Dispersal
Reiczigel, J., Lang, Z., Rozsa, L. and Tothmeresz, B. (2008) Patterns: The Effects of Social Structure on Population
‘Measures of sociality: Two different views of group size’, Genetics. Chicago, IL: University of Chicago Press. pp. 3–24.
Animal Behaviour, 75: 715–21. Shorrocks, B. and Croft, D.P. (2009) ‘Necks and networks: A
Rhodes, M., Wardell-Johnson, G.W., Rhodes, M.P. and preliminary study of population structure in the reticulated
Raymond, B. (2006) ‘Applying network analysis to the giraffe (Giraffa camelopardalis reticulata de Winston)’,
conservation of habitat trees in urban environments: A case African Journal of Ecology, 47(3): 374–81.
study from Brisbane, Australia’, Conservation Biology, Sih, A., Hanser, S.F. and McHugh, K.A. (2009) ‘Social network
20(3): 861–70. theory: New insights and issues for behavioral ecologists’,
Roberts, J.M. (1990) ‘Modeling hierarchy: Transitivity and the Behavioral Ecology and Sociobiology, 63: 975–88.
linear ordering problem’, The Journal of Mathematical Silk, J.B. (2002) ‘Using the ‘F’-word in primatology’, Behaviour,
Sociology, 16(1): 77–87. 139: 421–46.
Rogers, L.L. (1987) ‘Effects of food supply and kinship on Silk, J.B., Alberts, S.C. and Altmann, J. (2004) ‘Patterns of
social behavior, movements, and population growth of coalition formation by adult female baboons in Amboseli,
black bears in northeastern Minnesota’, Wildlife Kenya’, Animal Behaviour, 67: 573–82.
Monographs, (97): 3–72. Silk, J.B., Alberts, S.C. and Altmann, J. (2006) ‘Social relation-
Sade, D.S. (1972) ‘Sociometrics of Macaca-Mulatta: Linkages ships among adult female baboons (Papio cynocephalus) II:
and cliques in grooming matrices’, Folia Primatologica, Variation in the quality and stability of social bonds’,
18(3–4): 196–223. Behavioral Ecology and Sociobiology, 61: 197–204.
Sade, D.S. (1989) ‘Sociometrics of Macaca Mulatta III: n-path Silk, J.B., Seyfarth, R.M. and Cheney, D.L. (1999) ‘The
centrality in grooming networks’, Social Networks, 11(3): structure of social relationships among female savanna
273–92. baboons in Moremi Reserve, Botswana’, Behaviour, 136:
Sade, D.S., Altmann, M., Loy, J., Hausfater, G. and 679–703.
Breuggeman, J.A. (1988) ‘Sociometrics of Macaca- Skvoretz, J. and Faust, K. (2002) ‘Relations, species, and
Mulatta.2. Decoupling centrality and dominance in network structure’, Journal of Social Structure, 3(3).

5605-Scott-Chap11.indd 165 4/7/2011 4:50:12 PM


166 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Skvoretz, J., Faust, K. and Fararo, T. (1996) ‘Social, structure, Wey, T.W. and Blumstein, D.T. (2009) ‘Ontogeny of social
networks, and E-state structuralism models’, Journal of relations in yellow-bellied marmots’, International Sunbelt
Mathematical Sociology, 21(1–2): 57–76. Social Network Conference, San Diego, CA.
Slooten, E., Dawson, S.M. and Whitehead, H. (1993) Wey, T.W., Blumstein, D.T., Shen, W. and Jordan, F. (2008)
‘Associations among photographically identified Hector’s ‘Social network analysis of animal behaviour: A promising
dolphins’, Canadian Journal of Zoology, 71: 2311–18. tool for the study of sociality’, Animal Behaviour, 75(2):
Smale, L., Frank, L.G. and Holekamp, K.E. (1993) ‘Ontogeny 333–44.
of dominance in free-living spotted hyaenas: Juvenile rank Whitehead, H. (1997) ‘Analysing animal social structure’,
relations with adult females and immigrant males’, Animal Animal Behaviour, 53(5): 1053–67.
Behaviour, 46: 467–77. Whitehead, H. (1999) ‘Testing association patterns of social
Smolker, R.A. Richards, A.F., Connor, R.C. and Pepper, J.W. animals’, Animal Behaviour, 57(6): F26–F29.
(1992) ‘Sex differences in patterns of association among Whitehead, H. (2008) Analyzing Animal Societies: Quantitative
Indian Ocean bottlenose dolphins’, Behaviour, 123(1–2): Methods for Vertebrate Social Analysis. Chicago, IL:
38–69. University of Chicago Press.
Stacey, P.B. and Koenig, W.D. (1990) Cooperative Breeding in Williams, R. and Lusseau, D. (2006) ‘A killer whale social
Birds: Long Term Studies of Ecology and Behaviour. network is vulnerable to targeted removals’, Biology
Cambridge: Cambridge University Press. Letters, 2: 497–500.
Sundrasen, S.R., Fischhoff, I.R., Dushoff, J. and Rubenstein, D.I. Wilson, E.O. (1975) Sociobiology: The New Synthesis.
(2007) ‘Network metrics reveal differences in social organi- Cambridge, MA: Harvard University Press.
zation between two fission-fusion species, Grevy’s zebra Wilson, E.O. (1999) The Diversity of Life. New York: Norton.
and onager’, Oecologia, 151(1): 140–49. Wittemyer, G., Douglas-Hamilton, I. et al. (2005) ‘The socio-
Swedell, L. (2002) ‘Affiliation among females in wild hama- ecology of elephants: Analysis of the processes creating
dryas baboons (Papio hamadryas hamadryas)’, International multitiered social structures’, Animal Behaviour, 69(6):
Journal of Primatology, 23(6): 1205–26. 1357–71.
Thierry, B., Singh, M. and Kaumanns, W. (eds.). (2004) Wolf, J.B.W., Mawdsley, D., Trillmich, F. and James, R. (2007)
Macaque Societies: A Model for the Study of Social ‘Social structure in a colonial mammal: Unravelling hidden
Organization. Cambridge: Cambridge University Press. structural layers and their foundations by network analysis’,
Van Dierendonck, M.C., de Vries, H., Schilder, M.B.H., Animal Behaviour, 74: 1293–302.
Colenbrander, B., Porhallsdottir, A.G. and Sigurjonsdottir, H. Wolf, J.B.W. and Trillmich, F. (2008) ‘Kin in space: Social
(2009) ‘Interventions in social behaviour in a herd of mares viscosity in a spatially and genetically substructured
and geldings’, Applied Animal Behaviour Science, 116(1): network’, Proceedings of the Royal Society B-Biological
67–73. Sciences, 275(1647): 2063–69.
Wasser, P.M. and Jones, W.T. (1983) ‘Natal philopatry among Woolfenden, G.E. (1975) ‘Florida scrub jays helpers at the
solitary mammals’, Quarterly Review of Biology, 58(3): nest’, The Auk, 92: 1–15.
355–90. Woolfenden, G.E. and Fitzpatrick, J.W. (1978) ‘The inheritance
Weeden, J.S. and Falls, J.B. (1959) ‘Differential responses of territory in group-breeding birds’, BioScience, 28(2):
of male ovenbirds to recorded songs of neighboring 104–8.
and more distant individuals’, The Auk, 76(3): Woolfenden, G.E. and Fitzpatrick, J.W. (1984) The Florida
343–51. Scrub Jay: Demography of a Cooperative-breeding Bird.
Wells, R.S. (2003) ‘Dolphin social complexity: Lessons from Princeton, NJ: Princeton University Press.
long-term study and life history’, in Frans B.M. de Waal and Zhou, W.X., Sornette, D., Hill, R.A. and Dunbar, R.I.M. (2005)
Peter L. Tyack, (eds.), Animal Social Complexity: Intelligence, ‘Discrete hierarchical organization of social group sizes’,
Culture, and Individualized Societies. Cambridge, MA: Proceedings of the Royal Society B-Biological Sciences,
Harvard University Press. pp. 32–56. 272(1561): 439–44.

5605-Scott-Chap11.indd 166 4/7/2011 4:50:12 PM


12
Networking Online:
Cybercommunities
Anatoliy Gruzd and
Caroline Haythornthwaite

INTRODUCTION Fulk and Steinfield, 1990; Sproull and Kiesler,


1991; Dutton, 1996; Rice, 1992), it is not until
As social creatures, our daily lives are intertwined over 10 years after The Network Nation that
with others in a wide variety of social networks studies of online communities begin to emerge.
involving our relatives, friends, co-workers, and a First among these are several major qualitative
vast array of acquaintances and strangers. It is examinations of online communities: Reid’s
only natural that our digital lives are also made up analysis of the play-based MUD (multi-user
of various social structures and networks. As dungeon) “Electropolis” environment (Reid,
Wellman (2001) noted, “Computer networks 1995); Baym’s examination of a Usenet online
are inherently social networks, linking people, group for soap opera fans (see Baym, 2000); and
organizations, and knowledge” (p. 2031). Our Rheingold’s (1993) exploration of the Well com-
online interactions can complement other munity. The Well, which began in 1985, stands as
communication channels in support of existing perhaps one of the first social networking sites,
social relationships, and they can open up new, specifically created to allow interaction among
exclusively virtual, relationships maintained a widespread group of online participants. Each
through online groups, communities, and worlds. of these studies addressed the (then) very new,
Richly nuanced, strong ties can be maintained exclusively online, communities. Without directly
through the abundant and interconnected media referring to social networks, each describes how
channels now at our fingertips: from the common- the kinds of relations maintained offline are re-
place email to the latest in blogging, microblog- created online, and how interaction in a text-based
ging, and mobile texting. While widespread, weak medium becomes a space where people meet,
ties can be maintained through discussion lists, discuss, play, and create meaningful friendships
Web forums, and social networking sites. and communal practices. In the second edition of
The potential for online communication to the The Virtual Community (2000), Rheingold
change the way we form and manage human and directly addresses social networks, bringing in the
communal interaction was addressed very early in work of Barry Wellman and Mark Smith.
the history of computer-mediated communication At the same time that these all-online commu-
by Hiltz and Turoff in The Network Nation, first nities were being examined, major studies of
published in 1978. The authors envisioned the computer-mediated communities were underway
world of computer-mediated connection we see that emphasized structure and language in online
today: individuals networked across geography interaction (Sudweeks et al., 1998; Cherny, 1999;
through computer conferencing. While studies in Smith, 1999), the development and expression of
the 1980s concentrated on the transformative social norms (Smith et al., 1996; Kendall, 2002),
effects of information and communication and social networks online (Rice, 1993, 1994;
technologies at work (e.g., Galegher et al., 1990; Haythornthwaite and Wellman, 1998).

5605-Scott-Chap12.indd 167 4/6/2011 11:49:48 AM


168 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

By the mid-1990s, real life and online life were multiple features of a comprehensive online portal
beginning to converge. Email was much more such as in knowledge management systems,
commonplace in work settings, the Internet was virtual learning environments, and social network-
beginning to make an impact on information and ing sites. Network contacts are no longer con-
communication practices, personal computers strained to single media, and communities can
appeared and became less expensive, and efforts follow individuals as network lists are maintained
to make wired connectivity a taken-for-granted on multiple devices, and as messages cross
infrastructure were making access easier and more platforms from phone to email and back
prevalent, and thus more expected. Home connec- again (Haythornthwaite, 2000; Wellman, this
tion made its major debut, and the Internet entered volume).
the home for work, school, and play. Research and Social network studies of online communica-
popular views of computing began to recognize tion and community have provided some insight
and accept the presence of the Internet in everyday into how relations, ties, and networks are
life (Wellman and Haythornthwaite, 2002), and maintained online. Research to date has generally
studies turned to how online worlds overlapped confirmed that ties maintained online are as real
and complemented offline relations and practices as offline ties, entailing mutual trust and disclo-
(Kendall, 2002; Rice and Katz, 2001; Hampton, sure, supporting relations of work, advice,
2003; Hagar and Haythornthwaite, 2005). At a socializing, and social support, and with more
societal level, studies began to document and relations maintained more frequently and more
interpret the way new information and communi- intensely among strongly versus weakly tied
cation technologies (ICTs) created a “digital pairs. Along with relational multiplexity, strongly
divide,” and contributed to e-inclusion and tied pairs also demonstrate “media multiplexity,”
exclusion from societal benefits (Schement the use of more media the closer the tie
and Curtis, 1997; Katz and Rice, 2002; U.S. (Haythornthwaite and Wellman, 1998). Computer
National Telecommunications and Information media also appear to provide a structure for latent
Administration reports starting in 2002, http:// ties (i.e., for ties “for which a connection is avail-
www.ntia.doc.gov; Commission of the European able technically but [which have] not yet been
Communities, 2005). The social capital arising activated by social interaction” [Haythornthwaite,
from online social network connectivity is recog- 2002: 387]). Such structures provide the poten-
nized and included as part of the benefits of tial for the information sharing observed by
community-wide implementations of computer Constant et al. (1996) as well as for the wide-
networks (Kavanaugh and Patterson, 2002; Keeble spread social connectivity of social networking
and Loader, 2001). sites.
Since 2000 the rapid proliferation of media Analysis of these phenomena using traditional
types and media accessibility has driven a social science methods of interviews and
revolution in communication practices. The online questionnaires has been useful in providing a
social networking that Constant et al. (1996) basis for understanding online social networks,
observed — that email networks provided access communication, information transfer, and com-
to organization-wide expertise — is now perhaps munity. Yet many of the studies have been limited
best represented in the widespread networking to small or relatively small datasets because of
achieved through social networking sites: difficulties with access to group members, the
Facebook for the college crowd, Myspace for the time and participant effort needed for social
working crowd, and LinkedIn for the business network questionnaire completion, and ethical,
crowd; Orkut for Brazil, and Cyworld for Korea access, analysis, and interpretation issues relating
(Hargittai, 2007; Donath and boyd, 2004; boyd to online data. The phenomenal growth of online
and Ellison, 2007; with the caveat that clear interaction, and the online traces left by all this
boundaries in geography and demography are interaction, begs the use of these data in order to
beginning to blur, see statistics presented by the explore and understand the equally rapid changes
sites themselves). in means of creating and supporting online social
Through these many means, single-threaded, networks. Since a number of reviews are available
online communication via email has spread to that give more extensive coverage of the ideas
include information, communication, and document and studies that have informed current social
exchange through synchronous and asynchronous network understanding of cybercommunities, this
online means, constant contact through wireless chapter focuses on what is and can be done to
networks and mobile phones, and multithreaded harness the massive quantities of data now being
contact as face-to-face interaction is blended produced online to address questions about social
with email, chat, texting, and twittering. networks and cybercommunities. (For more on
Cybercommunities are no longer simple text- communities and cybercommunities from a social
based groups but can be supported through the network perspective, see Wellman et al., 1996;

5605-Scott-Chap12.indd 168 4/6/2011 11:49:48 AM


NETWORKING ONLINE: CYBERCOMMUNITIES 169

Garton et al., 1997; Wellman, 1999, 2001; Rice, data collection is also unencumbered with the
2002; Haythornthwaite, 2007; Hogan, 2008.) subjectivity of traditional data collection tech-
niques (e.g., that respondents may provide partial
answers, respond in ways they believe make their
behavior look better, exaggerate interactions,
Online network data forget people and interactions, or perceive events
and relationships differently from other network
Each reply to an email, link to a Web page, members).
posting of a blog, or comment on a Youtube video, The remainder of this chapter explores in depth
leaves a digital trace, a record that explicitly or new ways of revealing and discovering social
implicitly connects the poster to another online networks online. The chapter begins by describing
participant. Each creates a network of attention various Internet sources of data for these kinds of
around topics of interest, common affiliation, analyses, then describes the main steps needed to
communities of practice, or collective action. uncover explicit and implicit social ties and
The data quantity is impressive: in 2003, Marc common applications where these networks are
Smith estimated 100 million posters in Usenet used. With the necessary limitations of space,
(Festa, 2003), and a 2008 Wikipedia compilation the chapter does not address data sources that are
of sources estimated 4.6 terabytes of data posted already organized in the form of social networks,
daily on Usenet. Technorati’s (2008) “State of the such as “Friend of a Friend” data, and only briefly
Blogosphere” indicates 900,000 blogs are created addresses email-based social networks since both
each day, with 184 million people worldwide require very little processing of original data to
who have started a blog (23–26 million in the build a network and have been explored elsewhere
United States), and 346 million blog readers (see boyd and Ellison, 2007; Hogan, 2008).
(60–94 million in the United States). Various The chapter also does not address theoretical
estimates suggest something on the order of perspectives on communication networks (see
100 billion emails sent per day (Leggatt, 2007). Monge and Contractor, 2003), semantic networks
Even with the caveat that at least half of the email (e.g., Scott, 2005), or the kinds of “community”
traffic is spam, there remains a remarkable amount revealed by online networks (Haythornthwaite,
of text generated every day. Dealing with 2007). Finally, since not all types of data sources
the quantities of data becomes even more over- are freely accessible on the Internet, we assume
whelming when the problems of interest often that a researcher has acquired legal access to a
require examining multiple platforms (e.g., to dataset, is cognizant of the ethical issues and
explore how communications are distributed implications of work and its impact on online
across media, or across multiple instances to communities and their members, and, as required,
examine common patterns of exchange, develop- has received the necessary permission from the
ment of shared language and understanding, or appropriate ethics review board for the use of
emergence of roles and positions). the data. (For more on ethical issues, see Ess
Thus, it is not surprising that there is an and the Association of Internet Researchers Ethics
increasing interest in retrieving and analyzing Working Committee, 2002; Breiger, 2005.)
online behavior automatically, using Web and text
mining techniques to gain insight into the inner
workings of online communities. Discovering
details about online social networks has already INTERNET DATA SOURCES FOR
proven useful in deciding what information DISCOVERY OF SOCIAL NETWORKS
is relevant on the Internet, identifying credible
Web sites, finding popular resources, and sharing
This section reviews the three most prevalent
information within a network of trust. Other
Internet data types – email, discussion forums,
uses of social network data include conducting
and Web pages – with examples of how social
viral marketing, identifying and tracking terrorist
network data discovered from each data type have
cells on the Internet, analyzing consumers’
been used.
perceptions of products, and measuring the effec-
tiveness of political campaigns in online and
offline media.
One of the reasons automated discovery of Email
social networks has become so popular is that it
tends to be unobtrusive, scalable, and fast and thus Email is one of the data sources most commonly
avoids the difficulties of obtaining respondent used for social network extraction. It is interesting
compliance in completing the often burdensome to network analysts in a number of ways. First, its
social network questionnaires. Automated network structure fits easily into a network paradigm.

5605-Scott-Chap12.indd 169 4/6/2011 11:49:49 AM


170 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Email headers provide “To” and “From” data, collapse progressed. Furthermore, the characteris-
fitting easily into network considerations of direc- tics of the discovered networks, such as centrality
tion of relations. Subject lines (where present) and group cohesion, suggested that “a highly
offer a short text that can be used to cluster mes- segmented workforce with little cross communi-
sages by topic. Even with the limitations of such cation may have been a factor that supported the
data – for example, that subject lines may frauds in Enron” (p. 10). Lim et al. (2007) used
be maintained even after the messages change the Enron dataset to test automated techniques to
topic – the subject line provides a simple, detect anomalous behavior in email traffic. Their
text-based indicator of message content that techniques were able to detect changes in email
often can be interpreted without further formal traffic between the two top-ranked employees and
analysis. Further, the text of the message provides the rest of the company before and during Enron’s
a wealth of information about the relation being financial crisis. These Enron network studies have
maintained by the actors. This text can be shown the feasibility of analyzing email data in an
instrumentally counted for indications of automated and systematic fashion and how email
engagement – for example, length of the data can be used to discover connections and roles
message minus appended replies – and it can be within groups.
read, coded, or text-mined for keywords, common While the ubiquity of email makes it a highly
phrases, tone of communication, etc., in order appealing source of data, there are reservations
to gain insight into the topics, ties, roles, and in interpreting social network relations from
relations being maintained. such data. First, as noted above, access to email
Second, the ubiquity of email provides a may be legally and ethically questionable. While
wealth of data that parallels other kinds of most legal cases have granted the right to email
relationships – work, friendship, family ties – access to owners of the service (e.g., Bloom,
suggesting it is viable reflection of person-to- 2008; “Who owns your email?” 2005), practical
person interaction and ties. Since each email is an and ethical considerations weigh against auto-
instance of a social interaction between two or matic data extraction on a day-to-day basis. Most
more people who know (or will know) each other, email is sent privately between individuals and
it is reasonable to assume that the number of thus does not reside in the public domain for
emails exchanged between two people is a good researchers. Access must be secured from the
indicator of the existence and the strength of their organizational owners, and it may also be neces-
social tie. sary to obtain permission from each user whose
Email has also come along significantly as a data may be analyzed. This holds true as much
means for analyzing networks because of access for the who-to-whom data as for the subject
to the large, publicly available real-world Enron line and text of the messages. A researcher
email dataset. This dataset has provided a common may also need to negotiate the visibility, anony-
platform for evaluation of email messages in the mity, and distribution of results (e.g., on whether
context of a contemporary phenomenon of organizational management has access to
wide interest (i.e., who knew what during the results). Second, email is often not the only
Enron crisis). The Enron email dataset (http:// communication means used by actors. Hence,
www.cs.cmu.edu/~enron) was made public by interpretations of behavior need to take into
the Federal Energy Regulatory Commission account that email represents only one stream
during its investigation of the Enron Corporation of interaction, not the entirety of a network
financial collapse. Since the release of the dataset, tie (Haythornthwaite and Wellman, 1998;
a number of studies covering a wide range of Haythornthwaite, 2002, 2005).
organizational research have used this dataset to
conduct their studies. In the process, researchers
have been able to study and fine-tune their
automated network discovery algorithms and their Online forums
interpretations of various social network analysis
(SNA) measures. Online forums with threaded discussions are a
Diesner and Carley (2005) used “who talks to more easily accessible source of Internet-based
whom” networks to compare Enron employees’ communication data than email, and they are also
communication patterns before and during the good candidates for automated social network
company’s collapse. They found that communica- extraction. Since open, online forums are often the
tion networks during the collapse did not reflect communication medium of choice for many
Enron’s formal organizational structures: top groups, there is a wealth of accumulated data that
executives formed a tight clique, perhaps to pro- can be used to conduct studies and experiments.
vide mutual support to each other, and interacted Having the ability to automatically discover and
less often with other employees as the company’s represent the various networks that exist within

5605-Scott-Chap12.indd 170 4/6/2011 11:49:49 AM


NETWORKING ONLINE: CYBERCOMMUNITIES 171

these online forums provides researchers with a implicit connections between people (e.g., through
window on the collaborative processes in online links to a colleague’s homepage, names on a
groups and communities. homepage, messages on a friend’s blog, comments
Among the numerous types of online forums, on a picture published by a relative, appearance in
Usenet groups and online classes have received the same online publication, or subscription to the
the most attention from researchers and generated same online data feed). All these examples may
the most amount of literature on automated be used by an automated system to infer social
analysis. Fisher et al. (2006) used social networks networks. The work in this area is wide and varied
extracted from Usenet discussion groups to iden- due to the seemingly endless variations in the
tify and characterize populations of participants types of Web pages (homepages, personal blogs,
into four distinct groups: “question and answer,” news articles, academic publications, etc.). Recent
“conversational,” “social support,” and “flame.” studies include research by Adamic and Adar
Fiore et al. (2002) examined how Usenet partici- (2003), who used links between homepages of
pants’ posting behaviors (such as the number students at Stanford University and the
of postings and the number of newsgroups they Massachusetts Institute of Technology to infer
subscribed to) were associated with readers’ real-world connections and communities of
subjective evaluations of them. They found a high students; Chin and Chignell (2007), who used
correlation between these, with participants who links between comments posted on Canadian
dominated the conversations being viewed more Independent Music blogs to identify communities
unfavorably than others. of blog authors and readers; and online resources
In automated studies of online classes, Reyes such as Silobreaker (http://www.silobreaker.com)
and Tchounikine (2005) relied on the “who replies and Muckety (http://news.muckety.com), which
to whom” data to build a communication network extract social networks from online news, with
of participants in an online class. The researchers the aim of developing new browsing and visualiza-
argued that participants’ centrality and group tion techniques for connections between people
cohesion are two very important measures for in the news.
the assessment of learning groups. Using a case The rise in online publishing has also made it
study of 15 participants, the researchers demon- easier to mine and access citation information
strated how a tutor could rely on these measures to on the Internet. Work in bibliometrics and infomet-
assess collaborative learning. In one of the rics uses this to discover and study co-author and
threaded discussions that they studied, group co-citation networks. To social scientists, this type
cohesion was extremely low. Upon further of network is of interest because of the way it
investigation, it was discovered that the two par- follows and reflects social structures (White et al.,
ticipants with the highest centrality were dominat- 2004). Chen and his colleagues (2001) used
ing the conversation, a condition that may be co-citation networks extracted from several
undesirable for learning communities where conference proceedings to conduct a subject
wider-spread contribution is intended, and thus of domain analysis and provide a more effective
value to identify. Among more recent work, Cho user interface to access information in a digital
et al. (2007) explored different social network library. Newman (2001) built a co-authorship
properties such as degree, closeness, betweenness, network to discover collaboration patterns between
and structural holes to find relations between scientists in physics, biomedical research, and
students’ positions in the social network and computer science.
their success in the class to see which measures Each of these kinds of online data examines
correlated with final grades. They found that different spheres of interaction. Email may be
“closeness centrality was significantly associated best for examining dyadic and close group
with students’ final grades” (p. 322). In sum, these relationships where message senders know at
studies demonstrate that threaded discussion is a least the email address of the recipient(s).
good source for extracting communication net- Online forums, as well as email traffic on
works, providing a view of online data that can be listservs, require less knowledge about those
useful for studying group dynamics and online who are part of the conversation, allowing
communities. examination of groups with larger, more unknown
membership. Web pages provide connectivity
information on a much wider scale, drawing
connections not just between people, but between
Web pages organizations, ideas, and knowledge. As such,
Web pages may be best for providing insight into
Web pages are another important source of social the organization of people and knowledge at a
network data on the Internet. The content of Web wider societal level, across regions, nations, and
pages may and often does reveal explicit and the globe.

5605-Scott-Chap12.indd 171 4/6/2011 11:49:49 AM


172 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

FROM DATA NETWORKS TO SOCIAL (2009) showed that such an approach provides a
NETWORKS better reflection of perceived social ties. The study
found 40 percent more information was gained
about social ties compared to approaches that
As work progresses in this area, a major issue to relied only on “who posted after whom” data
be addressed is how to interpret networks derived derived from position in the threaded discussion.
from online data. For example, how well do The additional information mostly comes from
networks derived from online transcripts represent instances when a poster addressed or referenced
“real” or “on-the-ground” social networks, those somebody who had not previously posted in a
defined by the complete, multirelational set of particular thread. (Other methods that rely on
interactions and perceptions that make up inter- text-mining techniques to discover social net-
personal ties? A corollary question is how do we works are discussed further below.)
compare what is known about social networks Web pages as network data sources present
from studies that ask individuals to report on their their own set of difficulties. In their raw form,
associations with results from single, abstracted Web pages provide very little information about
parts of their daily interaction such as the traces dyadic relationships. For example, discovering
left in online conversations? Thus, it is important that two people are mentioned on the same Web
to ask not only whether online networks are as page as attending the same conference is not suf-
“real” as offline networks, but also what part of ficient, on its own, to make judgments about their
those “real” networks is captured through examin- social relationship. Nevertheless, with the proper
ing online interactions, and how that part relates to text-mining tools, Web pages may still reveal
other network capture mechanisms. explicit or implicit declarations of relationships
In the absence of sufficient empirical data between two or more people. However, from a
comparing offline to online networks, it is only programming point of view, the latter is a more
possible at this point to consider the relationship challenging task compared to analyzing email
between the ties revealed from online data and the communication, because the majority of Web
entirety of an interpersonal relationship. In doing pages are essentially unstructured text that requires
so, we find that different Internet data sources a lot more automated processing to discover
provide different levels of confidence for the relational declarations.
identification of meaningful dyadic relationships. One of the ways used to increase confidence in
For example, while a one-to-one email communi- the existence of dyadic relationships found on the
cation provides data that two people exchanged a Internet is to use a combination of data sources
message, it does not reveal the nature of the tie. generated by members of the same community.
The relationship may be friendship, but it may This approach is based on the idea that analyzing
equally be strictly formal (e.g., supervisor to different data sources provides more evidence
subordinate), or present only because an auto- in support (or rejection) of dyadic relationships
mated system has generated emails to the recipi- between members of that community. This
ent (e.g., notices from discussion lists, marketing method can provide additional insight into the
materials, or spam). Ensuring that networks strength of ties; pairs that maintain ties
derived automatically are viable representations through multiple media are more likely to be
of the kinds of social networks usually derived strongly tied than those connected via only
from asking people about their ties may require one medium (Haythornthwaite and Wellman,
additional computational steps, such as examining 1998; Haythornthwaite, 2001).
the text of messages to identify roles and relation- Several studies have taken the approach of
ships. examining multiple online data sources. Stefanone
“One-to-many” modes of communication such and Gay (2008) relied on both email networks and
as online forums may provide even less confi- forum networks to study social interactions of
dence in the depth of the identified dyadic rela- undergraduate students. Matsuo et al. (2006) used
tionship. While an email clearly identifies the self-declared Friend-of-a-Friend networks,
intended recipient(s), forum postings do not. As a Web-mined collaborator networks, and face-to-
result, it is difficult to ascertain who exactly is face meeting networks to build Polyphonet, a
involved in the observed interaction. Therefore, to community support system for two different
discover “one-to-one” relationships from “one-to- conferences. Aleman-Meza et al. (2006) used two
many” modes of communication, it is necessary to social networks – Friend-of-a-Friend networks
look beyond message addressing. One possible extracted from pages on the Semantic Web and a
approach is to use text-mining techniques to co-authorship network derived from the DBLP
extract all mentions of personal names in the post- Computer Science Bibliography – to determine
ings and use these as actual addressee(s) of post- the degree of conflict of interest among potential
ings. A recent study of six online classes by Gruzd reviewers and authors of scientific publications.

5605-Scott-Chap12.indd 172 4/6/2011 11:49:49 AM


NETWORKING ONLINE: CYBERCOMMUNITIES 173

Although there seems to be an increasing named entities recognition (NER). NER is a set of
interest in combining datasets, it is not always text-mining techniques designed to discover
feasible or possible to collect social network data named entities and the types of connections and
from multiple sources for any particular online relations between them (Chinchor, 1997). In NER,
communities. Some groups, particularly distrib- a named entity is defined very broadly. It may
uted groups, may only use one channel of be a person, organization, or even a geographic
communication. Also, there is still the ongoing location. NRE is commonly used in various natu-
research question of how to combine evidence of ral language processing (NLP) applications such
social relationships from different types of data. as machine translation, information extraction,
However, no matter what the medium or media and question answering systems. An example of
examined, the problem of extracting social an application that deals specifically with people’s
networks is present for all such datasets. The next names is anonymization or pseudonymization
section describes in more detail the steps used used to hide sensitive data in private or secret
to extract social networks from Internet data documents such as personal medical records and
and how to address some of the challenges men- vital government documents (e.g., Sweeney, 2004;
tioned above. Uzuner et al., 2007).
Since it is relatively easy to find pronouns (e.g.,
by comparing each word to a list of possible
pronouns) and email addresses in text (by match-
SOCIAL NETWORK DISCOVERY FROM ing each word with a string pattern such as
TEXTUAL DATA ON THE INTERNET [part1]@[part2].[part3]), the following focuses
primarily on the discovery of personal names.
There are two primary approaches to finding per-
Text-mining techniques have been gaining in
sonal names in the text. The first and easiest
sophistication over the past decade. These tech-
approach is to look up each word in a dictionary
niques now offer ways to discover social networks
of all possible personal names. If a word is in the
from documents published on the Internet and
dictionary of names, then it is considered to be a
text-based online communication. In general, to
name. Examples of electronic dictionaries with
discover social networks from textual data, the
English names include the publicly accessible
following steps are taken:
U.S. Census (www.census.gov), the commercial
InfoSphere Global Name database from IBM, and
• Node Discovery: All references to people are
the Web resource Behind the Name (www.
identified using names, pronouns, and email
behindthename.com). Researchers who have
addresses.
relied on this approach include Harada et al.
• Coreference and Alias Resolution: Ambiguities
(2004), and Sweeney (2004).
about people are resolved, for example, differ-
This approach is easy to implement and run;
entiating between people with the same name
however, it leaves out names that are not already
and creating a single identity for those with
found in the dictionary. These may be names of
multiple aliases.
non-English origin, informal variations of names,
• Tie Discovery: Social connections are deter-
or nicknames. Neither does this approach take
mined between people identified in the first
into account that in different sentences a word
two steps.
may be a name or just a noun (e.g., “Page asked
• Relationship and Role Identification: The types
for my help” and “Look at page 23”). To make
of ties (e.g., friend, co-worker, classmate, etc.),
sure that an algorithm finds the name “Page”
and relations (e.g., trust, help, agreement, etc.)
and ignores the word “page,” some researchers
are identified, and roles (e.g., manager, subor-
consider only capitalized words as potential
dinate, etc.) are assigned for each person based
candidates for personal names and ignore others.
on communication content or patterns.
However, this restriction is not very practical
with informal texts such as computer-mediated
The following describes each of these four steps
communication where names are often not
and provides examples from the literature.
capitalized.
An alternate approach to finding personal
names does not require using a dictionary of
Node discovery names. This approach applies linguistic rules or
patterns to the content and sentence structure to
Node discovery is usually conducted through the identify potential names. The linguistic rules and
discovery of personal names and other references patterns are often built based on characteristic
to people found in the text. It is part of a broader attributes of words such as word frequencies,
task in computational linguistics (CL) called context words, and word position in the text.

5605-Scott-Chap12.indd 173 4/6/2011 11:49:49 AM


174 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Some work in this direction includes that of Chen address belongs to a person if it contains either his
et al. (2002) and Nadeau et al. (2006). or her first or last name and the initial of the other.
In practice, these two approaches are usually According to this rule, emails that would be
used together; for example, finding all names in attributed to John Smith include john.smith@mail.
the dictionary first, and then using linguistic rules org, jsmith@mail.net, john@smith.net, s.john@
or patterns to find names that are not in the mail.net. (For a more in-depth review of personal
dictionary. Using such a hybrid approach, Minkov name-matching techniques, see Reuther and
et al. (2005) reported a 10–20 per cent improve- Walter, 2006.)
ment in accuracy. The downside of a hybrid The second part of this step, alias resolution,
approach is that it tends to increase the time requires special attention. Alias resolution can be
needed to process the textual data. (For a more performed as part of general NER, but it can also
detailed survey of modern NER techniques, see be conducted as a standalone procedure; it has
Nadeau and Sekine, 2007.) a broad range of application in research on
authorship, citation analysis, spam detection,
author disambiguation in digital libraries, and
Coreference and alias resolution more. The purpose of the various approaches to
alias resolution is to distinguish between two or
Once names and other words that refer to people more people with the same name by identifying
(e.g., titles, pronouns, email addresses) are the unique “signature” that can be associated with
identified, the next step is coreference and alias each person. These approaches often rely on either
resolution. The goal of this step is twofold: to unique linguistic characteristics of a person’s
group all mentions of the same person together writing (e.g., common writing styles, punctuation
(for example, “you,” “John,” “Mr. Smith,” and marks, average length of sentences, expertise
j.smith@mail.net) and to distinguish between two keywords, etc.; e.g., Hsiung et al., 2005; Pedersen
or more people with the same name. Similar to the et al., 2006) or network-based patterns of interac-
previous step of identifying named entities, for tions (e.g., common senders and recipients; e.g.,
coreferencing, computational linguistics (CL) Malin et al., 2005). When extracting social
relies on a more general approach based on networks from the Internet, alias resolution is
machine learning (ML) techniques and tries to often addressed by automatically assigning a set
link not just names, but also any coreferring noun of expertise keywords (e.g., Bollegala et al., 2006)
phrases across sentences and documents where or summaries of several contextual sentences
noun phrases may refer to people, organizations, (e.g., Phan et al., 2006) to each name in the text.
or any other objects in the world. CL uses ML The assumption is that different people (even
techniques to determine the likelihood that a set of with the same name) will be mentioned in
noun phrases might refer to the same entity. different contexts in the text. So the task is
Likelihood is measured by attributes of noun reduced to finding a set of discriminating words
phrases, such as the distance between noun phrases and semantic features to uniquely describe a
in the text, lexical similarities, how often phrases particular person.
collocate with each other, agreement in gender, and Finally, in addition to content-based features,
semantic meanings, etc. (For recent work in this coreference and alias resolution in computer-
area, see Culotta et al., 2007; Yang et al., 2008.) mediated communication can rely on traffic-based
In practice, however, to discover a social features. For example, for threaded discussions,
network from Internet data, there is usually no Gruzd and Haythornthwaite (2008a) relied on
need to perform a full coreference and alias both types of features to associate names extracted
resolution. Quite often, resolution among personal from the content of messages (content-based fea-
names, email addresses, and sometime pronouns ture) with the unique identifiers of posters’ email
is sufficient. Thus, researchers working with addresses found in the posting headers (traffic-
Internet data often rely on simple rule-based or based features). All names that were associated
string-matching approaches. For example, with the same email address were considered to
McArthur and Bruza (2003) approached a pro- belong to the same person. This approach will
noun coreference resolution in an email archive by require modification for communities where users
simply replacing pronouns “I,” “my,” “me” with use more than one email address.
the sender’s name and pronouns “you” and “your”
with the receiver’s name. There are also a number
of simple but effective methods that match
variations of names or email addresses by relying Tie discovery
on phonetic encoding and pattern-matching
techniques (e.g., Feitelson, 2004; Christen, 2006). After all network nodes are identified and grouped
For example, a simple rule may state that an email to represent unique people, the next step is to

5605-Scott-Chap12.indd 174 4/6/2011 11:49:49 AM


NETWORKING ONLINE: CYBERCOMMUNITIES 175

uncover if, and how, these nodes are intercon- Matsuo et al. (2007) relied on content-based char-
nected. There are two main methods in the litera- acteristics – such as the number of co-occurrences
ture for automated discovery of ties based on of two people’s names (e.g., whether their names
textual information. One is based on the similarity appear on the same line) or whether a page included
between users’ profiles. A profile is either created particular keywords in the title or first five lines –
manually by a person himself (e.g., a Facebook to automatically derive rules for the identification
profile) or pulled out automatically from informa- of the following relationships: (1) co-authors,
tion on the Internet (e.g., a person’s homepage or (2) members of the same lab, (3) members of the
parts of the text written about that person). same project, and (4) participants in the same con-
A simple way to measure the similarities is to ference or workshop. The researchers discovered
count how many profile items two people have in that to identify “co-authorship” only required
common (e.g., Adamic and Adar, 2003). Another checking whether or not the names appeared on the
common approach includes measuring the seman- same line in their collection of Web pages.
tic similarity between words extracted from the Mori et al. (2005) assigned these four relation-
profiles. According to this method, two people are ships to two broad categories: common property
considered connected when the value of semantic relationships (when people share a common prop-
similarity between their profiles is higher than a erty such as profession, workplace, hobbies, etc.)
predefined threshold. In other words, people are and event-participation relationships (when people
considered to be connected when there is a sub- participate in the same event such as “taking a
stantial overlap of words and phrases found in course” or “watching the same movie”). Common
their profiles. (For more on measuring semantic property relationships reflect the well-known
similarity, see Kozima and Furugori, 1993; principle in sociology called homophily, which
Maguitman et al., 2005.) holds that people with similar interests are more
Another method for tie discovery uses a co- likely to associate with each other (McPherson
occurrence metric to calculate the number of times et al., 2001). Event-participation relationships are
two names appear in close proximity within the text. known to social network researchers in studies of
This approach is especially popular among research- two-mode networks. There is an assumption that
ers using Web pages to build networks. This is co-attendance signifies a similarity of interest in
because search engines make it easy to count the the common event, and a similar exposure to
co-occurrence of two people on Web pages. Matsuo knowledge, ideas, or activities presented at the
et al. (2006) counted the number of hits from an event. Assumptions may also include an increased
Internet search engine in response to a query con- likelihood that individuals have accomplished
sisting of two names joined via the boolean operator interpersonal interaction. An event-participation
“AND”. Kautz et al. (1997) used this approach in relationship creates what Haythornthwaite (2002)
their application called ReferralWeb for visualizing has called a latent tie structure, one that is organ-
and searching social networks on the Web. For ized by authorities beyond the individuals involved
threaded discussions, Gruzd and Haythornthwaite and yet provides the first (and sometimes required)
(2008a) used the co-occurrence between posters’ step for the formation of weak ties, some of which
email addresses found in the posting headers and may then build to stronger ties.
names found in the body of their messages to reveal The content of emails has also been used to
learning networks in online classes (also see identify relationships or roles automatically. For
Haythornthwaite and Gruzd, 2008). example, Carvalho et al. (2007) used the content
of email messages to identify leadership roles in a
set of 34 workgroups. Specifically, to identify
the leadership roles, the researchers looked for
Role and relationship identification messages with words that were good indicators of
such speech acts as Commit, Request, Deliver,
Text-mining techniques have also proven to be Propose, and Meeting. Using both content-based
useful for identifying roles and relationships in and traffic-based information together in their
social networks. To perform this task automati- study yielded 96 percent accuracy in predicting
cally, researchers closely examine the context in leadership roles.
which people’s names are mentioned in the text.
For example, if two names appear in the same
sentence with a word like committee, then an
assumption is made that these two people are Interest in automated social
members of the same organization, oriented to the network discovery
same responsibilities.
Due to their rich textual content, Web pages are Interest in automated social network discovery
especially good sources for this kind of analysis. extends beyond academic researchers. More and

5605-Scott-Chap12.indd 175 4/6/2011 11:49:49 AM


176 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

more Web applications (often called social Web relationships from multiple Internet sources
apps) are using information about users’ personal associated with a particular community. However,
networks to help users find more relevant infor- this approach is not always practical since addi-
mation, share information with friends, or make tional data sources are often absent or unavailable
better decisions (for a list of applications, see to the researchers. The other approach is to use
www.programmableweb.com/tag/social). As Web Web and text-mining techniques to extract addi-
and text-mining techniques become more tional information about relationships and social
accessible to an even broader audience, even more roles through four main steps of node discovery,
applications can be expected that make use of coreference and alias resolution, ties discovery,
online social network data. Research on how to and relationship and role identification.
make text-mining techniques more accessible The automated techniques reviewed in this
for use in the discovery of social networks is chapter can be used to transform even unstruc-
on the way from a number of researchers cited tured Internet data into social network data. With
here, including the lead author of the chapter the social network data available, it is much easier
who has developed a system called Internet to analyze and make judgments about social con-
Community Text Analyzer (ICTA; available at nections between community members. These
http://textanalytics.net). A detailed description of automated techniques for social network discov-
this system can be found in Gruzd and ery can be used where more traditional methods
Haythornthwaite (2008b). for data collection are too costly or impractical, or
Industry-led initiatives in this direction by they can be used in conjunction with traditional
Facebook (http://developers.facebook.com) and methods. This is an exciting, new area of research,
Google (http://code.google.com/apis/opensocial) and we can expect future studies to provide
are likely to have an important impact because of improved accuracy using Web and text-mining
their reach. Each company has built a free Web methods and new automated methods to interpret
interface that gives Web developers access to the the networks as they are extracted.
personal networks information of their and their
partners’ users. This has resulted in an explosion
of social Web apps. While most of this newly
available data is already pre-organized into a net-
work form, additional processing of the texts REFERENCES
produced by these communities, as described
above, could reveal even more details about the Adamic, L.A. and Adar, E. (2003) ‘Friends and neighbors on
nature of social ties between their members. the web’, Social Networks, 25(3): 211–30.
Aleman-Meza, B., Nagarajan, M., Ramakrishnan, C., Ding, L.,
Kolari, P., Sheth, A. P., Arpinar, I. B., Joshi, A. and Finin, T.
(2006) ‘Semantic analytics on social networks: experiences
in addressing the problem of conflict of interest detection’,
CONCLUSIONS Proceedings of the 15th International Conference on the
World Wide Web (Edinburgh, Scotland). WWW ’06. NY:
The chapter reviewed three types of commonly ACM. pp. 407–16.
available Internet data sources (emails, online Baym, N.K. (2000) Tune in, Log on: Soaps, Fandom and Online
forums, and Web pages) in the context of auto- Community. Thousand Oaks, CA: Sage.
mated discovery of social networks. Along with a Bloom, E.M. (2008, February 22) ‘Who wins the fight over
brief discussion of each of the three data types, the email ownership?’ The National Law Journal. Retrieved
chapter provided examples from the literature of November 1, 2008, from http://www.law.com/jsp/
how social networks have been discovered and legaltechnology/pubArticleLT.jsp?id=1203602189436.
used to study communities that rely on computer- Bollegala, D., Matsuo, Y. and Ishizuka, M. (2006) ‘Extracting
mediated communication. The chapter then key phrases to disambiguate personal names on the web’,
discussed the merits of different Internet data in A. Gelbukh (ed.), Computational Linguistics and
sources for revealing “real” dyadic relationships Intelligent Text Processing. Berlin: Springer. pp. 223–34.
and social networks. Among the data types boyd, D.M. and Ellison, N.B. (2007) ‘Social network sites:
discussed, the one-to-one nature of email inspires Definition, history, and scholarship’, JCMC, 13(1): 210–30.
the most confidence in attributing socially signifi- Retrieved March 21, 2009, from http://jcmc.indiana.edu/
cant ties to the revealed network, with Web pages vol13/issue1/boyd.ellison.html.
providing the least confidence. Breiger, R.L. (ed.) (2005) ‘Ethical dilemmas in social network
Regardless of the data type, two main research’, Social Networks, 27(2), whole issue.
approaches are currently being used to extract Carvalho, V.R., Wu, W. and Cohen, W.W. (2007) ‘Discovering
networks from Internet data. One approach leadership roles in email workgroups’, Proceedings of
collects and combines evidence about dyadic Fourth Conference on Email and Anti-Spam (Mountain

5605-Scott-Chap12.indd 176 4/6/2011 11:49:49 AM


NETWORKING ONLINE: CYBERCOMMUNITIES 177

View, CA). Retrieved October 30, 2008, from http://www. Festa, P. (2003) ‘Newsmaker: Microsoft’s in-house sociologist’,
ceas.cc/2007/papers/paper-08.pdf. CNET. Retrieved March 21, 2009, from http://www.news.
Chen, C., Paul, R.J. and O’Keefe, B. (2001) ‘Fitting the jigsaw com/2008–1082_3–5065298.html.
of citation: Information visualization in domain analysis’, Fiore, A.T., Tiernan, S.L. and Smith, M.A. (2002) ‘Observed
Journal of the American Society for Information Science behavior and perceived value of authors in usenet news-
and Technology, 52(4): 315–30. groups: Bridging the gap’, Proceedings of SIGCHI.
Chen, Z., Wenyin, L. and Zhang, F. (2002) ‘A new statistical Minneapolis, MN: ACM. pp. 323–30.
approach to personal name extraction’, in C. Sammut and Fisher, D., Smith, M. and Welser, H.T. (2006) ‘You are who
A.G. Hoffmann (eds), Proceedings of the Nineteenth you talk to: Detecting roles in usenet newsgroups’,
International Conference on Machine Learning. San Proceedings of HICSS 39. pp. 59–68.
Francisco: Morgan Kaufmann. pp. 67–74. Fulk, J. and Steinfield, C.W. (eds) (1990) Organizations
Cherny, L. (1999) Conversation and Community: Chat in a and Communication Technology. Newbury Park, CA:
Virtual World. Stanford, CA: CSLI Publications. Sage.
Chin, A. and Chignell, M. (2007) ‘Identifying communities in Galegher, J., Kraut, R. E. and Edigo, C. (eds) (1990) Intellectual
blogs: Roles for social network analysis and survey instru- Teamwork. Hillsdale, NJ: Lawrence Erlbaum.
ments’, International Journal of Web Based Communities, Garton, L., Haythornthwaite, C. and Wellman, B. (1997)
3(3): 343–65. ‘Studying online social networks’, JCMC, 3(1). Retrieved
Chinchor, N. (1997) ‘MUC-7 named entity task definition’, March 20, 2008, from http://jcmc.indiana.edu/vol3/issue1/
Proceedings of the 7th Message Understanding garton.html.
Conference. Retrieved October 30, 2008, from http://www- Gruzd, A. (2009) ‘Name networks: A content-based method
nlpir.nist.gov/related_projects/muc/proceedings/ne_task. for automated discovery of social networks to study
html. collaborative learning’, Proceedings of the Association
Cho, H., Gay, G., Davidson, B. and Ingraffea, A. (2007) ‘Social for Library and Information Science Education
networks, communication styles, and learning performance Conference. Denver, CO, January 20–23, 2009. Retrieved
in a CSCL community’, Computers & Education, 49(2): October 30, 2008, from http://blogs.iis.syr.edu/alise/
309–29. archives/168.
Christen, P. (2006) ‘Comparison of personal name matching: Gruzd, A. and Haythornthwaite, C. (2008a) ‘Automated
Techniques and practical issues’, Proceedings of the discovery and analysis of social networks from threaded
Workshop on Mining Complex Data, IEEE International discussions’, International Network of Social Network
Conference on Data Mining. ICDMW. Washington, DC: Analysts. St. Pete Beach, FL, January 22–27, 2008.
IEEE Computer Society. pp. 290–94. Gruzd, A. and Haythornthwaite, C. (2008b) ‘The analysis of
Commission of the European Communities (2005) eInclusion online communities using interactive content-based social
Revisited. Retrieved March 21, 2009, from http://europa. networks (extended abstract)’, Proceedings of the American
eu.int/comm/employment_social/news/2005/feb/ Society for Information Science and Technology Conference.
eincllocal_en.pdf. 523–27.
Constant, D., Kiesler, S.B. and Sproull, L.S. (1996) ‘The kind- Hagar, C. and Haythornthwaite, C. (2005) ‘Crisis, farming and
ness of strangers: The usefulness of electronic weak ties for community’, Journal of Community Informatics, 1(3).
technical advice’, Organization Science, 7(2): 119–35. Retrieved March 21, 2009, from http://ci-journal.net/index.
Culotta, A., Wick, M. and McCallum, A. (2007) ‘First-order php/ciej/article/view/246/210.
probabilistic models for coreference resolution’, Proceedings Hampton, K. (2003) ‘Grieving for a lost network: Collective
of Human Language Technologies 2007. Rochester, NY: action in a wired suburb’, The Information Society, 19(5):
Association for Computational Linguistics. pp. 81–88. 1–13.
Diesner, J. and Carley, K.M. (2005) ‘Exploration of communi- Harada, M., Sato, S. and Kazama, K. (2004) ‘Finding authori-
cation networks from the Enron email corpus’, Proceedings tative people from the web’, Proceedings of the 4th ACM/
of the 2005 SIAM Workshop on Link Analysis, IEEE-CS Joint Conference on Digital Libraries. Tucson, AZ:
Counterterrorism and Security, Newport Beach, CA. ACM. pp. 306–13.
pp. 3–14. Retrieved October 30, 2008, from http://research. Hargittai, E. (2007) ‘Whose space? Differences among users
cs.queensu.ca/home/skill/proceedings/diesner.pdf. and non-users of social network sites’, JCMC, 13(1), article
Donath, J. and boyd, D. (2004) ‘Public displays of connection’, 14. Retrieved March 21, 2009, from http://jcmc.indiana.
BT Technology Journal, 22(4): 71–84. edu/vol13/issue1/hargittai.html.
Dutton, W.H. (1996) (ed.) Information and Communication Haythornthwaite, C. (2000) ‘Online personal networks: Size,
Technologies. Oxford: Oxford University Press. composition and media use among distance learners’, New
Ess, C. and the AoIR Ethics Working Committee (2002) Media and Society, 2(2): 195–226.
‘Ethical decision-making and Internet research’, Retrieved Haythornthwaite, C. (2001) ‘Exploring multiplexity: Social
March 21, 2009, from www.aoir.org/reports/ethics.pdf. network structures in a computer-supported distance
Feitelson, D.G. (2004) ‘On identifying name equivalences in learning class,’ The Information Society, 17(3): 211–26.
digital libraries’, Information Research, 8(4): paper 192. Haythornthwaite, C. (2002) ‘Strong, weak and latent ties and
Retrieved October 30, 2008, from http://InformationR.net/ the impact of new media’, The Information Society, 18(5):
ir/9–4/paper192.html. 385–401.

5605-Scott-Chap12.indd 177 4/6/2011 11:49:50 AM


178 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Haythornthwaite, C. (2005) ‘Social networks and Internet Proceedings of 14th International Conference on World
connectivity effects‘, Information, Communication and Wide Web. Chiba, Japan, May 10–14, 2005. WWW ’05.
Society, 8(2): 125–47. New York: ACM. pp. 107–16.
Haythornthwaite, C. (2007) ‘Social networks and online Malin, B., Airoldi, E. and Carley, K.M. (2005) ‘A network
community’, in A. Joinson, K. McKenna, U. Reips, and analysis model for disambiguation of names in lists’,
T. Postmes (eds), Oxford Handbook of Internet Psychology. Computational and Mathematical Organization Theory,
Oxford, UK: Oxford University Press. pp. 121–36. 11(2): 119–39.
Haythornthwaite, C. and Gruzd, A. (2008) ‘Analyzing net- Matsuo, Y., Hamasaki, M., Nakamura, Y., Nishimura, T.,
worked learning texts’, Proceedings of the Networked Hasida, K., Takeda, H., Mori, J., Bollegala, D. and Ishizuka, M.
Learning Conference. Halkidiki, Greece, May 5–6, 2008. (2006) ‘Spinning multiple social networks for semantic
Haythornthwaite, C. and Wellman, B. (1998) ‘Work, friendship web’, Proceedings of the Twenty-First AAAI Conference on
and media use for information exchange in a networked Artificial Intelligence. Menlo Park, CA: AAAI Press.
organization’, Journal of the American Society for Matsuo, Y., Mori, J., Hamasaki, M., Nishimura, T., Takeda, H.,
Information Science, 49(12): 1101–14. Hasida, K. and Ishizuka, M. (2007) ‘Polyphonet: An
Hiltz, S.R. and Turoff, M. (1978) The Network Nation. advanced social network extraction system from the web’,
Reading, MA: Addison-Wesley. Web Semantics, 5(4): 262–78.
Hogan, B. (2008) ‘Analyzing social networks via the Internet’, McArthur, R. and Bruza, P. (2003) ‘Discovery of social
in N. Fielding, R.M. Lee and G. Blank (eds), SAGE networks and knowledge in social networks by analysis
Handbook of Online Research Methods. Thousand Oaks, of email utterances’, Proceedings of ECSCW 03 Workshop
CA: Sage. pp. 141–60. on Moving from Analysis to Design. Helsinki, Finland.
Hsiung, P., Moore, A., Neill, D. and Schneider, J. (2005) ‘Alias Retrieved October 30, 2008, from http://www.ischool.
detection in link data sets’, Proceedings of the International washington.edu/mcdonald/ecscw03/papers/mcarthur-
Conference on Intelligence Analysis. Retrieved October 30, ecscw03-ws.pdf.
2008, from http://www-cgi.cs.cmu.edu/~schneide/hsiung_ McPherson, M., Smith-Lovin, L. and Cook, J.M. (2001) ‘Birds
alias.pdf. of a feather: Homophily in social networks’, Annual
Katz, J.E. and Rice, R.E. (2002) Social Consequences of Reviews in Sociology, 27(1): 415–44.
Internet Use. Cambridge, MA: MIT Press. Minkov, E., Wang, R.C. and Cohen, W.W. (2005) ‘Extracting
Kautz, H., Selman, B. and Shah, M. (1997) ‘Referral web: personal names from email: Applying named entity recog-
Combining social networks and collaborative filtering’, nition to informal text’, Proceedings of Human Language
Communications of the ACM, 40(3): 63–65. Technology Conference and Conference on Empirical
Kavanaugh, A. and Patterson, S. (2002) ‘The impact of com- Methods in Natural Language Processing. Morristown, NJ:
puter networks on social capital and community involve- Association for Computational Linguistics. pp. 443–50.
ment in Blacksburg’, in B. Wellman and C. Haythornthwaite Monge, P.R. and Contractor, N.S. (2003) Theories of
(eds), The Internet in Everyday Life. Oxford, UK: Blackwell. Communication Networks. Oxford, UK: Oxford University
325–44. Press.
Keeble, L. and Loader, B. (eds) (2001) Community Informatics: Mori, J., Sugiyama, T. and Matsuo, Y. (2005) ‘Real-world
Shaping Computer Mediated Social Relations. London: oriented information sharing using social networks’,
Routledge. Proceedings of the 2005 International ACM SIGGROUP
Kendall, L. (2002) Hanging Out in the Virtual Pub. Berkeley: Conference on Supporting Group Work. New York: ACM.
University of California Press. pp. 81–84.
Kozima, H. and Furugori, T. (1993) ‘Similarity between words Nadeau, D. and Sekine, S. (2007) ‘A survey of named entity
computed by spreading activation on an English diction- recognition and classification’, Linguisticae Investigationes,
ary’, Proceedings of the Sixth Conference on European 30(1): 3–26.
Chapter of the Association for Computational Linguistics. Nadeau, D., Turney, P. and Matwin, S. (2006) ‘Unsupervised
pp. 21–23. Retrieved October 30, 2008, from http://acl.ldc. named-entity recognition: Generating gazetteers and
upenn.edu/E/E93/E93–1028.pdf. resolving ambiguity’, in J.G. Carbonell and J. Siekmann
Leggatt, H. (2007, April 12) ‘Spam volume to exceed legiti- (eds), Lecture Notes in Computer Science: Advances in
mate emails in 2007’, BizReport: Email Marketing. Artificial Intelligence. Berlin: Springer. pp. 266–77.
Retrieved October 30, 2008, from http://www.bizreport. Newman, M.E.J. (2001) ‘Scientific collaboration networks. I.
com/2007/04/spam_volume_to_exceed_legitimate_ Network construction and fundamental results’, Physical
emails_in_2007.html. Review E, 64(1): 64–71.
Lim, M.J.H., Negnevitsky, M. and Hartnett, J. (2007) ‘Detecting Pedersen, T., Kulkarni, A., Angheluta, R., Kozareva, Z. and
abnormal changes in email traffic using hierarchical Solorio, T. (2006) ‘An unsupervised language independent
fuzzy systems’, Proceedings of Fuzzy Systems Conference, method of name discrimination using second order co-
2007. FUZZ-IEEE 2007. IEEE International. 1–6. Retrieved occurrence features’, in A. Gelbukh (ed.), Computational
October 30, 2008, from http://ieeexplore.ieee.org/servlet/ Linguistics and Intelligent Text Processing. Berlin: Springer.
opac?punumber=4295328. pp. 208–22.
Maguitman, A.G., Menczer, F., Roinestad, H. and Vespignani, A. Phan, X.-H., Nguyen, L.-M. and Horiguchi, S. (2006)
(2005) ‘Algorithmic detection of semantic similarity’, ‘Personal name resolution crossover documents by a

5605-Scott-Chap12.indd 178 4/6/2011 11:49:50 AM


NETWORKING ONLINE: CYBERCOMMUNITIES 179

semantics-based approach’, IEICE Transactions on Smith, M.A. (1999) ‘Invisible crowds in cyberspace’, in
Information and Systems, E89-D(2): 825–36. M.A. Smith and P. Kollock (eds), Communities in
Reid, E. (1995) ‘Virtual worlds: Culture and imagination’, Cyberspace. London: Routledge. pp. 195–219.
in S.G. Jones (ed.), CyberSociety: Computer-Mediated Sproull, L. and Kiesler, S. (1991) Connections. Cambridge,
Communication and Community. Thousand Oaks, CA: MA: MIT Press.
Sage. pp. 164–83. Stefanone, M.A. and Gay, G. (2008) ‘Structural reproduction
Reuther, P. and Walter, B. (2006) ‘Survey on test collections of social networks in computer-mediated communication
and techniques for personal name matching’, International forums’, Behaviour and Information Technology, 27(2):
Journal of Metadata, Semantics and Ontologies, 1(2): 97–106.
89–99. Sudweeks, F. McLaughlin, M.L. and Rafaeli, S. (eds) (1998)
Reyes, P. and Tchounikine, P. (2005). ‘Mining learning groups’ Network and Netplay. Cambridge, MA: MIT Press.
activities in forum-type tools’, Proceedings of the 2005 Sweeney, L. (2004) ‘Finding lists of people on the Web’,
Conference on Computer Support for Collaborative Computer Science Technical Report CMU-CS-03–168.
Learning: Learning 2005: the Next 10 Years! Taipei, Carnegie Mellon University, Pittsburg, PA. Retrieved
Taiwan, pp. 509–513. October 30, 2008, from http://reports-archive.adm.cs.cmu.
Rheingold, H. (1993) The Virtual Community. Reading, MA: edu/anon/2003/CMU-CS-03–168.pdf.
Addison-Wesley. Technorati (2008) ‘State of the Blogosphere’, Retrieved
Rice, R.E. and Katz, J. (eds) (2001) The Internet and Health October 30, 2008, from http://technorati.com/blogging/
Communication. Thousand Oaks, CA: Sage. state-of-the-blogosphere/.
Rice, R.E. (1992) ‘Contexts of research on organizational Uzuner, O., Luo, Y. and Szolovits, P. (2007) ‘Evaluating the
computer-mediated communication’, in M. Lea (ed.), state-of-the-art in automatic de-identification’, Journal of
Contexts of Computer-Mediated Communication. New York: the American Medical Information Association, 14(5):
Harvester Wheatsheaf. pp.113–44. 550–63.
Rice, R.E. (1993) ‘Using network concepts to clarify sources Wellman, B. (ed.) (1999) Networks in the Global Village.
and mechanisms of social influence’, in G. Barnett and Boulder, CO: Westview Press.
J. W. Richards (eds). Advances in Communication Network Wellman, B. (2001) ‘Computer networks as social networks’,
Analysis. Norwood, NJ: Ablex. pp. 42–52. Science, 293(5537): 2031–34.
Rice, R.E. (1994) ‘Network analysis and computer-mediated Wellman, B. and Haythornthwaite, C. (eds) (2002) The
communication systems’, in S. Wasserman and Internet in Everyday Life. Oxford, UK: Blackwell.
J. Galaskiewicz (eds), Advances in Social Network Wellman, B., Salaff, J., Dimitrova, D., Garton, L., Gulia, M. and
Analysis. Thousand Oaks, CA: Sage. pp. 167–203. Haythornthwaite, C. (1996) ‘Computer networks as social
Rice, R.E. (2002) ‘Primary issues in Internet use: Access, civic networks’, Annual Review of Sociology, 22: 213–38.
and community involvement, and social interaction and White, H.D., Wellman, B. and Nazer, N. (2004) ‘Does
expression’, in L. Lievrouw and S. Livingstone (eds), citation reflect social structure?’, Journal of the American
Handbook of New Media. London, UK: Sage. pp. 105–29. Society for Information Science and Technology, 55(2):
Schement, J.R. and Curtis, T. (1997) Tendencies and Tensions 111–26.
of the Information Age: The Production and Distribution of ‘Who owns your email?’ (2005, January 11) BBC NEWS.
Information in the United States. Piscataway, NJ: Retrieved November 1, 2008, from http://news.bbc.co.uk/
Transaction Publishers. go/pr/fr/-/2/hi/uk_news/magazine/4164669.stm.
Scott, P.B. (2005) ‘Knowledge workers: Social, task and Wikipedia (2008) ‘Usenet,’ Retrieved October 30, 2008, from
semantic network analysis’, Corporate Communications, http://en.wikipedia.org/wiki/USENET.
10(3): 257–21. Yang, X., Su, J., Lang, J., Tan, C.L., Liu, T. and Li, S. (2008)
Smith, C.B., McLaughlin, M.L. and Osborne, K.K. (1996) ‘An entity-mention model for coreference resolution with
‘Conduct control on Usenet’, JCMC, 2(4). Retrieved inductive logic programming’, Proceedings of the 46th
March 21, 2009, from http://jcmc.indiana.edu/vol2/issue4/ Annual Meeting of the Association for Computational
smith.html. Linguistics. Morristown, NJ: ACL. pp. 843–51.

5605-Scott-Chap12.indd 179 4/6/2011 11:49:50 AM


13
Corporate Elites and
Intercorporate Networks
William K. Carroll and J.P. Sapinski

INTRODUCTION firms, thereby enhancing contacts, influence, and


prestige. For firms, interlocking directorates put
Although systematic network analyses mapping boards in contact, and may enable coordination of
the social organization of business power date business strategies within an interlocked group.
only from the 1970s, scholars have explored the There is a duality in networks of directors and the
relations that link corporations and their directors corporate boards on which they sit (Breiger,
into corporate elites and intercorporate networks 1974), which is reflected in this chapter’s title.
for over a century. Otto Jeidels’s (1905) study of These affiliation networks simultaneously draw
the relationship of German banks to industry, together persons and large corporations, and they
the first noteworthy investigation of this kind, can be fruitfully analyzed on either level. As such,
discovered 1,350 interlocking directorates the study of these networks is relevant to a number
between the six biggest banks and industry. He of issues, including economic organization and
related the interlock network to “a new phase the structure of capitalist classes (Scott, 1985: 2).
in German industrial development caused by Large corporations are governed by boards of
concentration and launched by the economic crisis directors, elected at annual meetings of sharehold-
of 1900” (Fennema and Schijf, 1978: 298). This ers on the basis of one share, one vote – a system
chapter reviews the empirical work that followed that favors owners of large blocks of shares –
from Jeidels, with an emphasis upon the period whether the shares are held by persons, other
since the 1970s, when social scientists turned to corporations, or institutional investors. Each cor-
network analysis as the primary means of repre- porate directorate is typically made up of both
senting the structure of elite and intercorporate internal executives (insiders) and outside directors
relations. who do not hold executive positions in the firm.
First, some terminology. Networks linking Individuals who hold interlocking directorships in
corporations and their directors are known as large corporations include those with only outside
“two-mode” or “affiliation” networks (see directorships as well as executives of firms with
Borgatti, this volume): they contain two kinds of which they are principally affiliated. In either
nodes (directors and corporations), with lines case, “their directorships spread throughout the
running only between one kind and the other. economy, and they form a corporate or business
When an individual sits on two corporate boards elite” (Scott, 1991: 182). An elite, however, is
concurrently, (s)he is said to hold interlocking more than a set of advantaged individuals; it refers
directorships with the two companies, which also to “those who occupy the most powerful positions
means that the directorates of the companies inter- in structures of domination” (Scott, 2008: 33). As
lock, tying them together at the level of govern- hierarchical organizations controlled by major
ance. For individuals, interlocking directorships shareholders, top executives, or some combination
enable participation in governance of multiple of both, large corporations are structures of

5605-Scott-Chap13.indd 180 4/7/2011 4:53:01 PM


CORPORATE ELITES AND INTERCORPORATE NETWORKS 181

domination par excellence. However, a corporate corporate interlocking creates, among leading cor-
elite is different from a capitalist class, though the porate executives and the very rich, an elite that is
former, in its coordinated agency as an “organized autonomous from specific property interests.
minority” (Brownlee, 2005), may be the “leading These interlockers, along with shareholders whose
edge” of the latter. “An economic elite,” says Scott investments span many sectors, come to embrace
(2008: 37), “is an inter-organizational group of classwide interests that transcend specific property
people who hold positions of dominance in busi- interests (Mills, 1956: 123). Interlocks offer to
ness organizations and who may, under certain these elites a potential for exchanging views, con-
circumstances, have certain additional powers solidating the corporate world by unifying the
available to them.” Interlocks figure heavily in outlook and policy of the propertied class (ibid.).
creating or reflecting these circumstances. Just as Porter shared Mills’s concerns about the threat to
interlocking directorships furnish the basis for a democracy posed by the concentration of eco-
more or less cohesive corporate elite, interlocking nomic power. His study of interlocks in Canada
directorates create relations between companies revealed a strong relationship between banks and
that add up to an intercorporate network. industrial corporations, as bankers sat on industrial
Of course, it was not always so. Although elites boards and vice versa (Porter, 1956: 211). The
and dominant classes have existed for millennia, classic work of G. William Domhoff (1967) also
corporate elites and intercorporate networks are treated social networks more as metaphor than
creatures of advanced capitalism, going back only method. His interest in power structures led him to
about a century or so, to the merger movements of stress the role of elite networks in creating unity.
the late nineteenth and early twentieth centuries Domhoff’s key contribution was to extend the
that created, in the core regions of world capital- analysis of interlocking to organizations that are
ism, today’s large corporations or their predeces- part of the policy-planning process, such as busi-
sors (Stanworth and Giddens, 1975). Jeidels’s ness associations, policy forums, and think tanks
(1905) pioneering work emphasized the formation (see Bond and Harrigan, this volume).
of networks of interlocking directorships between
German industry and banks that accompanied this
new phase of concentration. Rudolf Hilferding’s
(1981 [1910]) conception of finance capital as the
symbiotic relation between money capital and POWER STRUCTURE RESEARCH AND THE
industrial capital offered a theorization of the new TURN TO NETWORK ANALYSIS
power structure. On the one hand, banks needed
an outlet to invest their accumulated capital; on The groundwork having been laid in the 1950s
the other, industry’s scale of production had and 1960s, “power structure research” came into
reached the point that only the largest banks its own in the 1970s (Domhoff, 1980), as research-
could provide sufficient capital. Integration and ers in the United States articulated an alternative
coordination of the system was managed by a to pluralist readings of economic and political
small circle of finance capitalists whose corporate power. The debate revolved mainly around
affiliations linked banks with top industrial corpo- the question of the unity and cohesiveness of the
rations. In the United States, the first reference to corporate elite. Against the pluralist position
interlocking directorates comes from the Pujo that market competition precludes elite unity,
Committee, a congressional investigation set up in structuralist researchers used network analysis to
1912 to address the growing concerns about this reveal elite cohesion, and the capacity for political
system of bank power undermining market action.
competition (Scott, 1997: 106). Another investiga- At the level of individual directors, common
tion directed by Paul Sweezy in the 1930s exam- participation in civic and political organizations
ined the bases of ownership of corporations, their (social clubs, foundations, universities, business
interlocking directorates, and the control exerted associations and forums) as well as on corporate
by large banks on them. Sweezy was the first to boards was found to foster social cohesion
delineate in the U.S. economy several interest (Domhoff, 1974; Koenig and Gogel, 1981; Moore,
groups among the 200 largest corporations and the 1979). Power structure research showed how
50 largest banks (Sweezy, 1953: 166–67). individual directors connect, through the many
Concerns with the concentration of power venues where they meet, exchange ideas, and
found another expression in C. Wright Mills’s discuss economic as well as political issues.
(1956) theory of the power elite, as well as in the Useem (1978, 1984) identified, as the “dominant
work of the Canadian sociologist John Porter segment” of the capitalist class, an “inner circle”
(1955, 1957). Both Mills and Porter invoked of corporate interlockers, directors of multiple
social networks more as metaphor than as firms who possess greater wealth than single-firm
full-fledged research method. Mills argued that directors, have more connections to financial

5605-Scott-Chap13.indd 181 4/7/2011 4:53:01 PM


182 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

institutions, and show a higher degree of social relations among them. In contrast, network analy-
cohesion and of political influence (Useem, 1978). sis highlights the relations between units and the
Elite cohesion, moreover, was shown to have bio- ways in which units (whether directors or corpora-
graphical depth. Studies in the United Kingdom tions) are themselves shaped by their positions in
indicated that most corporate directors share a systems of interrelations (Berkowitz, 1980).
similar background of privilege and inherited By 1978, the research literature had burgeoned
wealth, and that elites’ educational and social to the point that Fennema and Schijf, in their
backgrounds had become increasingly homogene- authoritative review, could offer a summary state-
ous in the twentieth century (Stanworth and ment on the architecture and span of interlock
Giddens, 1975; Whitley, 1974). Domhoff (1974) networks in the developed capitalist societies:
drew from experimental research on group
dynamics to show that proximity and face-to-face In all cases financial institutions, banks and
communication enhance group cohesion, which in insurance companies have central positions in the
turn facilitates consensus formation in problem network of interlocking directorates. Another very
solving. For power structure researchers, the general result is that in all studies so far almost all
extensive network connecting corporate directors, the companies are directly or indirectly connected
layered upon personal networks that reach back to with each other. (p. 327)
common educational and social backgrounds,
promoted a common worldview (Koenig and
Gogel, 1981), the basis for elite consensus and for Debates within the study of interlocks
concerted political agency (see Bond and Harrigan,
this volume). As network analysis of interlocks developed
The findings of power structure researchers roots in the 1970s, internal debates grew
also challenged the managerialist position that within the field. Scott (1985) classifies approaches
saw a separation of ownership and control in to the study of interlocks along two dimensions:
the evolution of the modern corporation. As own- first, an agent–system axis, and second, an
ership became dispersed among many small organization-individual axis. The intersection
shareholders, control of the firm was claimed to of these two axes define four approaches (see
pass into the hands of disinterested managers Table 13.1).
(Berle and Means, 1932). If this were so, corpo- The agent-centered approaches correspond for
rate directors and interlocks would be no more the most part to the prenetwork perspectives
than window-dressing, irrelevant to economic reviewed above. Focusing on organizational
power (Koenig et al., 1979). Power structure agents, interlocks become a characteristic of the
researchers questioned managerialism on many firm that can be statistically related to perform-
counts. On the level of corporations, Zeitlin ance or profitability. This not only diverts the
(1974) analyzed the structure of ownership agenda from questions of power; it fails to see that
relations to show that, in the majority of cases, the goals and decision making of one firm are
personal shareholding has been replaced by bank affected by the other firms with which it has
and insurance company shareholding, catapulting relations of interdependency (Pfeffer, 1987).
the latter, not managers, into controlling positions. Focusing on individual agents, interlocks become
On the individual level, Pfeffer (1987) argued that properties of individuals, to be related to other
managers’ goals are tied to their organizations’ personal characteristics, like wealth, education,
goals, especially in the case of corporations where class background and club membership (see
top executives directly benefit from the firm’s Domhoff, 1967, 1974; Whitley, 1974). In reducing
profitability through the shares they hold. the social relations among directors to mere
Studies such as these affirmed, in opposition to attributes, information on the actual system of
pluralism and managerialism, that corporations interrelations that socially constitute the elite is
cannot be considered in isolation. They are sacrificed (Scott, 1985: 4).
embedded in a wider system of power through
interlocking directorates and other relations. These
multilevel relations shape corporate decisions and Table 13.1 Approaches to the study of
policies. The accomplishment of power structure interlocks (Networks of Corporate Power,
research was to move beyond the “aggregative” John Scott)
methods of classic elite analysis, of pluralist
political science, and of managerialism alike. Agent System
These prenetwork approaches studied attributes
Individuals Social background Class cohesion
of units of analysis (individuals or corporations),
tacitly assuming the autonomy of the units, but Corporations Organizational Intercorporate
did not systematically examine the structure of Source: Scott (1985: 3)

5605-Scott-Chap13.indd 182 4/7/2011 4:53:01 PM


CORPORATE ELITES AND INTERCORPORATE NETWORKS 183

The main debates that took place in the 1980s sectors of the business community. But at the
were situated at the structural, systemic level, individual level the same interlocks help consti-
between interorganizational approaches and a “class tute an elite of finance capitalists: “a cohesive
hegemony” approach that emphasized the integra- group of multiple directors tied together by shared
tive function of interlocks for leading members of a background, friendship networks and economic
dominant class. The former developed along two interests, who sit on bank boards as representa-
lines. In viewing corporations as formal organiza- tives of capital in general” (1985: 254).
tions and corporate networks as interorganizational Finally, the class hegemony perspective saw
fields (Breiger, 1974; Palmer, 1987), some research- corporations as “units in a class controlled
ers introduced ideas from the sociology of formal apparatus of appropriation” (Soref and Zeitlin,
organization, as in Allen’s (1974) claim that inter- 1987: 58). In this view, decision making takes
locks issue from attempts by organizations to place within a wider network, not of organizations
reduce environmental uncertainties by co-opting but of individual members of the dominant class,
elites from other organizations and as in Pfeffer’s whose particular interests are crystallized not in
(1987) view that policies and decisions are designed individual corporations but in control groups
to manage this uncertainty as organizations inter- (families or financial cliques), and whose general
lock to secure access to necessary resources from class interests are reinforced by the manifold
other organizations (cf. Pennings, 1980). Although weak ties of interlocking outside directors. The
this analytic lens afforded some insights on how analysis focuses on individual directors as
organizational imperatives figure in intercorporate members of the upper class, on the internal class
networks, in assimilating the corporation to the structure, including the relations between the
broader category of formal organization, its specifi- industrial and financial fractions of the capitalist
city as a key institution of advanced capitalism was class, and on how firms are connected through
lost. Issues of class, power, and capital accumula- individual board members or corporate and family
tion have not been taken up by interorganizational ownership. Interlocks are considered an expres-
researchers, even though these are arguably central sion of class cohesion, allowing for the integration
to this field of study. (For a review of research on of potentially contradictory interests (financial,
interorganizational networks, see Krackhardt, this industrial, commercial) of the richest families,
volume.) whose investments span different sectors (Soref
Other researchers took an intercorporate view. and Zeitlin, 1987: 60). In the class hegemony
In this perspective, interlocks are instrumental perspective, interlocks serve as channels of
means in the accumulation and control of capital. communication between individual directors,
Earlier researchers, often affiliated with old left facilitating a common worldview among them
parties, had taken up this approach, basing their (Koenig and Gogel, 1981), and giving the “inner
work on Hilferding’s view of finance capital as an circle” of interlockers access to a broad resource
integration of the financial and industrial forms of base from which to exert their hegemony in and
capital, placing big banks in central positions beyond business circles (Useem, 1978).
within a power structure segmented into “financial Thus, system-centered approaches broke from
groups” of aligned corporations (Aaronovitch, the limitations of agent-centered and “aggregative”
1961; Menshikov, 1969; Park and Park, 1973 approaches to corporate elites and intercorporate
[1962]; Perlo, 1957; Rochester, 1936). Mintz and networks (Berkowitz, 1980). Taking into account
Schwartz (1985) employed this approach in their the embedded character of corporations and direc-
study of the power structure of American business tors, these approaches depicted the power structure
in the 1960s. Observing that “large investments as a formation within which elite individuals and
create a common fate; both lender and borrower capitalist enterprises pursued particular goals
depend heavily upon successful use of capital,” while often contributing to wider class-based inter-
(1985: 183) they analyzed how, by controlling ests, as in the allocation of investment capital and
flows of capital, banks shape industrial structure, the solidification of class hegemony. Many authors
directing capital toward the most profitable or have stressed the complementarity between these
promising lines of investment. In this system approaches (Koenig and Gogel, 1981; Scott, 1985;
of financial hegemony, the largest banks are Stokman et al., 1988). In combination, they depict
“vehicles for the class control of the economy” corporate interlocks as “traces of power” (Helmers
(1985: 254), and their central position in the et al., 1975, cited in Fennema and Schijf, 1978) of
interlock network reflects their hegemonic role as two sorts: the instrumental power associated with
mediators of intraclass competition and meeting the accumulation of capital and the expressive
points for finance capitalists. In this formulation, power associated with class hegemony (Carroll,
bank-centered interlocks provide the information 2004; Sonquist and Koenig, 1975). This raises a
necessary, at the organizational level, to implement key question, succinctly posed by Mark Mizruchi:
financial hegemony – the broad scan across what do interlocks do?

5605-Scott-Chap13.indd 183 4/7/2011 4:53:01 PM


184 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

What do interlocks do? deepen knowledge beyond the tacit positing of the
United States as the norm. It was in this context
In an extensive review of research literature, that John Scott (1985) produced the second edi-
Mizruchi (1996) considered the causes and conse- tion of his Corporations, Classes and Capitalism,
quences of corporate interlocks. Focussing on the a compendium of research emphasizing the dis-
local rather than systemic significance of such tinct routes that the advanced capitalist countries
ties, he noted both corporate and individual-level had taken to the corporate regimes of the late
factors. For instance, interlocks can be created as twentieth century, and the implications of those
mechanisms of co-optation or monitoring, as differences for network structure. In the same
when a bank sends one of its officers to the board year, an international research group comparing
of one of its clients. Firms may invite prestigious the structure of intercorporate networks in
directors on their boards to enhance their own 10 countries (the United States plus nine European
reputations and contacts. Simultaneously, states), published Networks of Corporate Power
interlocks result from individual decisions to (Stokman et al., 1985). Although structural analy-
serve on multiple boards, which can be influenced sis of corporate interlocks had, since Jeidels, been
by the prestige brought by the position, the pursued in various countries and had been
remuneration, and the possibilities of making advanced significantly by Dutch researchers (see
useful personal contacts (Mizruchi, 1996: 277). Fennema and Schijf, 1978), these works began to
Any one explanation accounts for only a subset of broaden the focus of interlock research and at the
all interlocks (Mizruchi, 1996: 274); hence, the same time to afford systematic cross-national
precise significance of a given interlock is highly comparison.
context-dependent. Drawing on such exemplars as Hilferding’s
In this regard, Scott’s (1991: 184) observation analysis of bank control in Germany and Mintz
that “power in intercorporate networks is based and Schwartz’s study of financial hegemony in the
on at least three distinct kinds of intercorporate American corporate network, Scott (1985, 1987)
relation: personal, capital and commercial” has noted that the capital relations that undergird
purchase. Commercial relations are simply interlock networks entail two forms of power:
trading links between buyers and sellers, but strategic control over specific corporations
personal and capital relations are the main control by means of concentrated blocs of shares and
relations surrounding corporations. Personal allocative power over capital flows, exercised by
relations include interlocking directorships as financial institutions. Distinct patterns of
well as kinship and friendship ties. Capital rela- economic development and corporate law had
tions “are the links between business agents that produced variant configurations of these forms of
result from shareholdings and from the granting economic power within national business systems
and witholding of credit” (p. 184). While interlock and networks (cf. Whitley, 1999). In Germany,
networks open a window onto the social organiza- these forms intersected in the big “universal”
tion of corporate business, they comprise only one banks, engendering a network of “oligarchic bank
type of relation in a multilayered formation. Of hegemony” in which banks were dominant in both
particular significance in decoding interlocks as capital allocation and control. In the postwar
“traces of power” is the tendency, highlighted in Japanese system, strategic and allocative power
the concept of finance capital, for interlocking were also combined in discrete, bank-centered
directorships to be undergirded by capital enterprise groups whose members held large
relations (Scott, 2003: 159), including, in different blocs of shares in each other. In France, Belgium,
contexts, intercorporate ownership, family control and Italy, a “Latin model,” organized around
of multiple firms, institutional shareholding, and the extensive shareholdings of rival holding com-
the credit relations through which banks exercise panies, imparted “a granular, group structuring
allocative power vis-à-vis borrowers. of the economy” and of the network (Scott,
1985: 136). In the Anglo-American system of
“polyarchic financial hegemony,” which took
shape in the aftermath of the Great Depression
COMPARATIVE PERSPECTIVES AND THE and was consolidated during the post–World War
GLOBAL INTERLOCK NETWORK II boom, large financial institutions held powerful
allocative positions opposite industrial firms while
By the 1980s, a vast body of empirical research, institutional investors such as pension funds held
much of it centered on the United States, had blocs of shares that enabled them to function
yielded many detailed insights on the structure collectively as “constellations of interests,”
of intercorporate networks and corporate elites. exercising a constraining strategic power upon
What was lacking, however, was a comparative- corporate management. The “polyarchic” charac-
historical perspective that could broaden and ter of the Anglo-American system made for an

5605-Scott-Chap13.indd 184 4/7/2011 4:53:01 PM


CORPORATE ELITES AND INTERCORPORATE NETWORKS 185

interlock network centralized around major banks householders. They yielded their centrality to
and insurance companies, with little to no frac- giant industrial firms whose resource exports gen-
tioning of the network into discrete financial erated deep pools of capital, on which the banks
groups (Scott, 1985: 129–260). With continuing themselves came to depend. The study supported
growth in all advanced capitalist countries of the concept of finance capital as an integration of
depersonalized, institutional investment, Scott saw financial and industrial forms, but showed how,
“a common move toward bank hegemony of a when financial institutions are weak, a few indus-
loosely structured kind” (p. 227). trial concerns can act as the coordinating centers of
A stream of comparative research flowed in financial-industrial groups (2005: 452). Yun Tae
the wake of these initiatives, and by the time Kim (2007), focusing on the level of individual
Scott (1997) issued a completely rewritten Korean directors, detailed the role of exogamous
compendium he was able not only to refine his marriage networks, common educational back-
earlier categories of variant patterns but to add the grounds, and exclusive social clubs in knitting
“post-Communist pattern” of collusive business together the major chaebol into a cohesive corpo-
organization in Eastern Europe and the “Chinese rate elite with a wide range of connections with
pattern” of corporate cooperation based on state officials, politicians, and the military elite.
fraternal inheritance. More recent comparative Although Kim found very little direct involvement
studies include Maclean et al.’s (2006) investiga- of the corporate elite in political parties or the
tion of business elites and corporate governance in state, a plethora of informal connections “have
France and the United Kingdom, which contrasted provided chaebols not only with communication
the thinness of the British network with the exten- channels, but also with significant power and influ-
sive involvement of wealthy families and the state ence over policy-making” (2007: 34).
in corporate France. Drawing on Bourdieusian If studies such as these suggest that on the
field analysis, these authors explored “the social semi-periphery the move to impersonal posses-
reality of how power is applied, channelled and sion and polyarchic financial hegemony is less
contained in both countries” (2006: 164). Although advanced, other political-economic transforma-
in both cases serving on the boards of charitable tions, beginning in the 1980s, brought changes to
institutions, business associations, public bodies, the dominant pattern of business organization in
and the like was a mainstream medium for elite core countries. The long-term tendency for capital
networking, the French elite favored service on to internationalize in the form of transnational
business associations while the British elite was corporations and financial markets, and the asso-
heavily involved in arts, sport, and private clubs. ciated accumulation crisis of nationally organized
Maclean et al. argued that “there are powerful, capitalism, furnished favorable terrain for neolib-
logical economic reasons why individuals rich in eral policies of deregulation, pursued in the
contacts are appointed as directors, leading to the context of the increasingly visible impact of
self-perpetuating cohesion of the business elite on globalization on the structure, and functioning of
both sides of the Channel” (2006: 191). Paul corporate power. Scott (1997: 252) suggested that,
Windolf’s (2002) study of interlock networks with neoliberal globalization, the disarticulation
in Europe and the United States also merits of national core economies brought a disarticula-
attention, not only for its further details on the tion to national interlock networks. A study of
organization of big business in advanced change in the Canadian network from 1976 to
capitalism but for its attention to post-socialist 1996 did find an overall weakening of ties but also
networks in Eastern Europe. Windolf’s analysis a tendency for Canada-based transnationals, both
of the economic annexation of the former German industrial and financial, to become more central in
Democratic Republic by the West German the network. The network became sparser mainly
capitalist class – a process that produced an East due to corporate governance reforms within the
German network of companies “legally and business community, implemented after 1995,
economically dependent upon western interests” which sought both to bolster shareholder rights
(2002: 163) – raised the larger question of how, in and to prevent further corporate scandals, under
a globalizing world, corporate power is config- the pressure of intensified international competi-
ured on world capitalism’s semi-periphery. tion (Carroll, 2002a: 367).
In one reply, Ilya Okhmatovskiy’s (2005) study Indeed, in the wake of deregulatory policies
of the Russian interlock network evidenced an that rendered corporate business prone to
instructive reversal of the dominant pattern of Enron-style scandals and corporate capitalism
financial hegemony found in core countries. In the more susceptible to financial crisis, a governance
aftermath of the 1998 financial crisis, Russian reform movement was spearheaded by institu-
banks, previous leaders in converting public tional investors in the 1990s and embraced by the
assets into capital were unable to access foreign Organization for Economic Cooperation and
capital or even to aggregate the savings of wary Development in 1998. The thrust of these reforms

5605-Scott-Chap13.indd 185 4/7/2011 4:53:01 PM


186 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

was to make corporate boards more effective and (particularly Germany/Netherlands and Belgium/
reliable in generating value for shareholders, the France) were quite profusely connected.
most powerful of whom, within systems of After a lapse of 17 years, Carroll and Fennema
polyarchic financial hegemony, are institutional (2002) picked up the thread, with an analysis of
investors. These objectives dictated a normative Fennema’s (1982) 1976 network and comparable
ideal for corporate boards: that they be independ- data for 1996. They reported only a modest
ent from top management, uninfluenced by increase in transnational interlocking alongside
interests other than shareholders, small enough to the persistence of national networks, suggesting
function efficiently, and composed of high- strong path dependencies reproducing the patterns
performance, well-oriented directors who are of national corporate-elite organization discerned
directly engaged in the decision-making process by Scott (1997). Kentor and Jang (2004)
(Carroll, 2004: 34; Maclean et al., 2006: 213). purported to show a much more dramatic increase
Governance reforms reshaped the structure of in transnational interlocking between 1983 and
corporate elites. They encouraged corporations, in 1998; however, questions were raised about the
the name of efficiency, to reduce the size of boards validity of their data (Carroll and Fennema, 2004).
and to limit the number of directorships that Whatever the case, research on the 500 leading
members should hold concurrently; they corporations in the world in the most recent
weakened the basis for interlocks between non- decade (1996–2006) finds a proliferation of
shareholding creditors (typically banks) and transnational interlockers and a decline in national
debtors; they brought merit-based recruitment networkers, particularly in Japan, whose comple-
practices, opening boardrooms to more women ment of leading corporations plummeted during
and ethnic minorities (Carroll, 2004). The result, the 1990s. The transnationalists have profuse
in countries where reforms were vigorously ties to each other as well as to various national
undertaken (but much less so in France [Maclean segments; thus, “in the inner circle of the global
et al., 2006: 257] and elsewhere), was a thinning corporate elite, transnationalists and national
of the interlock network (as leaner boards were networkers intermingle extensively, ‘national’
populated with fewer “big linkers”), a weakening and ‘supranational’ spaces intersect, and whatever
of bank centrality, a modest shift away from common interest takes shape is likely to blend
patriarchal and toward multicultural board ‘national’ and ‘transnational’ concerns” (Carroll,
composition, and a decline of the “old boys 2009: 308).
networks” that had formed the dense core of
corporate elites (cf. Carroll, 2004; Davis and
Mizruchi, 1999; Heemskerk, 2007; Zweigenhaft
and Domhoff, 1998). KEY ISSUES
Meanwhile, with the ongoing globalization
of corporations, network analysis of corporate
Across the last several decades, researchers have
organization also went global. Key issues inform-
used an eclectic combination of techniques to map
ing this strand of analysis have been (1) whether
corporate networks at different scales and over
transnational interlocks between firms based in
various time frames. In this section we consider
different countries are on the rise while national
how four analytic issues have been addressed –
interlocks contained within countries are declin-
the duality of corporate networks, questions of
ing and (2) the spatial distribution of transnational
temporality, questions of spatiality, and the rela-
interlocking. These questions, the second of which
tion between interlocking directorates and capital
we take up later, are crucial to an understanding of
relations.
the global intercorporate network and the global
corporate elite.
Fennema (1982) made the earliest attempt to
analyze a transnational intercorporate network. The duality of interlock networks
Mapping the network before and after the
generalized international recession of 1973–74, he As we saw above, interlock networks can be
documented the consolidation of a Euro-North fruitfully analyzed as interpersonal networks of
American component but found very few ties directors forming a corporate elite or as intercor-
extending beyond that heartland of postwar porate configurations. Although both approaches
capitalism. Fennema and Schijf’s (1985) more shed light on issues of social organization, each
extensive network analysis, conducted as part of reveals only one facet of an inherently dualistic
the 10 countries study (Stokman et al., 1985), structure (Breiger, 1974), reducible neither to an
clarified that the 1976 Euro-USA network linked elite of directors nor to a network of faceless
the two continents only sparsely, largely through corporations (Carroll, 1984: 249). The challenge
Britain, but that certain pairs of European countries has been to devise ways of representing interlock

5605-Scott-Chap13.indd 186 4/7/2011 4:53:01 PM


CORPORATE ELITES AND INTERCORPORATE NETWORKS 187

networks as configurations of both individual empires, as in Carroll and Lewis’s (1991) case
directors and the corporations they direct. study of the Brascan enterprise group, which in
One approach has been to examine the network 1986 included 56 directors of two or more of the
in two parallel analyses, as an interpersonal 14 major Canadian corporations controlled by or
network of directors, linked to each other by affiliated with the investment company Brascan
virtue of their common corporate affiliations, and Limited.
as an intercorporate network of interlocking More recently, Alexander explored the board-
directorates. Applying this strategy to the U.S. room networks of Australian directors, in an
network, Bearden and Mintz (1987: 204) discov- intricate two-mode analysis at 1976 and 1996.
ered “parallels in structure between the corporate Following Faust and Wasserman (1993), Alexander
and director networks,” with regional organiza- (2003: 235) notes that both the interpersonal and
tion, the merger of institutional and class interests, intercorporate network have as their common
and the unifying role of big linkers occurring on infrastructure “the specific subset of memberships
both levels, and with bank boards serving as key of all the interlockers/networkers in the affiliation
sites in both the director network and the corpo- network,” which provides the resources for
rate network. Davis and colleagues (2003) also network connectivity. The patterning of such
pursued parallel analyses in their small-world memberships simultaneously shapes both levels
study of change in the U.S. corporate network of the network. For instance, if directors tend to
between 1982 and 1999. Although the mean clump together on the same boards, as in a
degree of contacts decreased in both the interper- configuration built around corporate groups, the
sonal and intercorporate networks, at both levels network will contain extensive redundancy, with
the structure remained a small world, due to the same directors linking the same boards in a
the integrative impact of both linchpin boards and system of “tight” interlocks that will dampen the
linchpin directors: nodes whose ties across spread of contacts in the interpersonal network. In
clusters create shortcuts that shrink the social the Australian case, although the density of inter-
space of the network. The remarkable consistency corporate relations increased only slightly from
in connectivity, despite decreasing board inter- 1976 to 1996, redundancy in the infrastructure
locks, led these researchers to conclude that the decreased substantially, creating more networking
small world of the corporate elite may issue less resources, which increased the interpersonal
from elite institutions such as private schools network’s density and drew many more boards
and commercial banks and more from simple into the dominant component.
tendencies for boards to recruit well-connected
directors and for directors to prefer well-
connected boards (p. 322). Temporality and network dynamics
Alternatively, the two levels can be considered
in a single analysis of the interpersonal network Intercorporate networks and corporate elites arise
by assigning to directors, as contextual variables, and persist in the broad sweep of history, and
the attributes of the firms with which they are researchers have explored the temporality of these
principally affiliated. Applying this approach to formations using a variety of models and designs.
the Canadian network, Carroll (1984) found that The most basic longitudinal research design
industrial and financial firms controlled in Canada depicts network structure at two moments, and
were strongly over-represented at the center of the interprets patterns of continuity and change in
director network and in its principal cliques. The view of social and historical processes that are
cliques were substantially organized around known to have occurred in the interim, as in
intercorporate ownership relations, supporting the Allen’s (1974) comparison of the U.S. intercorpo-
conclusion that the Canadian corporate power rate network at 1935 and 1970. A slightly more
structure revolves around “groups of interlocked elaborate longitudinal design incorporates three or
capitalists who own and manage supra-corporate more points of observation. Bunting and Barbour
blocs of finance capital” (p. 265). (1971) analyzed interlocking directorates among
Researchers have also addressed the issue of 207 American firms at six points from 1896 to
duality directly by analyzing corporate affiliations 1964 and reported a decline in both inter-sectoral
as two-mode networks, thereby keeping both and intra-sectoral density after 1905, which
levels in view. Levine and Roy (1979) pioneered they attributed to the introduction of anti-trust
this approach with their “rubber-band” model, legislation. As well, Stanworth and Giddens
simultaneously clustering directors, and corpora- (1975), in their study of the British network at
tions on either side of a set of elastic board seven points between 1906 and 1970, find that the
affiliations. This approach is limited to relatively concentration of firms has increased, along with
small corporate networks, but it can be very the number of ties among firms; they also note
revealing when applied to specific corporate that the top 50 British firms grew closer to the

5605-Scott-Chap13.indd 187 4/7/2011 4:53:01 PM


188 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

City banks since the beginning of the twentieth years 1962, 1964, and 1966, consistent with inter-
century. Gilles Piédalue (1976) replicated the pretations of interlocks as indicators of power,
snowball-sampling approach of Jeidels (1905) in a interdependence, and communication.
study of Canadian corporations from 1900 to 1930 Following from the groundbreaking work
that included four observation points. Like Jeidels, of Helmers et al. (1975, cited in Fennema and
Piédalue began with the big banks and included Schijf, 1978: 324–25), which showed that in the
corporations sharing directors with a bank or Netherlands in the 1960s interlocks between
firms interlocked with a bank. He was able to financial institutions and industrial corporations
show a dramatic expansion of the network, par- had a high probability of being restored after
ticularly in the first decade, and an increasing retirement, resignation, or death of a director,
degree of interlocking. Mark Mizruchi’s (1982) several studies then employed restoration of
follow-up to Bunting and Barbour examined the broken ties as an indicator of the importance of an
U.S. network at seven points from 1904 to 1974, interlock to the two linked firms. Ornstein (1984)
revealing one large cluster of firms dominated by found that of the 5,354 interlocks among large
JP Morgan & Co., which divided after 1919 into corporations in Canada broken at some point
bank-centerd cliques, with most corporations during the first three postwar decades, 30 percent
inhabiting the borders of multiple cliques. More were restored, but the rate of restoration varied
recently, Barnes and Ritter (2001) tracked the according to several factors. Interlocks carried by
thickening and then thinning of the American executives in one of the interlocked firms, and
corporate network at four points from 1962 to interlocks that were part of a multiple-interlock
1995, and Barnes (2005), using the same data relation or a relation of intercorporate ownership
but examining the interpersonal network, explored between firms, were substantially more likely to
the multiple dimensions of the American corpo- be restored. Also, ties among companies control-
rate elite’s small world. By assessing how much led domestically were far more likely to be
the addition of extra-corporate affiliations restored than were ties between Canadian- and
decreased mean geodesic distances among American-controlled firms. And, after controlling
directors, Barnes documented the decline of for country of control, industry, and location of
cultural ties (e.g., to museum and symphony head office, financial-industrial interlocks were
boards) but a steady increase in the integrative more likely to be restored than other ties.
role of elite affiliations with policy planning Richardson (1987) used cross-lagged correlations
organizations. In line with Useem (1984), these to show that in the Canadian network the
trends depict a corporate elite becoming less profitability of industrial firms in 1963 predicted
concerned with maintaining social or civic ties the restoration of their interlocks with financial
and much more politically mobilized (cf. Carroll, institutions five years later, in a “circular and
2004; Murray, 2006). self-sustaining process” that reinforced compa-
Although successive cross-sections allow nies’ original profit position, supporting the theory
researchers to pinpoint when major structural of finance capital as capital integration.
changes occur, they do not afford much basis for Palmer’s studies of broken ties in the American
discerning the dynamics of change. With panel network found a low rate of restoration, particu-
designs it is possible to analyze changes in both larly for non-executive interlocks. He concluded
the composition of the set of largest corporations that although some interlocks facilitate formal
and the structure of relations among them. intercorporate coordination, many of them are
Carroll’s (1986) analysis of turnover in the corpo- expressions of class hegemony, as interactions
rate constituents of the Canadian network and the among leading directors and executives create
links between them (1946–76) isolated as the “a loose, but nonetheless very real system of
stable core the set of multiple-director interlocks coordination in which firms are instruments of
that were maintained throughout the three decades inner circle policy” (p. 70). Stearns and Mizruchi
among firms that consistently ranked in the Top (1986), however, in a panel study that tracked
100, despite changes in board composition. It was 22 major industrial corporations over three
around this stable core that the major structural decades, found evidence of “functional reconstitu-
transformations occurred, as differential rates of tion,” in which an industrial firm’s broken tie to a
accumulation and corporate reorganizations led financial institution is restored by an interlock to a
firms to enter or exit from the Top 100 and as different financial institution. This suggests that
interlocks emerged or disappeared with corporate the incidence of purposive, strategic interlocking
realignments. Panel design has also been used in is higher than that estimated by the “direct” resto-
assessing the stability of network parameters, as ration of broken ties. In a complementary investi-
in Mariolis and Jones’s (1982) study of relative gation using the same database, an event-history
centrality in the American corporate network, analysis of the creation of new interlocks showed
which was found to be extremely stable over the that although firms with decreasing solvency and

5605-Scott-Chap13.indd 188 4/7/2011 4:53:01 PM


CORPORATE ELITES AND INTERCORPORATE NETWORKS 189

profitability were likely to appoint executives in modeling has only recently been applied to
financial institutions to their boards, all corpora- interorganizational relations, it offers intriguing
tions were more likely to make such appointments opportunities to explore how macro-configura-
during upswings in the business cycle, as tions of corporate power are shaped by local,
capital needs expand. Both the specific situation context-dependent decisions of corporations.
facing a firm and the general context for capital The career trajectories of directors and execu-
accumulation appear to influence the creation of a tives present yet another dynamic in the life of
financial-industrial interlock (Mizruchi and corporate networks. In their study of pathways to
Stearns, 1988). corporate management in the United States,
Although the bulk of sociological research on Useem and Karabel (1986) found that although
corporate networks has been set within the power- there are a variety of routes to the top, individuals
structure tradition, some of the most innovative who become members of the elite’s inner circle
analyses of temporality have explored practices are those with the greatest amount of both
only indirectly related to this central problematic. “scholastic” (elite education) and “social” (upper-
Galaskiewicz and Wasserman (1981), in a study of class background) capital. The core of the elite,
a regional corporate network, used Markov chains the segment most engaged in classwide leader-
to model network processes. Focusing on the ship, appears to be recruited through mechanisms
probability of establishing a linkage and the emphasized in Bourdieu’s (1984) generalized
probability of an asymmetric (executive) linkage theory of capital. In a fully longitudinal study of
becoming reciprocated (or vice versa), they found Dutch corporations over two decades (1960–80),
that norms of reciprocity are not operative in Stokman et al. (1988) tracked the careers of the
corporate interlock networks, as they are in other 105 big linkers whose extensive corporate
interorganizational relations – consistent with the directorships carried most of the network. The
idea that interlocks carried by corporate insiders typical career pattern involved entering the
tend to be relations of influence and power. network as an executive, acquiring several outside
Diffusion of innovation analysis has also been directorships, retiring from the executive position
employed in tracking network effects on speed of but maintaining (some of) the outside director-
adaptation and patterns of prevalence of corporate ships, and finally exiting from the network
governance practices. Here, Davis and Greve’s altogether. As corporate boards recruit outside
(1997) study of the adoption of poison pills and directors from a pool of executives of other large
golden parachutes in the American network firms, and as executives move through this career
(1980–86), marking a shift to “investor sequence, the network is reproduced in its duality,
capitalism,” is iconic. They showed how, amid the partly on the basis of “permanent economic
takeover waves of the 1980s, poison pills spread and financial relations between companies,” and
rapidly through board-to-board diffusion proc- partly through recruitment processes that
esses “in which firms adopted to the extent that cause “global stability of the structure of the
their contacts had done so,” but parachutes spread network, together with local instability of dyadic
slowly, on the basis of geographical proximity relations” (p. 203).
rather than interlocking directorates (p. 29). Finally, more qualitative approaches have high-
More recently, the development of actor- lighted the contingent, historical, and contextual
oriented modeling by Tom Snijders and his character of network temporality. Davita
colleagues (Snijders, this volume; Steglich et al., Glasberg’s (1987) case studies of the assertion of
2006) has opened new possibilities for systematic financial hegemony in restructuring insolvent
analysis of network dynamics. As applied to corporations through such mechanisms as stock
intercorporate networks, this approach accounts dumping are of great relevance to the current
for the changing pattern of inter-firm relations by conjuncture of global capitalist crisis. Equally
estimating the underlying rational choices of apposite is Brayshay and colleagues’ (2006) qual-
network actors. For instance, van de Bunt and itative study of “power geometries” in the rescue
Groenewegen’s (2007) study of collaborative of Hudson’s Bay Company (HBC) by the Bank of
agreements among genomic companies found that England during the last worldwide Depression.
firms prefer to start partnerships with high-status Eschewing a large-sample approach, these
(well-connected) companies and with companies researchers began from the biography of a single
that are already members of the same (2-clique) person, Patrick Ashley Cooper, appointed gover-
groups as the focal firm. The modeling procedure nor of the HBC in 1931 and a director of the Bank
enabled these researchers to show that an apparent of England in 1932, and thereupon assembled a
transitivity effect (whereby firms prefer to partner remarkable set of international business contacts.
with companies that are already partners of By tracing Cooper’s network in depth, through
partners) could be accounted for by the preference archival documents including his detailed
for high-status partners. Although actor-oriented personal diaries and letters, as well as Bank of

5605-Scott-Chap13.indd 189 4/7/2011 4:53:01 PM


190 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

England archives, Brayshay et al. constructed a regionally dispersed pattern of interlocking in the
rich longitudinal account of the corporate network United States should not be abstractly generalized
and wide range of business- and policy-related to other social formations. For instance, in Canada
practices that were enabled by it. Significantly, the corporate elite has long been centered in two
Cooper’s embeddedness extended well beyond cities – Montreal and Toronto – with the corporate
the boardrooms of London. Indeed, among his network aligned along a highly integrated Toronto-
core group of special confidants were many Montreal axis (Clement, 1975). However, a study
people who had no overlapping corporate of the shifting corporate geography from 1946 to
affiliations with him. The authors’ sensible 1996 found that the westward flow of capital
conclusion, that “a full reconstruction of an brought a plethora of corporate head offices to
economic actor’s array of contacts requires Calgary and Vancouver, creating a westward drift
research beyond the stylized mapping of corporate in the network itself. Still, the continuing preemi-
networks” (p. 996), should serve as a challenge to nence of Toronto and Montreal as centers of
researchers: they should delve into the kind of finance produced a national network carried sub-
qualitative depth that can yield insight on specific stantially by finance capitalists directing eastern-
mechanisms of social power, corporate control, based financials and western-based industrials
and capital accumulation. (Carroll, 2002b; see also, in the British case, Scott
and Griff, 1984).
Recently, the geography of corporate networks
Spatiality has been explored at a global level. In a study of
the global corporate elite (1996–2006) mentioned
The question of how business networks are earlier, Carroll found a highly regionalized
configured in space has preoccupied researchers network, most of whose members are entirely
since the consolidation of power structure analysis embedded in national networks, with transnational
in the 1970s. The outstanding study from that era interlocking mainly integrating corporate Europe
is Sonquist and Koenig’s (1975) clique analysis of or linking across to North America. Moreover,
the American network circa 1969. Geocoding the growing cohesiveness of corporate Europe and
each corporation by the city of its headquarters, the thinning of the American network shifted the
they found a structure of 32 overlapping cliques global network’s center of gravity, registering the
and their satellites, most of which were based in success, from a business standpoint, of European
particular cities, with New York hosting the largest integration, along with the decline of American
and most central group. Mintz and Schwartz hegemony (Carroll, 2009).
(1981: 863) soon demonstrated the special posi- Several investigations have reached similar
tion of New York as “the base of a national conclusions by charting the network of global
network of corporate interlocks, uniting regional cities on the basis of intercorporate relations.
clusters into a loosely integrated whole.” Green’s Using interlock data from 1996, aggregated by
(Green, 1983; Green and Sempel, 1981) subse- city of head office, Carroll (2007) found an inter-
quent studies of the inter-urban network of corpo- urban network in which Paris, London, and New
rate interlocks and of institutional stock ownership York are particularly central, along with other
(Green, 1993) revealed a regionalized network cities of northeast North America and
dominated by the cities in which major financial northwest Europe — the heartland of an Atlantic
institutions have their headquarters: New York and ruling class, in van der Pijl’s (1984) terminology.
four secondary urban centers (Chicago, Boston, Alderson and Beckfield’s (2004) research on
Los Angeles, and San Francisco). Later, Kono and intercorporate ownership relations radiating from
his colleagues (1998) explored the possibility that the world’s 500 largest corporations provided
local and nonlocal interlocking may have different a different vantage point on the world city system.
determinants by examining the relationship Based on parent-subsidiary ownership relations,
between spatial propinquity of corporate head- Tokyo emerged as the most central point. A follow-
quarters and corporate interlocking among up investigation, analyzing change in the
500 U.S. firms in 1964. Interestingly, firms based centrality of cities between 1980 and 2000, found
in cities with exclusive upper-class clubs were a substantial reshuffling of the hierarchy and an
more likely to interlock with each other, suggest- increasing interurban disparity in centrality.
ing that “the local capitalist class social organiza- Overall, the parent-subsidiary network of global
tion made possible by the colocation of corporate cities appeared to be reproducing the “old”
headquarters and upper-class clubs may be an geography of center-periphery relations in the
instrument by which corporate elites manage their world-system “in an even more pronounced
organizational environments, gaining information, form” (Alderson and Beckfield, 2007: 34). A find-
trusted contacts, and access to national networks ing common to all these studies has been the
of elites” (Kono et al., 1998: 904). Of course, the marginal position of corporations headquartered

5605-Scott-Chap13.indd 190 4/7/2011 4:53:01 PM


CORPORATE ELITES AND INTERCORPORATE NETWORKS 191

on global capitalism’s semi-periphery. The global precise shape of these systems varied between the
corporate elite, the global intercorporate network, Anglo-American pattern of financial hegemony
and the world city network compose a core- and the Japanese structure of aligned participation
periphery structure in which the Global North in corporate sets (on the latter, see Scott, 1997:
continues to dominate (see also Kick et al., this 181–95). In the case of Australia, Murray’s
volume). (2006, 2008) research, considering both interlock-
ing directorates and shareholding in top compa-
nies, reached the conclusion that “of themselves
interlocks do not reveal the underlying power
Capital relations and corporate structures of companies” (Murray, 2008: 17).
interlocks Indeed, in 2007 six top financial institutions
operating in Australia (including Morgan Chase,
Although this chapter has focused on interlocking HSBC, and Citicorp) held 34.1 percent of the
directorates, earlier we noted Scott’s (2003: 159) market capitalization of the top 300 companies,
thesis that interlocking directorships must be indicating both an enormous centralization of
viewed “alongside the capital relations that under- financial power and a remarkable penetration by
gird them.” This point, central to an understanding transnational capital.
of interlock networks, has been made by Other research has looked purely at the
numerous researchers in various ways. Ratcliff’s network of intercorporate ownership ties. The
(1980) study of 78 commercial banks based in German case was examined in a study by Kogut
St. Louis evidenced a strong relationship between and Walker (2001) whose longitudinal design
a bank’s centrality in the interlock network and its (running from 1993 to 1997) enabled a tracking of
loans to capitalists. Invoking Hilferding, Ratcliff 101 acquisitions involving the top 550 German
concluded that the personal union of banking and companies. Results showed a strong small-world
corporate interests at the center of the capitalist effect, connecting firms through owners and
class “is associated with a major flow of loan owners through firms (2001: 325) and tendencies
capital from banks to corporations and other for acquisitions to make the network more
related borrowers” (p. 565). centralized and for leading financial institutions to
Although firm-by-firm data on bank loans are act as “brokering owners” in mergers and acquisi-
not generally available, data on intercorporate tions. Grbic (2007) mapped the Japanese bank
ownership have been widely employed in studies ownership network from 1988 to 1999, a period of
of corporate networks. An especially fruitful massive restructuring and economic recession,
approach combines ownership and directorship which saw the collapse of major financial institu-
data in the study of enterprises: sets of firms oper- tions. Defining as an ownership tie a block of 2.5
ating under common control, detectable in the to 5 percent of a bank’s share capital (the latter
coincidence of intercorporate ownership with being the legal limit), Grbic compiled the
shared directors. Applying this to the Canadian two-mode matrix of relations between Japanese
economy (1972–87), Berkowitz and Fitzgerald banks and their institutional stockholders (includ-
(1995) found a five-fold consolidation of ing other banks), and then converted it to a
enterprises, from 1,456 to 298, representing an one-mode matrix of institutional shareholders,
enormous centralization of the control of capital, linked by the number of banks in which they
even though the actual number of legally defined jointly held stakes. He found that nearly all the
large companies hardly changed at all. Windolf’s 80-odd institutional investors formed a single
(2002: 42, 69) comparative investigations of component, whose density approached 0.2 in
American and European corporate networks every year; that the network structure fit a core-
included ownership ties, and revealed sharp periphery pattern, with negligible factionalization;
differences, into the 1990s, between continental and that core actors were almost entirely financial
regimes such as Germany’s, where ownership and institutions. Bearing in mind the longstanding
interlocking often coincide, and the British and division of corporate Japan into corporate
American networks, which show few instances sets, Grbic discerned a “dual network . . . of cross-
of significant intercorporate ownership and little cutting ties linking all banks and insurance
overlap between the networks. Scott’s (1986) firms while underneath exists a system organized
comparative study of corporate shareholding and by business groups that constitute separate spheres
financial power in the United Kingdom, United of influence” (p. 486). Studies such as these
States, and Japan showed that in the mid-1970s show how national intercorporate networks
most large corporations were not controlled continue to be underpinned to some extent by
by single interests but were “tied through inter- capital relations entailing combinations of alloca-
weaving share participations into a system of tive power and strategic control, as theorized by
impersonal possession” (p. 200). However, the Scott (1997).

5605-Scott-Chap13.indd 191 4/7/2011 4:53:01 PM


192 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

CONCLUSION REFERENCES

Interlock research has come a long way since Aaronovitch, S. (1961) The Ruling Class: A Study of British
Jeidels’s groundbreaking research. In the study of Finance Capital. London: Lawrence and Wishart.
economic elites and the structure of corporate Alderson, A.S. and Beckfield, J. (2004) ‘Power and position in
power, a variety of approaches has been used. We the world city system’, The American Journal of Sociology,
noted the limitations of focusing only on individ- 109(4): 811–51.
ual or corporate characteristics, in comparison to Alderson, A.S. and Beckfield, J. (2007) ‘Globalization and the
systemic approaches that consider the structure of world city system: Preliminary results from a longitudinal
the entire field. Among systemic approaches, we data set’, in P.J. Taylor, B. Derudder, P. Saey and F. Witlox
emphasized how the class hegemony and intercor- (eds), Cities in Globalization: Practices, Policies, Theories.
porate perspectives complement each other. The London: Routledge. pp. 21–36.
former focuses on the individual directors who, as Alexander, M. (2003) ‘Boardroom networks among Australian
an organized minority, exercise classwide leader- company directors, 1976 and 1996’, Journal of Sociology,
ship and control the corporate structure as an 39(3): 231–51.
“apparatus of appropriation.” The latter views Allen, M.P. (1974) ‘The structure of interorganizational elite
interlocks as vectors of inter-firm communication, cooptation: Interlocking corporate directorates’, American
coordination, influence, and control. Insofar as Sociological Review, 39(3): 393–406.
intercorporate ties entail capital relations, two Barnes, R.C. (2005) ‘The multiple dimensions of the corporate
forms of power have been discerned: strategic elite’s “small world” from 1962 to 1995’, Paper presented
control over corporations through ownership of at the annual meeting of the American Sociological
blocs of shares, and control over capital flow Association, Philadelphia, August 13–16.
exerted by financial corporations. Since the 1980s, Barnes, R.C. and Ritter, E.R. (2001) ‘Networks of corporate
interlock research has been enriched through com- interlocking: 1962–1995’, Critical Sociology, 27(2):
parative research designs and has started to look 192–220.
beyond national networks to the global level. Bearden, J. and Mintz, B. (1987) ‘The structure of class
Questions of network dynamics have been cohesion: The corporate network and its dual’, in
addressed through longitudinal designs and the M.S. Mizruchi and M. Schwartz (eds), Intercorporate
study of broken and reconstituted ties. The geog- Relations: The Structural Analysis of Business. Cambridge:
raphy of intercorporate networks has also been Cambridge University Press. pp. 187–207.
charted in the various core countries of capitalism Berkowitz, S.D. (1980) ‘Structural and non-structural models
and on a global scale. of elites: A critique’, Canadian Journal of Sociology, 5(1):
If in the past few decades the methods of analy- 13–30.
sis have grown in sophistication, corporate elites Berkowitz, S.D. and Fitzgerald, W. (1995) ‘Corporate control
and intercorporate networks have hardly remained and enterprise structure in the Canadian economy:
static in their organizational features. The research 1972–1987’, Social Networks, 17(2): 111–27.
literature reviewed above records major structural Berle, A.A. and Means, G.C. (1932) The Modern
changes, often catalyzed by economic crises that Corporation and Private Property. New York: Harcourt,
provoke massive capital reorganizations and, some- Brace & World.
times, new regulatory frameworks. This dynamic of Bourdieu, P. (1984) Distinction: A Social Critique of the
economic crisis and network re-composition, of Judgement of Taste, Translated by R. Nice. Cambridge,
course, has great relevance to the contemporary MA: Harvard University Press.
scene. The financial meltdown and global recession Brayshay, M., Cleary, M. and Selwood, J. (2006) ‘Power
that took hold in the autumn of 2008 has already geometries: Social networks and the 1930s multinational
transformed the corporate landscape, claiming most corporate elite’, Geoforum, 37(6): 986–98.
of the major U.S. investment banks, for instance. Breiger, R.L. (1974) ‘The duality of persons and groups’, Social
With the collapse of the paper economy, and with Forces, 53(2): 181–90.
widespread calls for re-regulation of corporate Brownlee, J. (2005) Ruling Canada: Corporate Cohesion and
capital, the stage seemed set for a resurgent hegem- Democracy. Halifax: Fernwood Publishing.
ony of whichever amalgamated financial institu- Bunting, D. and Barbour, J. (1971) ‘Interlocking directorates in
tions emerge from the crisis, under conditions of large American corporations, 1986–1964’, Business History
renewed state regulation and, in some countries, Review, 45(3): 317–35.
direct state control. Meanwhile, the growth of giant Carroll, W.K. (1984) ‘The individual, class, and corporate
corporations on the semi-periphery presents another power in Canada’, Canadian Journal of Sociology, 9(3):
possible source of re-composition in the structure of 245–68.
corporate power. For corporate elites and intercor- Carroll, W.K. (1986) Corporate Power and Canadian
porate networks, both national and global, what is Capitalism. Vancouver: University of British Columbia
certain is that change is here to stay. Press.

5605-Scott-Chap13.indd 192 4/7/2011 4:53:01 PM


CORPORATE ELITES AND INTERCORPORATE NETWORKS 193

Carroll, W.K. (2002a) ‘Does disorganized capitalism disorgan- Glasberg, D. (1987) ‘The ties that bind? Case studies in the
ize corporate networks?’ Canadian Journal of Sociology, significance of corporate board interlocks with financial
27(3): 339–71. institutions’, Sociological Perspectives, 30(1): 19–48.
Carroll, W.K. (2002b) ‘Westward ho? The shifting geography Grbic, Douglas (2007) ‘The source, structure, and stability of
of corporate power in Canada’, Journal of Canadian control over Japan’s financial sector’, Social Science
Studies, 36(4): 118–42. Research, 36(2): 469–90.
Carroll, W.K. (2004) Corporate Power in a Globalizing World: Green, M.B. (1983) ‘The interurban corporate interlocking
A Study in Elite Social Organization. Oxford: Oxford directorate network of Canada and the United States:
University Press. A spatial perspective’, Urban Geography, 4(4): 338–54.
Carroll, W.K. (2007) ‘Global cities in the global Green, M.B. (1993) ‘A geography of institutional stock
corporate network’, Environment and Planning A, 39(10): ownership in the United States’, Annals of the Association
2297–323. of American Geographers, 83(1): 66–89.
Carroll, W.K. (2009) ‘Transnationalists and national network- Green, M.B. and Semple, R.K. (1981) ‘The corporate
ers in the global corporate elite’, Global Networks interlocking directorate as an urban spatial information
9(3): 289–314. network’, Urban Geography, 2(2): 148–60.
Carroll, W.K. and Fennema, M. (2002) ‘Is there a transnational Heemskerk, E.M. (2007) Decline of the Corporate Community:
business community?’ International Sociology, 17(3): Network Dynamics of the Dutch Business Elite. Amsterdam:
393–419. Amsterdam University Press.
Carroll, W.K. and Fennema, M. (2004) ‘Problems in the study Helmers, H.M., Mokken, R.J., Plijter, R.C. and Stokman, F.N.
of the transnational business community: A reply to Kentor (1975) Graven naar Macht. Op zoek naar de kern van de
and Jang’, International Sociology, 19(3): 369–78. Nederlandse ekonomie. Amsterdam: Van Gennep.
Carroll, W.K. and Lewis, S. (1991) ‘Restructuring finance Hilferding, R. (1981 [1910]) Finance Capital: A Study of the
capital: Changes in the Canadian corporate network, Latest Phase of Capitalist Development, Translated by
1976–1986’, Sociology, 25(3): 491–510. M. Watnick and S. Gordon. London: Routledge & K. Paul.
Clement, W. (1975) The Canadian Corporate Elite: An Jeidels, O. (1905) ‘Das Verhältnis der deutschen Grossbanken
Analysis of Economic Power. Toronto: McClelland and zur Industrie mit besonder Berücksichtigung der
Stewart. Eisenindustrie (Relation of the German big banks to indus-
Davis, G.F. and Greve, H.R. (1997) ‘Corporate elite networks try with special reference to the iron industry)’, Staats- und
and governance changes in the 1980s’, The American sozialwissenschaftliche Forschungen, 24(2): 1–271.
Journal of Sociology, 103(1): 1–37. Kentor, J. and Jang, Y.S. (2004) ‘Yes, there is a (growing)
Davis, G.F. and Mizruchi, M.S. (1999) ‘The money center transnational business community: A study of global inter-
cannot hold: Commercial banks in the U.S. system of locking directorates, 1983–98’, International Sociology,
corporate governance’, Administrative Science Quarterly, 19(3): 355–68.
44(2): 215–39. Kim, Y.T. (2007) ‘Korean elites: Social networks and power’,
Davis, G.F., Yoo, M. and Baker, W.E. (2003) ‘The small world Journal of Contemporary Asia, 37(1): 19–37.
of the American corporate elite, 1982–2001’, Strategic Koenig, T. and Gogel, R. (1981) ‘Interlocking corporate
Organization, 1(3): 301–26. directorships as a social network’, American Journal of
Domhoff, G.W. (1967) Who Rules America? Englewood Cliffs, Economics and Sociology, 40(1): 37–50.
NJ: Prentice-Hall. Koenig, T, Gogel, R. and Sonquist, J. (1979) ‘Models of the
Domhoff, G.W. (1974) The Bohemian Grove and Other significance of interlocking corporate directorates’,
Retreats: A Study in Ruling-Class Cohesiveness. New York: American Journal of Economics and Sociology, 38(2):
Harper & Row. 173–86.
Domhoff, G.W (ed.) (1980) Power Structure Research. Beverly Kogut, B. and Walker, G. (2001) ‘The small world of Germany
Hills, CA: Sage. and the durability of national networks’, American
Faust, K. and Wasserman, S. (1993) ‘Correlation and Sociological Review, 66(3): 317–35.
association models for studying measurements on ordinal Kono, C., Palmer, D., Friedland, R. and Zafonte, M. (1998)
relations’, Sociological Methodology, 23: 177–215. ‘Lost in space: The geography of corporate interlocking
Fennema, M. (1982) International Networks of Banks and directorates’, The American Journal of Sociology, 103(4):
Industry. The Hague: M. Nijhoff. 863–911.
Fennema, M. and Schijf, H. (1978) ‘Analysing interlocking Levine, J.H. and Roy, W.S. (1979) ‘A study of interlocking
directorates: Theory and methods’, Social Networks, 1(4): directorates: Vital concepts of organization’, in P.W. Holland
297–332. and S. Leinhardt (eds), Perspectives on Social Network
Fennema, M. and Schijf, H. (1985) ‘The transnational Research. New York: Academic Press. pp. 349–78.
network’, in F. N. Stokman, R. Ziegler and J. Scott (eds), Maclean, M., Harvey, C. and Press, J. (2006) Business Elites
Networks of Corporate Power: A Comparative Analysis of and Corporate Governance in France and the UK.
Ten Countries. Cambridge: Polity Press. pp. 250–66. Basingstoke, UK: Palgrave Macmillan.
Galaskiewicz, J. and Wasserman, S. (1981) ‘A dynamic study Mariolis, P. and Jones, M.H. (1982) ‘Centrality in corporate
of change in a regional corporate network’, American interlock networks: Reliability and stability’, Administrative
Sociological Review, 46(4): 475–84. Science Quarterly, 27(4): 571–85.

5605-Scott-Chap13.indd 193 4/7/2011 4:53:01 PM


194 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Menshikov, S. (1969) Millionaires and Managers: Structure Porter, J. (1956) ‘Concentration of economic power and the
of the U.S. Financial Oligarchy. Moscow: Progress economic elite in Canada’, The Canadian Journal of
Publishers. Economics and Political Science, 22(2): 199–220.
Mills, C.W. (1956) The Power Elite. New York: Oxford Porter, J. (1957) ‘The economic elite and the social structure
University Press. in Canada’, The Canadian Journal of Economics and
Mintz, B. and Schwartz, M. (1981) ‘Interlocking directorates Political Science, 23(3): 376–94.
and interest group formation’, American Sociological Ratcliff, R.E. (1980) ‘Banks and corporate lending: An analysis
Review, 46: 851–69. of the impact of the internal structure of the capitalist class
Mintz, B. and Schwartz, M. (1985) The Power Structure on the lending behavior of banks’, American Sociological
of American Business. Chicago: University of Chicago Review, 45(4): 553–70.
Press. Richardson, R.J. (1987) ‘Directorship interlocks and corporate
Mizruchi, M.S. (1982) The American Corporate Network: profitability’, Administrative Science Quarterly, 32(3):
1904–1974. Beverly Hills: Sage. 367–86.
Mizruchi, M.S. (1996) ‘What do interlocks do? An analysis, Rochester, A. (1936) Rulers of America: A Study of Finance
critique, and assessment of research on interlocking Capital. London: Lawrence & Wishart.
directorates’, Annual Review of Sociology 22: 271–98. Scott, J. (1985) ‘Theoretical framework and research design’,
Mizruchi, M.S. and Schwartz, M. (1987) ‘The structural in F.N. Stokman, R. Ziegler and J. Scott (eds), Networks of
analysis of business: An emerging field’, in M.S. Mizruchi Corporate Power: A Comparative Analysis of Ten Countries.
and M. Schwartz (eds), Intercorporate Relations: The Cambridge: Polity Press. pp. 1–19.
Structural Analysis of Business. Cambridge: Cambridge Scott, J. (1986) Capitalist Property and Financial Power.
University Press. pp. 3–22. Brighton, Sussex: Wheatsheaf Books.
Mizruchi, M.S. and Stearns, L.B. (1988) ‘A longitudinal study Scott, J. (1987) ‘Intercorporate structures in Western Europe:
of the formation of interlocking directorates’, Administrative A comparative historical analysis’, in M.S. Mizruchi and
Science Quarterly, 33(2): 194–210. M. Schwartz (eds), Intercorporate Relations: The Structural
Moore, G. (1979) ‘The structure of a national elite network’, Analysis of Business. Cambridge: Cambridge University
American Sociological Review, 44(4): 673–92. Press. pp. 208–32.
Murray, G. (2006) Capitalist Networks and Social Power in Scott, J. (1991) ‘Networks of corporate power: A
Australia and New Zealand. Aldershot, UK: Ashgate. comparative assessment’, Annual Review of Sociology, 17:
Murray, G. (2008) ‘Invisible invaders: Does Australia have a 181–203.
transnational class?’ Paper presented at the ISA Forum of Scott, J. (1997) Corporate Business and Capitalist Class.
Sociology, Barcelona, September 4–8. New York: Oxford University Press.
Okhmatovskiy, I. (2005) ‘Sources of capital and structures of Scott, J. (2003) ‘Transformations in the British economic elite’,
influence: Banks in the Russian corporate network’, Comparative Sociology, 2(1): 155–73.
International Sociology, 20(4): 427–57. Scott, J. (2008) ‘Modes of power and the re-conceptualization
Ornstein, M.D. (1984) ‘Interlocking directorates in Canada: of elites’, in M. Savage and K. Williams (eds), Remembering
Intercorporate or class alliance?’ Administrative Science Elites. Oxford: Blackwell. pp. 27–43.
Quarterly, 29(2): 210–31. Scott, J, and Griff, C. (1984) Directors of Industry: The
Palmer, D. (1987) ‘The dual nature of corporate interlocks’, British Corporate Network, 1900–1976. Cambridge: Polity
in M. Schwartz (ed.), The Structure of Power in America: Press.
The Corporate Elite as a Ruling Class. New York: Holmes Sonquist, J.A. and Koenig, T. (1975) ‘Interlocking directorates
and Meier. pp. 60–74. in the top U.S. corporations: A graph theory approach’,
Park, L. and Park, F. (1973 [1962]) Anatomy of Big Business. The Insurgent Sociologist, 5(3): 196–230.
Toronto: James Lewis & Samuel. Soref, M. and Zeitlin, M. (1987) ‘Finance capital and the
Pennings, J.M. (1980) Interlocking Directorates: Origins and internal structure of the capitalist class in the United
Consequences of Connections Among Organizations’ States’, in M.S. Mizruchi and M. Schwartz (eds),
Boards of Directors. San Francisco: Jossey-Bass. Intercorporate Relations: The Structural Analysis of
Perlo, V. (1957) The Empire of High Finance. New York: Business. Cambridge: Cambridge University Press.
International Publishers. pp. 56–84.
Pfeffer, J. (1987) ‘A resource dependence perspective on Stanworth, P, and Giddens, A. (1975) ‘The modern corporate
interorganizational relations’, in M.S. Mizruchi and economy: Interlocking directorships in Britain, 1906–1970’,
M. Schwartz (eds), Intercorporate Relations: The Structural The Sociological Review, 23(1): 5–28.
Analysis of Business. Cambridge: Cambridge University Stearns, L.B. and Mizruchi, M.S. (1986) ‘Broken-tie
Press. pp. 22–55. reconstitution and the functions of interorganizational
Piédalue, G. (1976) ‘Les groupes financiers au Canada interlocks: A reexamination’, Administrative Science
1900–1930 — Étude préliminaire’, Revue d’histoire de Quarterly, 31(4): 522–38.
l’Amérique française, 30(1): 3–34. Steglich, C.E.G., Snijders, T.A.B. and West, P. (2006) ‘Applying
Porter, J. (1955) ‘Elite groups: A scheme for the study of SIENA: An illustrative analysis of the coevolution of adoles-
power in Canada’, Canadian Journal of Economics and cents’ friendship networks, taste in music, and alcohol
Political Science, 21(4): 498–512. consumption’, Methodology, 2: 48–56.

5605-Scott-Chap13.indd 194 4/7/2011 4:53:01 PM


CORPORATE ELITES AND INTERCORPORATE NETWORKS 195

Stokman, F.N., van der Knoop, J. and Wasseur, F.W. (1988) interorganizational network evolution’, Organizational
‘Interlocks in the Netherlands: Stability and careers in the Research Methods, 10: 463–82.
period 1960–1980’, Social Networks, 10: 183–208. van der Pijl, K. (1984) The Making of an Atlantic Ruling Class.
Stokman, F.N., Ziegler, R. and Scott, J. (eds) (1985) Networks London: Verso.
of Corporate Power: A Comparative Analysis of Ten Whitley, R. (1974) ‘The city and industry: The directors of
Countries. Cambridge: Polity Press. large companies, their characteristics and connections’,
Sweezy, P.M. (1953) The Present as History: Essays and in P. Stanworth and A. Giddens (eds), Elites and Power in
Reviews on Capitalism and Socialism. New York: Monthly British Society. London: Cambridge University Press.
Review Press. pp. 66–82.
Useem, M. (1978) ‘The inner group of the American capitalist Whitley, R. (1999) Divergent Capitalisms. New York: Oxford
class’, Social Problems, 25(3): 225–40. University Press.
Useem, M. (1984) The Inner Circle: Large Corporations and Windolf, P. (2002) Corporate Networks in Europe and the
the Rise of Business Political Activity in the U.S. and U.K. United States. New York: Oxford University Press.
New York: Oxford University Press. Zeitlin, M. (1974) ‘Corporate ownership and control: The large
Useem, M. and Karabel, J. (1986) ‘Pathways to top corporate corporation and the capitalist class’, American Journal of
management’, American Sociological Review, 51(2): Sociology, 79(4): 1073–119.
184–200. Zweigenhaft, R.L. and Domhoff, G.W. (1998) Diversity in the
van de Bunt, G.G. and Groenewegen, P. (2007) ‘An Power Elite: Have Women and Minorities Reached the
actor-oriented dynamic network approach: The case of Top? New Haven, CT: Yale University Press.

5605-Scott-Chap13.indd 195 4/7/2011 4:53:01 PM


14
Political Dimensions of
Corporate Connections
Matthew Bond and Nicholas Harrigan

INTRODUCTION consequences has a long history. Adam Smith’s


(1776 [1937]) concerns about collusion between
Social network analysis (SNA) is (1) a method for entrepreneurs are an early precursor; however,
analysing the volume and patterns of social the research traditions that are the subject of
relations linking individual actors to each other this review originated in the first decades of the
and (2) a way of theorising social structure and its twentieth century.
effects on behaviour. The analysis of corporate Interest in corporate behaviour and politics
political activity, on the other hand, is part of the developed in reaction to a number of changes in
empirical examination of business politics. They capitalist economies. In its early stages capitalist
are distinct intellectual endeavours; however, their production was dominated by family-controlled
paths have often crossed and led to mutually firms that were small relative to the size of the
beneficial partnerships. Social network analysts markets they operated in. Growth in the scale
have an opportunity to test the utility of their of production and the concomitant need to coordi-
measures and theoretical predispositions in a nate firms’ complex and diverse activities created
substantive field of empirical research. Scholars pressures leading to the creation of the modern
of business politics have relied on SNA for a set of corporate economy (Chandler, 1977). Five
tools suited to the task of operationalising and interrelated consequences accompanied these
testing their theories. changes. First, large-scale production radically
In this chapter we review and evaluate these augmented firms’ capital requirements and,
collaborations. We start by outlining the history thereby, their reliance on external sources of
and contours of the broader research agenda finance. Second, firms began producing on such
concerned with corporate politics. We then scales that their output was a significant propor-
discuss analytic issues involved in conceptualising tion of total supply. Third, the growth of joint
corporate actors and the relations linking them as stock led to the dilution of family ownership.
a social network. We continue by examining how Fourth, a corps of managers skilled in administra-
social network mechanisms and measures have tion emerged who were not necessarily owners
been used in the empirical literature. We conclude of the firms they ran. Fifth, explicit, bureaucratic
by reviewing prospects for future collaborations. mechanisms of coordination were substituted for
market mechanisms within firms and across them
through, for example, shared personnel on firms’
boards of directors (interlocking directorates).
HISTORY AND BACKGROUND While these trends might appear to be primarily
technical and economic, they attracted attention
Scholarly interest in social1 relations between from political authorities and were perceived to
business establishments and their political have political consequences. In the United States

5605-Scott-Chap14.indd 196 4/6/2011 11:50:26 AM


POLITICAL DIMENSIONS OF CORPORATE CONNECTIONS 197

the changes, especially inter-firm relations they are reinforcing (Berg and Zald, 1978). Third,
between nominal competitors, led to fears that the the separation of ownership and control (Berle
new large economic corporations would engage in and Means, 1932) has robbed capitalists of
monopolistic practices, such as price fixing. In integrating social relations that would permit them
response anti-trust laws were implemented, regu- to mobilise and take unified political action (Bell,
latory frameworks were developed, and, outside 1960; Useem, 1984). The first two points are not
the United States, corporations in strategic indus- amenable to examination by network methods;
tries were often nationalised. however, SNA has been deemed the most suitable
Another response, which had a more profound method for examining whether corporations or
impact on research traditions using network directors (the issue of appropriate unit of analysis
analyses, was formulated by a series of scholars is discussed in the next section) have relations
who developed theories of finance capital and they can use to form a political community.
imperialism (Hobson, 1902; Hilferding, 1910; Details of specific network studies are pre-
Lenin, 1916). For them, the changes in the sented later. For now it will suffice to provide a
economy, particularly the centralisation and con- synoptic outline of the role of network methods
centration of finance needed to meet the invest- and theories used in the power structure debate.
ment needs of large-scale production, provided In response to pluralist critiques, elite and
the basis for a powerful capitalist, ruling class. In finance capital theorists collected and presented
the words of Lenin, ‘Production becomes social, data bearing on capitalist social networks (Sweezy,
but appropriation remains private. The social 1953 [1939]; Aaronovitch, 1961; Kolko, 1962);
means of production remain the private property however, they did so prior to the development of
of a few. The general framework of a formally social network analytic measures and computa-
recognised free competition remains, and tional tools. Beginning in the 1970s a new set of
oppression by a few monopolists of the rest of the scholars took advantage of developments in SNA
population becomes a hundred times more intense, and began mapping corporate networks (e.g.
palpable and intolerable’ (1916: 25). A few Levine, 1972; Carroll, 1982; Mizruchi, 1982;
thousand capitalists, centred on banks, are able to Scott and Griff, 1984; Scott, 1990; Carroll and
use the new coordinated corporate order for their Sapinski, this volume). They showed that (1) a
own private needs. One of the central political wide variety of social relations link corporations,
consequences is war between states in search of (2) most corporations are parts of connected
new territories for capital investment. components, and (3) there are central actors who
While not sharing Lenin’s resolute Marxism, could coordinate the actions of many others if they
elite theorists (e.g. Mills, 1956; Domhoff, 1998) could garner authority from those relations (e.g.
made similar points. C. Wright Mills argued Mintz and Schwartz, 1985).
that the growth of large-scale bureaucracies in Difficulties remained. Although these studies
modern societies had created conditions for the confirmed the structure of corporate networks
domination by a small elite. Mills departed from were consistent with the broad claims made by
theorists of finance capital by adopting a Weberian, elite and finance capital theorists, weakness lay in
multidimensional view of power. The corporate their inferential frameworks. First, they lacked a
elite is part of a broader integrated elite that is also probabilistic baseline. Knowledge of the features
drawn from the polity and the military. In spite of of random networks were either not known or
their differences about the distribution of power were not diffused throughout the community of
across elites and their view of modern society’s network scholars. It was unclear whether corpo-
developmental trends, theorists of finance capital rate networks’ characteristics were signs of
and elite theorists agreed that corporate elites are conscious design and coordination or whether
few in number, well integrated, and powerful. more random processes generated them. Second,
Of course, these claims were intensely disputed. even if a network’s characteristics were not
Pluralist scholars argued that the integration of random their political consequences were unap-
elites in general, and corporate elites in particular, parent. Corporations might have the social
had been assumed rather than demonstrated by resources permitting them to form a powerful
elite and Marxist scholars (Rose, 1968). Although political community, but there was no evidence that
pluralists agreed economic power had migrated they could, or would, take advantage of them.
to a small number of individuals, they claimed Judgement of this body of work is difficult.
modern societies have a number of countervailing Any serious empirical researcher cannot help but
forces (Galbraith, 1952). First, democratic control admire the range of data collected and the ingen-
of the polity has provided an independent check ious measurement strategies deployed. The lack of
on corporate power (Dahl, 1961). Second, corpo- an inferential framework, however, limits the
rate elites do not have a single unified set of trust one can place in their conclusions. A further
interests – elite interests are as cross cutting as problem with this research is that it is difficult to

5605-Scott-Chap14.indd 197 4/6/2011 11:50:26 AM


198 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

assess the political consequences of the network effects corporations have on political systems. At
characteristics that have been identified. the very least, uncoordinated corporate political
Beginning in the 1980s a second generation of action can add random sources of error into
scholarship emerged that investigated the political political communication and deliberation. Second,
consequences of corporate social networks. An their focus on politically active corporations and a
early example was Useem’s (1984) claims that dyadic framework hindered their ability to make
there were a set of well-connected directors and statements about the entire network. Their research
corporations who are more likely, among other designs meant they could tell us nothing about the
things, to make political donations or be active in network sources of political inactivity or whether
think tanks. It was not, however, until three inde- politically inactive corporations influence other
pendent projects led by the American scholars Val firms’ political activity. Inferences that earlier
Burris (1987), Dan Clawson and Alan Neustadtl scholars had tried to make about the political
(Clawson et al., 1986; Neustadtl and Clawson, consequences of national corporate structures
1988) and Mizruchi (1989, 1990, 1992) that net- were extremely difficult, given the preoccupation
work methodologies were systematically used to with politically active firms.
investigate corporate political behaviour. They More recently, a new set of analytic concerns
exploited publicly available sources of data about has attracted the scrutiny of scholars using
contributions by American corporations to politi- network methodologies. Val Burris (1991, 2001,
cal campaigns, which had only recently become 2005; see also Bearden and Mintz, 1987) has
available because of changes in American election broadened the focus of corporate political behav-
law. Their analytic concerns centred on the sources iour to include directors as well as corporations.
of unity and partisanship in corporate politics, This has enabled him to build links between the
which they studied in the context of historical analysis of corporate political behaviour and
debates about business’s role in shifting American research traditions that have focussed on elite
politics to the right in the 1980s. individuals (e.g. Mills, 1956; Domhoff, 1998).
As well as exploring political consequences, Network methodologies developed to study
the studies innovated by focussing on dyadic corporations have been used to study elites. Other
and factional relations among politically active examples of papers examining the political conse-
corporations. The structure of relations between quences of director backgrounds and networks
politically active corporations displaced interest include Bond (2007), Harrigan (2007b) and Bond
in the broader contours of national corporate and colleagues (2006).
networks. The dyadic, factional basis was an Bond (2004) has argued that recent research on
implicit consequence of accepting Dahl’s (1958) American corporate behaviour has limited exter-
arguments that unity is a necessary prerequisite of nal validity. The focus on business unity is, to
power. Corporations and their directors might some extent, an artefact of American institutional
have a great deal of potential collective power; relationships and the absence of an electorally
however, if each pursues different aims or viable American socialist or labour party. When
supports different candidates their collective powerful political forces threaten the existence of
power may never be actualised. capitalist enterprise the field of corporate political
These studies made significant contributions choice is narrowed – the freedom of corporations
to our knowledge about business politics; they to be disunited could be interpreted as evidence of
developed inferential frameworks as well as American business dominance. For example,
creatively employing network methods. Perhaps during the period of Labour-Conservative political
most impressively, they treated the respective competition for state power, the overwhelming
claims made on either side of the power structure majority of corporate political support has gone to
debate as testable hypotheses. Their legacy is to the Conservative Party (see Pinto-Duschinsky,
have left a more nuanced picture of capitalist 1981; Linton, 1994; Ewing, 1987). These observa-
activity in capitalist economies. tions are consistent with Smith’s (2000) finding
Their achievements are many; however, their that American businesses were most unified when
approach had certain limits. First, if one succumbs in greatest peril.
to Dahl’s claims as these scholars more or less did, As well as unity, mobilisation (measured as, for
one can reasonably ignore the effects that many example, the proportion of corporations making a
large, uncoordinated business contributions may political donation) and intensity (measured as, for
have on a political system. This is a controversial example, the size of donations) are important
decision. A principled line of criticism of capital- dimensions of corporate political behaviour.
ist societies has, after all, highlighted the distort- Shifting notice from unity has network
ing effects they can have on rational political implications – there is no reason to expect mobili-
discussion (Habermas, 1987). We are interested sation to be influenced by the same network
not only in meaningful but also in unintended mechanisms as unity. A key analytic development

5605-Scott-Chap14.indd 198 4/6/2011 11:50:27 AM


POLITICAL DIMENSIONS OF CORPORATE CONNECTIONS 199

in the emerging literature developing around we begin with two sets of actors: corporations and
mobilisation has been the widening of samples to individuals affiliated to them. Overlapping affilia-
include corporations/directors who are not politi- tions can be used to construct inter-corporate and
cally active (Bond, 2004, 2007; Bond et al., 2006; inter-individual networks. By far, the most studied
see Harrigan, 2007a, b) for an example of research inter-corporate networks have been based on
that simultaneously analyses partisanship and interlocking directorates where the director of one
mobilisation). Giving all corporations within a corporation sits on the board of another; however,
defined population an opportunity to enter the the framework we develop below is suitable to a
sample has facilitated a shift away from dyadic wide range of different networks linking directors,
relations between politically active corporations corporations and other corporate stakeholders
and brought it closer to earlier studies examining (e.g. networks could be constructed based on
the structure of national corporate networks. Role ownership; see Zeitlin, 1974).
positions in the corporate social structure as well The criterion most associated with selection
as dyadic relations have been associated with into studies of business behaviour has been size.
mobilisation (Bond, 2007). The sample is the n largest corporations in a
It is perhaps too early to judge the contribution national economy. These can be found in privately
of the latest wave of scholarship using network funded journalistic lists ranging from the Fortune
methodologies; however, some potential weak- 500 to the FTSE 500. By examining more primary
nesses stand out. First, social directories used to sources, such as corporations’ statutory reporting
collect status information about directors are practices (annual reports), researchers can easily
incomplete (only a subset of directors is included validate the lists’ claims. Additional validation is
in them). This weakness is a prompt to empirical granted to these lists, in many cases, because the
researchers to discover new data sources and for number of actors they include exceeds theoretical
statistically minded social network researchers to expectations. For example, if we follow Lenin
outline the inferential consequences of missing (1916), Mills (1956) or Baran and Sweezy (1966)
data. Second, there are many outstanding ques- we would not be surprised if the most nationally
tions about the role of selection and influence in influential economic actors numbered in the tens
these studies that would be more tractable if lon- or few hundreds – the lists should include every
gitudinal and cross-national data were collected. politically significant member of the business
This brief review of social network studies of elite. A sample selection from large corporations,
corporate politics demonstrates that there have however, has loaded theoretical ramifications. The
been at least three analytic stages of network stud- reasonableness of this assumption is an area
ies of corporate politics and growth in scientific deserving additional empirical and theoretical
knowledge and technique. Network methodolo- research. As well as the criterion of size, some
gies have a firm and proven place in studying studies limit themselves to politically active
corporate politics. Analysts with diverse theoreti- corporations or use a stratifying criterion, such as
cal proclivities and investigating varied institu- industry. Simple random samples of corporations
tional environments have turned to SNA as a taken from the universe of all corporations are
methodology and theoretical resource. In the next absent from the literature.
two sections we wish to give a slightly more Most generally, we study n corporations
formal assessment of the network methodologies sampled from a larger universe of corporations.
and mechanisms emphasised in the literature. Directors are the most commonly studied corpo-
rate affiliates because they are assumed to be the
ultimate political authority in corporations.2 They
approximate generally accepted descriptions of
NETWORK METHODOLOGY working capitalists. In the future, scholars could
take a wider range of affiliates, ranging from
In this section we highlight the general network owners through creditors to employees. The choice
analytic issues that have arisen in the study of of affiliates is a theoretical decision.
corporate politics. We intend to guide researchers We also study m individuals affiliated to n
through some of the major challenges they face corporations. When we cross-tabulate corpora-
when translating theoretical claims about business tions by affiliated individuals we have an m × n
behaviour into concrete research strategies. corporation by individual affiliation matrix A
(Borgatti, this volume). Following Breiger (1974),
if we post-multiply3 A by its transpose,4 AAT,
Corporate networks we have an m × m corporation by corporation
matrix, B. If we pre-multiply the matrix by its
There are many data matrices that can be constructed transpose we get an n × n individual by individual
to represent corporate networks. Most commonly, matrix, C. Although these matrices are related,

5605-Scott-Chap14.indd 199 4/6/2011 11:50:27 AM


200 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

they have distinct structural properties (see mobilization and partisanship the dependent vari-
Bearden and Mintz, 1987). Networks of interlock- able can be treated as polytomous, such as whether
ing directorates are examples of B matrices (see a corporation does not donate, makes ideological
Mizruchi, 1982; Scott and Griff, 1984; Bond, contributions, or hedges (Harrigan, 2007a).
2004). In studies focussing on unity or partisanship
Variations of these matrices can be created the conceptualisation of the dependent variable
to reflect the multi-modal characteristics of displays the influence of network thinking. Unity
corporate networks. Constructing additional researchers typically characterise similarity of
matrices, D, linking either corporations, m, or political behaviour in dyadic terms. For example,
individuals, n, to third actors, p, ranging from Mizruchi constructed a similarity measure for
social clubs to political parties, can facilitate this. all 1,596 dyads created by the 57 manufacturing
For example, Bond (2007) created a D (n × p) corporations in his sample. For each dyad he
individual by club matrix. He pre-multiplied this calculated the following measure of similarity of
by an A (m × n) corporation by director matrix, political behaviour:
AD, giving an m × p matrix, E. Post-multiplying
this matrix by its transpose, EET, he obtained Sij = nij /(ni*nj)1/2
a B (m × m) matrix where cell entries are the
products5 of corporations’ shared affiliations to clubs
through their directors summed over all clubs. where nij is the total number of corporate dona-
Networks used in studies of corporate politics tions that corporation i and corporation j make in
are not only constructed through affiliation common, ni and nj are the total numbers of dona-
matrices. They can be created by direct relations tions each makes. Mizruchi then modelled the
between firms or directors. For example, Mizruchi effects of dyadic social relations on the dyadic
(1992) used inter-industry trade and market measure of political similarity. Su et al. (1995)
concentration to construct matrices of inter- created corporation by corporation data matrices
corporate market constraint. where cell entries are dyadic measures of political
Many network measures have been used in similarity. Where they differed from Mizruchi is
studies of corporate politics. Researchers inter- that they performed clique analyses (Alba, 1973)
ested in detecting the political effects of dominant to cluster corporations into blocs depending on
corporations ranging from a ‘financial oligarchy’ their similarity of political behaviour. They then
through ‘interest groups’ to an ‘inner circle’ have attempted to explain membership of these group-
used measures of centrality to operationalise their ings rather than dyadic relations directly.
concepts (Useem, 1984; Mintz and Schwartz,
1985). Measures of cohesion, including political
homophily and clique analysis, have been used to
detect particularistic or close-knit relationships Corporate attributes
between political factions (e.g. Bond, 2004; Corporations’ attributes are usually included in
Clawson and Neustadtl, 1989). Finally researchers network studies of corporate politics as controls.
interested in mechanisms of social control produc- They are there to avoid potential omitted variable
ing mobilisation and unity in corporate politics biases, that is, biases created by variables that are
have used measures of structural equivalence simultaneously associated with the dependent
(Mizruchi, 1992; Bond, 2004). Structural equiva- political variable and the independent corporate
lence has also been used as a basis for clustering network variable. For example, corporations in
corporations into social positions with typical role certain industries might independently be more
relations between them (Bond, 2007). likely to share a social relation and to take specific
kinds of political behaviour – associations between
social relations and political behaviour could be
Corporate political behaviour spurious when industry is controlled. Attributes
are conceptualised either as properties of individ-
As we discussed earlier, network studies have uals or properties of dyads.
treated political behaviour as the dependent
variable that can be explained by network
influences. Political behaviour is typically opera-
tionalised as mobilisation or unity. Statistical models
In studies focussing on mobilisation the depend-
ent variable is often treated as dichotomous, for The attention devoted to studying the political
example, whether a corporation does or does not consequences of corporations’ social networks
make a donation to a political party (Bond, 2004, has inevitably led researchers to use statistical
2007). In studies that simultaneously examine models in order to estimate the magnitude of the

5605-Scott-Chap14.indd 200 4/6/2011 11:50:27 AM


POLITICAL DIMENSIONS OF CORPORATE CONNECTIONS 201

relationship between social factors and whether from Lenin (1916), and elite theories, such as
they are significantly different from a null model from Mills (1956), lead us to expect powerful
of no relationship. Depending on how political actors in modern corporate economies to be linked
behaviour (the dependent variable) is measured, by many formal and informal ties.
some variant of the generalised linear model Theorists of finance capital and bank control
is selected. Examples include least squares with have given the most explicit predictions about the
dummy variables (LSDV) (Mizruchi, 1989), quad- structure of national inter-corporate networks.
ratic assignment procedure (QAP) regression, and Concentrations of financial power should lead to a
logistic regression (Bond, 2004). few clusters of corporations centred on controlling
Because these projects use relational models, banks. The key feature of the network is its cen-
observations of both political behaviour and tralisation, which reflects the extreme agglomera-
corporate networks are often not statistically inde- tion of capital; however, the network is divided
pendent. Unity researchers have paid most into separate cohesive groups united in their
attention to this issue and incorporated corrections dependence on the same financial institutions, for
for lack of independence into their model. Harrigan example, interest groups (Sweezy, 1953 [1939]).
(2007b) is one of the first to take advantage The political importance of this structure is that it
of statistical network models that are designed provides the organisational basis for a capitalist
precisely to handle difficulties surrounding ruling class centred on a financial oligarchy.
the lack of statistical independence in network An example of a sophisticated operationalisa-
observations. tion of these ideas in network terms comes from
The use of ‘largeness’ as a criterion for Mintz and Schwartz (1981, 1983, 1985), who
selecting corporations into samples raises sample used data on interlocking directorates between
selection issues (Berk, 1983; Breen, 1996; large American corporations in the 1960s to test
Heckman, 1979). Val Burris (2005) used Heckman for structural configurations predicted by theories
selection models in an effort to control for sample of bank control. Their theory had four elements.
selection but his is a lone example. Analysts may First, interlocking directorates were treated as
feel theoretically justified restricting their obser- indicators6 of competition’s absence – interlocked
vations to large corporations but this choice has corporations do not compete. Instead, they
analytic consequences that should be accounted indicated either cooperative or authoritative rela-
for. After all, are the rich (powerful) different from tions. Second, there should be a positive skew in
the poor (powerless) in any way other than having corporations’ degree centrality in the network of
more money (power)? Systematic comparisons of interlocking directorates with financial corpora-
differing sample plans are a promising area for tions being interlocked to the largest number. This
future research. reflects (a) corporations’ dependence on capital,
an inevitable concomitant of large-scale industrial
production and (b) the concentration of finance
capital in a few hands, a consequence of capitalist
NETWORK MECHANISMS competition. Third, cohesive subgroups should be
organised around financial corporations. Fourth,
the presence of interlocks within subgroups
In this section we shift our attention from
reflects cooperation among firms dependent on
methodology to theory. We focus on three mecha-
the same financial institutions and their absence
nisms that have been at the heart of network
between reflects subgroup competition. The ratio
analyses of corporate politics: (1) centrality,
of in-group to out-group interlocks measures
(2) cohesion and (3) structural equivalence
levels of ‘intra-group unity’ relative to ‘inter-
(Doreian et al., this volume; Hanneman and
group competition.’
Riddle, this volume). While we discuss centrality
The network analytic strategy adopted by Mintz
independently the debates about cohesion and
and Schwartz (1981, 1983, 1985) to investigate
structural equivalence have become so entwined
these issues had two parts. First, theyconfirmed
that we feel it makes sense to discuss them simul-
the centrality of financial corporations by using a
taneously; however, each of the measures has
weighted7 centrality measure. Large financial
overlapping dimensions.
corporations dominated the list of the 20 most
central corporations. Second, they identified
peaks and clusters of corporations around them.
Centrality Peak analysis involves searching for corporations
that are more central than all other corporations
The role of central actors in the corporate they are connected with – these corporations are
economy has been key to theories of business called peaks. Once peaks are identified a corpora-
power. As we discussed, Marxist theories, such as tion is considered part of a cluster centred on a

5605-Scott-Chap14.indd 201 4/6/2011 11:50:27 AM


202 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

peak if every other corporation it is linked to is reflect dependence relations and on findings by
more central than it is in the same cluster (i.e. Koenig et al. (1979), Ornstein (1980) and Palmer
linked to the same peak). Some special features of (1983) that broken interlocks are rarely replaced,
this way of defining clusters are worth note: a which is inconsistent with their being indicators of
corporation does not need to be directly linked to inter-firm dependence. Instead, he argued that
a peak to be in a cluster defined by it (a concomi- corporate interlocks were driven by an effort
tant of this is that corporations in the same cluster to gain general information about the broader
do not need to have a direct tie), a corporation corporate community.
cannot be in more than one cluster, and it is Market pressures buffet directors and their
possible for some firms to be in none of the corporations, giving them a short-sighted, techno-
clusters. cratic and profit-driven focus. They are loath to
Mintz and Schwartz found several peaks in involve themselves and their firms in political
the 1960s American corporate network but the action unless it can be rationalised as having a
clusters around them tended to be small. For direct positive effect on corporate profits. As busi-
example, in 1966 they found 10 ‘major’ peaks, all ness political activity has many collective action
commercial banks, but only 5 per cent of all features (Olson, 1965; Bond, 2004), firms are
corporations were members of a cluster. From likely to free-ride on others’ political activity –
these analyses, they concluded that while financial firm-level rationality dominates community/class-
institutions are central and influential in the level rationality. When directors sit on the boards
network the corporate network is not divided into of other corporations they become more sensitive
discrete clusters around them. Mintz and Schwartz to the challenges facing the corporate community
drew two conclusions from their findings: (1) the and the mutual interests they share with other
interest group formulation of finance capital directors who are in the same class and situation.
theory does not accurately describe the network The heightened political consciousness of these
of interlocking directorates and (2) the lack of multiple directors allows class-wide rationality to
discrete, competing interest groups means ‘that gain the upper hand over parochial firm-level
the trends toward unity outweigh the forces of concerns. Politically active multiple directors are
division’ (Mintz and Schwartz, 1983: 201). termed the inner circle. Useem supported his
Are these conclusions justified, or are they contentions about multiple directorships by draw-
merely artefacts of their procedures? ing on a wide range of examples, from donations
Mintz and Schwartz, to their credit, outlined to political parties to sitting on the boards of think
clear hypotheses about the relation between tanks, where the most central directors and
capital concentration and the structure of the inter- corporations are also the most active.
locking directorate network, which were consistent Useem’s theories also made predictions about
with theorists of finance capital from Lenin the quality of political activity by the inner circle.
(1916) to Sweezy (1953 [1939]). They also took He argued that it would tend towards corporate
effort to validate their findings by triangulating liberalism (Weinstein, 1968), that is, it would
them with qualitative data from the business press be more compromising on some issues vital to
that confirmed corporate unity. From a purely business because its class-wide rationality would
social network analytic perspective, however, allow accommodation with labour and the state
inferential difficulties remain. How many peaks that are necessary for the long-term survival of the
should we expect to find in networks with as capitalist system.
many actors and as many ties as the American Useem’s theories about the effects of interlocks
corporate network? How much clustering? have received mixed support in the literature.
Without the baseline of a random network it is Mizruchi (1989) and Burris (1987) found no
difficult to judge whether the network features effect of the number of direct interlocks on the
Mintz and Schwartz identified could arise entirely similarity of American corporations’ political
by chance or whether they represent systematic behaviour. Clawson et al. (1986) found that highly
biases predicted by bank control or finance capital interlocked corporations were most likely to
theorists. follow pragmatic, firm, rational political-donation
Whereas Mintz and Schwartz and financial strategies. They argued that heavily interlocked
capital theorists used interlocking directorates firms had opportunities for defending class-wide
primarily as indicators of capital flows or compe- political interests other than donations to ideo-
tition’s absence, Michael Useem (1984) studied logical candidates. Firms with no interlocks had
their role as a mechanism of political unity. He no other avenues to express class-wide political
dismissed the idea that interlocks merely reflect interests.
financial dependencies. He based his rejection on Bond (2004) found that central corporations in
his interview data with British and American the British network of interlocking directorates
directors who consistently denied interlocks were more likely to make donations to the

5605-Scott-Chap14.indd 202 4/6/2011 11:50:27 AM


POLITICAL DIMENSIONS OF CORPORATE CONNECTIONS 203

Conservative Party. The picture became more Indirect, two-step relations can alter (or not) the
mixed when he partitioned interlocks depending behaviour of either participant by two, overlap-
on whether they were made by corporate execu- ping mechanisms: (1) competition – actors can
tives, non-executives from outside the corporate compete for the set of resources controlled by a
community, or incidentally created between two third actor and act similarly because they think
firms when a director from a third firm sat on both that will be a key to unlocking the third’s resources;
their boards. Two key findings were that firms that and (2) third-party control – a third actor can
‘sent’ many directors were more likely to make exploit the forces for conformity in competition to
donations and that corporations that ‘received’ ties ensure that two actors act in ways that satisfy her
were less likely to make donations unless they or his interests. These mechanisms have been
came from corporations that were donors them- most extensively theorised by social scientists
selves. He argued that these findings contradicted using social network analytic concepts9 or
the idea that inner-circle positions influenced sociologists using reference group theory.
the political behaviour of firms and their directors. Both cohesion and structural equivalence
Instead, they were more consistent with ‘influen- mechanisms can contribute to dyadic covariance
tial’, politically active corporations and directors in individual behaviour in a network. Additional
selecting into multiple relations with other corpo- sources of observed covariance will arise from
rate actors. They then used their multiple ties to researcher and instrument fallibility, selection,
influence others to follow their political lead. and omitted variable biases. Each source is impor-
Centrality appears to be associated with politi- tant but selection issues have posed the most
cal behaviour but not consistently. Disagreement pressing problems for social network analyses
remains about (1) whether firms with multiple of corporate political behaviour. Similarity of
directors are more likely to adopt a class-wide or behaviour by individuals in cohesive or structural
firm-level perspective on politics; (2) whether equivalent relations might arise not because they
firms central in corporate networks are politically are influencing each other but because they have
influenced by their relations, or whether corpora- similar characteristics that lead them independ-
tions with certain political preferences are likely ently to select into those relations. Two examples:
to select into multiple relations; and (3) whether a norm of homophily will lead actors to select into
corporate interlocks have the same political effects cohesive relations with others like them (Lazarsfeld
in different national political systems. and Merton, 1954), and actors’ mutual interests
in the resource controlled by a third will lead
them to behave in similar ways (Burt, 1992; most
basically, they will select into the same relation
Cohesion and structural with a third actor).
equivalence In a series of papers and a monograph, Mizruchi
(1989, 1990, 1992) argued strenuously for
A central debate in social network theories has the importance of structural equivalence through
been the relative influence of cohesion and struc- indirect ties on corporate political behaviour in
tural equivalence in creating social control. addition to cohesive relations. He claimed that we
Protagonists in the debate define cohesion in best understand the sources of dyadic similarity in
dyadic terms as a direct relation between two political behaviour by embedding them in triadic
actors and structural equivalence in triadic terms social relations. He examined the sources of
as the indirect, two-step relation actors have when dyadic similarity of corporate political behaviour
they are tied to the same alter. At a macro level we ranging from donations to the same political par-
study the systematic interaction between these, ties or candidates to testimony before congres-
and potentially more removed, relations. sional committees. Details of Mizruchi’s sample
Three types of cohesion mechanisms can be and data analytic approach were discussed in the
discerned. Relations8 between actors can alter methodology section.
(or not) the behaviour of either participant by The analytic focus was on dyadic similarity
(1) persuasion – ego agrees to agree/disagree with because it is an expression of business solidarity.
alter (e.g. Habermas, 1987); (2) influence – ego Mizruchi stressed that solidarity (i.e. similar
takes alter’s behaviour as a role model (e.g. behaviour) can have a basis either in direct
Friedkin, 1998), and (3) power, where ego’s will cohesive relations or in structurally equivalent
dominates alter’s will (e.g. Weber, 1947). These relations. Two corporations can make similar
mechanisms have been theorised by social donations either because of direct cohesive
scientists from both within and without the social relations between them or because they occupy
network community. structurally equivalent positions in the corporate
Two types of structural equivalence mecha- network. An example of direct, cohesive relations
nisms can be discerned (compare with Burt, 1992). encouraging political similarity would be if a

5605-Scott-Chap14.indd 203 4/6/2011 11:50:27 AM


204 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

corporation made a donation to a candidate, not The same concerns that prompted Coleman’s
because it supported the candidate but to curry (1982) stinging criticism of interlocking
favour with a vital supplier that did support him directorate research are reflected in our scepticism
or her. An example of structural equivalence about Mizruchi’s structural equivalence
through indirect ties encouraging political similar- interpretation of indirect interlocks. Coleman
ity would be if two corporations made a donation wrote:
to a candidate because they were linked to the
same third corporation. The practice of industrial firms having executives of
In the paper where he most explicitly eluci- other firms or of financial institutions as members
dated the network mechanisms driving corporate of boards of directors does not involve agency.
political unity, Mizruchi (1990) highlighted two These persons are board members in their capacity
findings that consistently emerged from his as persons, and their other positions are relevant
research: (1) indirect interlocks (through financial only as they have acquired skills or knowledge
institutions) have greater effects on dyadic from those positions. This points to a central diffi-
similarity than direct interlocks, and (2) operating culty of sociological studies of ‘interlocking
in the same industry has a greater effect on directorates’ . . . Because the board member does
political similarity than the market constraint not come as an agent but as a natural person,
(defined as ‘dependence of one industry10 on there is no interlock in the sense ordinarily meant.
another for sales and resources weighted by the It is for this reason that such studies have never
concentration on the latter industry’ [Mizruchi, proved very useful for the study of the functioning
1989: 410, based on Burt, 1983b]). of society. (Coleman 1982: 13)
These examples were selected because they
demonstrated, according to Mizruchi, that When two corporations send an executive to the
structural equivalence mechanisms were playing board of a third institution it creates an indirect tie
as great, if not a greater, role in creating corporate between the corporations but a direct tie between
unity than cohesion mechanisms. Mizruchi the executives. In other words, the corporations
interpreted indirect interlocks effects and sharing are structurally equivalent but the executives are
primary industry as being examples of either cohesively related. The two sides of the
third-party control or competition for resources dual (Breiger, 1974) have different structural
held by a third actor. In both cases corporations properties – different network mechanisms could
‘adjust their behavior towards what they view as be operating at the level of the individual or the
appropriate to their roles’ (Mizruchi, 1990: 31). corporation.
Acceptance of Mizruchi’s claims rests largely Figure 14.1 illustrates the differing conse-
on the construct validity of his measures: are pri- quences corporate interlocks have for directors
mary industry and indirect interlocks indicators of and the corporations they are affiliated to.
structural equivalence, cohesion or no network Corporations A and B have interlocked with
mechanism at all? Leaving aside the measurement Corporation C. They are structurally equivalent
issues involved in distinguishing structural equiv- but they do not have a direct cohesive relation.
alence and cohesion, that is, many actors that are Director 1 from Corporation A and Director 2
in cohesive relations are also structurally equiva- from Corporation B, however, do have a direct
lent (Burt, 1987), we believe that equally relation by virtue of sitting on the same board.
plausible, alternative interpretations of the variables Cohesion at the level of individual actors accom-
exist. panies structural equivalence at the level of the
We begin with the treatment of industry. First, organization. The question then arises whether the
we note that industry can be conceptualised as a leading decision makers in corporations are acting
shared attribute of corporations. The shared as the agents of corporate political interests or of
attribute does not imply any interaction (i.e. actors individual-level interests? Mizruchi implicitly
can have shared attributes and be in unconnected assumes that political agency is rooted in organi-
components). Features such as capital intensity sational rather than class interests.
or management structures may endogenously Three recent studies have highlighted the com-
generate industrial political interests. We do not plexities these questions raise. Burris (2001, 2005)
necessarily dispute Emirbayer and Goodwin’s and Bond (2007) have studied the relations of
(1994) strong claims that most social concepts directors and corporate-level interests. Burris
imply a relational ontology; however, if we are (2001) found that American directors’ patterns of
willing to accept that some influences on corpo- political donations differed from the corporations
rate political behaviour are more relational than they work for. He also found that individual-level
others, then surely membership of the same characteristics of directors did not influence
primary industry is less obviously relational than corporate political donations (although he does not
other influences. display these findings). Bond (2007) found different

5605-Scott-Chap14.indd 204 4/6/2011 11:50:27 AM


POLITICAL DIMENSIONS OF CORPORATE CONNECTIONS 205

Corporation A

Director 1

Corporation C

Director 1

Director 2

Corporation B

Director 2

Structural equivalence relation

Direct cohesive relation

Figure 14.1 Structural equivalence between corporations and cohesion between directors

results in his study of political donations by large than selection is producing the results, chains of
British corporations. Corporations’ probabilities structural equivalence or cohesion are driving
of making a donation to the Conservative Party political contagion or there are social mechanisms
were associated with their directors’ educational that operate at levels higher than the triad.
backgrounds and social club affiliations. Further While Mizruchi’s studies advanced the social
studies are required before assumptions can be network analytic study of corporate political
safely made about the locus of political control in behaviour his conclusions must remain tentative.
the large economic corporation. The mutual conditioning of corporations’ and their
Burris (2005) studied the effect of interlocking directors’ political behaviour, and the effects of
directorates on the similarity of directors’ dona- embedding dyads in broader corporate networks
tions to candidates for president in primary must be explored to validate (or not) his claims.
elections. He found that direct, cohesive relation-
ships between directors were associated with
increased similarity in donation patterns. The
magnitude of the coefficients in the models he NEW DIRECTIONS
estimated was identical for direct and indirect ties,
and was significant even at six steps removed. Social network studies of corporate politics have
Two lessons can be learnt from Burris’s results. raised as many questions as they have answered.
First, cohesive relations created by interlocking In what follows we list a number of possible
directorates could be mechanisms of political directions the alliance can take in the future. We
influences at the level of the individual if not the focus on topics that we think have greater network
corporation. If directors were to use corporate relevance. We do not, for example, discuss the
political donations to further their interests, inter- need for cross-national studies because they do
locking directorates could create cohesive politi- not have direct clear social network analytic con-
cal communities. Second, Burris’s finding that sequences although we think they are key to
political similarity is associated with ties as indi- understanding the nature and effects of corporate
rect as six steps implies that, if influence rather politics.

5605-Scott-Chap14.indd 205 4/6/2011 11:50:27 AM


206 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Moving beyond the power theorists studied directors/owners. As we have


structure debate pointed out at several points in this chapter, study-
ing these two actors separately can present
The intellectual commitments of the antagonists network analytic difficulties. Depending on the
in the power structure debate have tended to direct locus of political agency, the choice of unit of
scholarly analysis of corporate politics towards a analysis will vary. This is important from a
focus on unity and cohesion. We fear the focus on network perspective because the structural charac-
unity has limited the broader network analysis of teristics of the networks linking directors/owners
corporate behaviour. First, it is unclear that a on the one hand and corporations on the other will
focus on unity is intellectually principled. For not necessarily coincide – as mentioned earlier,
example, Marxist objections to capitalist society structural equivalence between corporations can
would not vanish if pluralist claims that the capi- imply cohesive relations between their directors.
talist class is disunited and politically ineffica- Inference about network mechanisms at one level
cious were confirmed; they have a deeper basis of analysis can be misleading if political agency
rooted in the injustice, and historically stultifying resides at another level. Social network analysts
effects, of exploitative relations between classes. can make significant contributions to our under-
Also, Marxist scholars such as Poulantzas (1973) standing of corporate political behaviour by
have argued that the anarchic economic relations systematically studying the divergences between
between capitalists will be mirrored in their directors’ and corporations’ networks and the impli-
political activity. Second, it limits our understand- cations these have for corporate networks. Affiliation
ing of the political effects of corporate political or two-mode networks could also be more usefully
action. Acceptance of the decisive importance of used in analyses of corporate politics.
unity has meant neglect of mobilisation and inten-
sity. If corporations are highly mobilised and
devoting intense effort to achieving their political Influence and selection
aims we think this can have significant effects on
the political system. For example, even capitalists Network analysts face difficult identification
on different sides of the debate can crowd out problems. Are corporate actors’ political predispo-
other participants. If democracy has a deliberative sitions and behaviour influenced by their relations
element, intense, disunited corporate interventions in corporate networks, or are corporate actors with
can, at the very least, create a random error term different political tendencies also likely to select
that makes the political system less efficient. Third, into different kinds of social relations? The infeasi-
the power structure debate has led to a systematic bility of experimental design in research into corpo-
disregard of the effect that organised labour will rate politics renders definitive answers to these
have on the political behaviour of corporations. questions impossible; however, some research
Has the American experience of having no elector- designs will give more definitive answers than
ally significant socialist party meant that scholars others. Researchers can mitigate the selection threat
have focussed too much on searching for sources by collecting longitudinal data on corporate actors’
of opposition within business? Finally, the focus relations with each other and their political behav-
on unity has had research design implications for iour. They can then, for example, detect whether
what is considered the appropriate network meth- directors’ political activity changes as they develop
odologies. It has encouraged a dyadic or triadic more ties to the corporate community as predicted
focus on cohesive and structural equivalence by inner circle theory. Recent developments in the
mechanisms. Examination of broader network statistical analysis of social networks have provided
effects such as centrality and the network charac- methods and computational tools for inferring the
teristics of politically quiescent corporations have roles of influence and selection in longitudinal
been neglected as a consequence. social networks (Snijders, 2001; Snijders and
Steglich, this volume). Statistical SNA could lead
to a renaissance in studies that examine whether
Relations between the two corporate networks reflect capital concentration
sides of the duality: Directors and and ruling-class interaction. The problems of
inference no longer appear so insoluble.
corporations
In the modern corporate order two sets of capital-
ist actors are important: corporations and their
directors/owners. Until Burris’s work (1991, 2001, CONCLUSION
2005), these actors were largely treated separately
(see Bearden and Mintz, 1987). Analysts of We have tried to outline the history, achievements,
corporate politics studied corporations while elite and problems of the alliances between social

5605-Scott-Chap14.indd 206 4/6/2011 11:50:27 AM


POLITICAL DIMENSIONS OF CORPORATE CONNECTIONS 207

network analysts and scholars of corporate poli- 8 If we take Burris’s (2005) stricture to study
tics. We hope we have conveyed the diversity and more and more distant relations (i.e. three-step,
scope of this research – it is, in our opinion, the four-step, etc.) seriously then there are many more
area where SNA has made its greatest empirical types of relation to study than cohesive and
contribution. Many intellectual challenges remain, structural equivalence mechanisms. What mecha-
which should attract both scholars interested in nisms, if any, are influencing behaviour of individuals
the balance of power in capitalist societies and at greater than two steps of a relation?
scholars interested in modelling complex social 9 One of the most important intellectual
structures as networks. contributions is the systematic theorisation of rela-
tions that are not direct. The balance of direct and
indirect relations in determining human behaviour is
an unanswered question, but the answer to this
question has potentially important consequences for
NOTES the efficient allocation of intellectual resources
between social network analytic and other types of
1 As opposed to purely economic or market social scientific perspectives.
relations. 10 Because input-output tables on business
2 The extent to which directors’ authority over transactions are available at the industry level rather
political decisions is institutionalised varies with than firm level, constraint between industries is used
national electoral laws. as a proxy of constraint between individuals.
3 We mention pre/post-multiplication because
the order in which matrices are multiplied
affects their product. Matrix multiplication is not
commutative. REFERENCES
4 The transpose of the matrix is simply when the
rows and columns of the matrix are switched. Aaronovitch, S. (1961) The Ruling Class. A Study of British
5 For example, if corporation A had two Finance Capital. London: Lawrence and Wishart.
directors who were members of a social club and Alba, R.D. (1973) ‘A graph theoretic definition of a sociomet-
corporation B had three members the product would ric clique’, Journal of Mathematical Sociology, 3: 113–26.
be six, reflecting six possible avenues of social Baran, P.A. and Sweezy, P.M. (1966) Monopoly Capital.
interaction. The products are summed across all clubs Harmondsworth: Penguin.
to get the total number of possible avenues of social Bearden, J. and Mintz, B. (1987) ‘The structure of class
interaction in the social club network. cohesion: The corporate network and its dual’, in Mark
6 What is the meaning and/or function of an S. Mizruchi and Michael Schwartz (eds), Intercorporate
interlock between corporate directorates? This is a Relations: The Structural Analysis of Business. New York:
vexed question but one cannot stand on the sidelines Cambridge University Press. pp. 187–207.
if one thinks interlocking directorates are worth Bell, D. (1960) The End of Ideology. New York: Collier.
studying. Are they mini council halls where individual Berg, I. and Zald, M. (1978) ‘Business and society’, Annual
capitalists sit and discuss politics? Or are they areas Review of Sociology, 4: 115–43.
where individuals from similar social backgrounds Berk, R.A. (1983) ‘An introduction to sample selection bias in
who have ended up in the same capitalist economic sociological data’, American Sociological Review, 48:
positions can sit with similar/different others? We are 386–98.
open-minded on these topics. We have our ideas Berle, A. and Means, G. (1932) The Modern Corporation and
about how directors should behave, but directors of Private Property. New York: Harcourt Brace and World.
large corporations act those roles out in observable Bond, M. (2004) ‘Social influences on corporate political dona-
sets of behaviours – because we are more interested tions in Britain’, British Journal of Sociology, 55: 55–77.
in the behaviour of directors than we are in social Bond, M. (2007) ‘Elite social relations and corporate political
scientists’ ideas about what is best for them, our donations in Britain’, Political Studies.
focus is on the former. Our guess is that interlocks Bond, M., Glouharova, S. and Harrigan, N. (2006) The Effects
have various meanings or functions. Social scientists of Intercorporate Networks on Corporate Social and
judge whether they have these meanings or func- Political Behaviour. Report to the Economic and Social
tions by examining their consequences and testing, Research Council (ESRC award ref. RES-000–22–0872).
within a probabilistic framework, whether those Breen, R. (1996) Regression Models: Censored, Sample
consequences are manifest in their observations. See Selected, or Truncated Data. Thousand Oaks, CA: Sage.
Mizruchi, 1996, for a discussion of the meaning of Breiger, R.L. (1974) ‘The duality of persons and groups’, Social
interlocks. Forces, 53: 181–90.
7 Weighted by centrality of the corporations Burris, V. (1987) ‘The political partisanship of American
they are connected to, in other words, eigenvector business: A study of corporate political action committees’,
centrality. American Sociological Review, 52: 732–44.

5605-Scott-Chap14.indd 207 4/6/2011 11:50:27 AM


208 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Burris, V. (1991) ‘Director interlocks and the political behavior Heckman, J.J. (1979) ‘Sample selection bias as a specification
of corporations and corporate elites’, Social Scientific error’, Econometrica, 47: 153–61.
Quarterly, 72: 537–51. Hilferding, R. (1910) Financial Capital. London: Routledge
Burris, V. (2001) ‘The two faces of capital: Corporations and Kegan Paul.
individual capitalists as political actors’, American Hobson, A. (1902) Imperialism: A Study. London: James Pott
Sociological Review, 66: 361–81. and Company
Burris, V. (2005) ‘Interlocking directorates and political Koenig, T., Gogel, R. and Sonquist, J. (1979) ‘Models of the
cohesion among corporate elites’, American Journal of significance of interlocking corporate directorates’, American
Sociology, 111: 249–83. Journal of Economics and Sociology, 103:173–86.
Burt, R.S. (1983a) ‘Cohesion versus structural equivalence Kolko, G. (1962) Wealth and Power in America. New York:
as a basis for network subgroups’, in Ronald S. Burt, Frederick A. Praeger.
Michael J. Minor and Associates (eds), Applied Network Lazarsfeld, P. and Merton, R.K. (1954) ‘Friendship as social
Analysis. Beverly Hills: Sage. pp. 262–82. process: A substantive and methodological analysis’, in
Burt, R.S. (1983b) Corporate Profits and Cooptation: Networks Morroe Berger, Theodore Abel, and Charles Page (eds),
of Market Constraints and Directorate Ties in the American Freedom and Control in Modern Society. New York: Van
Economy. New York: Academic Press. Nostrand. pp. 21–54.
Burt, R.S. (1987) ‘Social contagion and innovation: Cohesion Lenin, V.I. (1916) Imperialism: The Highest Stage of Capitalism.
versus structural equivalence’, American Journal of London: Martin Lawrence.
Sociology, 92: 1287–335. Levine, J. (1972) ‘The Sphere of Influence’ American
Burt, R.S. (1992) Structural Holes: The Social Structure of Sociological Review, 37: 14–27.
Competition. Cambridge, MA: Cambridge University Linton, M. (1994) Money and Votes. London: Institute for
Press. Public Policy Research.
Carroll, W.K. (1982) ‘The Canadian corporate elite: Financiers Mills, C.W. (1956) The Power Elite. New York: Oxford
or finance capitalists?’ Studies in Political Economy, 8: University Press.
89–114. Mintz, B. and Schwartz, M. (1981) ‘The structure of intercor-
Chandler, A.D. (1977) The Visible Hand: The Managerial porate unity in American business’, Social Problems, 29:
Revolution in American Business. Cambridge: Harvard 87–103.
University Press. Mintz, B. and Schwartz, M. (1983) ‘Financial interest groups and
Clawson, D. and Neustadtl, A. (1989) ‘Interlocks, PACs, and interlocking directorates’, Social Science History, 7: 183–204.
corporate conservatism’, American Journal of Sociology, Mintz, B. and Schwartz, M. (1985) The Power Structure of
94: 779–73. American Business. Chicago: University of Chicago Press.
Clawson, D., Neustadtl, A. and Bearden, J. (1986) ‘The logic Mizruchi, M.S. (1982) The American Corporate Network,
of business unity: Corporate contributions in the 1980 1904–74. Beverly Hills: Sage.
election’, American Sociological Review, 51: 797–811. Mizruchi, M.S. (1989) ‘Similarity of political behavior among
Coleman, J.S. (1982) The Asymmetric Society. Syracuse, NY: large American corporations’, American Journal of
Syracuse University Press. Sociology, 95: 401–24.
Dahl, R.A. (1958) ‘A critique of the ruling elite model’, Mizruchi, M.S. (1990) ‘Cohesion, structural equivalence, and
American Political Science Review, 52: 463–69. similarity of behavior: An approach to the study of
Dahl, R.A. (1961) Who Governs? New Haven: Yale University corporate political power’, Sociological Theory, 8:
Press. 16–32.
Domhoff, G.W. (1998) Who Rules America: Power and Politics Mizruchi, M.S. (1992) The Structure of Corporate Political
in the Year 2000. New York: McGraw Hill. Action. Cambridge, MA: Cambridge University Press.
Emirbayer, M. and Goodwin, R. (1994) ‘Manifesto for a Mizruchi, M.S. (1996) ‘What do interlocks do? An analysis,
relational sociology’, American Journal of Sociology. critique, and assessment of research on interlocking
Ewing, K.D. (1987) The Funding of Political Parties in Britain. directorates’, Annual Review of Sociology, 22: 271–98.
Cambridge: Cambridge University Press. Neustadtl, A. and Clawson, D. (1988) ‘Corporate political
Friedkin, N. (1998) A Structural Theory of Social Influence. groupings: Does ideology unify business political
Cambridge: Cambridge University Press. behaviour’, American Sociological Review, 53: 172–90.
Galbraith, J.K. (1952) American Capitalism. Boston, MA: Olson, M. (1965) The Logic of Collective Action. Cambridge,
Transaction Press. MA: Harvard University Press.
Habermas, J. (1987) The Theory of Communicative Action, Ornstein, M. (1980) ‘Interlocking directorates in Canada:
Vol II: The Critique of Functionalist Reason. Cambridge: Evidence from replacement patterns’, Social Networks, 4:
Polity Press. 3–25.
Harrigan, N. (2007a) ‘Political partisanship and corporate Palmer, D. (1983) ‘Broken ties: Interlocking directorates and
political donations in Australia’, Unpublished manuscript. intercorporate coordination’, Administrative Science
Australian National University. Quarterly, 28: 40–55.
Harrigan, N. (2007b) ‘The inner circle revisited: A social Pinto-Duschinsky, M. (1981) British Political Finance:
selection model of the politics of interlocking directorates’, 1830–1980. Washington, DC: American Enterprise
unpublished manuscript. Australian National University. Institute.

5605-Scott-Chap14.indd 208 4/6/2011 11:50:28 AM


POLITICAL DIMENSIONS OF CORPORATE CONNECTIONS 209

Poulantzas, N. (1973) Political Power and Social Classes. Su, T-t, Neustadtl, A. and Clawson, D. (1995) ‘Business and
London: New Left Books. the conservative shift: Corporate PAC contributions,
Rose, A. (1968) The Power Structure: Political Process in 1976–1986’, Social Science Quarterly, 76: 22–39.
American Life. New York: Oxford University Press. Sweezy, P.M. (1953 [1939]). ‘Interest groups in the American
Scott, J. (ed.) (1990) The Sociology of Elites, Vol III. Aldershot: economy’, in Paul M. Sweezy (ed.), The Present as History.
Edward Elgar. New York: Monthly Review.
Scott, J. and Griff, C. (1984) Directors of Industry: The British Useem, M. (1984) The Inner Circle. New York: Oxford
Corporate Network: 1900–1976. Cambridge: Polity Press. University Press.
Smith, A. (1776 [1937]) An Inquiry into the Nature and Causes Weber, M. (1947) The Theory of Social and Political
of the Wealth of Nations. New York: Random House. Organization, London: William Hodge.
Smith, M.A. (2000) American Business and Political Power. Weinstein, J. (1968) The Corporate Ideal in the Liberal State
Chicago: University of Chicago Press. 1900–18. Boston: Beacon.
Snijders, T.A.B. (2001) ‘The statistical evaluation of network Zeitlin, M. (1974) ‘Corporate ownership and control: The large
dynamics’, in M.E. Sobel and M.P. Becker (eds), Sociological corporation and the capitalist class’, American Journal of
Methodology. London: Basil Blackwell. Sociology, 79: 1073–119.

5605-Scott-Chap14.indd 209 4/6/2011 11:50:28 AM


15
Policy Networks
David Knoke

Je weniger die Leute davon wissen, wie Würste Katzenstein (1976) comparing the foreign
und Gesetze gemacht werden, desto besser schla- economic policies of France and the United
fen sie. [The less people know about how sausages States. Over the next three decades, the volume of
and laws are made, the better they sleep.] theoretical and empirical work on both substantive
–Chancellor Otto von Bismarck (1815–98) policy networks and formal policymaking models
expanded enormously, with scopes ranging from
Policy network analysis seeks to identify the urban (e.g., Laumann and Pappi, 1976), to national
important actors – governmental and nongovern- (Schneider, 1992), to regional (Thomson et al.,
mental organizations, interest groups, and 2006), and to global levels of analysis (Witte
persons – involved in policymaking institutions, to et al., 2000). This chapter offers an overview of
describe and explain the structure of their the history and current situation of policy network
interactions during policymaking processes, and analysis; while it cannot be comprehensive and
to explain and predict collective policy decisions exhaustive, the chapter highlights crucial develop-
and outcomes. To those ends, policy theorists and ments and controversies. The first section defines
empirical researchers who apply network analytic key concepts used by most policy network ana-
perspectives have defined a multiplicity of con- lysts. The second section summarizes the origins
cepts, principles, and propositions to explicate of policy network and policy domain ideas, while
differential aspects of policy networks. the third section describes more recent empirical
Fundamental research objectives include showing research. The fourth section discusses the devel-
how policy networks form, persist, and change opment of formal network models of collective
over time. Social network theories of political decision making. The concluding section offers
influence and persuasion examine how relational some suggestions for future directions in policy
ties among policy participants shape their political network analysis.
attitudes, preferences, and opinions. Other goals
are to demonstrate the policy consequences of
network structural relations for the actors
contending and collaborating within specific KEY POLICY NETWORK CONCEPTS
public policy arenas. Comparative researchers
explore the historical origins of national differ- Like any social network, a policy network consists
ences in network structural relations among state of a bounded set of actors and one or more sets of
institutions and private interest groups, and their relations that connect these actors. Although
consequences for policy network dynamics and policy network actors may be individual persons,
collective outcomes. at the national and international levels of analysis
Probably the first explicit use of the term they are more typically formal organizations,
“policy network” appeared in an article by Peter such as political parties, legislatures, executive

5605-Scott-Chap15.indd 210 4/15/2011 4:59:20 PM


POLICY NETWORKS 211

agencies, and interest group organizations. For about the authority to issue commands and expect
example, Kenis and Schneider (1991) defined a compliance (Weber’s legitimate power). Public
policy network as a set of public and private sector authorities usually possess greater power
corporate actors linked by communication ties than private sector organizations to impose and
for exchanging information, expertise, trust, and enforce their interests on a domain. Boundary
other political resources. The boundaries of a penetrations involve two or more actors coordinat-
closely related concept, the policy domain, are ing their actions to achieve a common goal
socially constructed by the actors’ mutual recogni- (Knoke, 2001: 65); classic illustrations are the
tion that their preferences and actions on policy lobbying coalitions discussed in the next para-
events must be taken into account by the graph. Finally, sentimental attachments refer to
other domain participants (Laumann and Knoke, subjective, emotional affiliations that generate
1987: 10). More formally, a policy domain is any solidarity and mutual assistance among actors, for
subsystem “identified by specifying a substan- example, predispositions by labor unions to
tively defined criterion of mutual relevance or provide mutual political support.
common orientation among a set of consequential A lobbying coalition involves consciously
actors concerned with formulating, advocating, coordinated activity by two or more actors to
and selecting courses of action (i.e., policy options) influence a policy decision. Coalitions form
that are intended to resolve the delimited substan- around a specific policy event, a pending decision
tive problems in question” (Knoke and Laumann, on a proposed legislative bill, regulatory order, or
1982: 256). Examples of policy domains include court case ruling. A coalition comprises an action
national defense, education, agriculture, welfare set in which partners all hold the same policy
(Laumann and Knoke, 1987: 10), health, energy, preferences for an event, are connected through
and transportation (Burstein, 1991: 328). The twin a communication network, and coordinate their
concepts of policy network and policy domain can lobbying and other policy-influencing activities
be reconciled by recognizing that a policy domain (Knoke et al., 1996: 22). Although some organiza-
delineates a bounded system whose members are tions work alone in attempting to persuade
interconnected by multiple policy networks. legislators or regulators to choose proposed
Social network theories assume that the policies favorable to their interests, the chances of
primary unit of analysis is a social relation (a spe- a successful outcome are usually greater when
cific type of tie) connecting the members of a organizations pool their material and political
social system. The pattern of present and absent resources into a joint policy campaign. An effi-
ties among a network’s actors constitutes its social cient division of labor among powerful coalition
structure. Furthermore, “the perceptions, attitudes, partners can enhance a group’s political influence
and actions of organizational actors are shaped by on a policy event outcome relative to a less-
the larger structural networks within which they synchronized, opposing coalition with fewer
are embedded, and in turn their behaviors can resources. By combining their strengths and
change these network structures” (Knoke, 2001: expertise, partners can deploy a wider variety of
63–64). These assumptions focus analysts’ atten- political influence tactics. For example, broad-
tion on the multiple types of interorganizational based membership associations mobilize larger
ties that may be important for explaining a policy numbers of constituents to write letters and emails
domain’s social structure, and for understanding to their legislators. Organizations with well-staffed
the consequent actions at both the individual research operations present more compelling evi-
organizational level and for the policy domain dence during private meetings with governmental
as a whole. Knoke (2001: 65) argued that research- officials and in testimonies at public legislative or
ers should take into consideration five basic types regulatory hearings. Lobbying is neither political
of interorganizational relations, each of which bribery nor overt quid pro quo dealing (Browne,
may reveal a distinctive network structure: 1998). Rather, policy influence requires that a
resource exchange, information transmission, coalition present its most persuasive case to the
power relations, boundary penetration, and ultimate decision-making body: Lobbyists give
sentimental attachments. Although resource policymakers persuasive information, substantive
exchanges in policy networks, such as money or technical analyses, proposed policy language, and
personnel, are typically voluntary, sometimes politically accurate arguments about why they
governmental mandates – legislation or administra- should support the coalition’s preferred solution,
tive regulations – impose and enforce interorgani- instead of backing the opposition’s so obviously
zational connections. Information transmission inferior and indefensible policy alternative.
among organizations ranges from scientific and Lobbying coalitions are typically short-lived
technical data to policy advice and opinions. efforts to affect the outcome of a specific, nar-
Asymmetrical power relations rest less often on rowly defined policy event. After public officials
coercive force than on taken-for-granted beliefs render a decision, the coalition partners routinely

5605-Scott-Chap15.indd 211 4/15/2011 4:59:21 PM


212 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

disband to pursue their separate agenda items. connecting the elites of a small German city
Although some of those organizations may facilitated and constrained their collective capac-
coalesce again around subsequent policy events, ity to affect community policies. Replications of
most coalitions involve distinctive constellations the approach in two middle-size Illinois cities
of participants, attracted by the substantive revealed that organizations occupying central
particulars affecting their interests. The aphorism network positions were more influential in com-
“politics makes strange bedfellows” reflects an munity affairs, more likely to mobilize for action
occasional occurrence of former enemies now in political controversies, and better able to
working together on an event of mutual concern. achieve their preferred outcomes in public policy
For example, both liberals and conservatives disputes (Laumann et al., 1978; Galaskiewicz,
opposed President Bush’s warrantless wiretapping 1979). Laumann and Knoke’s The Organizational
inside the United States as a serious erosion of State (1987) extended the network analysis of
Americans’ civil liberties. However, most lobby- power structures to national policy domains con-
ing coalitions involve organizations that share ceptualized as multiplex networks among formal
similar preferences across a broad spectrum of organizations, not elite persons. Their connections
interest, identity, or ideological concerns that enable opposing interest organization coalitions to
guides their political calculations about policy mobilize political resources in collective fights for
stances. Broad and enduring cleavages often influence over specific public policy decisions. A
emerge within a policy domain; for example, national power structure is revealed in patterns of
business versus unions in labor policy, producers multiplex networks of information, resources,
versus distributors in agricultural policy, and phar- reputations, and political support among organiza-
maceutical companies versus consumers in health tions with partially overlapping and opposing
care policy (Heinz et al., 1993). Typically, only a policy interests. A comparison of U.S., German,
subset of the organizations with general interests and Japanese labor policy domains (Knoke et al.,
in a policy issue joins a coalition actively fighting 1996) found that organizations that were more
to achieve a specific policy event outcome (Knoke, central in both the communication network (meas-
2001: 351–56). Two fundamental research ured by policy information exchanges) and the
questions are: How best to describe and measure support network (measured by resource exchanges)
the network structure created by the overlapping had higher reputations as especially influential
participation of organizations in coalitions across players in labor policy. Centrality in both
multiple policy events? And how best to explain networks led to participation across numerous
whether social cohesion and collective action by legislative events in six types of political influence
coalition participants leads to particular policy activities, including coalitions with other domain
event outcomes? The next two sections review the organizations sharing the same policy preferences.
initial efforts to answer these questions. In the United States and Germany, communication
centrality had more impact than support centrality
on organizational reputations and political activi-
ties, while the opposite pattern occurred in Japan
POLICY NETWORK AND DOMAIN (Knoke et al., 1996: 120). Most national labor
RESEARCH policy fights were conducted by relatively small
action sets, with labor unions and business asso-
ciations making up the primary coalition leaders
The extensive efforts to theorize and examine
in all three nations. These factions usually took
policy networks and policy domains can only be
opposing positions on legislative bills and almost
briefly summarized here (for more extensive over-
never collaborated, even on rare instances where
views, see Knoke, 1998; Granados and Knoke,
they held the same policy outcome preferences.
2005; Robinson, 2006). The next three subsec-
tions discuss the origins of distinctive perspectives
on policy networks in the United States, Britain,
and Germany. United Kingdom
British scholars sought to identify the dimensions
of national policy network structures according
United States to their differentiated pluralist and corporatist
features (Rhodes, 1985, 1990; Atkinson and
A network approach to public policy analysis Coleman, 1989, 1992; Jordan and Schubert, 1992).
originated in a community power study, New Beginning in the 1980s, as problems in such
Directions in the Study of Community Elites, by national policy domains as environment and health
Edward O. Laumann and Franz Urban Pappi increased in complexity, British policymaking
(1976). They demonstrated how multiple networks shifted away from entrenched subgovernments

5605-Scott-Chap15.indd 212 4/15/2011 4:59:21 PM


POLICY NETWORKS 213

(i.e., policy domains at the national ministerial (1973) on community power structure discussed
level) that tightly controlled consensual policy above, and in Lehmbruch’s (1984) analyses of
agendas. In their place, more fluid and unpredict- corporatist politics in the Federal Republic
able networks emerged in such policy domains of Germany (FRG) before reunification. Drawing
as agriculture, civil nuclear power, youth employ- from research on interlocking politics (Scharpf
ment, smoking, heart disease, sea defenses, et al., 1976), Lehmbruch depicted the web of
and information technology (Richardson, 2000: interorganizational networks as an important
1009–11). British political scientists elaborated institutional constraint that stabilizes collective
a policy community model of self-organizing policy actions. In contrast to more centralized
groups drawing policy participants from govern- national states, such as France and the United
ment bureaucracies and associated pressure Kingdom, the FRG resembled the U.S. federal
organizations (Wilks and Wright, 1987; Rhodes, system where states (Länder) retain important
1990; Jordan, 1990). By the 1990s, rising policy powers vis-à-vis the national government.
intergovernmental management, new public man- Corporatist concertation in the FRG involved
agement practices, and a “hollowed out” state generalized exchanges among diverse interest
sector had propelled networks into a persistent organizations – private-sector organizations,
attribute of the British human services sector state and federal agencies, and political parties –
(Rhodes, 1996). creating an interlocking system of autonomous,
Marsh and Rhodes (1992) proposed a model of sectoral policy networks integrated under an
interest intermediation that emphasized the impor- overarching, noncentralized network (Lehmbruch,
tance of structural relations among governmental 1989). The economic policy network was
ministries, pressure groups, and informal actors oriented towards achieving national homogeneity,
participating in the policy process. Their approach although regional policy networks apparently
downplayed the significance of interpersonal rela- grew increasingly powerful. Bargaining and
tions and presented a static, unidirectional relation accommodation of interest groups took prece-
between policy networks and policy outcomes. dence over hierarchical centralization in the FRG.
Critics (Dowding, 1995, 2001; Raab, 2001) argued Lehmbruch’s crucial insight – that institutions
that the policy network approach lacked a shape the specific forms and dynamics of policy
theoretical basis and could not explain network networks – was largely overlooked by later
transformation. In response, Marsh and Smith researchers, who mostly investigated policy
(2000) offered a model of dialectical change (and domains within a single governmental system.
stability) involving three interactive effects among In contrast to both American and British con-
the policy network and the agents operating ceptualizations of policy networks as fundamental
within it; the network and its social context; and structures for intermediation between interest
the network and policy outcome. They applied groups and governments, many German scholars
the model’s mutually causal and feedback tended to view them as a new form of governance.
relations to explain transformative changes in That is, policy networks are an alternative to both
U.K. agricultural policy since the 1930s. For centralized authority hierarchies and deregulated
example, the National Farmers’ Union preference markets for efficiently resolving policy conflicts
for government price supports increased between between the state and its civil society (Börzel,
1930 and 1947 as it interacted with government 1998). The proliferation of policy networks,
officials and learned what demands it could especially in supranational European Union policy
make in shifting economic contexts. Marsh also domains, reflects several trends in state-society
applied the dialectical model to explain changes in relations: increasing dispersion of resources
U.K. policy on genetically modified (GM) food among public and private organizations; elabora-
and crops, disclosing the power of “outsider” tion of new policy domains demanding collective
environmental groups in compelling GM foods decisions; and overloaded governments that
to disappear from supermarket shelves (Toke are dependent on the cooperation of private organ-
and Marsh, 2003). More recently, Kisby (2007) izations, and therefore whose interests must be
advocated adding “programmatic beliefs” as ante- taken into account during policy formulation and
cedent ideational contexts in the Marsh dialectical implementation (Kenis and Schneider, 1991;
model. Schneider, 1992). As structured interactions
among interdependent but nonhierarchical organi-
zations, policy networks facilitate their members’
Germany coordination of interests, the pooling and exchange
of resources, and bargaining over policy propos-
Germanic perspectives on policy networks als. In the absence of a central hierarchical author-
are rooted in the American approach, through the ity that is capable of imposing its preferred policy
collaboration of Franz Pappi and Edward Laumann solutions, cooperative policy blocks (based on

5605-Scott-Chap15.indd 213 4/15/2011 4:59:21 PM


214 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

communication, trust, support, resource exchange, nations, and at the transnational level of
and other interorganizational relations) constitute analysis – that built on those foundations.
an informally institutionalized framework for A fallow period followed the florescence of
conducting complex negotiations and reaching U.S. policy domain research in the 1980s, as the
collective policy decisions (Marin and Mayntz, pioneering scholars turned their research attention
1991; Mayntz, 1993; Benz, 1995). This analytic elsewhere. However, the approach showed signs
framework underlies the formal network decision of revival as some political scientists examined
models of European decision making discussed in old studies or extended policy domain research in
another section below. new directions. For example, a reanalysis of
Volker Schneider’s comparative research on the Laumann and Knoke’s health policy domain data
dangerous chemicals and telecommunications showed that, as the domain’s demand for policy
policy domains of Germany and the EU exempli- information increased, interest organizations
fied the Germanic conceptualization of policy invested more time and resources in forging
networks as a distinct governance form (Schneider, stronger communication ties to their trusted
1986, 1992; Schneider et al., 1994). He found a political allies rather than pursuing a broader
variety of governance mechanisms – ranging from acquaintance strategy (Carpenter et al., 2003). But
institutionalized formal advisory bodies to strong ties tend to form within cliques, which
working committees to informal and secretive fail to transmit novel information as quickly as
groups – for co-opting private-sector actors in the interclique weak ties. Because of its inefficiency
public policymaking process. A study of the in distributing information when it is most in
1990–94 privatization of former East German demand, the strong-tie strategy is vulnerable to
shipbuilding and steel conglomerates after German network failure, the “tendency for a policy com-
reunification revealed dense horizontal communi- munity to shatter into competing cliques that do
cation and medium hierarchical power networks not share information” (p. 433).
as the emergent governance structure (Raab, Other political scientists examined the relations
2002). Formal institutional rules, indicated by between political institutions and policy networks.
German constitutional provisions and interorgani- Local water-policy networks spawned local
zational reporting requirements, were the institutions that increased both enforcement and
dominant factors influencing network tie compliance with the federal Clean Water Act from
formation among interested public and private 1994 to 2000, even in conservative areas that were
organizations and multilateral negotiations over prone to undermining those efforts (Scholz and
privatizing or closing down the East German Wang, 2006). Lubell (2007) found a strong rela-
industrial properties. tion between policy trust in the organizations
involved in agricultural water policy and the
policy-core beliefs of farmers in the Sacramento
River watershed policy domain. At the national
level, the policy coherence of 18 policy domains
RECENT POLICY NETWORK RESEARCH (measured by issue concentration, interest concen-
tration, and policy targeting) was highest among
The initial research on policy networks and domains with a dominant congressional commit-
domains failed to develop rigorous theories tee or involvement of a lead federal agency (May
consisting of testable propositions about policy et al., 2006). A comparative study of biotechnol-
development and outcomes. They suffered from ogy policy domains found the United States bifur-
terminological imprecision and the proliferation cated into distinct agricultural and food networks
of typologies, relying heavily on metaphor and that shared key actors, while the Canadian domain
description (Burstein, 1991; Dowding, 1995). At split between a network to manage biotech promo-
times, analysts seemed uncertain about whether tion and another network focused on assessing
to treat policy networks as primarily dependent environmental and health risks (Montpetit, 2005).
or independent variables (Mikkelson, 2006: 18), One consequence of these national structural
that is, whether the primary objective was to differences is a more permissive regulatory
explain the formation of policy networks or the climate in the United States. Despite the encour-
consequences of network dynamics for collective aging evidence of continuing empirical research
action and policy outcomes. But those early on U.S. policy domains, no one has proffered a
efforts introduced a wealth of network concepts, comprehensive new theoretical framework for
principles, measures, and methods that invigor- systematizing and stimulating further inquiry.
ated the field and prepared the ground for subse- In contrast to the quiescent American scene,
quent advances. This section briefly examines European research on policy networks prolifer-
recent examples of policy network research – in ated in recent years, with extensions to new
the United States, Europe, and non-Western nations and to the supranational European Union.

5605-Scott-Chap15.indd 214 4/15/2011 4:59:21 PM


POLICY NETWORKS 215

This increased activity accompanied shifts to (Paredes, 2008), and national development in
broader foci: from government to governance South Korea and Taiwan (Kondoh, 2002). Clearly,
processes; from unitary central government substantial opportunities exist to expand cross-
to multilayered policymaking; from top-down national research on policy domains.
hierarchies to bottoms-up bargaining; from Other scholars have taken tentative but promis-
national to both supra- and subnational levels of ing steps toward identifying and mapping global
analysis; and from policy formation to policy or transnational policy networks (e.g., Witte et al.,
implementation. A case study of constructing a 2000; Benner et al., 2004). These networks involve
new British hospital concluded that implementa- relations among the important organizations that
tion networks in multilayered government under- deal with a boundary-spanning policy issue; for
mined the democratic accountability of elected example, global trade, plagues and pandemics,
local officials (Greenaway et al., 2007). In trafficking in illegal substances and endangered
contrast, an investigation of sustainable develop- species, and climate change. The United Nations’
ment in two local communities found broader complex of organizations and agencies make up
participation when the state actively manipulated one network with transnational reach in several
the network than when it withdrew from its central policy domains (Reinicke and Deng, 2000).
position (Hudson et al., 2007). A “lobbyism” Numerous national governmental, private sector,
paradigm for state-society relations emerged and nongovernmental organizations (NGOs) also
in Germany as selective lobbying supplanted populate these policy networks. The key players
institutionalized corporatist forms of interest in these power structures typically consist of
advocacy (von Winter, 2004). Following reunifi- international organizations and institutions
cation, a reorientation of federal and local possessing limited mandates and legitimate
authorities and an increasing number of interest authority to set and enforce extra-territorial rules
groups induced structural changes in the German and standards (e.g., World Trade Organization,
poverty policy network (von Winter, 2001). In International Monetary Fund, Convention on
other European countries, scholars investigated International Trade in Endangered Species).
diverse policy networks, including French and Goldman (2007) described how the World Bank
Dutch urban policy (Le Gales, 2001; De Vries, facilitated the creation of a transnational water-
2008), Greek rural development (Papadopoulos policy network, linking environmental and devel-
and Liarikos, 2007), Swiss energy policy (Kriesi opment NGOs with business firms. The
and Jegen, 2001), and Czech social welfare consequence was a rapid privatization of water
(Anderson, 2003). supplies in Africa, Asia, and Latin America under
Analysts of European Union policymaking the control of a few multinational corporations. In
emphasized the importance of policy networks, in contrast, transnational advocacy networks act as
such domains as higher education (Lavdas et al., counterweights to corporation-dominated
2006), genetically modified foods (Skogstad, economic globalization. These loose-knit
2003), and industrial regulation (Coen and networks mobilize grassroots activists, social
Thatcher, 2008). A comparative study of three movements, and other civil society organizations
policy domains (European integration, agricul- across borders to pressure governments and
ture, and immigration) in seven Western nations business to change their policies and practices.
highlighted the heavy influence of the EU context Well-known instances include the Global Fund to
and the conditional effects of domain-specific fight AIDS/HIV, tuberculosis and malaria and
domestic power structures (Kriesi et al., 2006). the Campaign for Access to Essential Medicines
Blockmodel analyses of the integration domain (Kohlmorgen et al., 2007), human rights and
revealed distinctive coalitions and cleavages, election monitoring, and the anti-globalization
implying that theories must aim “to understand protests at Seattle, Davos, and Genoa.
the combined impact of country- and policy-
specific contexts” (358). The next section dis-
cusses formal efforts to model bargaining and
negotiation over legislative decision making FORMAL NETWORK DECISION MODELS
among EU member-states.
Policy network analyses of non-Western An enduring theoretical challenge is to forsake
nations are much rarer than projects conducted in generic metaphors and apply rigorous social
advanced democratic societies. The few extant network analysis principles to construct formal
reports are largely descriptive efforts rather than models of public policymaking. Formal models
theoretically guided investigations. Some recent try to elucidate how binding decisions about
instances include free-trade negotiations in Chile proposed laws and regulations emerge within
(Bull, 2008), water policy in Egypt and Ethiopia collective action systems – such as legislatures,
(Luzi et al., 2008), Mexican forestry policy courts, and regulatory agencies – through

5605-Scott-Chap15.indd 215 4/15/2011 4:59:21 PM


216 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

information exchanges, political resource pooling, Several research studies yielded results consist-
coalitions, vote trading, and other dynamic politi- ent with the social network influence model’s
cal interactions. For example, log rolling (pork- hypothesized effects. An example of the applica-
barrel politics) involves one legislator agreeing to tion of the social influence model in policy net-
vote for another’s bill in exchange for the second’s work research was Mark Mizruchi’s (1989, 1990)
vote supporting the first’s favored bill. Or legisla- demonstration that manufacturing corporations
tors may make concessions on the contents of a operating in the same primary industry tend to
less important bill in exchange for others’ support give financial contributions to the same political
on issues of more central interest. candidates. The behavioral similarity was even
Formal network decision models, typically stronger to the extent that firms were located in
using matrix algebraic formulations, assume that related industries and were indirectly interlocked
the collective outcomes across a set of policy through shared banks and insurance companies.
domain events, such as legislative bills, involve
exchanges of resources controlled by policy actors
with varied interests in particular event outcomes.
The more powerful actors mobilize and deploy Collective action models
their political resources to affect the actions of
James S. Coleman, in The Mathematics of
the less powerful actors, making the latter depend-
Collective Action (1973), modeled legislative vote
ent on the former, and thus increasing the
trading as an open market with perfect informa-
powerful actors’ capabilities to achieve their
tion about policy preferences that yields resulting
preferred policy outcomes. The following subsec-
prices (power) of actors over event outcomes.
tions discuss a variety of noteworthy efforts
A legislator’s power at market equilibrium is pro-
to construct formal models based on such assump-
portional to her control over valued resources for
tions. These models are impossible to describe
events (i.e., her votes on a set of bills) in which the
adequately without resort to some simple matrix
other legislators have high interest. Power-driven
algebra notation.
actors seek to maximize their subjective expected
utilities by exchanging votes, giving up their con-
trol of low-interest events in return for acquiring
Social influence models control over events having high interest to them.
To illustrate this log-rolling process, if Senator A
These models, also called network effects or from a farming state has high interest in a price-
contagion models, show how network connections support bill, while Senator B from a coastal state
among actors mutually shape one another’s wants to pass a port-development bill, this dyad
beliefs and actions. The general hypothesis is that may mutually agree to vote for one another’s
the greater the proximity of two actors in a event. In effect, each senator transfers control over
network, the higher the probability that one the event of lesser interest for control over
actor’s responses will be modified by the other’s the event of greater importance. The Coleman
actions, which may occur without deliberate or model’s simultaneous power equation solution for
consciously attempted influence (Marsden the entire legislature can be expressed in matrix
and Friedkin, 1994: 4). Friedkin (1984, 2004) algebra notation as the following, where P is a
proposed a deterministic, discrete-time linear vector of legislators’ equilibrium power, after
process model in which each actor’s attitude or all vote exchanges have taken place; X is a matrix
preference is adjusted to the views of the other of legislator interests in a set of legislative
actors who have some influence over that actor events (bills) to be decided by vote; and C is each
(e.g., a direct network tie). All actors’ opinions are legislator’s control over each event (i.e., one vote
simultaneously determined by the structural per person on each bill).
relations in the network. In formal matrix
algebraic terms, where y is a vector of actors’ P = PXC (15.3)
attitudes at time t, and W is a matrix of network
ties among the actors, the vector of attitudes at
time t+1 is shown in Equation 15.1. Friedkin and Network access models
Johnson (1990) generalized this model to include
Peter V. Marsden (1983) modified Coleman’s
a matrix X of independent variables and a column
market exchange model so that network relations
vector b of their regression coefficients (shown in
could restrict actors’ access to potential vote
Equation 15.2).
exchanges. In contrast to Coleman, whose market
model allowed every legislator to trade votes with
yt+1 = Wyt (15.1) all others, Marsden assumed varying opportuni-
yt+1 = aWyt + b Xb (15.2) ties for dyadic vote trades. Compatibility of

5605-Scott-Chap15.indd 216 4/15/2011 4:59:21 PM


POLICY NETWORKS 217

interests – based on trust, ideology, or party information mobilization process fit more closely
loyalty – might restrict the subset of actors among with American data, while the deployment
whom legislators prefer to log-roll their votes. The process provided a better explanation of German
network access model’s power equation (shown policy decisions (Knoke et al., 1996: 184). Both
in Equation 15.4) differs from the Coleman models performed equally well for Japan, during
model by including access matrix A, where aij = 1 the period when the Liberal Democratic Party had
if a vote exchange between actors i and j is long dominated the Diet. The public authorities
possible, and aij = 0 if no exchange can occur. in all three countries, in both executive and legis-
A is equivalent to the W matrix of network ties lative bodies, that also played the roles of agents
in social influence models. Marsden’s simulations were the most powerful actors. These organiza-
of his restricted network access model revealed tions’ power stemmed from their ability to
(1) reduced levels of resource exchanges among maintain high levels of self-control over policy
actors; (2) power redistributed to actors in the information sought by the other public- and
most advantaged network positions; and (3) a pos- private-sector actors.
sible shift to a more efficient system (i.e., higher
aggregate interest satisfaction).
Dynamic access models
P = PAXC (15.4)
In Frans Stokman’s dynamic access models,
collective decisions occur in a two-stage process
Dynamic policy models where actors first mutually choose their preferred
policies, then vote based on those derived
Franz Pappi’s institutional access models of preferences. More specifically, (1) each actor’s
network exchange were designed to explicate the policy event preferences are influenced by the
underlying mechanisms by which interest groups preferences held by all the actors who have access
influence the collective decision making of the to them through network ties; (2) then public
organizational state. The approach distinguished officials cast their votes based on the set of policy
actors (e.g., interest groups) from agents (e.g., preferences formed during the first stage where
public authorities with voting rights, such as influence activities could occur (Stokman and Van
legislatures) in national policy domains, with net- den Bos, 1992; Stokman and Van Oosten, 1994;
work structures built into the interest component Stokman and Zeggelink, 1996). The dynamic
(Pappi and Kappelhoff, 1984; Pappi, 1993; König, access model’s three key equations are shown in
1993; Pappi et al., 1995). An actor’s power comes Equation 15.6, where C is control over events, R
from its ability to gain access to effective agents, is actors’ resources, and A is network access to
who are a subset of the network members (that is, other actors; X is actor interest in events and S is
agents can also be actors with their own interests the salience of event decisions; V is voting power
in some event outcomes). Actors can gain control of the public officials and O is the predicted event
over policy events either by deploying their own outcomes.
policy information or by mobilizing the agents’
information. The key equation in the mobilization
version of the dynamic policy model is in C = RA X = XCS O = XV (15.6)
Equation 15.5, where K* is the event-control
matrix at equilibrium (L actors control the votes of Stokman and Berveling (1998) compared
K agents), and the W is the matrix of network ties. predictions made by alternative versions of the
The alternative resource deployment version of dynamic access model to the actual outcomes of
the model operationalized actors’ control as 10 Amsterdam policy decisions. The policy maxi-
confirmed policy communication network, and mization model performed better than either the
measured self-control as the number of organiza- control maximization or the two-stage model. In
tions not confirming the sender’s information the maximization version, policy-driven actors
exchange offers (i.e., an indicator of independence selectively agree to requests that they believe will
in the system). mostly likely improve their own policy positions.
Realizing that more distant powerful opponents
aren’t readily accessible, actors instead attempt to
PXA = WK* (15.5) influence others who are most similar to them-
selves. That is, actors deliberately choose influ-
When Pappi and his colleagues applied the ence strategies that enhance the chances of success
institutional access model to predict legislative for their preferred policy positions but avoid
outcomes in the U.S., German, and Japanese having to change their preferences as they try to
labor policy domain networks, they found that the persuade others to support them (1998: 598).

5605-Scott-Chap15.indd 217 4/15/2011 4:59:21 PM


218 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Dynamic access models were most extensively arguments, before a policy decision is formally
applied to institutionalized political bargaining adopted. The position exchange model (Arregui
and negotiation over legislative decisions among et al., 2006) assumes that actors may willingly
the member states of the European Union (Bueno change their initial preferences to support other
de Mesquita and Stokman, 1994; Thomson et al., positions at the final voting stage, because actors
2006). Under the EU’s governance rules, the engage in mutually beneficial exchanges across
executive European Commission (consisting of pairs of policy decisions (that is, log-rolling).
one commissioner from each of the 25 member- Analysts initially found that the challenge
states) introduces a policy proposal either to the model made the most accurate predictions of
Council of the EU (a body of national ministers decision outcomes (Bueno de Mesquita and
responsible for the policy area being addressed) or Stokman, 1994), based on only 16 policy issues.
to both the Council and the European Parliament However, when the three models were applied to
(EP, consisting of 785 members directly elected the much larger dataset of 162 EU policy
by the EU citizenry). After consultations and decisions, overall the simple compromise model
voting under a qualified majority system, which made the fewest errors in predicting policy adop-
distributes votes among EU member-states roughly tions, although not statistically fewer than the
by their population sizes, the legislative bodies position exchange model (Arregui et al., 2006:
ultimately either adopt or reject the proposed 151). The position exchange model’s predictions
policy (Thomson and Hosli, 2006: 12–19). Diverse were most accurate for more polarized policy
interest groups may try to influence the policy issues; the compromise model led to poor predic-
proposal during the Commission’s preparatory tions for dichotomous issues; and the position
stage or during the decision-making stage by the exchange model fared best under co-decision
Council and EP. The chapters in Thomson et al. procedures requiring both unanimity and qualified
(2006) apply various models of informal bargain- majority voting. Although each model captured
ing and formal decision-making procedures to some aspects of policymaking overlooked by the
66 Commission proposals and 162 policy deci- others, the authors’ main conclusion was that the
sions from 1999 to 2001. compromise model best explained EU legislative
Most relevant to the policy network perspective processes, where information and persuasion are
are comparisons of three alternative two-stage central and members willingly compromise their
models in which actors try to build winning positions to reach common solutions (Arregui
coalitions by influencing others to support their et al., 2006: 152).
policy positions (Arregui et al., 2006). Each
model consists of an initial round of informal
bargaining among actors holding different policy
preferences, which may lead to some actors shift- FUTURE DIRECTIONS FOR POLICY
ing positions over time, followed by a formal NETWORKS
voting stage at which policies are adopted. The
simple compromise model (Achen, 2006), which Over the past three decades, policy network
traces back to Thucydides’ analysis of the balance theory and research moved from a vague meta-
of city-state power in the Peloponnesian War, phor about the interconnectedness of political
treats governmental institutions as the key actors actors to the demonstration that formal network
whose relative power determines policy outcomes. concepts, principles, and data analytic methods
During informal bargaining, if actors’ common could yield important insights into network
policy interests are higher than their divergent formation, structural configurations, collective
preferences, some may change their positions actions, and policy outcomes. This concluding
on the basis of convincing information and per- section offers my suggestions for some possible
suasion. Then, using John Nash’s solution to future directions.
bargaining games, the policy decision can be Raab (2002: 581) presciently asked, “Where
predicted as a weighted average of actors’ most- do policy networks come from?” and answered
preferred policies, where weights are calculated as that macrostructures emerge from conscious
the product of actor power times policy salience. micro-decisions about gaining access to resources.
In the challenge model (Bueno de Mesquita, At present, researchers know far more about
2002), based on rational utility-maximizing routine activities within established policy
decisions in noncooperative game theory, the domains than about the origins, evolution, and
actors experience a series of potentially hostile transformation of policy networks. To explain
encounters during the informal bargaining stage. how conditions in civil society generate new
Coalitions try to compel other actors with diver- policy domains and interorganizational networks,
gent positions to change their policy preferences, analysts should painstakingly uncover the dynamic
using power dominance rather than persuasive interplay between agency and structure through

5605-Scott-Chap15.indd 218 4/15/2011 4:59:21 PM


POLICY NETWORKS 219

historical time. Knoke (2004) proposed a provi- of analysis. That theory should be capable of
sional framework for the sociopolitical construc- generating novel propositions and testing them
tion of national policy domains. He argued that with precisely measured network concepts and
“focusing events” and innovations, exemplified by longitudinal data analytic methods. Although
the 9/11 terror attacks and fiber-optic surveillance these desiderata seem utopian at present, the
technologies, disrupt routine arrangements. The policy network field showed such impressive
Internet is a particularly disruptive political force gains over the past three decades that a break-
(Rethemeyer, 2007), generating new streams of through may occur sooner than anyone could
political money and communication patterns. reasonably anticipate.
Policy entrepreneurs reframe policy issues as
requiring either a major restructuring or the
creation of a new domain with sufficient resources
to deal with those disruptions. The eventual
outcome is “a new institutional configuration of REFERENCES
actors, programs, and procedures for conducting
routine policymaking on the reframed substantive Achen, C. (2006) ‘Institutional realism and bargaining models’,
issues” (Knoke 2004: 93). To test this model, in Robert Thomson, Frans N. Stokman, Christopher H.
longitudinal data would have to be culled from Achen and Thomas König (eds), The European Union
archival documents. Decides. Cambridge, UK: Cambridge University Press.
As in most social network research, theoretical pp. 86–123.
rigor in policy network analysis lags behind its Anderson, L.S. (2003) ‘Constructing policy networks: Social
increasingly sophisticated methods of data assistance reform in the Czech Republic’, International
analysis (Carlsson, 2000; Raab and Kenis, 2007). Journal of Public Administration, 26: 635–63.
Yet opportunities abound for developing new Arregui, J., Stokman, F. and Thomson, R. (2006) ‘Compromise,
concepts, propositions, and theoretical frame- exchange and challenge in the EU’, in Robert Thomson,
works. For example, political capital is the Frans N. Stokman, Christopher H. Achen and Thomas
conceptual analogue of social capital, defined as König (eds), The European Union Decides. Cambridge, UK:
an ego actor’s access to the resources held by its Cambridge University Press. pp. 124–52.
alters (Knoke, 2009). Organizations acquire Atkinson, M.M. and Coleman, W.D. (1989) ‘Strong states
political capital through favor trading, such as and weak states: Sectoral policy networks in advanced
unions contributing money and campaign workers capitalist economies’, British Journal of Political Science,
to party politicians in exchange for sponsoring 19: 47–67.
legislation (Hersch et al., 2008). Although politi- Atkinson, M.M. and Coleman. W.D (1992) ‘Policy networks,
cal capital, with few exceptions (Siegel, 2008; policy communities and the problems of governance’,
Sørensen and Torfing, 2003), has rarely been Governance, 5: 154–80.
explicitly studied from a social network perspec- Benner, T., Reinicke, W.H. and Witte, J.M. (2004) ‘Multisectoral
tive, it could be incorporated into formal network networks in global governance: Towards a pluralistic
decision models. Another possible line of theory system of accountability’, Government and Opposition,
construction could assimilate insights from the 39(2): 191–210.
advocacy coalition framework (ACF) approach to Benz, A. (1995) ‘Politiknetzwerke in der horizontalen
policy subsystems (Weible and Sabatier, 2007). Politikverflechtung’, in Dorothea Jansen and Klaus Schubert
Like policy network analysis, ACF emphasizes (eds), Netzwerke und Politikproduktion: Konzepte,
that participants coordinate with allies who share Methoden, Perspektiven. Marburg, Germany: Schüren.
policy preferences and that policy brokers mediate pp. 185–204.
conflicts between opposing sides. ACF offers Blom-Hansen, J. (1997) ‘A new institutional perspective on
three mechanisms to explain policy changes – policy networks’, Public Administration, 75: 669–93.
external shocks, a “hurting stalemate,” and accu- Börzel, T.A. (1998) ‘Organizing Babylon: On the different
mulation of scientific/technical information. conceptions of policy networks’, Public Administration,
A third theory development option is to forge 76: 253–73.
closer ties to neoinstitutionalism, particularly by Browne, W.P. (1998) Groups, Interests, and U.S. Public Policy.
identifying how formal governance rules constrain Washington: Georgetown University Press.
the capacity of informal networks to achieve Bueno de Mesquita, B. (2002) Predicting Politics. Columbus,
collective decisions (Blom-Hansen, 1997; Klijn OH: Ohio State University Press.
and Koppenjan, 2006). Bueno de Mesquita, B. and Stokman, F. (eds) (1994) European
The ultimate sign that political network research Community Decision Making: Models, Applications and
has intellectually matured will be the emergence Comparisons. New Haven: Yale University Press.
of a distinctive theoretical explanation able Bull, B. (2008) ‘Policy networks and business participation in
to account fully for the origins, evolution, and free trade negotiations in Chile’, Journal of Latin American
policy outcomes of policy domains at every level Studies, 40(2): 195–224.

5605-Scott-Chap15.indd 219 4/15/2011 4:59:21 PM


220 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Burstein, P. (1991) ‘Policy domains: Organization, culture, and Jordan, G. and Schubert, K. (1992) ‘A preliminary ordering of
policy outcomes’, Annual Review of Sociology, 17: 327–50. policy network labels’, European Journal of Political
Carlsson, L. (2000) ‘Policy networks as collective action’, Research, 21: 7–27.
Policy Studies Journal, 28: 502–20. Katzenstein, P. (1976) ‘International relations and domestic
Carpenter, D., Esterling, K. and Lazer, D. (2003) ‘The strength structures: Foreign economic policies of advanced
of strong ties: A model of contact-making in policy industrial states’, International Organization, 30: 1–45.
networks with evidence from U.S. health politics’, Kenis, P. and Volker, S. (1991) ‘Policy networks and policy
Rationality and Society, 15(4):411–40. analysis: Scrutinizing a new analytical toolbox’, in Bernd
Coen, D. and Thatcher, M. (2008) ‘Network governance and Marin and Renate Mayntz (eds), Policy Networks: Empirical
multi-level delegation: European networks of regulatory Evidence and Theoretical Considerations. Boulder/Frankfurt:
agencies’, Journal of Public Policy, 28: 49–71. Campus/Westview Press. pp. 25–62.
Coleman, J.S. (1973) The Mathematics of Collective Action. Kisby, B. (2007) ‘Analysing policy networks: Towards an
Chicago: Aldine. ideational approach’, Policy Studies, 28: 71–90.
De Vries, M.S. (2008) ‘Stability despite reforms: Structural Klijn, E.-H. and Koppenjan, J.F.M. (2006) ‘Institutional design:
asymmetries in Dutch local policy networks’, Local Changing institutional features of networks’, Public
Government Studies, 34: 221–43. Management Review, 8: 141–60.
Dowding, K. (1995) ‘Model or metaphor? A critical review of Knoke, D. (1998) ‘The organizational state: Origins and
the network approach’, Political Studies, 43: 136–58. prospects’, Research in Political Sociology, 8: 147–63.
Dowding, K. (2001) ‘There must be an end to confusion: Policy Knoke, D. (2001) Changing Organizations: Business Networks
networks, intellectual fatigue, and the need for political in the New Political Economy. Boulder, CO: Westview.
science methods courses in British universities’, Political Knoke, D. (2004) ‘The sociopolitical construction of national
Studies, 49(1): 89–105. policy domains’, in Christian H.C.A. Henning and Christian
Friedkin, N.E. (1984) ‘Structural cohesion and equivalence Melbeck (eds), Interdisziplinäre Sozialforschung: Theorie
explanations of social homogeneity’, Sociological Methods und empirische Anwendungen. Frankfurt: Campus Verlag.
and Research, 12: 235–61. 81–96.
Friedkin, N.E. (2004) ‘Social cohesion’, Annual Review of Knoke, D. (2009) ‘Playing well together: Creating corporate
Sociology, 30: 409–25. social capital in strategic alliance networks’, American
Friedkin, N.E. and Johnson, E.C. (1990) ‘Social influence Behavioral Scientist, 52: 1690–708.
and opinions’, Journal of Mathematical Sociology, 15: Knoke, D. and Laumann, E.O. (1982) ‘The social structure of
193–205. national policy domains: An exploration of some structural
Galaskiewicz, J. (1979) Exchange Networks and Community hypotheses’, in Peter V. Marsden and Nan Lin (eds), Social
Politics. Beverly Hills, CA: Sage. Structure and Network Analysis. Beverly Hills: Sage.
Goldman, M. (2007) ‘How “Water for All!” policy became pp. 255–70.
hegemonic: The power of the World Bank and its transna- Knoke, D., Pappi, F., J Broadbent, J. and Tsujinaka, Y. (1996)
tional policy networks’, Geoforum, 38: 786–800. Comparing Policy Networks: Labor Politics in the U.S.,
Granados, F.J. and Knoke, D. (2005) ‘Organized interest Germany and Japan. New York: Cambridge University Press.
groups and policy networks’, in Thomas Janoski, Robert R. Kohlmorgen, L., Wolfgang, H. and Sonja, B. (2007) ‘Networks
Alford, Alexander M. Hicks, and Mildred A. Schwartz (eds), and governance. Transnational networks as a basis for
Handbook of Political Sociology: States, Civil Societies, and emancipatory politics in global society?’, Peripherie,
Globalization. New York: Cambridge University Press. 27(105–6): 8–34.
pp. 287–309. Kondoh, H. (2002) ‘Policy networks in South Korea and
Greenaway, J., Salter, B. and Hart, S. (2007) ‘How policy Taiwan during the democratic era’, Pacific Review, 15(2):
networks can damage democratic health: A case study in 225–44.
the government of governance’, Public Administration, König, T. (1993) ‘The impact of policy networks in a model of
85(3): 717–38. political decision making and public-private influence’,
Heinz, J.P., Laumann, E.O., Nelson, R.L. and Salisbury, R.H. Journal für Sozialforschung, 33: 343–67.
(1993) The Hollow Core: Private Interests in National Kriesi, H. and Jegen, M. (2001). ‘The Swiss energy policy elite:
Policymaking. Cambridge, MA: Harvard University Press. The actor constellation of a policy domain in transition’,
Hersch, P., Netter, J.M. and Pope, C. (2008) ‘Do campaign European Journal of Political Research, 39(2): 251–87.
contributions and lobbying expenditures by firms create Kriesi, H., Silke, A. and Margit, J. (2006) ‘Comparative analysis
“political” capital?’, Atlantic Economic Journal, 36: of policy networks in Western Europe’, Journal of European
395–405. Public Policy, 13: 341–61.
Hudson, J., Lowe, S., Oscroft, N. and Snell, C. (2007) Laumann, E.O., Galaskiewicz, J. and Marsden, P.V. (1978)
‘Activating policy networks: A case study of local ‘Community structure as interorganizational linkages’,
environmental policy-making in the United Kingdom’, Annual Review of Sociology, 4: 455–84.
Policy Studies, 28: 55–70. Laumann, E.O. and Knoke, D. (1987) The Organizational
Jordan, G. (1990) ‘Sub-government, policy communities and State: A Perspective on the Social Organization of National
networks: Refilling the old bottles?’ Journal of Theoretical Energy and Health Policy Domains. Madison: University of
Politics, 2(3): 319–38. Wisconsin Press.

5605-Scott-Chap15.indd 220 4/15/2011 4:59:21 PM


POLICY NETWORKS 221

Laumann, E.O. and Pappi, F.U. (1976) Networks of Collective Pappi, F.U. (1993) ‘Policy-Netze: Erschienungsform moderner
Action: A Perspective on Community Influence Systems. Politksteuerung oder methodischer Ansantz?‘ Sonderheft
New York: Academic Press. 24 der Politischen Vierteljahresschrift, pp. 84–94.
Lavdas, K.A., Papadakis, N.E. and Gidarakou, M. (2006) Pappi, F.U. and Kappelhoff, P. (1984) ‘Abhängigkeit, Tausch
‘Policies and networks in the construction of the European und kollektive Entscheidung in einer Gemeindeelite’,
higher education area’, Higher Education Management and Zeitschrift für Soziologie, 13: 87–117.
Policy, 18: 129–39. Pappi, F.U., König, T. and Knoke, D. (1995)
Lehmbruch, G. (1984) ‘Concertation and the structure of Entscheidungsprozesse in der Arbeits- und Sozialpolitik.
corporatist networks: Order and conflict in contemporary Der Zugang der Interessengruppen zum Regierungssystem
capitalism’, in John H. Goldthorpe (ed.), Order and Conflict über Politikfeldnetze: Ein deutsch-amerikanischer Vergleich.
in Contemporary Capitalism. Oxford: Oxford University Frankfurt/NewYork: Campus Verlag.
Press. pp. 60–80. Paredes, S.V. (2008) ‘Policy networks and organizational
Le Gales, P. (2001) ‘Urban governance and policy networks: change in Mexican forestry policy’, Gestion y Politica
On the urban political boundedness of policy networks: A Publica, 17: 101–44.
French case study’, Public Administration, 79: 167–84. Raab, C. (2001) ‘Understanding policy networks: A comment
Lehmbruch, G. (1989) ‘Institutional linkages and policy on Marsh and Smith’, Political Studies, 49: 551–56.
networks in the federal system of West Germany’, Publius, Raab, J. (2002) ‘Where do policy networks come from?’
19(4): 221–35. Journal of Public Administration Research and Theory
Lubell, M. (2007) ‘Familiarity breeds trust: Collective action in 12: 581–622.
a policy domain’, Journal of Politics, 69(1): 237–50. Raab, J. and Kenis, P. (2007) ‘Taking stock of policy networks:
Luzi, S., Hamouda, M.A., Sigrist, F. and Tauchnitz, E. (2008) Do they matter?’ in Frank Fischer, Gerald J. Miller and
‘Water policy networks in Egypt and Ethiopia’, Journal of Mara S. Sidney (eds), Handbook of Public Policy Analysis:
Environment and Development, 17: 238–68. Theory, Methods and Politics. London: Taylor & Francis.
Marin, B. and Mayntz, R. (eds) (1991) Policy Networks: pp. 187–200.
Empirical Evidence and Theoretical Considerations. Boulder, Reinicke, W.H. and Deng, F. (2000) Critical choices: The
CO: Westview Press. United Nations, Networks, and the Future of Global
Marsden, P.V. (1983) ‘Restricted access in networks and Governance. Ottawa, Canada: International Development
models of power’, American Journal of Sociology, 88: Research Centre.
686–717. Rethemeyer, R.K. (2007) ‘Policymaking in the age of Internet:
Marsden, P.V. and Friedkin, N.E. (1994) ‘Network studies of Is the Internet tending to make policy networks more or
social influence’, in Stanley Wasserman and Joseph less inclusive?’ Journal of Public Administration Research
Galaskiewicz (eds), Advances in Social Network Analysis: and Theory, 17: 259–84.
Research in the Social and Behavioral Sciences. Thousand Rhodes, R.A.W. (1985) ‘Power dependence, policy
Oaks, CA: Sage. pp. 3–25. communities and inter-governmental networks’, Public
Marsh, D. and Rhodes, R.A.W. (eds) (1992) Policy Networks in Administration Bulletin, 49: 4–29.
British Government. Oxford: Clarendon Press. Rhodes, R.A.W. (1990) ‘Policy networks: A British perspec-
Marsh, D. and Smith, M. (2000) ‘Understanding policy tive’, Journal of Theoretical Politics, 2(3): 293–317.
networks: Towards a dialectical approach’, Political Rhodes, R.A.W. (1996) ‘The new governance: Governing
Studies, 48(4): 4–21. without government’, Political Studies, 44: 652–67.
May, P.J., Sapotichne, J. and Workman, S. (2006) ‘Policy Richardson, J.J. (2000) ‘Government, interests groups and
coherence and policy domains’, Policy Studies Journal, policy change’, Political Studies, 48: 1006–25.
34(3): 381–403. Robinson, S.E. (2006) ‘A decade of treating networks
Mayntz, R. (1993) ‘Modernization and the logic of interorga- seriously’, Policy Studies Journal, 34: 589–98.
nizational networks’, Knowledge and Policy, 6: 3–16. Scharpf, F., Reissert, B. andSchnabel, F. (1976)
Mikkelsen, M. (2006) ‘Policy network analysis as a strategic Politikverflechtung: Theorie unde Empirie des kooperativen
tool for the voluntary sector’, Policy Studies, 27: 17–26. Föderalismus in der Bundesrepublik. Kronberg, Germany:
Mizruchi, M.S. (1989) ‘Similarity of behavior among large Scriptor Verlag.
American corporations’, American Journal of Sociology, 95: Schneider, V. (1986) ‘Exchange networks in the development
401–24. of policy: Regulation of chemicals in the OECD, EEC, and
Mizruchi, M.S. (1990) ‘Cohesion, structural equivalence, and the Federal Republic of Germany’, Journal Fur
similarity of behavior: An approach to the study of corpo- Sozialforschung, 26: 383–416.
rate political power’, Sociological Theory, 8: 16–32. Schneider, V. (1992) ‘The structure of policy networks: A
Montpetit, E. (2005) ‘A policy network explanation of biotech- comparison of the “chemicals control” and “telecommuni-
nology policy differences between the United States and cations” policy domains in Germany’, European Journal of
Canada’, Journal of Public Policy, 25(3): 339–66. Political Research, 21(1–2): 109–29.
Papadopoulos, A.G. and Liarikos, C. (2007) ‘Dissecting chang- Schneider, V., Dang-Nguyen, G. and Werle, R. (1994)
ing rural development policy networks: The case of ‘Corporate actor networks in European policy-making:
Greece’, Environment and Planning C: Government and Harmonizing telecommunications policy’, Journal of
Policy, 25: 291–313. Common Market Studies, 32(4): 473–98.

5605-Scott-Chap15.indd 221 4/15/2011 4:59:21 PM


222 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Scholz, J.T. and Wang, C.-L. (2006) ‘Cooptation or transfor- Thomson, R. and Hosli, M.O. (2006) ‘Explaining legislative
mation? Local policy networks and federal regulatory decision-making in the European Union’, in Robert
enforcement’, American Journal of Political Science, 50: Thomson, Frans N. Stokman, Christopher H. Achen
81–97. and Thomas König (eds), The European Union
Siegel, J. (2008) ‘Contingent political capital and international Decides. Cambridge, UK: Cambridge University Press.
alliances: Evidence from South Korea’, Administrative pp. 1–24.
Science Quarterly, 52: 621–66. Thomson, R., Stokman, F.N., Achen, C.H. and König, T. (eds)
Skogstad, G. (2003) ‘Legitimacy and/or policy effectiveness? (2006) The European Union Decides. Cambridge, UK:
Network governance and GMO regulation in the European Cambridge University Press.
Union’, Journal of European Public Policy, 10: 321–38. Toke, D. and Marsh, D. (2003) ‘Policy networks and the
Sørensen, E. and Torfing, J. (2003) ‘Network politics, political GM crops issue: Assessing the utility of a dialectical
capital, and democracy’, International Journal of Public model of policy networks’, Public Administration, 81:
Administration, 26: 609–34. 229–51.
Stokman, F. and Berveling, J. (1998) ‘Dynamic modeling of von Winter, T. (2001) ‘From corporatism to statism: Changes
policy networks in Amsterdam’, Journal of Theoretical in the structure of the German poverty policy network’,
Politics, 10: 577–601. Zeitschrift für Politikwissenschaft, 11: 1573–608.
Stokman, F.N. and Van den Bos, J.M.M. (1992) ‘A two-stage von Winter, T. (2004) ‘From corporatism to lobbyism:
model of policymaking with an empirical test in the U.S. A change of paradigm in the theory and analysis of
energy-policy domain’, Research in Politics and Society, advocacy’, Zeitschrift für Parlamentsfragen, 35: 761–76.
4: 219–53. Weible, C.M. and Sabatier, P.A. (2007) ‘A guide to the
Stokman, F.N. and Oosten, R.V. (1994) ‘The exchange of advocacy coalition framework’, in Frank Fischer, Gerald J.
voting positions: An objective-oriented model of policy Miller and Mara S. Sidney (eds), Handbook of Public Policy
networks’, in Bruce Bueno de Mesquita and Frans Stokman Analysis: Theory, Methods and Politics. London: Taylor &
(eds), European Community Decision Making: Models, Francis. pp. 123–36.
Applications and Comparisons. New Haven, CT: Yale Wilks, S. and Wright, M. (eds) (1987) Government-Industry
University Press. pp. 105–27. Relations: West Europe, U.S. and Japan. Oxford: Clarendon
Stokman, F.N. and Zeggelink, E.P.H. (1996) ‘Is politics power Press.
or policy oriented? A comparative analysis of dynamic Witte, J.M., Reinicke, W.H. and Benner, T. (2000) ‘Beyond
access models in policy’, Journal of Mathematical Sociology, multilateralism: Global public policy networks‘,
21: 77–111. Internationale Politik und Gesellschaft, 2: 176–88.

5605-Scott-Chap15.indd 222 4/15/2011 4:59:21 PM


16
Social Movements and
Collective Action
Mario Diani

This chapter examines the relation between However, attention has become massive since the
network analytical approaches and collective 1960s, when a new generation of scholar (often
action from two distinct angles.1 First, it intro- with an activist background) found themselves
duces the contribution of network analysis to the struggling with the inadequacy of previous
“collective action” dilemma proper, namely, how accounts of collective action as driven by
embeddedness in networks affects people’s deci- “personal pathology and social disorganization”
sions to engage in collective action. Next, it looks (McAdam, 2003: 281). This prompted an
at the emergence of collective actors as the result intellectual movement that stressed how activism
of coalitions and, more broadly, purposively built would normally be embedded in a rich texture of
ties. Here, the focus is on fields, constituted by the social relations.2
interactions between a multiplicity of organiza- Several studies ensued, illustrating how
tions and individuals. I conclude by identifying a involvement in extensive connections to people
few areas for future research. already active facilitated participation (Booth and
While students of social movements and Babchuk, 1969; Snow et al., 1980; Stark and
collective action are increasingly adopting Bainbridge, 1980; McAdam, 1986; Klandermans
network concepts and perspectives in their work, and Oegema, 1987; della Porta, 1988; Diani and
their use of formal network analytical tools is still Lodi, 1988; Opp, 1989; Opp and Gern, 1993;
limited. Accordingly, this chapter also covers Oegema and Klandermans, 1994). Some
studies that do not follow the classic quantitative suggested that networks mattered most for adhe-
approach but focus instead on qualitative observa- sion to groups that were somehow integrated in
tion (a strategy now largely represented even at society, while adhesion to world-rejecting sects
the annual Sunbelt conferences). Instead, it would be largely a matter for isolated individuals
looks far more sparingly at broader theoretical (Snow et al., 1980). For others, involvement
discussions of the role of networks in social in specific networks was most important for
processes (for relevant examples, see Emirbayer participation in demanding forms of activism,
and Goodwin, 1994; Gilchrist, 2000; Livesay, whether religious or political, whereas more
2002; Fine and Harrington, 2004). individualistic, market-oriented, and/or less
confrontational forms of behavior were more
likely to occur without previous connections
(Stark and Bainbridge, 1980; Diani and Lodi,
SOCIAL NETWORKS AND 1988). Embeddedness in social networks not only
COLLECTIVE ACTION mattered for recruitment, but it also discouraged
leaving, and it supported continued participation
Individual effects (McPherson et al., 1992), with substantial
bandwagon effects (Sandell, 1999).
Network processes have always been relevant for Evidence on the important role of social net-
analysts of political behavior (Zuckerman, 2005). works in fostering participation has kept piling up

5605-Scott-Chap16.indd 223 4/7/2011 4:53:39 PM


224 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

to date (for a review, Crossley, 2007), with Over the last few years, it has been increasingly
examples ranging from local communities in argued that we ought to look for mechanisms
Romania (Vasi, 2004) and Mexico (Holzner, rather than correlations, that is, we should clarify
2004) to university students’ networks in the how networks really operate and what impact they
United Kingdom (Crossley, 2008), from peace have on participation. Kitts (2000) differentiated
(Nepstad, 2004) and civil rights activism (Lowe, between information, identity, and exchange
2007) to white power groups (Futrell and Simi, mechanisms. Along similar lines, McAdam (2003)
2004). Most important, however, is the fact that identified four crucial mechanisms: recruitment
over the years, questions such as “Which attempts, identity-movement linkages, and
networks do explain what?” and “Under what positive and negative influence attempts. Passy
conditions do specific networks become rele- (2001, 2003; see also Passy and Giugni, 2000)
vant?” have been constantly refined. Some have differentiated between socialization, structural-
found previous activism to increase centrality in connection, and decision-shaping functions of
interpersonal networks, which in turn facilitated networks. These functions take different forms
involvement in subsequent campaigns (e.g., depending on the traits of the organization
Fernandez and McAdam, 1988, 1989). The form promoting recruitment and its visibility in the
of prospective participants’ ego-networks, that is, public space.
the distribution and density of the ties between the
actors that one is connected to, also matters. The
number of relevant others, who are already Population effects
involved and densely connected, positively corre-
lates with social incentives to join (Sandell and The analyses presented in the previous section
Stern, 1988). The impact of the context in which treat network location mainly as an individual
recruitment attempts take place has also been attribute, the impact of which is to be evaluated
assessed. Specific political networks have been controlling for education, age, profession, or
found to matter most where countercultural status. However, a structural account of participa-
communities are weak (Kriesi, 1988: 58; McAdam tion requires analysts to look at how individual
and Fernandez, 1990). Where alternative commu- ties combine into more complex network patterns,
nities are strong, more people are recruited through to affect the proportion of people willing to
personal friendship networks or even through contribute to a cause, or the intensity of participa-
other channels, including self-applications. tion in a certain population. These questions have
However, we can also find examples of the been addressed through both formal modeling and
opposite situation, in which milieus with fewer empirical case studies. Marwell and Oliver (1993;
protests see people mobilizing through contacts Oliver and Marwell 2001) used formal models3 to
developed in contexts that are not directly challenge Olson’s (1963) well-known claim that
associated with political protest. People may be only small groups can actually generate collective
embedded in settings, ranging from PTAs to sport action. They emphasized the crucial role of a
clubs, that do not directly promote activism, but critical mass of people (“organizers”), prepared to
create opportunities for people with similar face the costs of starting collective action, regard-
presuppositions to meet and eventually develop less of the size of the group taken as a whole.
joint action (Ohlemacher, 1996). The workplace Their simulations also found a strong positive
has also been found to exert a persistent positive relationship between centralization of a group and
effect on people’s chances to mobilize (Dixon and its members’ propensity to become involved
Roscigno, 2003). in collective action (Marwell and Oliver 1993:
Increasingly, researchers have recognized that 101–29), while the presence of cliques had appar-
people are involved in multiple ties; while ently no effects. Kim and Bearman (1997) found
some may facilitate participation, others may dis- that collective action occurs only if interest in
courage it. As such, neither embeddedness in specific issues and actors’ network centrality are
organizational links nor strong ties to people positively correlated.
already active necessarily predict activism. Lack Network heterogeneity also seems to matter. In
of direct ties may be overcome if prospective highly heterogeneous networks, selective mobili-
participants are embedded in broader organiza- zation attempts, targeting specific subgroups of
tional networks, compatible with the campaign or a population, are more effective than in homoge-
organization they are considering to join (Kriesi, neous networks (Marwell and Oliver, 1993:
1988; McAdam and Fernandez, 1990; McAdam 130–56). This line of argument is consistent with
and Paulsen, 1993). Similar mechanisms may the more general point that recruitment strategies
also occur between people involved in religious differ in how they balance the capacity to address
congregations (Becker and Dhingra, 2001; Smilde, a broad and diversified group of prospective par-
2005). ticipants (reach) with the capacity to mobilize

5605-Scott-Chap16.indd 224 4/7/2011 4:53:39 PM


SOCIAL MOVEMENTS AND COLLECTIVE ACTION 225

with strong messages a more restricted yet more work at the collective level. In a rare application to
motivated constituency (selectivity; see Friedman empirical data, Biggs (2005) has shown strikes to
and McAdam, 1992). expand following a power law distribution and a
Explorations of collective action dynamics model he assimilates to the “forest fire,” again
from this particular, systemic angle also address pointing (as Centola and Macy, and of course
the broader question of why networks ultimately Hedström et al., 2000) to spatial proximity as
matter. Some stress that network ties enable being a crucial element in diffusion processes.
people to calculate the impact of their actions
(Kim and Bearman, 1997). Norms of fairness are
also important in determining collective
outcomes. The denser a network, the higher the Do networks really matter?
levels of collective action, as people do not want
to be perceived as free riders (Gould, 1993b). The empirical evidence demonstrating the role of
Rates of participation also increase much more networks in recruitment processes has been
steeply if those who started collective action in the questioned from different angles. Some have
first place are centrally located in the overall defended the breakdown/malintegration argument,
network (Gould, 1993b). noting that it only refers to collective violence and
Gould (1991, 1993a, 1995) pioneered the disruptive behavior, not to the broader and less
empirical study of the relationship between contentious forms of action that most collective
collective performance and network variables. In action theorists include in their studies (Piven and
a path-breaking project, he showed that levels of Cloward, 1992: 308–9). Some recent studies
collective action by different Parisian neighbor- actually stress the relevance of some of the
hoods in the Commune uprising of Spring 1871 mechanisms identified by breakdown theorists.
were accounted for by organizational and infor- McVeigh (2006) shows levels of involvement in
mal relations between neighborhoods4 as well as activist groups of the left and the right in the
by nonrelational properties, such as levels of United States to be significantly linked to indica-
wealth in the neighborhood, percentage of resi- tors of problematic social integration, such as
dent salaried workers, and percentage of resident ethnic and religious heterogeneity or income
middle-class white-collar laborers. inequality. Anheier (2003) showed the importance
Peter Hedström and his associates also stressed of “isolated members,” that is, people who joined
the link between territorial units and mobilization without previous ties to already active members,
processes, yet with an emphasis on diffusion in the activities of the Nazi party. Or, Biggs (2006)
processes rather than levels of participation. They showed that grievances mattered more than
found that spatial proximity and the resulting integration in church networks to account for
increased likelihood of personal acquaintances to individual participation in civil rights protests in
significantly influenced the spread of trade union the 1960s American South (see also Snow et al.,
and social democratic party organizations in 1980; Luker, 1984; Mullins, 1987).
Sweden from 1890 to 1940 (Hedström, 1994; The network thesis would also be largely
Hedström et al., 2000; Sandell, 2001). Edling and tautological, given the spread of ties across groups
Liljeros (2003) also referred to Swedish unions in and individuals (Piven and Cloward, 1992: 311).
their analysis of the diffusion of new organiza- Even when network effects are discovered,
tional forms. Expanding this line of inquiry, findings are sometimes ambiguous (Oliver, 1984;
Hedström et al. (2000) paid special attention to Nepstad and Smith, 1999). Rather than highlight-
the role of specific activists (“socialist agitators”) ing exclusively those cases in which active people
in creating a macro network between otherwise are involved in network ties, analysts should also
disjointed groups of actors and regions. The visit look at those cases when networks are there, yet
of an agitator made a difference along with the participation is not (e.g., see Klandermans and
strength of ties between regions, given by Oegema, 1987; Dixon and Roscigno, 2003).
geographical proximity, or the number of social The growing interest in collective action in
democratic members in other districts. The countries with nondemocratic regimes has further
presence of committed activists was also found questioned the role of networks in recruitment, as
crucial to the spread of civil rights activities in the this is often dependent on public associational
1960s American South (Andrews and Biggs, activities that are discouraged if not openly
2006). repressed in those settings. For example, Vala and
Insisting on the classic distinction between O’Brien (2007) have looked at the recruitment in
strong and weak ties, Centola and Macy (2007) Protestant denominations in China. They have
have suggested that weak ties may actually impede shown that under repressive circumstances net-
rather than facilitate complex contagion. What works count less for recruitment than is usually
works at the individual level does not necessarily assumed, and networks are often the outcome of

5605-Scott-Chap16.indd 225 4/7/2011 4:53:39 PM


226 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

recruitment attempts rather than their precondi- of those issues (Schlosberg, 2002: Chapter 5).
tion. Similar indications come from studies of Oftentimes, however, a hybrid model of “network
Islamist activism in the Middle East (Bennani- organization” (Powell, 1990; Monge and
Chraïbi and Fillieule, 2003; Pedahzur and Perliger, Contractor, 2003) develops, combining elements
2006) and in Central Asia (Collins, 2007). The of formality with those elements from a loose
role of networks is similarly ambiguous in network structure. The “network organization”
contexts in which recruitment to a political organ- model is frequently found among organizations
ization may be coerced, as in the case of Central mobilizing on a transnational scale (e.g., Anheier
American guerrilla groups (Viterna, 2006). and Themudo, 2002; Katz and Anheier, 2007;
Similar doubts have been raised in reference to Smith, 2008).
organizational population dynamics. A study of Network organizational forms facilitate
the diffusion of civil rights campaigns in the alliance building, which in turn has been found
American South in the spring of 1960 shows to increase the chances of success for interest
social networks played a limited role in diffusion organizations (Laumann and Knoke, 1987: 387;
processes, as core activists of movement organiza- Knoke, 1990: 208); they also foster the diffusion
tions and news media turned out to be more of ideas and practices, and reduce the negative
important (Andrews and Biggs, 2006). A study of effects of failure in a certain organizational
participation in mass rallies on highly emotional population (Gerlach, 1971). With the legitimation
issues also had the same conclusion, suggesting crisis experienced by political parties and other
that the media play a much greater role than social established forms of political representation since
networks (Walgrave and Massens, 2000). Looking the 1980s, networks are also being regarded as
at survival rates of MADD chapters, Edwards and a desirable, more legitimate, and democratic form
McCarthy (2004) found that, despite the impor- of political organization (see Dumoulin, 2006;
tance of weak ties, stronger ties emerging from on networks and democratic theory, Hadenius,
bloc recruitment mechanisms do not seem to con- 2001: Chapter 3).
tribute to organizational survival. On the other hand, although loose network
forms increase the resources available to social
movement organizations, they also raise the
danger of internal conflict, both between different
organizational units and different ideological
SOCIAL MOVEMENTS, COALITIONS, factions (Kleidman, 1993: 39–40; Brooks, 2004).
AND ORGANIZATIONAL FIELDS Also for this reason, the lives of many network
organizations tend to be shorter and less
Social movements as networks stable than that of more bureaucratic organiza-
tions (Anheier and Themudo, 2002: 192–93;
Large-scale collective action has always been Markham, 2005).
organized in network forms (see e.g., Ansell,
2001; Rosenthal et al., 1985, 1997), and the net-
work nature of social movements has long been
Types of ties
highlighted (Gerlach, 1971, 2001; Curtis and
Zurcher, 1973). Recently, Diani (2003a; Diani and While traditionally applied to the study of indi-
Bison, 2004) proposed a relational typology of vidual recruitment and, more generally, individual
forms of collective action that focuses on actors’ behavior, the classic distinction between strong
different responses to issues of coordination and and weak ties has also been used in reference to
boundary definition. Social movements are organizational networks. Within civil society,
collective actors in which coordination takes weak ties seem to operate mostly as bridges
place through informal networks between between different organizational clusters, be they
formally independent actors, who all identify defined by reference to locality (e.g., Musso et al.,
nonetheless – if with variable intensity – with a 2006), issues (Baldassarri and Diani, 2007), or
common cause. They are contrasted to coalitions, something else. While weak ties better connect
organizations, and communities that are driven by civil society, their bridging functions usually do
different logics of action (see also Jackson, 2006). not go beyond information exchange or ad hoc
In many cases, network dynamics remain coalition work. On the other hand, stronger
purely informal. For example, in the environmen- bonding ties may facilitate collective action, but at
tal justice movement of the 1990s, many grass- the cost of reproducing inequalities within civil
roots groups preferred to coordinate through an society (Musso et al., 2006) or encouraging
informal networking strategy, rather than relying the fragmentation of civil society in non- or
on the intermediation of the rigid environmental little-communicating clusters (Baldassarri and
bureaucracies that had so far secured “ownership” Diani, 2007).

5605-Scott-Chap16.indd 226 4/7/2011 4:53:39 PM


SOCIAL MOVEMENTS AND COLLECTIVE ACTION 227

Strong ties have often been conceptualized as identifies with member overlaps), knowledge
the overlap of organizational exchanges and the structures (given by shared ideological elements
links provided by individual activists and their between organizations) and affiliation structures
multiple memberships (for general applications of (given by shared participation in events) operate
this principle: Simmel, 1908 [1955]; McPherson, in the same context.5
1983; Cornwell and Harrison, 2004). Looking at
how individuals link organizations through their
memberships generates useful insights on the
structure of social movement milieus. Carroll and Movement structures:
Ratner (1996) analyzed networks of multiple Segmentation and division of
memberships in the social movement sector in labor within movement networks
Vancouver, relating different structural positions
to different activists’ frames and representations. Social movement networks may actually take very
In their study of the organizational affiliations of different forms. Diani (2003a) has proposed a
202 leading feminists in New York State between typology based on two fundamental dimensions:
1840 and 1914, Rosenthal et al. (1985, 1997) network centralization vs. decentralization,
provided one of the earliest and most systematic and network integration vs. segmentation. This
treatment of overlapping memberships as generates four types of networks: “wheel/star”
interorganizational links. Access to diachronic networks, highly centralized and integrated (see
data enabled them to chart the transformation of Diani, 1995, 2003b, and Figure 16.1); “policepha-
networks through different historical periods. lous” networks, consisting of sets of different
Looking at both local and nationwide organiza- clusters, with variable degrees of centralization, in
tional milieus, they were also able to address which the average distance between nodes is
issues of core-periphery relations and division of higher than in the wheel/star model (see, for
labor in the women’s organizational fields. example, Phillips, 1991); “clique” networks,
Most studies of the duality of individuals and totally decentralized and highly integrated as all
groups focus on core activists and movement nodes are adjacent to each other (in reality,
leaders. Schmitt-Beck (1989) has explored the of course, we’ll have most probably 2-clique
connections between central figures in the German networks, as nodes will be unlikely to be
peace movement of the 1980s, and their ties to connected to all other nodes); and “segmented,
churches, trade unions, university, media, and decentralized” networks, consisting of different
other established social and political organiza- components, each in turn made of horizontal
tions. So have Schurman and Munro (2006), if in dyads or cliques (Diani, 2003a: 306–12). More
qualitative terms, in reference to mobilizations recently, Baldassarri and Diani (2007) identified a
opposing genetic engineering in European “small-world” type of structure for local civil
agriculture. Alongside religious identity, cohesive society networks, with dense clusters of interac-
networks have been found to play an important tion connected by rarer bridging ties and overall
role in shaping expectations and ideological lower levels of hierarchy than one would find in
stances of leaders in American evangelicalism random networks.
since the 1970s (Lindsay, 2008). From a historical Looking at global network structures and in
sociology perspective, Hillmann (2008) has looked particular to centrality measures may also illumi-
at political and mercantile elite networks in the nate some aspects of leadership dynamics within
English Civil War, while Han (2009) has explored social movements. While network studies of
the role of individual brokers, most notably Paul profit-oriented organizations have long estab-
Revere, in the American revolution. lished a relation between network centrality and
Some studies explicitly address the multiplicity influence (Brass and Burckhardt, 1993), it is more
of ties within movement networks. Diani (1995) disputed whether this might also apply to
differentiate between “visible” ties, consisting of networks of nonprofit, often protest-prone, organ-
exchanges between organizations, and “latent” izations. An early influential account of social
ties, consisting of the connections created by movements actually pointed at their nature as
activists’ personal friendships and multiple being policephalous (Gerlach, 1971), or even
memberships. Baldassarri and Diani (2007) refor- acephalous, networks (Gerlach, 2001). Brokerage
mulate the weak versus strong ties dichotomy in roles, bridging otherwise noncommunicating
terms of “transactions,” consisting only of resource milieus, seem particularly relevant for movements
exchanges, and “social bonds,” that combines operating on the global scale (Smith, 2002, 2005,
resource exchange and shared members (see also 2008). Other studies have stressed the relative
Lémieux, 1998). Studying the structure of centralization of movement networks. Phillips
the Korean environmental movement, Park (2008) (1991: 779) showed that centrality, rather than
explores how governance structures (that he resources, explained perception of efficacy among

5605-Scott-Chap16.indd 227 4/7/2011 4:53:39 PM


228 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 16.1 Structure of the Milanese environmental movement, mid-1980s

Canadian women’s groups. Diani (2003b) found environmental associations between the 1980s
that high in-degree scores among Milanese envi- and 1990s.
ronmental groups were accounted for by the social Still, neither functional division of labor nor
capital created by members’ multiple member- path dependencies enable us to make full sense of
ships, while high brokerage scores depended more the structure of movement networks. We also need
on organizational resources. However, looking at to look at homophily mechanisms, or, in other
the issue from the perspective of Actor Network words, at what characteristics of actors, of their
Theory, others (Routledge et al., 2007) found no belief systems and identities, facilitate or hinder
correlation between resources and centrality. the building of ties. For example, the development
But what does generate structural patterns? of broad alliances on environmental, gender, or
Movement networks emerge from discrete choices citizens’ rights issues may be hampered by the
that independent actors make regarding their part- strength of cultural differences — in turn based
ners in alliances, their privileged sources of infor- on race, class, or again gender — running within
mation, or, in the case of individuals, the the communities that movements are supposed
organizations to join and the groups to be part of. to mobilize (e.g., Lichterman, 1995; Croteau,
Particular network forms are not, in fact, the result 1995). How movement actors represent them-
of deliberate planning but rather of provisional or selves, their adversaries, and what is at stake in
contingent choices (Padgett and Ansell, 1993). the conflict in which they are involved can also
What determines such choices — that is, the prin- have multiple effects on the selection of potential
ciples behind alliance building — has been the allies, regardless of the political system in which
object of a lot of work recently (Rucht, 2004; van they operate (Diani, 1995; Lichterman, 1995;
Dyke and McCammon, 2010), yet with minimal Lavalle et al., 2007).
reference to SNA tools (see Ansell, 2003). Socio-demographic processes are often
Practical considerations, related to differences shaping network patterns. Let us think for instance
in issue agendas and time and resource con- of the varying salience of ethnic segregation. The
straints, and mechanisms of path dependence chances for the development of pan-Asian
undoubtedly play a significant role in shaping collective action in the United States seem higher
alliances. Despite the rhetoric on movement when American Asians as a whole are segregated
networks’ volatility, there is substantial continuity from the rest of society; if segregation patterns
in the choices of partners made at least by the apply unevenly between Asian subgroups, then
most important and persistent organizations. For the chances of pan-Asian collaboration diminish
example, Shumate, et al. (2005) show that previ- (Okamoto, 2003). Drastic changes of the socioe-
ous ties account for alliances between interna- conomic system like those induced by neoliberal
tional NGOs active on the HIV crisis. Diani policies may also affect coalition building. For
(1995: 152–62) found the same for the Milanese instance, chances for transnational networking

5605-Scott-Chap16.indd 228 4/7/2011 4:53:39 PM


SOCIAL MOVEMENTS AND COLLECTIVE ACTION 229

may grow while opportunities for domestic col- (Breiger, 1974; Borgatti and Everett, 1997), or
lective action may be reduced (Bandy, 2004). the evolution over time of relations between dif-
ferent sectors of civil society (see, for example,
Rosenthal et al., 1985, 1997; see also McPherson
and Rotolo, 1996). Available surveys like the
CONCLUSIONS General Social Survey in the United States or the
World Values Survey can be used (and sometimes
Over the last few years, network concepts have have been used: Cornwell and Harrison, 2004)
gained increasing attention in the study of social to this purpose.
movements and collective action. The contribu- As for organizational data, the major obstacle
tion of networks to individual recruitment in to diachronic research remains the difficulty of
particular has been both widely explored and identifying valid sources of data to chart the
critically discussed (Diani, 2004); in contrast, evolution of interorganizational networks over
despite a few exceptions (Phillips, 1991; Diani, time without depending on data about core
1995; Ansell, 2003; Diani and Bison, 2004; members. Sometimes, media reports mentioning
Mische, 2003, 2008; Park, 2008), applications of the involvement of specific organizations in pro-
SNA tools to interorganizational processes have test events have been drawn upon to map relations
been relatively rare. As a conclusion, I try to between those organizations, again following a
identify a few issues that in my opinion deserve two-mode logic of analysis (Bearman and Everett,
greater attention. 1993; Rootes, 2003; Boudourides and Botetzagias,
We need to take more seriously into considera- 2007). Archival data have also been dug up to map
tion the spatial dimension of networks, which do interactions between collaborating and conflicting
not develop in a vacuum but are embedded in actors in a variety of historical settings (Franzosi,
specific territories (Hägerstrand, 1967). Political 1999; Tilly and Wood, 2003).
and urban geographers have devoted substantial We also have to pay far more attention to appli-
attention to collective action processes both at the cations of SNA to the analysis of virtual networks.
local and the global levels. However, most of that Over the last few years, a considerable debate has
work has been conducted without drawing upon developed whether computer-mediated communi-
SNA tools (Cumbers et al., 2008; Leitner et al., cation (CMC) is capable of creating new social
2008; Routledge, 2003; Routledge et al., 2006, ties or simply expanding and amplifying “real,”
2007, 2008; Nicholls, 2008, 2009), while “face-to-face” ties (on CMC and collective action,
additions to analytical works like Hedstrom et al.’s see, among others, Walgrave and Massens, 2000;
or Gould’s have been far more rare. Earl and Schussman, 2003; Tilly, 2004: 95–108;
We also need to pay more attention to time van de Donk et al., 2004; della Porta and Diani,
dynamics and network evolution. Like in the case 2006: 131–34). However, the available evidence
of space, research covering long time spans is using network analysis tools is still very rare, at
severely hampered by constraints on resources least in the case of social movement studies.
and, most important, data availability. To date, the Among the few exceptions are studies of the
most sophisticated attempt to adopt a diachronic links between websites of global justice organiza-
perspective in the analysis of individual networks tions (van Aelst and Walgrave, 2004), and of
has been Ann Mische’s (2003, 2008) exploration organizations and activists mobilizing on global
of Brazilian youth activist networks from the communication rights (Mueller et al., 2004;
1970s to the 1990s. Mische maps the evolution of Padovani and Pavan, 2009; Pavan, 2011).
networks over time through the multiple member- Finally, more theorizing and research must be
ships of different activist cohorts. To this purpose put into the exploration of the link between
she provides a pioneering application to collective context — in particular, its structural, cultural, and
action processes of Galois lattice techniques political features — and network structures. The
(Mische and Pattison, 2000), which enables her to relationship between context and social networks
combine information on individuals, organiza- has only recently gained attention in SNA at
tions, and events. David Tindall (2002, 2004; large (Entwisle et al., 2007). In the case of social
Tindall et al., 2003) has provided another rare movement analysis, properties of the context, and
example of research by mapping the evolution of in particular “political opportunities” (Tarrow,
activist careers (in this case, British Columbia 1998; Meyer and Minkoff, 2004), are normally
environmental activists) over time, drawing upon taken as explanations for individual or aggregate
a three-stages panel study spanning three decades. behavior. However, it may also be worth studying
A more economic approach than panel studies or how they may shape interaction patterns. For
life histories consists of using available survey example, Stevenson and Greenberg (2000) show
data on individual memberships to map, using that political opportunities affect actors’ network
two-mode network principles and techniques strategies in policy networks. Cinalli and Füglister

5605-Scott-Chap16.indd 229 4/7/2011 4:53:39 PM


230 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

(2008) claim that actors mobilizing on unemploy- enlisted in the battalion of district j, divided by the
ment issues generate different coalitions in differ- overall number of i residents enlisted anywhere else.
ent European countries, depending on national Other indicators of linkages included rates of
peculiarities of collective action, in turn linked to marriages between residents of different districts.
dominant repertoires and styles of policy making. 5 See also Molm and Cook (1995) on the role
Carmin and Hicks (2002) look at the impact of of different types of connections in coalition
transnational networks on domestic mobilization processes
in former Socialist countries.
This logic might be extended to collective
action proper, as the salience of traditional cleav-
ages might affect levels of segmentation within REFERENCES
movement networks and the overall distribution
of alliance ties; likewise, the overall strength of Andrews, K.T. and Biggs, M. (2006) ‘The dynamics of protest
protest cultures and repertoires could encourage diffusion: Movement organizations, social networks, and
certain alliances to the detriment of others. Some news media in the 1960 sit-ins’, American Sociological
studies point in this direction. For example, Review, 71: 752–77.
environmental organizations in Italy in the 1980s Anheier, H. (2003) ‘Movement development and organiza-
mostly allied with actors on the same side of the tional networks: The role of ‘single members’ in the
major political cleavage, and a relatively German Nazi party, 1925–1930’, in Mario Diani and Doug
integrated movement developed only when the McAdam (eds), Social Movements and Networks. Oxford:
salience of major cleavages was reduced (Diani, Oxford University Press. pp. 49–74.
1995). Two decades later, U.S. peace movement Anheier, H. and Themudo, N. (2002) ‘Organizational forms
activists tended to join different sectors of the of global civil society: Implications of going global’, in
peace movement depending on their partisan Marlies Glasius, Mary Kaldor, and Helmut Ahheier (eds),
loyalties (Heaney and Rojas, 2007); the networks Global Civil Society 2002. Oxford: Oxford University Press.
generated in several European countries by peace pp. 191–216.
campaigners through their multiple involvements Ansell, C. (2001) Schism and Solidarity in Social Movements.
also seemed to vary depending on the salience of The Politics of Labour in the French Third Republic.
pre-existing cleavages (Diani, 2009). Other Cambridge: Cambridge University Press.
studies, however, found no relation between Ansell, C. (2003) ‘Community embeddedness and collabora-
cleavage salience and the structural properties of tive governance in the San Francisco Bay Area environmen-
civil society networks (Baldassarri and Diani, tal movement’, in Mario Diani and Doug McAdam (eds),
2007). Once again, more research is needed Social Movements and Networks. Oxford: Oxford University
before we can develop more solid theoretical Press.
arguments on this important issue. Baldassarri, D. and Diani, M. (2007) ‘The integrative power of
civic networks’, American Journal of Sociology, 113: 735–80.
Bandy, J. (2004) ‘Paradoxes of transnational civil societies
under neoliberalism: The Coalition for Justice in the
NOTES Maquiladoras’, Social Problems, 51: 410–31.
Bearman, P. and Everett, K.D. (1993) ‘The structure of social
1 Here I draw on and expand on previous treat- protest, 1961–1983’, Social Networks, 15:171–200.
ments of the issue, most notably Diani (2003a, 2004) Becker, P.E. and Dhingra, P. (2001) ‘Religious involvement
and della Porta and Diani (2006). and volunteering: Implications for civil society’, Sociology
2 Pinard (1968); Bolton (1972); Oberschall of Religion, 62: 315–35.
(1973); Pickvance (1975); McCarthy and Zald (1977); Bennani-Chraïbi, M. and Fillieule, O. (eds) (2003) Résistances
Tilly (1978). See Diani (2004: 340–43) for a more et protestations dans les sociétés musulmanes. Paris:
detailed account of these early phases. Presses de Sciences Po.
3 Other systematic attempts to apply formal Biggs, M. (2005) ‘Strikes as forest fires: Chicago and Paris in
modeling to the investigation of collective action the late nineteenth century’, American Journal of Sociology,
dynamics include Macy’s (1990, 1991, 1993) and 110: 1684–1714.
Heckathorn’s (1989, 1990, 1993, 1996), as well as, Biggs, M. (2006) ‘Who joined the sit-ins and why: Southern
more recently, Oliver and Myers (2003) and Takacs black students in the early 1960s’, Mobilization, 11:
et al. (2008). Although applications of formal theo- 241–56.
ries to the analysis of concrete empirical cases are Bolton, C.D. (1972) ‘Alienation and action: A study of peace
relatively rare (Gould, 2003), the works cited above group members’, American Journal of Sociology, 78:
have actually also inspired empirical research (see, for 537–61.
example, Brown and Boswell, 1995). Booth, A. and Babchuk, N. (1969) ‘Personal influence
4 Network links between neighborhoods were networks and voluntary association affiliation’, Sociological
measured as the number of residents of district i Inquiry, 39: 179–88.

5605-Scott-Chap16.indd 230 4/7/2011 4:53:39 PM


SOCIAL MOVEMENTS AND COLLECTIVE ACTION 231

Borgatti, S.P. and Everett, M.G. (1997) ‘Network analysis of Diani, M. (1995) Green Networks. A Structural Analysis of the
2-mode data’, Social Networks, 19: 243–69. Italian Environmental Movement. Edinburgh: Edinburgh
Boudourides, M. and Botetzagias, I.A. (2007) ‘Networks of University Press.
protest on global issues in Greece 2002–2003’, in Derrick Diani, M. (2003a) ‘Networks and social movements: A
Purdue (ed.), Civil Societies and Social Movements. London: research programme’, in Mario Diani and Doug McAdam
Routledge. pp. 109–23. (eds), Social Movements and Networks. Oxford: Oxford
Brass, D.J. and Burckhardt, M.E. (1993) ‘Potential power University Press. pp. 299–318.
and power use’, Academy of Management Journal, 36: Diani, M. (2003b) ‘Leaders or brokers?’, in Mario Diani and
441–70. Doug McAdam (eds), Social Movements and Networks.
Breiger, R.L. (1974) ‘The duality of persons and groups’, Social Oxford: Oxford University Press. pp. 105–22.
Forces, 53: 181–90. Diani, M. (2004) ‘Networks and participation’, in David Snow,
Brooks, C.D. (2004) ‘Faction in movement: The impact of Sarah Soule, and Hanspeter Kriesi (eds), The Blackwell
inclusivity on the anti-globalization movement’, Social Companion to Social Movements. Oxford: Blackwell.
Science Quarterly, 85: 559–77. pp. 339–59.
Brown, C. and Boswell, T. (1995) ‘Strikebreaking or solidarity Diani, M. (2009) ‘The structural bases of protest events.
in the Great Steel Strike of 1919: A split labor market, Multiple memberships and networks in the February 15th
game-theoretic, and QCA analysis’, American Journal of 2003 anti-war demonstrations’, Acta Sociologica, 52:
Sociology, 100: 1479–519. 63–83.
Carmin, J. and Hicks, B. (2002) ‘International triggering Diani, M. and Bison, I. (2004) ‘Organizations, coalitions, and
events, transnational networks, and the development of movements’, Theory and Society, 33: 281–309.
Czech and Polish environmental movements’, Mobilization, Diani, M. and Lodi, G. (1988) ‘Three in one: Currents in the
7: 305–24. Milan ecology movement’, in Bert Klandermans, Hanspeter
Carroll, W.K. and Ratner, R.S. (1996) ‘Master framing and Kriesi, and Sidney Tarrow (eds), From Structure to Action.
cross-movement networking in contemporary social Greenwich, CT: JAI Press. pp. 103–24.
movements’, Sociological Quarterly, 37: 601–25. Dixon, M. and Roscigno, V.J. (2003) ‘Status, networks, and
Centola, D. and Macy, M. (2007) ‘Complex contagions and social movement participation: The case of striking work-
the weakness of long ties’, American Journal of Sociology, ers’, American Journal of Sociology, 108: 1292–327.
113: 702–34. Dumoulin, D. (2006) ‘Usage comparé de la notion de reseau.
Cinalli, M. and Füglister, K. (2008) ‘Networks and political Propositions d’analyse pour l’action collective’, Cahiers des
contention over unemployment: A comparison of Britain, Amériques Latines, 51–52: 125–44.
Germany, and Switzerland’, Mobilization, 13: 259–76. Earl, J. and Schussman, A. (2003) ‘The new site of activism:
Collins, K. (2007) ‘Ideas, networks, and Islamist movements. On-line organizations, movement entrepreneurs, and the
Evidence from central Asia and the Caucasus’, World changing location of social movement decision-making’,
Politics, 60: 64–96. Research in Social Movements, Conflict and Change,
Cornwell, B. and Harrison, J.A. (2004) ‘Union members and 24: 155–87.
voluntary associations: Membership overlap as a case of Edling, C.R. and Liljeros, F. (2003) ‘Spatial diffusion of social
organizational embeddedness’, American Sociological organizing: Modeling trade union growth in Sweden,
Review, 69: 862–81. 1890–1940’, Advances in Strategic Management:
Crossley, N. (2007) ‘Social networks and extraparliamentary A Research Annual, 20: 267–90.
politics’, Sociology Compass, 1: 222–37. Edwards, B. and McCarthy, J.D. (2004) ‘Strategy matters:
Crossley, N. (2008) ‘Social networks and student activism: On The contingent value of social capital in the survival of
the politicising effect of campus connections’, Sociological local social movement organizations’, Social Forces, 83:
Review, 56: 18–38. 621–51.
Croteau, D. (1995) Politics and the Class Divide. Working Emirbayer, M. and Goodwin, J. (1994) ‘Network analysis,
People and the Middle Class Left. Philadelphia: Temple culture, and the problem of agency’, American Journal of
University Press. Sociology, 99: 1411–54.
Cumbers, A., Routledge, P. and Nativel, C. (2008) ‘The Entwisle, B., Faust, K., Rindfuss, R.R. and Kaneda, T. (2007)
entangled geographies of global justice networks’, Progress ‘Networks and contexts: Variation in the structure of social
in Human Geography, 32: 183–201. ties’, American Journal of Sociology, 112: 1495–533.
Curtis, R.L. and Zurcher, L.A.Jr. (1973) ‘Stable resources of Fernandez, R. and McAdam, D. (1988) ‘Social networks
protest movements: The multi-organizational field’, Social and social movements: Multiorganizational fields and
Forces, 52: 53–61. recruitment to Mississippi freedom summer’, Sociological
della Porta, D. (1988) ‘Recruitment processes in clandestine Forum, 3: 357–82.
political organizations: Italian left-wing terrorism’, in Fernandez, R. and McAdam, D. (1989) ‘Multiorganizational
Bert Klandermans, Hanspeter Kriesi, and Sidney Tarrow fields and recruitment to social movements’, in Bert
(eds), From Structure to Action. Greenwich: JAI Press. Klandermans (ed.), Organizing for Change. Greenwich,
pp. 155–72. CT: JAI Press. 315–44.
della Porta, D. and Diani, M. (2006) Social Movements. Fine, G.A. and Harrington, B. (2004) ‘Tiny publics: Small
Oxford: Blackwell. groups and civil society’, Sociological Theory, 22: 341–56.

5605-Scott-Chap16.indd 231 4/7/2011 4:53:40 PM


232 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Franzosi, R. (1999) ‘The return of the actor. Interaction Hedström, P. (1994) ‘Contagious collectivities: On the spatial
networks among social actors during periods of high mobi- diffusion of Swedish trade unions, 1890–1940’, American
lization (Italy, 1919–1922)’, Mobilization, 4: 131–49. Journal of Sociology, 99: 1157–79.
Friedman, D. and McAdam, D. (1992) ‘Collective identity and Hedström, P., Sandell, R. and Stern, C. (2000) ‘Mesolevel
activism: Networks, choices, and the life of a social networks and the diffusion of social movements: The case
movement’, in Aldon D. Morris and Carol Mueller (eds), of the Swedish Social Democratic Party’, American Journal
Frontiers in Social Movement Theory. New Haven: Yale of Sociology, 106: 145–72.
University Press. pp. 156–73. Hillmann, H. (2008) ‘Mediation in multiple networks: Elite
Futrell, R. and Simi, P. (2004) ‘Free spaces, collective identity, mobilization before the English Civil War’, American
and the persistence of U.S. white power activism’, Social Sociological Review, 73: 426–54.
Problems, 51: 16–42. Holzner, C. (2004) ‘The end of clientelism? Strong and weak
Gerlach, L. (1971) ‘Movements of revolutionary change. Some networks in a Mexican squatter movement’, Mobilization,
structural characteristics’, American Behavioral Scientist, 9: 223–40.
43: 813–36. Jackson, B.A. (2006) ‘Groups, networks, or movements:
Gerlach, L. (2001) ‘The structure of social movements: A command-and-control-driven approach to classifying
Environmental activism and its opponents’, in John Arquilla terrorist organizations and its application to Al Qaeda’,
and David Ronfeldt (eds), Networks and Netwars: The Studies in Conflict & Terrorism, 29: 241–62.
Future of Terror, Crime, and Militancy. Santa Monica, CA: Katz, H. and Anheier, H. (2007) ‘Global connectedness: The
Rand. 289–310. structure of transnational NGO networks’, in Marlies
Gilchrist, A. (2000) ‘The well-connected community: Glasius, Mary Kaldor, and Helmut Anheier (eds), Global
Networking to the “edge of chaos”’, Community Civil Society 2005/2006. London: Sage. pp. 240–65.
Development Journal, 35: 264–75. Kim, H. and Bearman, P.S. (1997) ‘The structure and dynamics
Gould, R.V. (1991) ‘Multiple networks and mobilization in the of movement participation’, American Sociological Review,
Paris Commune, 1871’, American Sociological Review, 62: 70–93.
56: 716–29. Kitts, J. (2000) ‘Mobilizing in black boxes: Social networks and
Gould, R.V. (1993a) ‘Trade cohesion, class unity, and urban SMO participation’, Mobilization, 5: 241–57.
insurrection: Artisanal activism in the French commune’, Klandermans, B. and Oegema, D. (1987) ‘Potentials,
American Journal of Sociology, 98: 721–54. networks, motivations, and barriers: Steps towards
Gould, R.V. (1993b) ‘Collective action and network structure’, participation in social movements’, American Sociological
American Sociological Review, 58: 182–96. Review, 52: 519–31.
Gould, R.V. (1995) Insurgent Identities: Class, Community, Kleidman, R. (1993) Organizing for Peace: Neutrality, the Test
and Protest in Paris from 1848 to the Commune. Chicago: Ban, and the Freeze. Syracuse, NY: Syracuse University
University of Chicago Press. Press.
Gould, R.V. (2003) ‘Why do networks matter? Rationalist and Knoke, D. (1990) Organizing for Collective Action. The
structuralist interpretations’, in Mario Diani and Doug Political Economies of Associations. New York: Aldine de
McAdam (eds), Social Movements and Networks. Oxford: Gruyter.
Oxford University Press. pp. 233–57. Kriesi, H. (1988) ‘Local mobilization for the people’s petition
Hadenius, A. (2001) Institutions and Democratic Citizenship. of the Dutch peace movement’, in Bert Klandermans,
Oxford: Oxford University Press. Hanspeter Kriesi, and Sidney Tarrow (eds), From Structure
Hägerstrand, T. (1967) Innovation Diffusion as a Spatial to Action. Greenwich, CT: JAI Press. pp. 41–82.
Process. Chicago: University of Chicago Press. Laumann, E.O. and Knoke, D. (1987) The Organizational
Han, S.-K. (2009) ‘The other ride of Paul Revere: State. Social Choice in National Policy Domains. Madison:
Brokerage role in the making of the American Revolution’, University of Wisconsin Press.
Mobilization, 14: 143–62. Lavalle, A.G., Castello, G. and Bichir, R.M. (2007) ‘Leading
Heaney, M.T. and Rojas, F. (2007) ‘Partisans, nonpartisans, actors within civil society: Networks and centralities of civil
and the antiwar movement in the United States’, American organizations in Sao Paulo’, Dados-Revista De Ciencias
Politics Research, 35: 431–64. Sociais, 50: 465–98.
Heckathorn, D.D. (1989) ‘Collective sanctions and the creation Leitner, H., Sheppard, E. and Sziarto, K.M. (2008) ‘The
of prisoner’s dilemma norms’, American Journal of spatialities of contentious politics’, Transactions of the
Sociology, 94: 535–62. Institute of British Geographers, 33: 157–72.
Heckathorn, D.D. (1990) ‘Collective sanctions and compliance Lémieux, V. (1998) Les coalitions: liens, transactions e contról.
norms: A formal theory of group-mediated social control’, Paris: P.U.F.
American Sociological Review, 55: 366–84. Lichterman, P. (1995) ‘Piecing together multicultural
Heckathorn, D.D. (1993) ‘Collective action and group community: Cultural differences in community building
heterogeneity: Voluntary provision versus selective among grass-roots environmentalists’, Social Problems,
incentives’, American Sociological Review, 58: 329–50. 42: 513–34.
Heckathorn, D.D. (1996) ‘The dynamics and dilemmas of Lindsay, D.M. (2008) ‘Evangelicals in the power elite: Elite
collective action’, American Sociological Review, 61: cohesion advancing a movement’, American Sociological
250–77. Review, 73: 60–82.

5605-Scott-Chap16.indd 232 4/7/2011 4:53:40 PM


SOCIAL MOVEMENTS AND COLLECTIVE ACTION 233

Livesay, J. (2002) ‘The duality of systems: Networks as media Mische, A. (2008) Partisan Publics. Princeton, NJ: Princeton
and outcomes of movement mobilization’, Current University Press.
Perspectives in Social Theory, 22: 185–222. Mische, A. and Pattison, P. (2000) ‘Composing a civic arena:
Lowe, M.R. (2007) ‘An “oasis of freedom” in a “closed Publics, projects, and social settings’, Poetics, 27: 163–94.
society”: The development of Tougaloo College as a free Molm, L.D. and Cook, K.S. (1995) ‘Social exchange and
space in Mississippi’s Civil Rights Movement, 1960 to exchange networks’, in Karen S. Cook, Gary A. Fine,
1964’, Journal of Historical Sociology, 20: 486–520. and J.S. House (eds), Sociological Perspectives on
Luker, K. (1984) Abortion and the Politics of Motherhood. Social Psychology. Stanford: Stanford University Press.
Berkeley: University of California Press. pp. 209–35.
Macy, M.W. (1990) ‘Learning-theory and the logic of critical Monge, P.R. and Contractor, N.S. (2003) Theories of
mass’, American Sociological Review, 55: 809–26. Communication Networks. Oxford: Oxford University
Macy, M.W. (1991) ‘Chains of cooperation: Threshold effects Press.
in collective action’, American Sociological Review, 56: Mueller, M., Pagé, C. and Kuerbis, B. (2004) ‘Civil society and
730–47. the shaping of communication-information policy: Four
Macy, M.W. (1993) ‘Backward-looking social-control’, decades of advocacy’, Information Society, 20: 169–85.
American Sociological Review, 58: 819–36. Mullins, P. (1987) ‘Community and urban movements’,
Markham, W.T. (2005) ‘Networking local environmental Sociological Review, 35: 347–69.
groups in Germany: The rise and fall of the Federal Alliance Musso, J.A., Weare, C., Oztas, N. and Loges, W.E. (2006)
of Citizens’ Initiatives for Environmental Protection (BBU)’, ‘Neighborhood governance reform and networks of
Environmental Politics, 14: 667–85. community power in Los Angeles’, American Review of
Marwell, G. and Oliver, P. (1993) The Critical Mass Public Administration, 36: 79–97.
in Collective Action. Cambridge: Cambridge University Nepstad, S.E. (2004) ‘Persistent resistance: Commitment and
Press. community in the plowshares movement’, Social Problems,
McAdam, D. (1986) ‘Recruitment to high risk activism: The 51: 43–60.
case of freedom summer’, American Journal of Sociology, Nepstad, S.E. and Smith, C. (1999) ‘Rethinking recruitment to
92: 64–90. high-risk/cost activism: The case of Nicaragua exchange’,
McAdam, D. and Fernandez, R. (1990) ‘Microstructural bases Mobilization, 4: 25–40.
of recruitment to social movements’, in Louis Kriesberg Nicholls, W. (2008) ‘The urban question revisited: The impor-
(ed.), Research in Social Movements, Conflict and Change. tance of cities for social movements’, International Journal
Vol.12. Greenwich, CT: JAI Press. pp. 1–33. of Urban and Regional Research, 32: 841–59.
McAdam, D. and Paulsen, R. (1993) ‘Specifying the relation- Nicholls, W. (2009) ‘Place, networks, space: Theorising the
ship between social ties and activism’, American Journal of geographies of social movements’, Transactions of the
Sociology, 99: 640–67. Institute of British Geographers, 34: 78–93.
McAdam, D. (2003) ‘Beyond structural analysis: Toward a Oberschall, A. (1973) Social Conflict and Social Movements.
more dynamic understanding of social movements’, Englewood Cliffs: Prentice-Hall.
in Mario Diani and Doug McAdam (eds), Social Oegema, D. and Klandermans, B. (1994) ‘Why social
Movements and Networks. Oxford: Oxford University Press. movement sympathizers don’t participate: Erosion and
pp. 281–98. nonconversion of support’, American Sociological Review,
McCarthy, J.D. and Zald, M.N. (1977) ‘Resource mobilization 59: 703–22.
and social movements: A partial theory’, American Journal Ohlemacher, T. (1996) ‘Bridging people and protest: Social
of Sociology, 82: 1212–41. relays of protest groups against low-flying military jets
McPherson, M. (1983) ‘An ecology of affiliation’, American in West Germany’, Social Problems, 43: 197–218.
Sociological Review, 48: 519–32. Okamoto, D.G. (2003) ‘Toward a theory of panethnicity:
McPherson, M, Popielarz, P. and Drobnic, S. (1992) ‘Social Explaining Asian American collective action’, American
networks and organizational dynamics’, American Sociological Review, 68: 811–42.
Sociological Review, 57: 153–70. Oliver, P. (1984) ‘If you don’t do it, nobody else will: Active
McPherson, M. and Rotolo, T. (1996) ‘Testing a dynamic and token contributors to collective action’, American
model of social composition: Diversity and change in Sociological Review, 49: 601–10.
voluntary groups’, American Sociological Review, 61: Oliver, P. and Marwell, G. (2001) ‘Whatever happened to
179–202. critical mass theory? A retrospective and assessment’,
McVeigh, R. (2006) ‘Structural influences on activism and Sociological Theory, 19: 292–311.
crime: Identifying the social structure of discontent’, Oliver, P. and Myers, D. (2003) ‘Networks, diffusion, and
American Journal of Sociology, 112: 510–66. cycles of collective action’, in Mario Diani and Doug
Meyer, D. and Minkoff, D. (2004) ‘Conceptualizing political McAdam (eds), Social Movements and Networks. Oxford:
opportunity’, Social Forces, 82: 1457–92. Oxford University Press. 173–204.
Mische, A. (2003) ‘Cross-talk in movements: Reconceiving the Olson, M. (1963) The Logics of Collective Action. Cambridge,
culture-network link’, in Mario Diani and Doug McAdam MA: Harvard University Press.
(eds), Social Movements and Networks. Oxford: Oxford Opp, K.-D. (1989) The Rationality of Political Protest. Boulder:
University Press. pp. 258–80. Westview Press.

5605-Scott-Chap16.indd 233 4/7/2011 4:53:40 PM


234 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Opp, K.-D. and Gern, C. (1993) ‘Dissident groups, personal solidarity in global justice networks’, Environment and
networks, and spontaneous cooperation. The East German Planning A, 39: 2575–92.
revolution of 1989’, American Sociological Review, 58: Routledge, P., Cumbers, A. and Nativel, C. (2008) ‘The
659–80. entangled geographies of global justice networks’, Progress
Padgett, J.F. and Ansell, C.K. (1993) ‘Robust action and the in Human Geography, 32: 183–201.
rise of the Medici, 1400–1434’, American Journal of Routledge, P., Nativel, C. and Cumbers, A. (2006) ‘Entangled
Sociology, 98: 1259–319. logics and grassroots imaginaries of global justice
Padovani, C. and Pavan, E. (2009) ‘Fra reti tematiche e networks’, Environmental Politics, 15: 839–59.
reti sociali. Un ritratto delle mobilitazioni sui diritti di Rucht, D. (2004) ‘Movement allies, adversaries, and third
comunicazione in Italia’, Quaderni di Sociologia, p. 49. parties’, in David Snow, Sarah Soule, and Hanspeter Kriesi
Park, H.-S. (2008) ‘Forming coalitions: A network-theoretic (eds), The Blackwell Companion to Social Movements.
approach to the contemporary South Korean environmental Oxford: Blackwell. pp. 197–216.
movement’, Mobilization, 13: 99–114. Sandell, R. (1999) ‘Organizational life aboard the moving
Passy, F. (2001) ‘Socializing, connecting, and the structural bandwagons: A network analysis of dropouts from a
agency/gap. A specification of the impact of networks Swedish temperance organization, 1896–1937’, Acta
on participation in social movements’, Mobilization, 6: Sociologica, 42: 3–15.
173–92. Sandell, R. (2001) ‘Organizational growth and ecological
Passy, F. (2003) ‘Social networks matter. But how?’, in Mario constraints: The growth of social movements in Sweden,
Diani and Doug McAdam (eds), Social Movements and 1881 to 1940’, American Sociological Review, 66:
Networks. Oxford: Oxford University Press. pp. 21–48. 672–93.
Passy, F. and Giugni, M. (2000) ‘Life-spheres, networks, and Sandell, R. and Stern, C. (1988) ‘Group size and the logic
sustained participation in social movements. A phenome- of collective action: A network analysis of a Swedish
nological approach to political commitment’, Sociological temperance movement 1896–1937’, Rationality and
Forum, 15: 117–44. Society, 10: 327–45.
Pavan, E. (2011) Networking Global Communication Schlosberg, D. (2002) Environmental Justice and the New
Governance. Lanham: Rowman & Littlefield. Pluralism. Oxford: Oxford University Press.
Pedahzur, A. and Perliger, A. (2006) ‘The changing nature Schmitt-Beck, R. (1989) ‘Organizational interlocks between
of suicide attacks: A social network perspective’, Social new social movements and traditional elite’, European
Forces, 84: 1987–2008. Journal of Political Research, 17: 583–98.
Phillips, S.D. (1991) ‘Meaning and structure in social Schurman, R. and Munro, W. (2006) ‘Ideas, thinkers, and
movements. Mapping the network of national Canadian social networks: The process of grievance construction in
women’s organizations’, Canadian Journal of Political the anti-genetic engineering movement’, Theory and
Science, 24: 755–82. Society, 35: 1–38.
Pickvance, C. (1975) ‘On the study of urban social Shumate, M., Fulk, J. and Monge, P. (2005) ‘Predictors of the
movements’, Sociological Review, 23: 29–49. international HIV-AIDS INGO network over time’, Human
Pinard, M. (1968) ‘Mass society and political movements: Communication Research, 31: 482–510.
A new formulation’, American Journal of Sociology, 73: Simmel, G. (1908 [1955]) ‘The web of group affiliations’,
682–90. in Conflict and the Web of Group Affiliations. New York:
Piven, F.F. and Cloward, R. (1992) ‘Normalizing collective Free Press.
protest’, in Aldon D. Morris and Carol Mueller (eds), Smilde, D. (2005) ‘A qualitative comparative analysis of
Frontiers in Social Movement Theory. New Haven: Yale conversion to Venezuelan evangelicalism: How networks
University Press. 301–25. matter’, American Journal of Sociology, 111: 757–96.
Powell, W.W. (1990) ‘Neither markets nor hierarchy: Network Smith, J. (2002) ‘Bridging global divides? Strategic framing
forms of organization’, Research in Organizational Behavior, and solidarity in transnational social movement organiza-
12: 295–336. tions’, International Sociology, 17: 505–28.
Rootes, C. (ed.) (2003) Environmental Protest in Western Smith, J. (2005) ‘Building bridges or building walls? Explaining
Europe. Oxford: Oxford University Press. regionalization among transnational social movement
Rosenthal, N., Fingrutd, M., Ethier, M., Karant, R. and organizations’, Mobilization, 10: 251–70.
McDonald, D. (1985) ‘Social movements and network Smith, J. (2008) Social Movements for Global Democracy.
analysis’, American Journal of Sociology, 90: 1022–54. Baltimore, MD: John Hopkins University Press.
Rosenthal, N., McDonald, D., Ethier, M., Fingrutd, M. and Snow, D.A., Zurcher, L.A. and Ekland-Olson, S. (1980) ‘Social
Karant, R. (1997) ‘Structural tensions in the nineteenth networks and social movements: A microstructural
century women’s movement’, Mobilization, 2: 21–46. approach to differential recruitment’, American Sociological
Routledge, P. (2003) ‘Convergence space: Process Review, 45: 787–801.
geographies of grassroots globalization networks’, Stark, R. and Bainbridge, W.S. (1980) ‘Networks of faith:
Transactions of the Institute of British Geographers, 28: Interpersonal bonds and recruitment to cults and sects’,
333–49. American Journal of Sociology, 85: 1376–95.
Routledge, P., Cumbers, A. and Nativel, C. (2007) ‘Grassrooting Stevenson, W.B. and Greenberg, D. (2000) ‘Agency and
network imaginaries: Relationality, power, and mutual social networks: Strategies of action in a social structure of

5605-Scott-Chap16.indd 234 4/7/2011 4:53:40 PM


SOCIAL MOVEMENTS AND COLLECTIVE ACTION 235

position, opposition, and opportunity’, Administrative Van Aelst, P. and Walgraave, S. (2004) ‘New media,
Science Quarterly, 45: 651–78. new movements? The role of the Internet in shaping the
Takacs, K., Janky, B. and Flache, A. (2008) ‘Collective action “anti-globalization” movement’, in Wim van de Donk,
and network change’, Social Networks, 30: 177–89. Brian Loader, Paul Nixon, and Dieter Rucht (eds),
Tarrow, S. (1998) Power in Movement. Cambridge: Cambridge Cyberprotest. New Media, Citizens and Social Movements.
University Press. London: Routledge. pp. 97–122.
Tilly, C. (1978) From Mobilization to Revolution. Reading, van de Donk, E., Loader, B., Nixon, P. and Rucht, D. (eds)
MA: Addison/Wesley. (2004) Cyberspace Protest. London: Routledge.
Tilly, C. (2004) Social Movements 1768–2004. Boulder, van Dyke, N. and McCammon, H. (ed.) (2010) Social
CO: Paradigm. Movement Coalitions. Minneapolis: University of Minnesota
Tilly, C. and Wood, L. (2003) ‘Contentious connections in Press.
Great Britain, 1828–1834’, in Mario Diani and Doug Vasi, I.B. (2004) ‘The fist of the working class: The
McAdam (eds), Social Movements and Networks. Oxford: social movements of Jiu Valley miners in post-socialist
Oxford University Press. pp. 147–70. Romania’, East European Politics and Societies, 18:
Tindall, D.B. (2002) ‘Social networks, identification and 132–57.
participation in an environmental movement: Low-medium Vasi, I.B. (2006) ‘Organizational environments, framing
cost activism within the British Columbia Wilderness processes, and the diffusion of the program to
Preservation Movement’, Canadian Review of Sociology address global climate change among local governments
and Anthropology, 39: 413–52. in the United States’, Sociological Forum, 21:
Tindall, D.B. (2004) ‘Social movement participation over time: 439–66.
An ego-network approach to micro-mobilization’, Viterna, J.S. (2006) ‘Pulled, pushed, and persuaded:
Sociological Focusm, 37: 163–84. Explaining women’s mobilization into the Salvadoran
Tindall, D.B., Davies, S. and Mauboules, C. (2003) ‘Activism guerrilla army’, American Journal of Sociology, 112:
and conservation behavior in an environmental movement: 1–45.
The contradictory effects of gender’, Society & Natural Walgrave, S. and Massens, J. (2000) ‘The making of the
Resources, 16: 909–32. White March: The mass media as mobilizing alternative
Vala, C.T. and O’Brien, K.J. (2007) ‘Attraction without net- to movement organizations’, Mobilization, 5: 217–39.
works: Recruiting strangers to unregistered Protestantism Zuckerman, A.S. (ed.) (2005) The Social Logics of Politics.
in China’, Mobilization, 12: 79–94. Philadelphia: Temple University Press.

5605-Scott-Chap16.indd 235 4/7/2011 4:53:40 PM


17
Crime and Social
Network Analysis
Peter J. Carrington

Applications of social network analysis in the and behavior are not innate, but are learned from
study of crime fall mainly into three topic areas: “intimate personal groups.” According to the sixth
the influence of the personal network on ego’s proposition of this theory, the likelihood that a
delinquency or crime, the influence of neighbor- child or adolescent will be delinquent is affected
hood networks on crime in the neighborhood, by the relative strength of criminal and anticrimi-
and the organization of criminal groups and nal “definitions” (i.e., norms) among his or her
activities. Of course, the literature is not so neatly close associates:
organized as this scheme suggests – even the
boundaries of the relevant literature are fuzzy – 6. A person becomes delinquent because of an
but the following account is organized around excess of definitions favorable to violation of law
these categories, while acknowledging the over definitions unfavorable to violation of law.
instances of work that straddle them, or lie only This is the principle of differential association. It
partly within them. refers to both criminal and anticriminal associa-
tions and involves counteracting forces. (Sutherland
et al., 1992: 89)

INFLUENCE OF PERSONAL NETWORKS Later reformulations of differential association


theory have resulted in the “social learning”
ON DELINQUENCY AND CRIME theory (Burgess and Akers, 1966) and “peer
influence” theory of delinquency (Warr, 1993,
The most common use of social network analysis 2002): the latter claiming that “peer influence is
in criminology has been in analyses of the effects the principal proximate cause of most criminal
of personal networks on adolescents’ delinquency conduct” (Warr, 2002: 136; emphasis in the
(and, to a lesser extent, on adults’ crime). Almost original).
all of this research is based, explicitly or implic- Consistently strong empirical correlations
itly, on one or both of two theories of crime and between subjects’ delinquency and that of their
delinquency: differential association theory and friends or “peer group,” even in the presence of
social control theory. controls for other factors, has been interpreted as
strong support for differential association theory
(Shoemaker, 2005: 152; Warr, 2002: 76). However,
Differential association theory the theory has been criticized on the grounds
(among others) of the difficulty of measuring the
According to this theory of delinquency, first relative strength of pro- and anticriminal definitions
formulated in 1939 by Edwin Sutherland (1939; among ego’s associates (Shoemaker, 2005: 151;
Sutherland et al., 1992), criminal attitudes see also “Measuring peers’ delinquency” later).

5605-Scott-Chap17.indd 236 4/6/2011 4:38:30 PM


CRIME AND SOCIAL NETWORK ANALYSIS 237

Sutherland’s seventh proposition offered some Social control theory has been interpreted in
guidance on this issue: network terms to imply that delinquents tend to be
social isolates, rejecting and being rejected by
7. Differential associations may vary in frequency, their peers (Ekland-Olson, 1983: 275–76) and
duration, priority, and intensity. (Sutherland et al., other potential agents of informal social control,
1992: 89) and conversely that nondelinquents tend to be well
connected with such agents. This is in clear
Luckenbill commented in 1992 on the measure- contrast with differential association theory, which
ment issue: characterizes both delinquents and nondelinquents
as being embedded in peer and family networks
In a precise description of the criminal behavior but with differing normative balances. The contra-
of a person, these modalities would be rated in dictory implications of the two theories of
quantitative form and a mathematical ratio would delinquency have motivated social network
be reached. A formula in this sense has not been research researchers to attempt to assess the level
developed, and the development of such a of empirical support for each theory.
formula would be extremely difficult. (Sutherland
et al., 1992: 89)

To anyone familiar with social network Krohn’s network theory


analysis, its potential usefulness in operationaliz- of delinquency
ing the main concepts in differential association
theory is obvious. The “intimate personal groups” Marvin Krohn’s (1986) network theory represents
in which criminal learning occurs are simply ego’s an early attempt to apply social network analysis
personal network (Chua et al., this volume). explicitly to the explanation of delinquency.
Measuring the “frequency, duration, priority, and Krohn’s theory combines elements of social
intensity” of associations is a staple of personal control and differential association theories of
networks research (Hanneman and Riddle, this delinquency. According to this theory, the social
volume). Evaluating communication processes cohesion of ego’s personal network, as indicated
and the diffusion of information in networks by its multiplexity and density, affects both ego’s
are staples of social network research on commu- social integration (as in social control theory)
nication and information diffusion (e.g., Monge and the balance of influences of procriminal and
and Contractor, 2003; Myers, 2000; Shih and anticriminal definitions in the network (as in
Chang, 2009; Valente, 1995). Differential associa- differential association theory). At the macrostruc-
tion theory can be seen as a specific instance tural level, the delinquency rate of a community
of the more general network theory of social will be inversely related to the density and
learning, that ego’s attitudes and behavior are multiplexity of its social networks, which are
affected by the attitudes and behavior of the affected by social structural characteristics of
members of his or her personal network, and the the community, such as population density,
effects are conditioned by the characteristics of geographic mobility, and the social stratification
the network. This would be consistent with system.
Sutherland’s own insistence that “the processes Krohn’s theory treats attachment to parents,
which result in systematic criminal behavior are teachers, and other adults as an aspect of social
fundamentally the same in form as the processes bonding, and therefore as an element of social
which result in systematic lawful behavior” (cited control theory, not of differential association
in Warr, 2002: 75). theory. This distinction between adults and age
peers is consistent with much of the subsequent
research that tests or employs differential associa-
tion theory, whether informed by social network
Social control theory analysis or not: the “intimate personal groups”
within which the balance of procriminal and
Social control theory, first formulated by Hirschi anticriminal definitions are measured are often
(1969), proposes that the propensity for antisocial, assumed to be exclusively composed of the young
deviant, or criminal behavior is innate but is person’s age peers, or “friends,” so that differen-
normally restrained by internalized and external tial association theory is treated as being equiva-
informal social control, due to bonding to social lent to peer influence theory (Warr, 2002: 73).
control agents such as parents, family, peers, Relationships with parents and family are taken as
school, and community – that is, to the social evidence of social bonding. However, Sutherland’s
integration of the individual. Thus, delinquency formulation of differential association theory does
and crime are a result of weak social bonds. not distinguish between adult agents of social

5605-Scott-Chap17.indd 237 4/6/2011 4:38:30 PM


238 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

control such as parents, and the young person’s secondary school students and stepwise path
age peers (Sutherland et al., 1992: 89; Warr, 2002: analysis, he found that frequency of contact with
73). Differential association research that is more deviant parents and with deviant peers both have
informed by social network analysis considers the positive influences on the respondent’s formation
influence of persons in any role vis-à-vis ego, of positive definitions of deviant behavior,
using the type and strength of the tie, not genera- which in turn increases the frequency of the
tional equivalence, as the criterion of inclusion in respondent’s criminal behavior; however, the
the personal network. impact of deviant friends was much greater.
Krohn’s network theory of delinquency has Lonardo et al. (2009) found that parents’ and
received limited attention. Following Friday and peers’ deviance were associated with adolescents’
Hage (1976), Krohn et al. (1988) found that deviance, but having a deviant romantic partner
multiplexity or role overlap in personal networks, was especially influential.
including parents and friends, partly explained the
cigarette smoking behavior of high school
students in a Midwestern city: youth who partici-
Measuring peers’ delinquency
Research on delinquent peers traditionally relied
pated jointly with their parents or friends in
on the respondent’s assessment of his or her peers’
activities, such as homework, athletics, church,
delinquency. This approach has been criticized
and membership in other organizations, were less
for vulnerability to measurement error due to
likely to smoke cigarettes. Haynie (2001) found
limitations on the respondents’ ability to observe
that personal network density is an important
and remember their peers’ delinquent attitudes
conditioner of the association between ego’s and
and behavior, and also to bias arising from projec-
peers’ delinquency: the relationship was stronger
tion by respondents of their own attitudes and
for egos with higher-density networks. Going
behavior onto their peers; thus inflating the crucial
beyond Krohn’s theory, she found that ego’s
correlation between the delinquency of self and of
centrality and popularity also condition the rela-
peers (see Meldrum et al., 2009, for a review of
tionship, but less so than network density: the
this issue). Research comparing the size of the
relationship is stronger for egos with higher
correlations obtained from respondents’ reports
centrality and higher popularity.
and peers’ own reports of their delinquency has
found that the correlation is indeed considerably
larger when respondents’ reports are used.
Weerman and Smeenk (2005: 518) interpret this
Network composition finding to mean that the true correlation lies some-
where between the two estimates. This is an
Most of the research that refers to social networks
instance of the more general measurement prob-
in relation to differential association or social
lem in research on egocentric networks: that
control theory is concerned only with the compo-
“proxy reports” provided by ego of alters’ charac-
sition of the peer network – the number or
teristics and behavior are of variable accuracy,
proportion of delinquent friends and (in some
depending on the type of information solicited
cases) of family members – and ignores its struc-
(see Marsden, this volume, for a discussion).
tural features (e.g., Capowich et al., 2001; Deptula
and Cohen, 2004; Elliott and Menard, 1996;
Giordano et al., 1993; Gutierrez-Lobos et al., Gender composition
2001; Hanson and Scott, 1996; Laird et al., 1999; A somewhat different approach to the relationship
Lee, 2004; McCarthy and Hagan, 1995; Weerman between peer network composition and ego’s
and Bijleveld, 2007). In one of the more sophisti- delinquency is to examine the gender composition
cated attempts to measure the balance of criminal of the peer network. The general idea is that
and anticriminal definitions in the peer network, female-dominated networks tend to provide “more
Haynie (2002) found that it is the proportion of social control, fewer opportunities and less
friends who are delinquent that is most strongly motivation for offending and may therefore
correlated with ego’s delinquency, rather than the discourage crime,” for both males and females,
number of delinquent friends, the average level of but especially for females (McCarthy et al., 2004).
delinquency of friends, or the total level of friends’ This suggests social control theory, but the effect
delinquency. She also found that consensus (either of female-dominated networks may also be due to
pro- or antidelinquency) in the peer network was differential association, as females are much less
most strongly associated with ego’s own behavior. criminal than males. Lacasse et al. (2003) found
Bruinsma (1992) is a rare example of differential that the gender composition of adolescents’ friend-
association research that includes parents as ship networks affects the incidence of potentially
possible sources of deviant definitions in ego’s offensive sexual behavior but not the subject’s
personal network. Using data on 1,096 Dutch tolerance of such behavior. Haynie and Piquero

5605-Scott-Chap17.indd 238 4/6/2011 4:38:30 PM


CRIME AND SOCIAL NETWORK ANALYSIS 239

(2006) found that the relationship between the as family and close friends, tend to know one
onset of puberty and violent victimization is another and therefore tend to form closed com-
moderated by the gender composition of boys’ munication circles, in which the same information
personal networks: the relationship is weaker for and attitudes are recycled. Furthermore, following
boys with a higher proportion of girls in their the principle of homophily (McPherson et al.,
network. For girls, no moderating effect of 2001; and see below, under “Gangs, groups and
network composition was found. In a sample of networks”), one’s close friends tend to hold atti-
adult heroin injectors in Baltimore, Curry and tudes and opinions similar to one’s own. In con-
Latkin (2003: 482) found that “for females but not trast, persons to whom one is weakly tied, such as
males, a higher number of females in one’s acquaintances, school friends and colleagues, and
network was associated with a lower frequency of more distant family members, are more likely to
arrests.” Lichtenstein (1997) found that in a small have attitudes that are less congruent with one’s
sample of Alabama women incarcerated for own and to belong to social circles that one is not
drug-related crimes, their personal networks com- a member of. Thus, weak ties are more likely to
prised mainly male intimates, and the use of crack form “bridges” between otherwise unconnected
cocaine was attributed to the influence of these social circles and consequently to be sources
male intimates. Weerman and Bijleveld (2007) of new information and attitudes. In relation to
found that differences in the personal networks of delinquency, Granovetter’s theory implies that
non-, minor, and serious delinquents in a sample the close friends of nondelinquents will also be
of Dutch high school students were mainly due to nondelinquent, and it is the weak ties of nondelin-
cross-gender friendships. Delinquent students quents who are more likely to be delinquent and
appeared to be more popular than nondelinquents therefore to exert a delinquent influence. Patacchini
in cross-gender friendships (girls nominated and Zenou (2008) found support for this hypoth-
delinquent boys more often, boys nominated esis: the proportion of weak versus strong ties
delinquent girls more often), while non-, minor, in the friendship network was found to have a
and serious delinquents were on average not more positive impact on the onset of delinquency.
or less popular among students from their own
gender.
Structure: centrality, cohesiveness,
and bridging
Types of ties
Baerveldt and Snijders (1994) found no support
Houtzager and Baerveldt (1999) differentiated for hypotheses concerning the relationship
different types of ties among Dutch high school between ego’s delinquency and segmentation in
students. They found that a respondent’s level of the network. Baron and Tindall (1993) found that
self-reported delinquency was not associated with the strength of a gang member’s delinquent
the emotional closeness of peer relations, the attitudes was positively associated with his or her
occurrence of positive relations such as practical centrality (betweenness and geodesic closeness)
support, emotional support, friendship and in the gang, as well as to weak conventional
intimate friendship, or with unpopularity. Using bonds. Pearson and West’s (2003) study of the
the same data, Baerveldt et al. (2004) analyzed adoption of “risky behaviors” (smoking and can-
10 different types of ties and found no evidence nabis use) by students in a Scottish high school
that delinquents have poorer peer relationships, suggests that ego’s position in the peer network
and evidence of a correlation between ego’s level (“as a group member, a group peripheral or a rela-
of delinquency and that of both weakly and tive isolate”) and the cohesiveness of the network
strongly tied peers – implicitly suggesting both have positive effects on ego’s influence on
support for differential association theory but not other members of the network. Lee (2004) used
for social control theory. Weerman and Smeenk data from the National Household Survey on
(2005) found that both “regular friends” and “best Drug Abuse to examine the network positions of
friends” in the networks of Dutch high school marijuana users, nonusers, and sellers. Users
students affect ego’s delinquency, with little tended to cluster in subgroups that were both more
difference in strength of effect. central and more cohesive than those of nonusers;
Patacchini and Zenou (2008) analyzed data sellers tended to be at the center of user groups.
from the AddHealth survey within the framework However, the centrality and cohesiveness of
of Granovetter’s (1973) “strength of weak ties” groups of users varied significantly across survey
theory. Granovetter proposed that the individuals sampling units.1
to whom one is weakly tied are more likely to be Using a cross-sectional analysis of data from
sources of influence for change than those to the first wave of the AddHealth survey, Schreck
whom one is more strongly tied. Strong ties, such et al. (2004) found that centrality in dense

5605-Scott-Chap17.indd 239 4/6/2011 4:38:31 PM


240 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

delinquent peer networks was associated with Espelage et al. (2007) used p* modeling (Robins,
higher risk for violent victimization, while this volume) to study the microstructures in
centrality in dense conventional networks had the a seventh-grade friendship network and their
opposite effect. McGloin and Shermer (2009) relationships with bullying behavior; they found
used longitudinal analysis of data from the same evidence of both homophily (selection) and peer
survey to examine the roles of network density, influence.
Bonacich centrality, and ego’s involvement with From their analyses of a two-wave survey of
the peer network, as well as ego’s self-control Dutch high school students, Snijders and Baerveldt
(Gottfredson and Hirschi, 1990) and other varia- (2003) found that similarity in delinquency affects
bles on ego’s future delinquency. Concerning both tie formation and tie dissolution. This
direct network effects, McGloin and Shermer provides support for the selection hypothesis, but
found that network density reduces delinquency the study did not test the influence hypothesis.
and that centrality and involvement increase it; the Using actor-oriented social network modeling
strength of the effect of centrality is positively (“SIENA” – see Snijders, this volume) with data
related to the overall level of deviance in the peer on students in 16 Dutch high schools, Baerveldt et
network (2009: 53). Involvement with the peer al. (2008) found that influence was a “universal”
network is inversely related to ego’s self-control process, found in all 16 schools; whereas selection
(2009: 59). Mangino (2009: 147) found that operated in only four schools. The strength of
“African American boys who are a social bridge selection depended on network differences
across two or more large but cohesive peer groups between the schools. The authors suggested that
are less delinquent than are their counterparts who the networks with significant selection were dom-
are members of a single peer group,” and this is inated by a small number of lifetime persistent
due to the enhanced prosocial influence of parents delinquents. From a longitudinal analysis of a
on these bridging children. sample of Swedish adolescents, employing
SIENA, Burk et al. (2007, 2008) concluded that
both selection and peer influence play roles in
Peer influence versus selection the co-evolution of early adolescent friendship
networks, but the role of peer influence is
The strong and consistent correlation observed stronger.
between adolescents’ delinquency and that of their Using data from the AddHealth survey, Haynie
peers is susceptible of at least three interpreta- and Osgood (2005: 1109) found that “the norma-
tions: (1) differential association – that peers tive influence of peers on delinquency is more
influence ego’s delinquency; (2) selection limited than indicated by most previous studies,
(homophily), or the “birds of a feather [flock [and] normative influence is not increased by
together]” theory – that individuals prefer to being more closely attached to friends or spending
associate with people who are similar to them; or more time with them.” They also found support
(3) neither, because the correlation is spurious. for the opportunity theory of Osgood et al. (1996),
Researchers have used longitudinal social which derives from Cohen and Felson’s (1979)
network analyses to assess the relative explana- routine activity theory: that having delinquent
tory power of the influence and selection theories. friends provides more opportunities for delinquent
The consensus is that the two processes reinforce behavior, regardless of their normative influence.
each other through interaction (as Thornberry Using data from the same survey, McGloin (2009)
[1987] proposed), but the evidence on the relative found support for a version of peer influence
contribution of each process to the correlation theory modified by balance theory: an imbalance
is mixed. at T1 between ego’s and the best friend’s level
Structural equation modeling of a three-wave of delinquency predicts a change in ego’s delin-
cross-lagged panel model of data from the National quency in the direction of the best friend’s level
Youth Survey led Elliott and Menard (1996) at T2. Using SIENA to analyze data on middle-
to conclude that peer influence leading to delin- school students in Oregon, Light and Dishion
quency tends to precede and be stronger than (2007) tested the “confluence hypothesis”: that
selection of delinquent peers. However, another rejection by peers leads to the formation of cliques
cross-lagged panel model analysis of data of high-risk youth, who then reinforce one anoth-
from the same survey found that “the effect of er’s deviant propensities. Thus, peer rejection
delinquency on peer associations is larger than leads to selection of deviant peers, who influence
that of peer associations on delinquency” ego’s own delinquency. They found strong support
(Matsueda and Anderson, 1998). Brook et al. for the first part of the hypothesized causal
(2003) found that marijuana use at T1 in a sample chain – that rejected youth form cliques – but only
of Colombian adolescents predicted having weak support for peer influence within these
marijuana-using friends at T2 (i.e., selection). cliques.

5605-Scott-Chap17.indd 240 4/6/2011 4:38:31 PM


CRIME AND SOCIAL NETWORK ANALYSIS 241

Diffusion in peer networks Reverse or complex causality


Kirke (1990, 1995, 2006) studied the diffusion of Some research has examined the effect that
illicit drug use in the networks of teenagers’ delinquency and crime have on ego’s personal
strong peer ties. She concluded that drug use network, or the mediating role of personal
is diffused through strong ties from users to networks in three-variable causal schemes.
nonusers, who then become users and potential Following up earlier research results suggesting
sources of new diffusion to additional nonusers; that one’s occupation may affect the quality of
thus, “a cycle of drug diffusion occurs in one’s personal network, Romans et al. (2001)
which, under specified social conditions, the found no differences in network quality between
structure influences individual action and the networks of a convenience sample of female
individual action influences the structure” (1990: sex workers and those of two large community
Abstract). Korobow et al. (2007) analyzed samples of age-matched women in New Zealand.
an agent-based simulation model of tax (non-) Kandel and Davies (1991) found that illicit drug
compliance incorporating social networks and use led to strong bonds among young adult males
found that individuals with limited knowledge of but not among females. Moss et al. (2003) found
their immediate network neighbors’ payoffs are that the children of drug-dependent fathers are
more likely to be compliant than those who can more likely to have deviant peers from preadoles-
factor knowledge of neighbor payoffs into their cence through mid-adolescence, and speculated
decisions. that these deviant affiliations may lead to the
children’s own antisocial behavior. Van der Poel
and van de Mheen (2006) found that crack use by
a sample of 16- to 24-year-olds accelerated a
Desistance process of marginalization that had begun before
Personal networks have also been implicated in their drug abuse. With crack use, their personal
desistance from delinquency, crime, or drug abuse. networks shrank and the proportion of crack users
Gainey et al. (1995) studied the personal networks in them increased. Schroeder et al. (2007) found
of a sample of heavy cocaine users who were that changes in the personal network, especially
seeking treatment. They found that the sample partner criminality, partly mediate the effect of
had “stable and supportive conventional bonds illicit drug use on future offending. Bernburg et al.
(1995: 27) and their closest emotional ties were to (2006) found that deviant peer affiliations mediate
nonusers. However, they were significantly more the impact of juvenile justice intervention on
likely to have certain types of functional ties, such future delinquency.
as lending or borrowing things or money, with
users. Gainey et al. speculated that the nature of
cocaine users’ social networks may partly explain
the decision to seek treatment. Sommers et al. Conclusion
(1994) found that forming new personal networks The differential association and social control theo-
was part of the process of “getting out of the ries of crime and delinquency both invoke the
life” of female long-term street offenders. The immediate micro-level social environment of the
supportiveness of the personal network was individual to explain his or her behavior. Social
also found by Shivy et al. (2007) to be a factor network analysis has been used to operationalize, or
influencing successful re-entry into the workforce model, this environment as a personal network.
of ex-offenders. Zhang (1998) advocates the Variations in the attributes of the personal network,
inclusion of data on social networks in evaluation such as its composition, types of ties, and structural
of the effectiveness of boot-camp treatments for features, have been used to explain variations in
delinquents. ego’s delinquency or crime and to assess the com-
There is a sizeable literature on the role of peting claims of the social control and differential
personal networks in the success of substance association theories. Much work remains to be done
abuse treatment programs. The consensus on measuring the relevant attributes of personal
finding of these studies is that the composition of networks and on establishing causal pathways.
the personal network – primarily the number or
proportion of deviant peers – and its emotional
supportiveness, especially the quality of ties
with family members, have a substantial impact
on the likelihood of treatment success (e.g., NEIGHBORHOOD NETWORKS
Griffith et al., 1998; Knight and Simpson, 1996;
Skeem et al., 2009; Sung et al., 2004; Wild et al., Social network analysis has also been applied
2006). to the explanation of crime at the level of the

5605-Scott-Chap17.indd 241 4/6/2011 4:38:31 PM


242 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

neighborhood. It has long been observed that high crime rates: high rates of incarceration
crime rates are higher in disadvantaged and of parent-aged men, concentrated in certain
heterogeneous neighborhoods. One explanation neighborhoods, can damage local social networks
for this phenomenon proposes that crime is caused (and other prosocial neighborhood institutions),
by social disorganization, or the breakdown of and this in turn leads to lower collective
informal social control, in the neighborhood, efficacy and higher community crime rates. Other
which in turn is caused by socioeconomic disad- researchers (e.g., Galster and Killen, 1995;
vantage, ethnic heterogeneity, and residential Galster and Mikelsons, 1995; Kennedy et al.,
mobility (Shoemaker, 2005). While this explana- 1998) have also found links between neighbor-
tion is usually treated as a theory in itself, it can hood structural conditions, social networks, and
also be seen as a neighborhood-level version of crime but have relied on the concepts of social
the social control theory of individual criminality. cohesion and social capital. According to Sampson
A competing explanation proposes that delinquent (2006a: 37; see also Sampson, 2003), while
and criminal peer influences are stronger in social networks contribute to social cohesion,
disadvantaged neighborhoods; this is differential this in itself is insufficient to capture the concept
association theory but at the neighborhood level. of collective efficacy, which includes the
additional elements of “mutual trust and shared
expectations.”
Social disorganization theory
The precise meaning of the mediating concept of Differential social organization
“social disorganization” was left unspecified for a theory
long time after the theory was first proposed by
Shaw et al. (1929). Sampson (1987) argued that Other research has found that the relationship
social disorganization is a weakening of social between neighborhood networks and the
bonds within the community, consequently a neighborhood crime rate is not always the straight-
weakening of informal social control. Certain forward negative one implied by social control or
structural conditions in the neighborhood, such as collective efficacy theory (e.g., Friedman et al.,
concentrated disadvantage, ethnic heterogeneity, 2007; Gayne, 2004; Triplett et al., 2003; Warner
and residential mobility, impair the community’s and Rountree, 1997). Pattillo (1998) showed that
ability to informally regulate behavior in the in a black, middle-class community in Chicago,
neighborhood to conform to its shared values – the dense social networks attributable to home
resulting in an increased level of crime, whether ownership and residential stability were crimino-
committed by residents or by outsiders (Sampson, genic as well as protective. These dense networks
2006a: 49–50). Thus, social disorganization theory of kin, friends, and neighbors facilitated informal
is a form of social control theory, but at the level social control of neighborhood youth, consistent
of the neighborhood rather than the individual. (but inversely) with social disorganization theory,
Sampson (2004a, 2004b; Sampson et al., 1997: but also facilitated the integration of local
918) later introduced the concept of collective criminals and their criminogenic influence. This
efficacy: “defined as social cohesion among finding suggests support also for differential
neighbors combined with their willingness to association and peer influence theories but at the
intervene on behalf of the common good.” level of the neighborhood: some types of neigh-
Sampson (1987: 110) and Leighton (1988: 365) borhoods are differentially likely to foster an
suggested that this cohesion among neighbors excess of procriminal over anticriminal definitions
might rest on social networks among residents of via their criminogenic networks of deviant
the community, and Sampson (2006b: 151–153) adolescents and adults.
emphasized the role of the weak ties that are said Matsueda (2006) theorized the varying
to characterize neighborly relations in the modern composition, structure, and prosocial versus
city. Sampson’s conceptualization of social antisocial effects of neighborhood social networks
disorganization as impaired collective efficacy is in terms of Sutherland’s (1939) little-known
a “contextual” and “situational” view, not an theory of differential social organization – the
individual-developmental one: “. . . whereas “sociological counterpart to his social psychologi-
collective efficacy predicts the event-based rate of cal theory of differential association” (Matsueda
violence in a neighborhood, it does not necessar- 2006: 3):
ily predict rates of offending by neighborhood
youth” (2006a: 50). Society has become organized in such a way that
In a similar vein, Clear (2008) introduced a premium has been placed both on perpetrating
neighborhood social networks as the intervening crime and on refraining from crime. An individual
variable in the effect of high incarceration rates on may now be a member of a group organized for

5605-Scott-Chap17.indd 242 4/6/2011 4:38:31 PM


CRIME AND SOCIAL NETWORK ANALYSIS 243

crime and at the same time be a member of a But social disorganization theory, in its modern
group organized against crime. (Sutherland et al., version as Sampson’s collective efficacy theory, is
1992: 105–6) radically different. Collective efficacy theory and
research sees neighborhood networks as networks
In other words, differential social organization of (prosocial) residents, which vary, according to
at the neighborhood level leads to differential exogenous structural conditions, in their efficacy
association at the individual level. in exerting informal social control of crime and
Consistent with this theory, Browning et al. delinquency in the neighborhood – whether due to
(2004) found that social networks in Chicago locals or to outsiders. In this theory, the social
neighborhoods characterized by a high level of control that reduces neighborhood crime is exerted
social organization and a high level of crime play not through the personal networks of potential
a dual role: promotion of prosocial collective delinquents or criminals but through the personal
efficacy but also provision of social capital to networks of prosocial residents, who are seen as
offenders. James et al. (2004) analyzed data from putative social control agents. The implication for
semi-structured interviews with a random sample collective efficacy research using social network
of 24 women in the American CASAWORKS analysis is that it is not the attributes of the
substance abuse program and found that residence personal networks of potential delinquents and
in poor neighborhoods exposed women to local criminals that explain neighborhood crime but the
law-breaking and substance-abusing networks, attributes of the whole network existing among
while at the same time limiting their access to the residents of the neighborhood, particularly its
supportive, prosocial networks. Harding (2009) cohesion and its capacity for the mobilization of
compared the age composition of adolescent collective action.
boys’ social networks and their criminogenic A major conceptual difficulty in collective
influence in neighborhoods with varying levels of efficacy theory, as some of the cited research
disadvantage. He found that the boys in more suggests, is that the population of the neighbor-
disadvantaged neighborhoods were more likely hood cannot be divided so neatly into potential
to spend most of their time with older males and delinquents and criminals, and prosocial residents
that this resulted in “cross-cohort socialization” who are potential social control agents; many, if
into crime. not most, residents fall into both categories, as
each individual experiences some balance of
prosocial and antisocial definitions. Furthermore,
the whole network of the neighborhood contains
Conclusion ties not only among the supposedly prosocial
residents, but also among the supposedly antiso-
The social disorganization and differential social cial residents who are potential delinquents or
organization theories that explain the rates of criminals, and finally, between members of these
crime and delinquency in neighborhoods can be nonmutually exclusive groupings. As Sweetser
seen as the neighborhood-level analogues of the (1942: 533) put it,
social control and differential association theories
of individual crime and delinquency. Social . . . that many boys in the most delinquent
network analysis has been used to model neigh- areas fail to absorb the delinquent “tradition” and
borhood networks, and variations in the attributes remain law-abiding is thus possible if the culture
of neighborhood networks have been used of the delinquency area be conceived in terms
to explain variations in their rates of crime and of the spatial interpenetration of a delinquent
delinquency. and a law-abiding tradition, perpetuated by
In Sutherland’s differential social organization differential acquaintance and association among
theory, structural aspects of the neighborhood neighbors.
such as disadvantage, heterogeneity, and residen-
tial mobility, are exogenous variables that affect A methodological difficulty of research on neigh-
the balance of antisocial and prosocial influences borhood networks is that it is extremely difficult
in neighborhood networks, which in turn affect to collect data on the attributes of, and ties among,
neighborhood crime rates. This theory and associ- the population of the whole neighborhood. In
ated research can therefore be subsumed under the practice, this research has relied on the personal
influence of personal networks on individual networks of samples of residents. However, infer-
criminality, and social network research in this ence from sampled personal networks to whole
tradition generally analyzes the characteristics of networks is by no means straightforward (Frank,
personal networks of potential delinquents and this volume). More research is needed that
criminals, as outcomes of exogenous structural addresses these conceptual and methodological
conditions. issues.

5605-Scott-Chap17.indd 243 4/6/2011 4:38:31 PM


244 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

CRIMINAL NETWORKS arising from police investigations [Renée van der


Hulst, personal communication].)
Social network analysis is also used to model the
social organization of crime. Network models are
employed in this literature to provide static and Gangs, groups, and networks
dynamic representations of criminal groups and
criminal activities. This research tends to be Studies reviewed in this section mainly deal with
exploratory and descriptive rather than theory- applications of social network analysis to criminal
testing, although two theoretical issues underlie groups that have fewer members than those
much of it: studied under the rubric of “organized crime,” and
commit more localized and relatively unsophisti-
cated “street crime.” Many of these studies
1 What intra- and inter-organizational network concern “youth gangs” or “delinquent groups,”
structures emerge in response to various task- which are further distinguished from organized
related and environmental contingencies? crime not only by the age of the members but
2 What are the performance-related conse- also by the presumed motives for participation:
quences of the adoption of various intra- and primarily instrumental in the case of organized
inter-organizational network structures? (Here, crime, but a mix of instrumental and expressive
“performance” refers mainly to indicators of motives in the case of youth gangs.
organizational success, such as profitability, Analysis of sociograms and sociomatrices
longevity, etc.) (Hanneman and Riddle, this volume), recording
subjects’ friends or companions (and co-offend-
These are also two of the fundamental questions ers), has a long history in the study of criminal
in the sociology of organizations (e.g., Aldrich, organization: indeed, it was Moreno’s invention of
1979; Handel, 2003; Perrow, 1986) and of indus- this technique to study the social structure of
trial organization studies (e.g., Pepall et al., 2008; incarcerated offenders at Sing Sing prison (1932)
Williamson, 1975), and social network analysis is and the Hudson School for Girls (1934) that is
used in the study of criminal networks in ways identified by many historians as the birth of social
that parallel its applications in those disciplines network analysis (e.g., Freeman, 2004: 7).
(e.g., Burt, 1983, 1992, 2000; Carrington, 1981; However, Moreno’s invention of sociometry is
Cross and Parker, 2004; Kilduff and Krackhardt, predated by Shaw and McKay’s (1931: 200–221)
2008; White, 1981, 2002). use of a two-mode incidence matrix (Borgatti and
Waring (2002: 43) has argued that the nature of Halgin, this volume) to study co-offending
criminal activity makes it best conceptualized as a cliques.2 Spaulding (1948) reviewed the early
network form of organization, rather than other development of the use of the concepts and
forms, such as the hierarchy or market, and that methods of social network analysis to study
criminal activity is therefore subsumed within a “cliques, gangs, and networks.”
broader class of activities organized as networks,
including policy coalitions, joint ventures, movie
projects, friendships, and business, political, and Do gangs exist?
community elites. Felson (2009) identified four Social network analysis has been used to address
levels of criminal cooperation, ranging from a central question in the literature on delinquent
“primordial clusters” to “an extended patrimonial and criminal groups and gangs: Do they really
system.” exist? Or are so-called gangs really just spontane-
A key difference between network research on ous, temporary, and opportunistic loosely knit,
criminal networks and on peer influence and shifting alliances of unorganized individuals?
neighborhood networks is that, in principle, There is a striking parallel to the question (see
criminal networks include only people who are below) of the degree of “organization” of
already involved in criminal activity, so the so-called organized crime groups. Network analy-
research questions involve not the etiology of ses of putative gang members have generally
crime, but its organization and the causes and found that they – like so-called organized crime
consequences thereof. Also, in contrast to peer groups – exhibit local clustering within larger
network studies, criminal network analyses are loosely knit networks, that is, small groups with
usually of whole networks rather than of personal two to a dozen or so members, with varying
or egocentric networks: that is, the networks are degrees of connection to other such groups (Daly,
generally not conceptually centered on individu- 2005; Fleisher, 2002; Hood and Sparks, 1970;
als, but comprise entire criminal groups, however Klein and Crawford, 1967; McGloin, 2005;
defined. (However, these “whole networks” are Reiss, 1988; Sarnecki, 1990, 2001, 2009; Short
often assembled from egocentric network data and Strodtbeck, 1965; Spergel, 1990: 203–4;

5605-Scott-Chap17.indd 244 4/6/2011 4:38:31 PM


CRIME AND SOCIAL NETWORK ANALYSIS 245

Warr, 1996, 2002: 39; Whyte, 1943). These find- (sub-)network, in which a central member is
ings motivate the use of local clustering (clique) connected to all other members, none of whom
analysis to identify delinquent groups within are connected to one another. Within these two
larger networks (e.g., Cadwallader and Cairns, structural types, she also distinguished networks
2002; Clarke-McLean, 1996; Sarnecki, 2001). by their size and role differentiation. She used
A different way of asking whether criminal qualitative analysis to explore why networks take
groups are really groups is to analyze the temporal on these forms and to look at the consequences
stability of their composition, that is, their of these structures for the activities of network
membership. Warr, for example, writes of “. . . the members. In a simulation study, Calvó-Armengol
extreme instability of [the membership of] most and Zenou (2004) found that Nash equilibria
delinquent groups . . . all groups are . . . so short- for delinquent competition and cooperation are
lived that it may make little sense to even speak of determined by the structure of links in the crimi-
delinquent groups at all . . .” (1996: 33; emphasis nal network.
in the original). Other research on delinquent Morselli and Tremblay (2004) showed that
groups has reached similar, though not always so nonredundancy in ego’s criminal contacts affects
extreme, conclusions (Sarnecki, 1990, 2001; van his or her criminal success, measuring nonredun-
Mastrigt, 2008; Warr, 1996). On the other hand, dancy by the “effective size” of the egocentric
Clarke-McLean (1996) found “reasonably stable” criminal network (Burt, 1992). McGloin
networks among a sample of 92 incarcerated and Piquero (2010) showed that redundancy,
youth – perhaps because they were incarcerated. measured by the density of ties in the egocentric
criminal network, is positively associated with
crime type specialization in ego’s co-offenses.
Homophily Individual centrality – and its inverse, peripher-
Network research on delinquent groups has gener- ality – has been used as an indicator of the extent
ally found evidence of homophily (McPherson et of ego’s embeddedness in a criminal group
al., 2001) in relation to age, place of residence, (Sarnecki, 2001, 2004). Central members tend to
and criminal experience (Clarke-McLean, 1996; be the most criminally experienced and active
Daly, 2005; Sarnecki, 2001). There is strong (Sarnecki, 1990, 2001), to have the most criminal
gender homophily (Clarke-McLean, 1996), but it attitudes (Baron and Tindall, 1993), and to be at
is weaker for female offenders (Daly, 2005; most risk of violent victimization (Schreck et al.,
Fleisher, 2002; Sarnecki, 2001, 2004; Warr, 1996). 2004). Females tend to be less central than males
Carrington (2002) used a probabilistic model and (Sarnecki, 2004). Using data from the AddHealth
Canadian co-offending data to show that the lower Survey and Nash equilibrium analysis, Calvó-
level of homophily among female offenders is Armengol et al. found that an adolescent’s
explained by the offender sex ratio, and it does not Bonacich centrality in a network of delinquents
imply any preference (see also van Mastrigt, “is a key determinant of her level of [delinquent]
2008). Other research on mixed-sex delinquent activity” (2005: 1).
groups has found evidence of recruitment of girls McGloin (2005: 625–26) suggested that gang
by older males and of male influence over, and suppression efforts concentrate on members
exploitation of, females (Fleisher and Krienert, who are “cut-points” – that is, individuals who
2004; but cf. Pettersson, 2005), as well as gen- constitute the only connections between two
dered criminal roles in the group (Mullins and individuals or groups and are therefore ideally
Wright, 2003; Waring, 1993). There is racial or placed as “contagion agents” for a “deterrence
ethnic homophily in delinquent groups in the message.” However, the effectiveness of such
United States (Clarke-McLean, 1996; Daly, 2005) “key player” interdiction strategies (Borgatti,
and, in a more complex way, in Sweden (Pettersson, 2006) is called into question by empirical research
2003; Sarnecki, 2001). discussed below (Milward and Raab, 2006;
Morselli and Petit, 2007), suggesting the adapta-
bility of criminal networks in the face of threats,
Structure and by simulations that treat network structure as
Waring (1993) used data from presentence reports endogenous (Easton and Karaivanov, 2009).
for white-collar criminals sentenced in U.S.
federal courts during the 1980s to study the struc-
tures of white-collar co-offending networks. She Intergang networks
constructed 377 co-offending networks involving Papachristos (2009) studied the “social structure
747 sample members, focusing on networks that of gang homicide” by analyzing the social
had either of two configurations: the complete network formed by gang-related homicides in
(sub-)network, or clique, in which all members Chicago in 1994. The 66 gangs whose members
are directly connected to one another; and the star were involved in the homicides as perpetrators or

5605-Scott-Chap17.indd 245 4/6/2011 4:38:31 PM


246 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

victims were defined as the nodes of the network, work model: for example, Natarajan (2000) used
and the homicides themselves defined the directed network analysis to study the organization of a
ties from the gang of the perpetrator to the gang cocaine trafficking group and found that it did fit
of the victim. Longitudinal analyses supported the classic “corporate” type of organization.
the hypothesis of contagion (diffusion) of On the other hand, in a study of wiretapped
homicidal behavior. Structural analyses confirmed conversations among 294 members of a heroin-
that homicides were influenced by, and in dealing network in New York City, combining
turn affected, the nature of members’ gang affilia- network concepts and measures, such as
tions and the dominance structure of intergang cohesiveness (density), subgroups (cliques), and
relations. individuals’ power (centrality), with several other
forms of analysis, Natarajan (2006) concluded
that this population did not form a unitary
Organized crime organization or “conspiracy” but was a “loosely
structured network . . ., with little or no hierarchy”
The distinction between organized crime and (189). However, while this network had little
criminal gangs and groups is not clear-cut, but it “formal organization,” it did not lack what might
points to differences in scale, reach, type of be called “network organization”: there were
criminal activity, and motivation. The following elements of local clustering and stratification of
review of network analyses of organized crime is centrality. Similar conclusions are reached by
necessarily selective; additional references are several other recent studies of smuggling and
available in two recent literature reviews (Morselli, trafficking, such as Kenney’s (2007) analysis of
2009b; von Lampe, 2009). the Colombian drug trade, Heber’s (2009a)
Early research in the United States on the analysis of drug traffickers in Stockholm,
organization of the Mafia used a formal organiza- Desroches’s (2005) study of drug trafficking in
tion or hierarchical model, epitomized by the Canada, Xia’s (2008) review of organizational
reports in the 1950s and 1960s of the Kefauver structures in Chinese organized crime, and several
and McClellan Committees of the U.S. Senate studies of human smuggling and trafficking
(Albanese, 2007: 105–6; Cressey, 1969). However, (Kleemans, 2009; Lehti and Aromaa, 2006;
lack of fit with data on many criminal organiza- Soudijn and Kleemans, 2009; Surtees, 2008;
tions and activities led to dissatisfaction with this Zhang, 2008; Zhang and Gaylord, 1996).
model as being overly structured. On the other
hand, the economic enterprise model (Reuter,
1983), which conceptualizes criminal businesses Social capital
and markets as operating according to the Two recurrent themes in the literature on organ-
same principles of economic rationality as legal ized crime are the related problems of trust and of
business enterprises, has also been criticized for access to resources. Criminal enterprise requires
its inadequacy (Liddick, 1999) – as it has in the the cooperation and coordination of multiple
analysis of legal business activity (Powell, 1990; actors, sometimes very distant from one another
White, 1981, 2002; Williamson, 1975). geographically, but criminal actors lack recourse
Some early research (e.g., Albini, 1971; Ianni, to conventional legal procedures for enforcement
1974; Ianni and Reuss-Ianni, 1972; Lupsha, 1983) of agreements. Thus, the issue of trust is
suggested a network model, in which no particular especially salient in criminal enterprise, and social
structure is assumed a priori, but rather the social relations support trust, whether they are preexist-
organization of the group is derived “bottom-up” ing (e.g., family, ethnicity, friendship) or have
(von Lampe, 2009: 94) from the observed developed in the course of criminal collaboration
configurations and qualities of connections and (Bruinsma and Bernasco, 2004; Felson, 2009;
transactions among the actors, and the attributes Granovetter, 1985: 492; Kleemans, 2007;
of the actors. While network analysis makes no Kleemans and de Poot, 2008; Kleemans and
prior assumptions about structure, a preference for van de Bunt, 1999; Morselli, 2003, 2005;
the “network model” of organized crime implies Tremblay, 1993; von Lampe and Johansen, 2004;
rejection of both the formal organization model von Lampe, 2009; Waring, 2002: 38–39; but
and the economic model: the former having cf. van de Bunt, 2008). Another theme is the need
too much structure, the latter too little (Waring, for connections – with suppliers, customers, and
2002: 33). Thus, in the network model, criminal sources of funding and expertise (Morselli, 2005).
groups and activities are seen as “a system of Kleemans and his colleagues define the “social
loosely structured [profit-oriented] relationships” opportunity structure” as “social ties providing
(Albini, 1971, cited in Albanese, 2007: 110). access to profitable criminal opportunities”
However, adoption of network analysis methods (Kleemans and de Poot, 2008: 75) and emphasize
does not necessarily imply adoption of the net- that access to such opportunities is limited and

5605-Scott-Chap17.indd 246 4/6/2011 4:38:31 PM


CRIME AND SOCIAL NETWORK ANALYSIS 247

distributed unequally over the population and over outlaw motorcycle gangs to assess structural
the life course (van Koppen et al., 2010). Their “weaknesses and vulnerabilities” in these groups
“social opportunity structure” is very similar to by identifying core, peripheral, and cut-point
the concept of social capital. For example, Lin members, and estimating overall gang cohesion
(2001: 19) defines social capital as “investment and communication flow paths, based on
in social relations with expected returns in the measures of density, centrality, clustering, and
marketplace,” or alternatively, “a social asset by bridging.
virtue of actors’ connections and access to Morselli (2003, 2005) used the concept of
resources in the network or group of which they structural holes (Burt, 1992; Hanneman and
are members.” Thus, Bouchard and Nguyen (2010) Riddle, this volume) to analyze the careers of two
contrasted the payoff from the social capital of a organized criminals, in an instance of criminal
sample of young cannabis cultivators, defined as network analysis that uses personal networks
“who you know – connections” or “resources in rather than whole networks. In a combined crime-
social networks,” with the payoff from criminal script and network analysis, Morselli and Roy
capital, defined as “what you know – talent” (2008) used two measures of brokerage (Burt,
or “[criminal] education, training, experience” 2005) – betweenness centrality (Hanneman and
(the equivalent of human capital in the noncrimi- Riddle, this volume), and brokerage leverage
nological literature). McCarthy and Hagan (1995; (Gould and Fernandez, 1989) – to analyze two
Hagan, 1997; Hagan and McCarthy, 1998) linked Canadian “ringing networks” involved in the sale
the notions of “who” and “what” one knows by of stolen vehicles. Morselli (2009a) used degree
defining criminal capital as the criminal knowl- centrality and betweenness centrality (brokerage)
edge and skill that are derived from embeddedness to study the organization of the criminal activities
in criminal networks. of the Hells Angels motorcycle club in the
province of Quebec – in particular to test the
hypothesis that they exhibited the tightly struc-
Structure tured hierarchical organization of the traditional
Bruinsma and Bernasco (2004) found differences organized crime paradigm. The results indicated
in cohesiveness (density), multiplexity, and that the organization of criminal activities was
clustering in the structures of networks operating more complex and nuanced.
in the Netherlands and involved in international
trafficking in heroin, women, and stolen cars.
Networks of heroin trafficking – a high-risk Implications for interdiction
activity – were characterized by dense, multiplex Extending the work of Calvó-Armengol and
ties in a single cluster. Ties among those involved colleagues (above), Easton and Karaivanov (2009)
in the trafficking of women and stolen cars were identified “optimal criminal networks” by finding
less dense, tended to be uniplex and instrumental, Nash equilibria for simulated networks whose size
and each network had two or more clusters, con- and structure were allowed to vary (i.e., were
nected in a chain by intermediate individuals or endogenous) according to individuals’ decisions
clusters. They concluded that these differences concerning their level of criminal activity and
“appear to be related to the legal and financial their links to others in the network, taking into
risks . . . and . . . the [consequent] required level account crime-reduction efforts of the authorities.
of trust” (2004: 79). Canter (2004) used partial- They concluded that models that assume fixed
order scalogram analysis to compare the organiza- (i.e., exogenous) criminal network size and struc-
tion of 29 British drug-dealing, property-crime, ture can produce misleading results; for example,
or hooligan networks, along six dimensions of the policy of “taking out” the key player (Borgatti,
network structure. He identified three types of 2006) may not reduce crime, because criminals
groups – ad hoc, oligarchies, and organized crimi- may reconfigure their network in response.
nals – that differed on two dominant axes related Milward and Raab (2006: 333) concluded from
to group size and leadership centrality. There was their review of research on the responses of Al
only a weak relationship between the tripartite Qaeda and of Colombian cocaine traffickers to
typologies of criminal activities and of organiza- efforts by control agents to suppress them that the
tional structures. Heber (2009b) identified two resilience of “dark networks” lies in their ability
central roles in the Swedish black market in to “rebalance differentiation and integration
construction labor: “fixers” and “network entre- mechanisms in their internal structure.” Morselli
preneurs,” and described the characteristics of the and Petit (2007) reached a similar conclusion
networks of each. McNally and Alston (2006) from their analysis of the reaction of a drug
used intelligence data on the associations and importation network in Montreal, Canada, to law
communications of members of three Canadian enforcement targeting.

5605-Scott-Chap17.indd 247 4/6/2011 4:38:31 PM


248 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Methodological and programmatic work are, as the term implies, inherently difficult to
A substantial part of the literature on criminal obtain. The empirical research cited in this section
networks, or more generally “dark networks,”3 is a testament to the ingenuity and assiduousness
consists of methodological and programmatic of the authors. Perhaps the gradual diffusion of
papers that advocate the adoption of the “network knowledge of the value of social network analysis
model” or the use of social network analysis to in the study of criminal groups will result in better
study organized crime or that explain how to do access for criminologists to classified data.
network analysis, sometimes with illustrative case
studies. Classic examples are Davis (1981), Ianni
and Reuss-Ianni (1990), and Sparrow (1991a,
1991b). More recent examples include McIllwain DISCUSSION
(1999), Coles (2001), Chattoe and Hamill (2005),
McAndrew (2000), Robins (2009), and van
The use of social network analysis in criminology
der Hulst (2009). Many recent programmatic
is in its infancy. The great majority of so-called
contributions present new analytic methods or
network studies of crime and delinquency con-
software for criminal network analysis (e.g.,
sider only the composition, or characteristics, of
Borgatti, 2006; Carley et al., 2002; Chen, 2002;
the members or of the networks, and not of the
Hadjidj et al., 2009; Hu et al., 2009; Huang, 2005;
structure of their relationships. Most analyses of
Kaza et al., 2009; Marshall et al., 2008; Oatley,
network structures are impressionistic, relying on
2006; Oatley et al., 2005; Oatley et al., 2008;
visual examination of sociograms, rather than
Rhodes and Keefe, 2007; Schwartz and Rouselle,
being computational. Even the computational
2009; Smith and King, 2002; Stovin and Davies,
analyses tend to limit themselves to the simplest
2008; Tsvetovat and Carley, 2007; Tutzauer,
network concepts and indices, such as density and
2007; Xu and Chen, 2003, 2005a, 2005b; Xu
centrality. Few criminologists appreciate the
et al., 2004).
usefulness of social network analysis in modeling
criminological concepts and propositions, or
Conclusion are trained in network methods, or use network
Much of the social network research on criminal analysis software. Suitable data are difficult to
networks is exploratory and descriptive, and it obtain or to generate.
seeks to give a (literally) graphic account of Nevertheless, a small number of criminologists
the structure of the networks being studied. are knowledgeable in the concepts and methods of
Some research goes beyond description and social network analysis, and some have shown
explores the causes or consequences of composi- great ingenuity in finding or generating suitable
tional and morphological variations in criminal data. They have produced a number of sophisti-
networks. Researchers on organized crime cated and powerful criminological network analy-
networks, whose members are presumed to be ses over the past decade. Much more needs to be
predominantly rational-instrumental in their done, particularly in training in social network
behavior, have explored both task-related analysis and access to data. The recent publication
and environmental determinants of network of the first pedagogical article on social network
attributes and also the outcomes of these attributes analysis to appear in a criminological journal
in terms of organizational success. Research (McGloin and Kirk, 2010) may be a harbinger of
on criminal networks has also investigated the future developments.
implications of network attributes for interdiction
strategies.
As van der Hulst (this volume) has pointed out
in relation to network analyses of terrorism, NOTES
researchers on criminal networks tend, with a few
exceptions, to fall into two distinct classes, each This chapter has benefited greatly from discus-
operating under severe constraints. Academic sions at the 7th Blankensee-Colloquium, Human
researchers have expertise in criminological theory Capital and Social Capital in Criminal Networks,
and research but tend to lack “domain expertise” Berlin, 2008, and from bibliographic suggestions and
and access to good data. Operational (crime) comments on a previous draft by Sean Bergin, Martin
analysts have domain expertise and access to clas- Bouchard, Reagan Daly, Edward Kleemans, Chris
sified data but tend to lack the motive or training Lewis, Carlo Morselli, Lynn Vincentnathan, Renée
to do research on criminological issues – or van der Hulst, Klaus von Lampe, and Frank Weerman.
may be prevented by secrecy considerations from Preparation of this chapter was supported by a grant
publishing their research. More generally, accu- from the Social Sciences and Humanities Research
rate and comprehensive data on “dark networks” Council of Canada.

5605-Scott-Chap17.indd 248 4/6/2011 4:38:31 PM


CRIME AND SOCIAL NETWORK ANALYSIS 249

1 For explanations of these and other network efficacy, and violent crime in urban neighborhoods’. Social
concepts, please see the chapters in this volume by Forces, 83(2): 503–34.
Hanneman and Riddle. Bruinsma, G.J.N. (1992) ‘Differential association theory
2 Frank and Carrington (2007; Frank, 2001) also reconsidered: An extension and its empirical test’. Journal
used a two-mode incidence matrix and a probabilistic of Quantitative Criminology, 8: 29–49.
model to estimate the “dark figures” in estimates of Bruinsma, G.J.N. and Bernasco, W. (2004) ‘Criminal groups
co-offending and individual criminal activity based on and transnational illegal markets: A more detailed
official data. examination on the basis of Social Network Theory’. Crime
3 “Dark networks” include both criminal and Law and Social Change, 41(1): 79–94.
terrorist networks, which are sometimes not distinct. Burgess, R.L. and Akers, R.L. (1966) ‘A differential associa-
I have included sources on “dark networks” in this tion-reinforcement theory of criminal behavior’. Social
chapter if they are particularly germane to the study Problems, 14: 128–47.
of organized crime; for a review of the literature on Burk, W.J., Kerr, M. and Stattin, H. (2008) ‘The co-evolution
social network analysis of terrorist networks, please of early adolescent friendship networks, school involve-
see the chapter by van der Hulst in this volume. ment, and delinquent behaviors’. Revue Française de
Sociologie, 49(3): 499–522.
Burk, W.J., Steglich, C.E.G. and Snijders, T.A.B. (2007)
‘Beyond dyadic interdependence: Actor-oriented models
for co-evolving social networks and individual behaviors’.
REFERENCES International Journal of Behavioral Development, 31(4):
397–404.
Albanese, J.S. (2007) Organized Crime in Our Times. 5th ed. Burt, R.S. (1983) Corporate Profits and Cooptation. New York:
Newark, NJ: LexisNexis. Academic Press.
Albini, J.L. (1971) The American Mafia: Genesis of a Legend. Burt, R.S. (1992) Structural Holes: The Social Structure of
New York: Irvington. Competition. Cambridge, MA: Harvard University Press.
Aldrich, H. (1979) Organizations and Environments. Englewood Burt, R.S. (2000) ‘The network structure of social capital’, in
Cliffs, NJ: Prentice-Hall. Robert I. Sutton and Barry M. Staw (eds), Research in
Baerveldt, C. and Snijders, T.A.B. (1994) ‘Influences on and Organizational Behavior. Greenwich, CT: JAI Press.
from the segmentation of networks: Hypotheses and tests’. Burt, R.S. (2005) Brokerage and Closure: An Introduction to
Social Networks, 16(3): 213–32. Social Capital. Oxford: Oxford University Press.
Baerveldt, C., Van Rossem, R., Vermande, M. and Weerman, Cadwallader, T.W. and Cairns, R.B. (2002) ‘Developmental
F. (2004) ‘Students’ delinquency and correlates with strong influences and gang awareness among African-American
and weaker ties: A study of students’ networks in Dutch inner city youth’. Social Development, 11(2): 245–65.
high schools’. Connections, 26(1): 11–28. Calvó-Armengol, A., Patacchini, E. and Zenou, Y. (2005) Peer
Baerveldt, C., Voelker, B. and Van Rossem, R. (2008) Effects and Social Networks in Education and Crime.
‘Revisiting selection and influence: An inquiry into the Working Paper. Vol. 645. Stockholm: Research Institute of
friendship networks of high school students and their Industrial Economics.
association with delinquency’. Canadian Journal of Calvó-Armengol, A. and Zenou, Y. (2004) ‘Social networks
Criminology and Criminal Justice, 50(5): 559–87. and crime decisions: The role of social structure in facilitat-
Baron, S.W. and Tindall, D.B. (1993) ‘Network structure and ing delinquent behavior’. International Economic Review,
delinquent attitudes within a juvenile gang’. Social 45(3): 939–58.
Networks, 15(3): 255–73. Canter, D. (2004) ‘A partial order scalogram analysis of crimi-
Bernburg, J.G., Krohn, M.D. and Rivera, C.J. (2006) ‘Official nal network structures’. Behaviormetrika, 31(2): 131–52.
labeling, criminal embeddedness, and subsequent delin- Capowich, G.E., Mazerolle, P. and Piquero, A. (2001) ‘General
quency: A longitudinal test of labeling theory’. Journal of strain theory, situational anger, and social networks: An
Research in Crime and Delinquency, 43(1): 67–88. assessment of conditioning influences’. Journal of Criminal
Borgatti, S. (2006) ‘Identifying sets of key players in a social Justice, 29(5): 445–61.
network’. Computational & Mathematical Organization Carley, K.M., Lee, J.-S.L. and Krackhardt, D. (2002)
Theory, 12(1): 21–34. ‘Destabilizing networks’. Connections, 24(3): 79–92.
Bouchard, M. and Nguyen, H. (2010) ‘Is it who you know, Carrington, P.J. (1981) ‘Horizontal co-optation through
or how many that counts? Criminal networks and cost corporate interlocks’. Doctoral dissertation, University of
avoidance in a sample of young offenders’. Justice Toronto.
Quarterly, 27: 130–58. Carrington, P.J. (2002) ‘Sex homogeneity in co-offending
Brook, J.S., Brook, D.W., Rosen, Z. and Rabbitt, C.R. (2003) groups’, in J. Hagberg (ed.), Contributions to Social
‘Earlier marijuana use and later problem behavior in Network Analysis, Information Theory and Other Topics in
Colombian youths’. Journal of the American Academy of Statistics. A Festschrift in Honour of Ove Frank. Stockholm:
Child and Adolescent Psychiatry, 42(4): 485–92. Stockholm University. pp. 101–16.
Browning, C.R., Feinberg, S.L. and Dietz, R.D. (2004) ‘The Chattoe, E. and Hamill, H. (2005) ‘It’s not who you know –
paradox of social organization: Networks, collective it’s what you know about people you don’t know

5605-Scott-Chap17.indd 249 4/6/2011 4:38:31 PM


250 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

that counts: Extending the analysis of crime groups as Felson, M. (2009) ‘The natural history of extended co-offend-
social networks’. British Journal of Criminology, 45(6): ing’. Trends in Organized Crime, 12(2): 159–65.
860–76. Fleisher, M.S. (2002) ‘Doing field research on diverse gangs:
Chen, H.C. (2002) ‘From digital library to digital government: Interpreting youth gangs as social networks’, in C. Ronald
A case study in crime data mapping and mining’. Digital Huff (ed.), Gangs in America. Thousand Oaks, CA: Sage.
Libraries: People, Knowledge, and Technology, Proceedings. pp. 199–217.
Lecture Notes in Computer Science, vol. 2555. Berlin: Fleisher, M.S. and Krienert, J.L. (2004) ‘Life-course events,
Springer-Verlag. social networks, and the emergence of violence among
Clarke-McLean, J.G. (1996) ‘Social networks among female gang members’. Journal of Community Psychology,
incarcerated juvenile offenders’. Social Development, 5(2): 32: 607–22.
203–17. Frank, O. (2001) ‘Statistical estimation of co-offending youth
Clear, T.R. (2008) ‘The effects of high imprisonment rates on networks’. Social Networks, 23(3): 203–14.
communities’, in Michael Tonry (ed.), Crime and Justice: Frank, O. and Carrington, P.J. (2007) ‘Estimation of offending
A Review of Research, vol. 37. Chicago: University of and co-offending using available data with model support’.
Chicago Press. pp. 97–132. Journal of Mathematical Sociology, 31(1): 1–46.
Cohen, L.E. and Felson, M. (1979) ‘Social Change and Crime Freeman, L.C. (2004) The Development of Social Network
Rate Trends: A Routine Activity Approach’. American Analysis. Vancouver, BC: Empirical Press.
Sociological Review, 44: 588–608. Friday, P.C. and Hage, J. (1976) ‘Youth crime in postindustrial
Coles, N. (2001) ‘It’s not what you know – it’s who you societies: An integrated perspective’. Criminology, 14:
know that counts. Analysing serious crime groups as 347–68.
social networks’. British Journal of Criminology, 41(4): Friedman, S.R., Mateu-Gelabert, P., Curtis, R., Maslow, C.,
580–94. Bolyard, M., Sandoval, M. and Flom, P.L. (2007) ‘Social
Cressey, D.R. (1969) Theft of the Nation. New York: capital or networks, negotiations, and norms? A neighbor-
Harper Row. hood case study’. American Journal of Preventive Medicine,
Cross, R.L. and Parker, A. (2004) The Hidden Power of 32(6): S160–S170.
Social Networks: Understanding How Work Really Gets Gainey, R.R., Peterson, P.L., Wells, E.A., Hawkins, J.D. and
Done in Organizations. Cambridge, MA: Harvard Business Catalano, R.F. (1995) ‘The social networks of cocaine users
Press. seeking treatment’. Addiction Research, 3: 17–32.
Curry, A.D. and Latkin, C.A. (2003) ‘Gender differences in Galster, G.C. and Killen, S.P. (1995) ‘The geography of
street economy and social network correlates of arrest metropolitan opportunity: A reconnaissance and concep-
among heroin injectors in Baltimore, Maryland’. Journal of tual-framework’. Housing Policy Debate, 6(1): 7–43.
Urban Health, 80: 482–93. Galster, G.C. and Mikelsons, M. (1995) ‘The geography of
Daly, R.M. (2005) ‘Delinquent networks in Philadelphia: The metropolitan opportunity: A case-study of neighborhood
structure of co-offending among juveniles’. Ph.D. thesis, conditions confronting youth in Washington, DC’. Housing
University of Pennsylvania. Policy Debate, 6(1): 73–102.
Davis, R.H. (1981) ‘Social network analysis: An aid in Gayne, M.K. (2004) ‘Illicit wigmaking in eighteenth-century
conspiracy investigations’. FBI Law Enforcement Bulletin, Paris’. Eighteenth-Century Studies, 38(1): 119–37.
50(12): 11–19. Giordano, P.C., Cernkovich, S.A. and Demaris, A. (1993)
Deptula, D.P. and Cohen, R. (2004) ‘Aggressive, rejected, and ‘The family and peer relations of black-adolescents’.
delinquent children and adolescents: A comparison of their Journal of Marriage and the Family, 55(2): 277–87.
friendships’. Aggression and Violent Behavior 9(1): Gottfredson, M.R. and Hirschi, T. (1990) A General Theory of
75–104. Crime. Stanford, CA: Stanford University Press.
Desroches, F.J. (2005) The Crime That Pays: Drug Trafficking Gould, R.V. and Fernandez, R.M. (1989) ‘Structures of media-
and Organized Crime in Canada. Toronto: Canadian tion: A formal approach to brokerage in transaction net-
Scholars’ Press. works’, in Clifford C. Clogg (ed.), Sociological Methodology.
Easton, S.T. and Karaivanov, A.K. (2009) ‘Understanding Vol. 19. Oxford: Basil Blackwell. pp. 89–126.
optimal criminal networks’. Global Crime, 10(1): 41–65. Granovetter, M. (1973) ‘Strength of weak ties’. American
Ekland-Olson, S. (1983) ‘Deviance, social control and social Journal of Sociology, 78(6): 1360–80.
networks’. Research in Law, Deviance and Social Control, Granovetter, M. (1985) ‘Economic action and social structure:
4: 271–99. The problem of embeddedness’. American Journal of
Elliott, D.S. and Menard, S. (1996) ‘Delinquent friends and Sociology, 91: 481–510.
delinquent behavior: Temporal and developmental Griffith, J.D., Knight, D.K., Joe, G.W. and Simpson, D.D.
patterns’, in J. D. Hawkins (ed.), Delinquency and Crime: (1998) ‘Implications of family and peer relations for
Current Theories. Cambridge: Cambridge University Press. treatment engagement and follow-up outcomes: An inte-
pp. 28–67. grative model’. Psychology of Addictive Behaviors, 12(2):
Espelage, D.L., Green, H.D., Jr. and Wasserman, S. (2007) 113–26.
‘Statistical analysis of friendship patterns and bullying Gutierrez-Lobos, K., Eher, R., Grunhut, C., Bankier, B.,
behaviors among youth’. New Directions for Child and Schmidl-Mohl, B., Fruhwald, S. and Semler, B.
Adolescent Development, 118: 61–75. (2001) ‘Violent sex offenders lack male social support’.

5605-Scott-Chap17.indd 250 4/6/2011 4:38:31 PM


CRIME AND SOCIAL NETWORK ANALYSIS 251

International Journal of Offender Therapy and Comparative Ianni, F.A.J. and Reuss-Ianni, E. (1990) ‘Network analysis’, in
Criminology, 45(1): 70–82. Paul P. Andrews, Jr. and Marilyn B. Peterson (eds), Criminal
Hadjidj, R., Debbabi, M., Lounis, H., Iqbal, F., Szporer, A. and Intelligence Analysis. Loomis, CA: Palmer Enterprises.
Benredjem, D. (2009) ‘Towards an integrated email pp. 67–84.
forensic analysis framework’. Digital Investigation, 5(3–4): James, S.E., Johnson, J. and Raghavan, C. (2004) ‘“I couldn’t
124–37. go anywhere” – Contextualizing violence and drug abuse:
Hagan, J. (1997) ‘Crime and capitalization: Toward a develop- A social network study’. Violence against Women, 10(9):
mental theory of street crime in America’, in Terence P. 991–1014.
Thornberry (ed.), Developmental Theories of Crime and Kandel, D. and Davies, M. (1991) ‘Friendship networks,
Delinquency. Vol. 7 of Advances in Criminological Theory. intimacy, and illicit drug-use in young adulthood: A
New Brunswick, NJ: Transaction. pp. 287–308. comparison of 2 competing theories’. Criminology, 29(3):
Hagan, J. and McCarthy, B. (1998) Mean Streets: Youth Crime 441–469.
and Homelessness. Cambridge, UK: Cambridge University Kaza, S., Xu, J., Marshall, B. and Chen, H. (2009) ‘Topological
Press. analysis of criminal activity networks: Enhancing transpor-
Handel, M.J. (ed.) (2003) Sociology of Organizations: Classic, tation security’. IEEE Transactions on Intelligent
Contemporary and Critical Readings. Thousand Oaks, CA: Transportation Systems, 10(1): 83–91.
Sage. Kennedy, B.P., Kawachi, I. and Brainerd, E. (1998) ‘The role of
Hanson, R.K. and Scott, H. (1996) ‘Social networks of social capital in the Russian mortality crisis’. World
sexual offenders’. Psychology Crime and Law, 2(4): Development, 26(11): 2029–43.
249–58. Kenney, M. (2007) ‘The architecture of drug trafficking:
Harding, D.J. (2009) ‘Violence, older peers, and the socializa- Network forms of organisation in the Colombian cocaine
tion of adolescent boys in disadvantaged neighborhoods’. trade’. Global Crime, 8(3): 233–59.
American Sociological Review, 74(3): 445–64. Kilduff, M. and Krackhardt, D. (2008) Interpersonal Networks
Haynie, D.L. (2001) ‘Delinquent peers revisited: Does network in Organizations: Cognition, Personality, Dynamics, and
structure matter?’ American Journal of Sociology, 106(4): Culture. Cambridge, UK: Cambridge University Press.
1013–57. Kirke, D.M. (1990) ‘Teenage drug abuse: An individualistic
Haynie, D.L. (2002) ‘Friendship networks and delinquency: and structural analysis’. Ph.D. thesis, University College,
The relative nature of peer delinquency’. Journal of Dublin.
Quantitative Criminology, 18(2): 99–134. Kirke, D.M. (1995) ‘Teenage peer networks in the community
Haynie, D.L. and Osgood, D.W. (2005) ‘Reconsidering peers as sources of social problems: A sociological perspective’,
and delinquency: How do peers matter?’ Social Forces, in T.S. Brugha (ed.), Social Support and Psychiatric
84(2): 1109–30. Disorder: Research Findings and Guidelines for Clinical
Haynie, D.L. and Piquero, A.R. (2006) ‘Pubertal development Practice. Cambridge: Cambridge University Press.
and physical victimization in adolescence’. Journal of Kirke, D.M. (2006) Teenagers and Substance Use. New York:
Research in Crime and Delinquency, 43(1): 3–35. Palgrave-Macmillan.
Heber, A. (2009a) ‘The networks of drug offenders’. Trends in Kleemans, E.R. (2007) ‘Organized crime, transit crime, and
Organized Crime, 12(1): 1–20. racketeering. Crime and justice in the Netherlands’, in
Heber, A. (2009b) ‘Networks of organised black market labour Michael Tonry and Catrien Bijleveld (eds), Crime and
in the building trade’. Trends in Organized Crime, 12(2): Justice: A Review of Research, vol. 35. Chicago: University
122–44. of Chicago Press. pp. 163–215.
Hirschi, T. (1969) Causes of Delinquency. Berkeley: University Kleemans, E.R. (2009) ‘Human smuggling and human
of California Press. trafficking’, in Michael Tonry (ed.), The Oxford Handbook
Hood, R. and Sparks, R. (1970) Key Issues in Criminology. of Crime and Public Policy. Oxford: Oxford University
New York: McGraw-Hill. Press.
Houtzager, B. and Baerveldt, C. (1999) ‘Just like normal: A Kleemans, E.R. and van de Bunt, H.G. (1999) ‘Social embed-
social network study of the relation between petty crime dedness of organized crime’, Transnational Organized
and the intimacy of adolescent friendships’. Social Behavior Crime, 5(1): 19–36.
and Personality, 27(2): 177–92. Kleemans, E.R. and de Poot, C.J. (2008) ‘Criminal careers in
Hu, D., Kaza, S. and Chen, H. (2009) ‘Identifying significant organized crime and social opportunity structure’. European
facilitators of dark network evolution’. Journal of the Journal of Criminology, 5(1): 69–98.
American Society for Information Science and Technology, Klein, M.W. and Crawford, L.Y. (1967) ‘Groups, gangs, and
60(4): 655–65. cohesiveness’. Journal of Research in Crime and
Huang, C.Y. (2005) ‘File sharing as a form of music consump- Delinquency, 4(1): 63–75.
tion’. International Journal of Electronic Commerce, 9(4): Knight, D.K. and Simpson, D.D. (1996) ‘Influences of family
37–55. and friends on client progress during drug abuse treat-
Ianni, F.A.J. (1974) Black Mafia: Ethnic Succession in ment’. Journal of Substance Abuse, 8(4): 417–29.
Organized Crime. New York: Simon and Schuster. Korobow, A., Johnson, C. and Axtell, R. (2007) ‘An agent-
Ianni, F.A.J. and Reuss-Ianni, E. (1972) A Family Business. based model of tax compliance with social networks’.
New York: Russell Sage Foundation. National Tax Journal, 60: 589–610.

5605-Scott-Chap17.indd 251 4/6/2011 4:38:31 PM


252 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Krohn, M.D. (1986) ‘The web of conformity: A network McAndrew, D. (2000) ‘The structural analysis of criminal
approach to the explanation of delinquent behavior’. Social networks’, in David Canter and Laurence Alison (eds), The
Problems, 33(6): S81–S93. Social Psychology of Crime: Groups, Teams and Networks,
Krohn, M.D., Massey, J.L. and Zielinski, M. (1988) ‘Role vol. III. Aldershot, UK: Ashgate. pp. 51–94.
overlap, network multiplexity, and adolescent deviant- McCarthy, B., Felmlee, D. and Hagan, J. (2004) ‘Girl friends
behavior’. Social Psychology Quarterly, 51(4): 346–356. are better: Gender, friends, and crime among school and
Lacasse, A., Purdy, K.T. and Mendelson, M.J. (2003) ‘The street youth’. Criminology, 42(4): 805–35.
mixed company they keep: Potentially offensive sexual McCarthy, B. and Hagan, J. (1995) ‘Getting into street
behaviours among adolescents’. International Journal of crime: The structure and process of criminal embedded-
Behavioral Development, 27(6): 532–40. ness’. Social Science Research, 24(1): 63–95.
Laird, R.D., Pettit, G.S., Dodge, K.A. and Bates, J.E. (1999) McGloin, J.M. (2005) ‘Policy and intervention considerations
‘Best friendships, group relationships, and antisocial of a network analysis of street gangs’. Criminology and
behavior in early adolescence’. Journal of Early Adolescence, Public Policy, 4(3): 607–36.
19: 413–37. McGloin, J.M. (2009) ‘Delinquency balance: Revisiting peer
Lee, J.S. (2004) ‘Generating networks of illegal drug users influence’. Criminology, 47(2): 439–77.
using large samples of partial ego-network data’. McGloin, J.M. and Kirk, D.S. (2010) ‘An overview of social
Intelligence and Security Informatics, Proceedings. Lecture network analysis’. Journal of Criminal Justice Education,
Notes in Computer Science, vol. 3073. Berlin: Springer- 21: 169–81.
Verlag. McGloin, J.M. and Piquero, A.R. (2010) ‘On the relationship
Lehti, M. and Aromaa, K. (2006) ‘Trafficking for sexual between co-offending network redundancy and offending
exploitation’, in Michael Tonry (ed.), Crime and Justice: versatility’. Journal of Research in Crime and Delinquency,
A Review of Research, 34: 133–227. 47: 63–90.
Leighton, B. (1988) ‘The community concept in criminology – McGloin, J.M. and Shermer, L.O.N. (2009) ‘Self-control and
Toward a social network approach’. Journal of Research in deviant peer network structure’. Journal of Research in
Crime and Delinquency, 25(4): 351–74. Crime and Delinquency, 46(1): 35–72.
Lichtenstein, B. (1997) ‘Women and crack-cocaine use: McIllwain, J.S. (1999) ‘Organized crime: A social
A study of social networks and HIV risk in an Alabama jail network approach’. Crime Law and Social Change, 32(4):
sample’. Addiction Research, 5(4): 279–96. 301–23.
Liddick, D. (1999) ‘The enterprise “model” of organized crime: McNally, D. and Alston, J. (2006) ‘Use of social network
Assessing theoretical propositions’. Justice Quarterly, 16(2): analysis (SNA) in the examination of an outlaw motorcycle
403–30. gang’. Journal of Gang Research, 13(3): 1–25.
Light, J.M. and Dishion, T.J. (2007) ‘Early adolescent antisocial McPherson, M., Smith-Lovin, L. and Cook, J.M. (2001) ‘Birds
behavior and peer rejection: A dynamic test of a develop- of a feather: Homophily in social networks’. Annual Review
mental process’. New Directions for Child and Adolescent of Sociology, 27: 415–44.
Development, 118: 77–89. Meldrum, R.C., Young, J.T.N. and Weerman, F.M. (2009)
Lin, N. (2001) Social Capital. Cambridge, UK: Cambridge ‘Reconsidering the effect of self-control and delinquent
University Press. peers: Implications of measurement for theoretical signifi-
Lonardo, R.A., Giordano, P.C., Longmore, M.A. and Manning, cance’. Journal of Research in Crime and Delinquency,
W.D. (2009) ‘Parents, friends, and romantic partners: 46: 353–76.
Enmeshment in deviant networks and adolescent delin- Milward, H.B. and Raab, J. (2006) ‘Dark networks as organi-
quency involvement’. Journal of Youth and Adolescence, zational problems: Elements of a theory’. International
38(3): 367–83. Public Management Journal, 9(3): 333–60.
Lupsha, P. (1983) ‘Networks versus networking: Analysis of an Monge, P.R. and Contractor, N. (2003) Theories of
organized crime group’, in G. Waldo (ed.), Career Criminals. Communication Networks. New York: Oxford University
Beverly Hills, CA: Sage. pp. 59–87. Press.
Mangino, W. (2009) ‘The downside of social closure: Moreno, J.L. (1932) Application of the Group Method to
Brokerage, parental influence, and delinquency among Classification. New York: National Committee on Prisons
African American boys’. Sociology of Education, 82(2): and Prison Labor.
147–72. Moreno, J.L. (1934) Who Shall Survive? Washington, DC:
Marshall, B., Chen, H. and Kaza, S. (2008) ‘Using importance Nervous and Mental Disease Publishing Company.
flooding to identify interesting networks of criminal Morselli, C. (2003) ‘Career opportunities and network-based
activity’. Journal of the American Society for Information privileges in the Cosa Nostra’. Crime Law and Social
Science and Technology, 59(13): 2099–114. Change, 39(4): 383–418.
Matsueda, R.L. (2006) ‘Differential social organization, Morselli, C. (2005) Contacts, Opportunities, and Criminal
collective action, and crime’. Crime Law and Social Change, Enterprise. Toronto: University of Toronto Press.
46: 3–33. Morselli, C. (2009a) ‘Hells Angels in springtime’. Trends in
Matsueda, R.L. and Anderson, K. (1998) ‘The dynamics of Organized Crime, 12(2): 145–58.
delinquent peers and delinquent behavior’. Criminology, Morselli, C. (2009b) Inside Criminal Networks. New York:
36(2): 269–308. Springer.

5605-Scott-Chap17.indd 252 4/6/2011 4:38:31 PM


CRIME AND SOCIAL NETWORK ANALYSIS 253

Morselli, C. and Petit, K. (2007) ‘Law-enforcement disruption Perrow, C. (1986) Complex Organizations: A Critical Essay.
of a drug importation network’. Global Crime, 8(2): 3rd ed. New York: McGraw-Hill.
109–30. Pettersson, T. (2003) ‘Ethnicity and violent crime: The ethnic
Morselli, C. and Roy, J. (2008) ‘Brokerage qualifications in structure of networks of youths suspected of violent
ringing operations’. Criminology, 46(1): 71–98. offences in Stockholm’. Journal of Scandinavian Studies in
Morselli, C. and Tremblay, P. (2004) ‘Criminal achievement, Criminology and Crime Prevention, 4(2): 143–61.
offender networks and the benefits of low self-control’. Pettersson, T. (2005) ‘Gendering delinquent networks.
Criminology, 42(3): 773–804. A gendered analysis of violent crimes and the structure of
Moss, H.B., Lynch, K.G. and Hardie, T.L. (2003) ‘Affiliation boys’ and girls’ co-offending networks’. Young Nordic
with deviant peers among children of substance dependent Journal of Youth Research, 13(3): 247–67.
fathers from pre-adolescence into adolescence: Associations Powell, W. (1990) ‘Neither hierarchies nor markets’, in Barry
with problem behaviors’. Drug and Alcohol Dependence, Shaw and L. L. Cummings (eds), Research in Organizational
71: 117–25. Behavior, vol. 12. Greenwich, CT: JAI Press. pp. 295–336.
Mullins, C.W. and Wright, R. (2003) ‘Gender, social networks, Reiss, A.J., Jr. (1988) ‘Co-offending and criminal careers’, in
and residential burglary’. Criminology, 41(3): 813–39. Michael Tonry and Norval Morris (eds), Crime and Justice:
Myers, D.J. (2000) ‘The diffusion of collective violence: A Review of Research. 10: 117–70.
Infectiousness, susceptibility, and mass media networks’. Reuter, P. (1983) Disorganized Crime: The Economics of the
American Journal of Sociology, 106: 173–208. Visible Hand. Cambridge, MA: MIT Press.
Natarajan, M. (2000) ‘Understanding the structure of a drug Rhodes, C.J. and Keefe, E.M.J. (2007) ‘Social network
trafficking organization: A conversational analysis’. Crime topology: A Bayesian approach’. Journal of the Operational
Prevention Studies, 11: 273–98. Research Society, 58(12): 1605–11.
Natarajan, M. (2006) ‘Understanding the structure of a large Robins, G. (2009) ‘Understanding individual behaviors within
heroin distribution network: A quantitative analysis of covert networks: The interplay of individual qualities,
qualitative data’. Journal of Quantitative Criminology, psychological predispositions, and network effects’. Trends
22(2): 171–92. in Organized Crime, 12(2): 166–87.
Oatley, G. (2006) ‘Decision support systems for police: Lessons Romans, S.E., Potter, K., Martin, J. and Herbison, P. (2001)
from the application of data mining techniques to “soft” ‘The mental and physical health of female sex workers: A
forensic evidence’. Artificial Intelligence and Law, 14: comparative study’. Australian and New Zealand Journal of
35–100. Psychiatry, 35(1): 75–80.
Oatley, G.C., Belem, B., Fernandes, K., Hoggarth, E., Sampson, R.J. (1987) ‘Communities and crime’, in Michael R.
Holland, B., Lewis, C., Meier, P., Morgan, K., Santhanam, J. Gottfredson and Travis Hirschi (eds), Positive Criminology.
and Squires, P. (2008) ‘The gang gun crime problem: Beverly Hills, CA: Sage. pp. 91–114.
Solutions from social network theory, epidemiology, cellu- Sampson, R.J. (2003) ‘The neighborhood context of
lar automata, Bayesian networks and spatial statistics’. well-being’. Perspectives in Biology and Medicine, 46(3):
Computational Forensics. New York: Springer. S53–S64.
Oatley, G., Zeleznikow, J., Leary, R. and Ewart, B. (2005) Sampson, R.J. (2004a) ‘Networks and neighbourhoods: The
‘From links to meaning: A burglary data case study’. implications of connectivity for thinking about crime in the
Knowledge-based Intelligent Information and Engineering modern city’, in Helen McCarthy, Paul Miller and Paul
Systems, Part 4, Proceedings. Lecture Notes in Artificial Skidmore (eds), Network Logic: Who Governs in an
Intelligence, vol. 3684. Berlin: Springer-Verlag. Interconnected World? London, UK: Demos. 157–66.
Osgood, D.W., Wilson, J.K., O’Malley, P.M., Bachman, J.G. Sampson, R.J. (2004b) ‘Neighbourhood and community:
and Johnston, L.D. (1996) ‘Routine activities and individual Collective efficacy and community safety’. New Economy,
deviant behavior’. American Sociological Review, 11: 106–13.
61: 635–55. Sampson, R.J. (2006a) ‘How does community context matter?
Papachristos, A.V. (2009) ‘Murder by structure: Dominance Social mechanisms and the explanation of crime rates’, in
relations and the social structure of gang homicide’. Per-Olof Wikström and Robert J. Sampson (eds), The
American Journal of Sociology, 115(1): 74–128. Explanation of Crime: Context, Mechanisms, and
Patacchini, E. and Zenou, Y. (2008) ‘The strength of weak ties Development. Cambridge, UK: Cambridge University Press.
in crime’. European Economic Review, 52(2): 209–36. pp. 31–60.
Pattillo, M.E. (1998) ‘Sweet mothers and gangbangers: Sampson, R.J. (2006b) ‘Collective efficacy theory: Lessons
Managing crime in a black middle-class neighborhood’. learned and directions for future inquiry’, in Francis T.
Social Forces, 76(3): 747–74. Cullen, John Paul Wright and Kristie R. Blevins (eds),
Pearson, M. and West, P. (2003) ‘Drifting smoke rings: Social Taking Stock: The Status of Criminological Theory, vol. 15.
network analysis and Markov processes in a longitudinal New Brunswick, NJ: Transaction. pp. 149–67.
study of friendship groups and risk-taking’. Connections, Sampson, R.J., Raudenbush, S.W. and Earls, F. (1997)
25(2): 59–76. ‘Neighborhoods and violent crime: A multilevel study of
Pepall, L., Richards, D. and Norman, G. (eds) (2008) Industrial collective efficacy’. Science, 277(5328): 918–24.
Organization: Contemporary Theory and Empirical Sarnecki, J. (1990) ‘Delinquent networks in Sweden’. Journal
Applications. 4th ed. Malden, MA: Blackwell. of Quantitative Criminology, 6(1): 31–50.

5605-Scott-Chap17.indd 253 4/6/2011 4:38:31 PM


254 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Sarnecki, J. (2001) Delinquent Networks: Youth Co- Sparrow, M.K. (1991b) ‘Network vulnerabilities and
offending in Stockholm. Cambridge: Cambridge University strategic intelligence in law enforcement’. International
Press. Journal of Intelligence and CounterIntelligence, 5(3):
Sarnecki, J. (2004) ‘Girls and boys in delinquent networks’. 255–74.
International Annals of Criminology, 42: 29–57. Spaulding, C.B. (1948) ‘Cliques, gangs and networks’.
Sarnecki, J. (2009) ‘Delinquent networks: youth co-offending’, Sociology and Social Research, 32: 928–37.
in Hans Joachim Schneider (ed.), Internationales Handbuch Spergel, I.A. (1990) ‘Youth gangs: Continuity and change’, in
der Kriminologie, vol. 2. Berlin: Walter de Gruyter. Michael Tonry and Norval Morris (eds), Crime and Justice:
pp. 995–1023. A Review of Research, vol. 12. Chicago: University of
Schreck, C.J., Fisher, Bonnie S. and Miller, J.M. (2004) Chicago Press. pp. 171–275.
‘The social context of violent victimization: A study of the Stovin, G. and Davies, C. (2008) ‘Beyond the network:
delinquent peer effect’. Justice Quarterly, 21: 23–47. A crime science approach to organized crime’. Policing,
Schroeder, R.D., Giordano, P.C. and Cernkovich, S.A. (2007) 2(4): 497–505.
‘Drug use and desistance processes’. Criminology, 45(1): Sung, H.E., Belenko, S., Feng, L. and Tabachnick, C. (2004)
191–222. ‘Predicting treatment noncompliance clients: A theoretical
Schwartz, D.M. and Rouselle, T. (2009) ‘Using social network and among criminal justice-mandated empirical explora-
analysis to target criminal networks’. Trends in Organized tion’. Journal of Substance Abuse Treatment, 26(1):
Crime, 12(2): 188–207. 315–28.
Shaw, C.R. and McKay, H.D. (1931) Social Factors in Juvenile Surtees, R. (2008) ‘Traffickers and trafficking in Southern
Delinquency. Report on the Causes of Crime, vol. II. and Eastern Europe: Considering the other side of human
Washington, DC: National Commission on Law Observance trafficking’. European Journal of Criminology, 5(1):
and Enforcement. 39–68.
Shaw, C.R., Zorbaugh, F.M., McKay, H.D. and Cottrell, L.S. Sutherland, E.H. (1939) Principles of Criminology. 3rd ed.
(1929) Delinquency Areas. Chicago: University of Chicago Philadelphia, PA: Lippincott.
Press. Sutherland, E.H., Cressey, D.R. and Luckenbill, D.F. (1992)
Shih, H.-Y. and Chang, T.-L.S. (2009) ‘International diffusion Principles of Criminology. 11th ed. Dix Hills, NY: General
of embodied and disembodied technology: A network Hall.
analysis approach’. Technological Forecasting and Social Sweetser, F.L., Jr. (1942) ‘A new emphasis for neighborhood
Change, 76: 821–34. research’. American Sociological Review, 7: 525–33.
Shivy, V.A., Wu, J.J., Moon, A.E., Mann, Shay C., Holland, J.G. Thornberry, T.P. (1987) ‘Toward an interactional theory of
and Eacho, C. (2007) ‘Ex-offenders reentering the delinquency’. Criminology, 25(4): 863–91.
workforce’. Journal of Counseling Psychology, 54(4): Tremblay, P. (1993) ‘Searching for suitable co-offenders’, in
466–73. Ronald V. Clarke and Marcus Felson (eds), Routine Activity
Shoemaker, D.J. (2005) Theories of Delinquency. 5th ed. and Rational Choice. Advances in Criminological Theory.
New York: Oxford University Press. 5: 17–36.
Short, J.F., Jr. and Strodtbeck, F.L. (1965) Group Process and Triplett, R.A., Gainey, R.R. and Sun, I.Y. (2003) ‘Institutional
Gang Delinquency. Chicago, IL: University of Chicago strength, social control and neighborhood crime rates’.
Press. Theoretical Criminology, 7(4): 439–67.
Skeem, J., Louden, J.E., Manchak, S., Vidal, S. and Haddad, E. Tsvetovat, M. and Carley, K. (2007) ‘On effectiveness of
(2009) ‘Social networks and social control of probationers wiretap programs in mapping social networks’.
with co-occurring mental and substance abuse problems’. Computational and Mathematical Organization Theory,
Law and Human Behavior, 33(2): 122–35. 13(1): 63–87.
Smith, M.N. and King, P.J.H. (2002) ‘Incrementally visualising Tutzauer, F. (2007) ‘Entropy as a measure of centrality in
criminal networks’. Proceedings of the Sixth International networks characterized by path-transfer flow’. Social
Conference on Information Visualisation, 2002. Networks, 29: 249–65.
Snijders, T.A.B. and Baerveldt, C. (2003) ‘A multilevel network Valente, T.W. (1995) Network Models of the Diffusion of
study of the effects of delinquent behavior on friendship Innovations. Cresskill, NJ: Hampton Press.
evolution’. Journal of Mathematical Sociology, 27(2–3): van de Bunt, H. (2008) ‘A case study on the misuse of hawala
123–51. banking’. International Journal of Social Economics, 35(9):
Sommers, I., Baskin, D.R. and Fagan, J. (1994) ‘Getting out of 691–702.
the life: Crime desistance by female street offenders’. van der Hulst, R.C. (2009) ‘Introduction to Social Network
Deviant Behavior, 15(2): 125–49. Analysis (SNA) as an investigative tool’. Trends in Organized
Soudijn, M.R.J. and Kleemans, E.R. (2009) ‘Chinese organized Crime, 12(1): 101–21.
crime and situational context: Comparing human smug- van der Poel, A. and van de Mheen, D. (2006) ‘Young people
gling and synthetic drugs trafficking’. Crime, Law and using crack and the process of marginalization’. Drugs-
Social Change, 52: 457–74. Education Prevention and Policy, 13(1): 45–59.
Sparrow, M.K. (1991a) ‘The application of network analysis to van Koppen, M.V., de Poot, C.J., Kleemans, E.R. and
criminal intelligence: An assessment of the prospects’. Nieuwbeerta, P. (2010) ‘Criminal trajectories in organized
Social Networks, 13(3): 251–74. crime’. British Journal of Criminology, 50: 102–23.

5605-Scott-Chap17.indd 254 4/6/2011 4:38:31 PM


CRIME AND SOCIAL NETWORK ANALYSIS 255

van Mastrigt, S.B. (2008) 'Co-offending: Relationships White, H.C. (2002) Markets from Networks: Socioeconomic
withage, gender and crime type'. Ph.D. thesis, University of Models of Production. Princeton, NJ: Princeton University
Cambridge. Press.
von Lampe, K. (2009) ‘Human capital and social capital in Whyte, W.F. (1943) Street Corner Society. Chicago: University
criminal networks: Introduction to the special issue on the of Chicago Press.
7th Blankensee Colloquium’. Trends in Organized Crime, Wild, T.C., Cunningham, J.A. and Ryan, R.M. (2006) ‘Social
12(2): 93–100. pressure, coercion, and client engagement at treatment
von Lampe, K. and Johansen, P.O. (2004) ‘Organized crime entry: A self-determination theory perspective’. Addictive
and trust: On the conceptualization and empirical relevance Behaviors, 31(10): 1858–72.
of trust in the context of criminal networks’. Global Crime, Williamson, O.E. (1975) Markets and Hierarchies: Analysis and
6: 159–84. Antitrust Implications. New York: Macmillan.
Waring, E.J. (1993) ‘Co-offending in white-collar crime: A Xia, M. (2008) ‘Organizational formations of organized crime
network approach’. Ph.D. thesis, Yale University. in China: Perspectives from the state, markets, and
Waring, E.J. (2002) ‘Co-offending as a network form of social networks’. Journal of Contemporary China, 17(54): 1–23.
organization’, in Elin J. Waring and David Weisburd (eds), Xu, J. and Chen, H.C. (2003) ‘Untangling criminal networks:
Crime and Social Organization, vol. 10. New Brunswick, A case study’. Intelligence and Security Informatics,
NJ: Transaction. pp. 31–47. Proceedings. Lecture Notes in Computer Science, vol. 2665.
Warner, B.D. and Rountree, P.W. (1997) ‘Local social ties in a Berlin: Springer-Verlag.
community and crime model: Questioning the systemic Xu, J. and Chen, H.C. (2005a) ‘Criminal network analysis
nature of informal social control’. Social Problems, 44(4): and visualization’. Communications of the ACM, 48(6):
520–36. 100–107.
Warr, M. (1993) ‘Age, peers, and delinquency’. Criminology, Xu, J. and Chen, H.C. (2005b) ‘CrimeNet explorer: A frame-
31(1): 17–40. work for criminal network knowledge discovery’. ACM
Warr, M. (1996) ‘Organization and instigation in delinquent Transactions on Information Systems, 23(2): 201–26.
groups’. Criminology, 34(1): 11–37. Xu, J., Marshall, B., Kaza, S. and Chen, H.C. (2004) ‘Analyzing
Warr, M. (2002) Companions in Crime: The Social Aspects of and visualizing criminal network dynamics: A case study’.
Criminal Conduct. Cambridge, UK: Cambridge University Intelligence and Security Informatics, Proceedings. Lecture
Press. Notes in Computer Science, vol. 3073. Berlin: Springer-
Weerman, F.M. and Bijleveld, C. (2007) ‘Birds of different Verlag.
feathers: School networks of serious delinquent, minor Zhang, S.X. (1998) ‘In search of hopeful glimpses: A critique
delinquent and non-delinquent boys and girls’. European of research strategies in current boot camp evaluations’.
Journal of Criminology, 4(4): 357–83. Crime & Delinquency, 44(2): 314–34.
Weerman, F.M. and Smeenk, W.H. (2005) ‘Peer similarity in Zhang, S.X. (2008) Chinese Human Smuggling Organizations.
delinquency for different types of friends: A comparison Families, Social Networks and Cultural Imperatives.
using two measurement methods’. Criminology, 43(2): Stanford, CA: Stanford University Press.
499–523. Zhang, S.X. and Gaylord, M.S. (1996) ‘Bound for the Golden
White, H.C. (1981) ‘Where do markets come from?’ American Mountain: The social organization of Chinese alien
Journal of Sociology, 87: 517–47. smuggling’. Crime Law and Social Change, 25: 1–16.

5605-Scott-Chap17.indd 255 4/6/2011 4:38:31 PM


18
Terrorist Networks: The
Threat of Connectivity
Renée C. van der Hulst

Extremism and terrorism are ever evolving exploited to create fear in order to further political
problems in our society. Terror is used as a or ideological objectives. The ‘fourth generation’
weapon to achieve goals and, not surprisingly, the of terrorists threatening our society today, for
associated opportunity structures often reside in example, is motivated by fundamental interpreta-
socially embedded networks. It has become top tions of a religious identity. Most recently at the
priority all over the world to make every effort to forefront is the stream of violent attacks under the
prevent future terrorist attacks. To further this umbrella of Islam as a religion (Rapoport, 2003).
cause, the systematic analysis of (terrorist) In the early twenty-first century the world is faced
networks, the associated relational structures and with horrific acts of terror, justified by the ‘holy
exchange of resources (e.g. information, skills, battle of jihad’, that have ravaged places all over
money or weapons) are assumed to provide key the world and killed thousands of innocent people.
leads. Contrary to most social networks that are Who doesn’t remember the airplanes that were
the objects of study in this field, however, the hijacked and crashed in the United States on
networks associated with terrorism are inherently September 11, 2001 (9/11), or the bombings that
covert. This calls for a sophisticated array of took place in Bali (Indonesia, 2002), Casablanca
research methods and tools to improve our (Morocco, 2003), Madrid (Spain, 2004), London
ability to detect, prevent, and respond to terrorist (United Kingdom, 2005) and most recently
events. The objective of this chapter is to review Mumbai (India, 2008) to name a few. Ever since
the international literature of terrorism research the tragedy of 9/11 the battle against terrorist
for applications of social network analysis (SNA). crimes has intensified and has become the top
What do we know and where is it heading? This priority all over the world.
chapter illustrates how the network paradigm is The focus in this chapter is to study terrorism
applied to the terrorism domain, evaluates the from a social networks point of view. A social
state of the art of research, critically reflects on network is defined as a collection of actors (e.g.
the developments and explores some future persons, groups, organisations) and relations
directions. between actors (connections, activities)
(Wasserman and Faust, 1994). With the exigency
to gain a better understanding of the rise and
functioning of terrorist networks (including asso-
IN THE NAME OF GOD ciated radical or extremist movements), the need
for advanced methods, information technologies
Although an internationally agreed-upon defini- and analytical tools increased accordingly. As
tion of terrorism is currently still lacking, most early as two decades ago, Sparrow (1991b: 251)
definitions emphasise that terrorist acts involve emphasised that law enforcement and intelligence
violent and aggressive methods, deliberately agencies were quite behind and ‘relatively

5605-Scott-Chap18.indd 256 4/7/2011 4:54:32 PM


TERRORIST NETWORKS: THE THREAT OF CONNECTIVITY 257

unsophisticated in their use of analytic tools and The global threat of terrorism
concepts’, in particular with regard to the
academic discipline of SNA. Although SNA has A popular idea among mainstream terrorism
been an approved research method in many disci- experts nowadays is that globalisation prompted
plines (e.g. in sociology, business management, organisations to change their traditional (hierar-
biology), it was only after 9/11 that the method chical) modus operandi into decentralised, self-
gained serious interest for applications in the governing project teams in order to work more
intelligence and security domain. Major research efficiently (Arquilla and Ronfeldt, 2001). The idea
programmes were launched, generated by of decentralised systems and semi-autonomous
abundant funding, and academics from various project teams has circulated in business manage-
disciplines joined efforts to tackle the global secu- ment ever since the 1980s and 1990s (see Borgatti
rity problem by way of advanced information and Foster, 2003; Rothenberg, 2001). The ten-
technologies and analysis tools. In particular the dency for terrorist organisations to be organised
recent influx of physicists, biologists, computer and regarded as networks (i.e. cellular structures
scientists, artificial intelligence researchers, rather than hierarchies), however, is relatively
engineers and military operations researchers new. In particular the scale-free ‘hub-and-spoke’
resulted in an increased emphasis on examining structures appear to meet with general approval to
very large networks (e.g. the Internet), network characterise terrorist organisations previously
dynamics, and their resilience to attacks (Carley, assumed to operate hierarchically (Barabási and
2003; Stohl and Stohl, 2007). Despite these devel- Albert, 1999; Watts, 1999; Zanini and Edwards,
opments, most of the work in this area is still in its 2001; Qin et al., 2005).
infancy. In the following section we will evaluate Hub-and-spoke networks are efficiently organ-
the general line of thought around networks as it ised structures of connected cells that are resilient
evolved over the last decade within the domain of to disruption. There is no fixed arrangement
counterterrorism. of human resources among cells but they are
likely to entail structurally equivalent roles (e.g.
ideological leaders, strategic leaders, resource
concentrators and specialised experts) (Tsvetovat
THE DISCOVERY OF STRUCTURE and Carley, 2005). Operational knowledge and
communication among cells is kept to a minimum
Most processes of radicalisation, indoctrination, based on a ‘need-to-know’ principle. Actors, ties,
attitude formation, terrorist plots, and collective and cells are all redundant in the sense that
action rise, evolve and develop in relation to information, materials and other resources have
others (Borum and Gelles, 2005; Dean, 2007; alternative routes to travel through the network
Ressler, 2006; Sageman, 2004, 2008). Based (i.e. the loss of one actor or cell is easily replaced
on this, the systematic analysis of relational by taking over operational activities by another).
structures is a ‘sine qua non’ to a more thorough The cell leaders however, are most likely to be
understanding of terrorist behaviour (Koschade, senior members, are often part of multiple cells
2006; Schwartz and Rouselle, 2008; Stohl and and are more knowledgeable than other members
Stohl, 2007). Although the importance of social (Carley et al., 2001).
networks in relation to terrorism is frequently The majority of actors in these networks have
emphasised, studies on terrorism have predomi- limited links and communicate or exchange
nantly focussed on individual (i.e. micro-level) resources through a limited number of highly
and the socio-, cultural- or political (i.e. macro- connected actors. These highly connected actors,
level) conditions associated with terrorism. also referred to as hubs, reduce the chain of com-
Despite the fact that more and more people from mand (i.e. lower the average path length) between
various disciplines have entered the network any two nodes in the network (e.g. leaders and
arena, systematic and empirical social network followers). In essence, they coordinate activities
studies of terrorism remain extremely scarce1 in the absence of a central control hierarchy. Since
(according to the academic literature). Either the network as a whole still remains sparse,
lacking the analytical skills or the appropriate data terrorist plots may remain inconspicuous because
and domain expertise, much of what we find in the of their low density, and the impact of random
literature on terrorist networks is theoretical disruptions is likely to be limited because the
discourse. Moreover, different views of terrorist network lacks central leadership. The elimination
networks appear to compete for validation whereas of the hubs, on the other hand, can cause major
they are in fact complementary to each other. disruptions to the network even if the hubs are not
The following sections outline two streams of the actual leaders.
thinking: one focuses on the global threat and the It is generally assumed that due to their
other focuses on the local threat of terrorism. increasing dispersed and scale-free cellular

5605-Scott-Chap18.indd 257 4/7/2011 4:54:33 PM


258 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

characteristics, groups or movements such as The small and self-organised groups lack a
Al Qaeda have become less vulnerable to detec- formalised and central coordination system.
tion or disruption. Although scale-free networks Actors often gain access through the Internet2
are popular among intelligence analysts, Tsvetovat to span different geographic boundaries, share
and Carley (2007: 76) argued that they do not fit information, reinforce ideology, and coordinate
well with reality as it is not just the hubs but also activities to achieve mutual goals (e.g. recruit,
local dense cells that continue to provide connec- motivate and mobilise young members, conduct
tivity when hubs are removed (i.e. the networks illegal activities, and solicit funding) (Chen, 2006;
are resilient because they also exhibit small-world Coates, 1996). They operate leaderlessly by way
properties) (see Milgram, 1967; Watts, 1999). of their shared ideology or religion, with the
Tsvetovat and Carley (2005) refer in this respect network being governed by strong, informal, and
to the safety net of ‘sleeper links’: non-operational trusted relationships rather than by hierarchical
ties from one cell to the other cell (e.g. family ties) organisational structures. Still, locally connected
that are mainly used for coordinating actions conspiracies may actively search for links
and are rarely activated. Within cells, only few to global terrorist organisations on their own
members would have such links. initiative (i.e. bottom-up in addition to top-down
recruitment). Moreover, although decentralised in
its operations, terrorist cells may turn out to be
semi-autonomous and receive peripheral support
Local threats from within through funding or direction (Borum and Gelles,
2005; Rothenberg, 2001).
The global rise of terrorist organisations, such as
Al Qaeda, is partly sustained by their ability to
appeal to Muslims all over the world, irrespective A continuum of clandestine
of their nationality (Rothenberg, 2001; Tsvetovat networks
and Carley, 2005). As conglomerates, terrorist
organisations do not necessarily have to coordi- All in all, the debate around terrorist networks is
nate activities. Individual actors and groups, characterized by a growing awareness of the
irrespective of where they are, are free to operate ‘need’ for decentralised structures, but it is not a
‘on behalf’ of the global jihad (or organisation). matter of rigorous categories: terrorist networks
Indeed, many terrorist conspiracies in Western come in many different forms that are not mutu-
Europe are self-organised and develop locally and ally exclusive. Governance structures can vary
are decentralised. Garfinkel (2003) referred to from hierarchical to decentralised systems, and
‘leaderless resistance’ to delineate the threat of a the scope of activities can be either local (i.e.
new generation of small, dispersed clandestine relating to a particular area or region) or global
networks and cells (not limited to religiously (i.e. involving the entire world). Moreover, both
motivated terrorism) that lack a formal hierarchi- governance and the scope of activities can change
cal command structure. Later on, Sageman (2008) over time. The Al Qaeda network of Osama
used the term leaderless jihad to catch the idea bin Laden, for example, has evolved from a hier-
of dispersed cellular Islamist terrorist structures of archical military local movement of mujahedin
self-organised, home-grown wannabes. (fighting the Russian occupation in Afghanistan)
Inspired by the globalisation of terror, local to a global ideological movement and infrastruc-
networks radicalise with their members willing to ture that supports a variety of self-organising
exploit equivalent, and sometimes fatal, acts of actors (Borum and Gelles, 2005: 470).
violence (e.g. the killing of the Dutch filmmaker It is not just the misspecification of network
Theo van Gogh in Amsterdam in 2004). boundaries (Stohl and Stohl, 2007: 108) but also
Perpetrators become inspired to commit violent the lack of differentiation between terrorist
acts by what they read and see rather than being networks that may compromise the usefulness of
recruited by a terrorist organisation and receiving the social network metaphor for combating terror-
orders to commit crimes and violent terrorist acts ism. After all, different networks have different
(Sageman, 2004). Tsvetovat and Carley (2007) implications in terms of intelligence strategies
characterise these networks as relatively small and counterterrorism policies. To overcome this
cells (6 to 10 actors) that are well manageable problem, we propose a continuum of clandestine
based on their size. Within cells, group members networks that explicitly distinguishes between
are like-minded, share strong religious or governance structures (horizontal axis: decentral-
ideological bonds, are in close physical proximity ised v hierarchical) and the scope of activities
to each other (e.g. share living arrangements), and (vertical axis: local v global), where terrorist
are able to substitute for each other (i.e. they are networks can be plotted as ‘coordinates’ on the
structurally equivalent) (Sparrow, 1991b). continuum. The two-dimensional ‘radar’ spheres

5605-Scott-Chap18.indd 258 4/7/2011 4:54:33 PM


TERRORIST NETWORKS: THE THREAT OF CONNECTIVITY 259

Global

Decentralised Hierarchical

Local

Figure 18.1 The two-dimensional ‘radar’ spheres of clandestine networks

(TDRS) of terrorist or any clandestine networks is characterised by strong, historical or social bonds)3
presented in Figure 18.1. (Krebs, 2001; Sageman, 2004; Tsvetovat and
Carley, 2005, 2007; Qin et al., 2005). Likewise,
people are also more likely to be influenced by
their close friends and associates, which is consid-
Balancing needs through ered the main reason why actors’ beliefs, social
structure: The efficiency/security norms, attitudes, and behaviours become more
trade-off homogeneous in dense networks over time
(Borgatti and Foster, 2003; Friedkin and Johnsen,
The TDRS coordinate in and of themselves do not 1999). In particular strong transitive ties (i.e. the
necessarily characterise network structure. It is tendency of friends of friends to become friends)
very likely, however, that clandestine networks may reinforce an actor’s willingness to participate
who find themselves in a particular sphere share in costly, risky or controversial behaviour (Centola
identical features and regularities (or profiles) in and Macy, 2007).
their social structures. The thing is that social Such dense, cohesive affiliation networks are
networks are not disorganised but develop and generally characterised by high redundancy, trust
evolve based on socio-dynamic and psychological and social support (Lin et al., 2001). Loosely
processes (e.g. opportunity structures, selection connected brokerage networks, on the other
preferences, and social influence). So far, network hand, are characterised by structural holes, non-
research on terrorism tends to neglect combining redundancy and more competitive information
the explanatory mechanisms related to analytical benefits (see Burt, 1992, 2005; Granovetter, 1973).
metrics (that are in essence based on such theo- Indeed, both types of structures have different
ries), whereas such processes may well be contin- functional implications in terms of operational
gent to different types of governance structures or efficiency and secrecy (Erickson, 1981; Kadushin,
the scope of terrorist activities. 2002; Krebs, 2001; Morselli et al., 2007;
According to homophily theory (see McPherson Rothenberg, 2001; Stohl and Stohl, 2007). Dense
et al., 2001), for example, people are more likely cohesive networks facilitate coordination within
to initiate contact with other people who share the group, increase group compliance, are less
similar characteristics (e.g. religion, nationality, likely to be infiltrated by outsiders, and are
background) and who are in close social or difficult to destabilize. The trusted ties promote
spatial proximity to them (e.g. within training security within but are vulnerable upon detection
camps, mosques). Moreover, the importance of since it takes only one actor to release critical
trust is one of the main reasons why terrorists information about many others (Xu et al., 2004).
recruit mainly among their own nationalities, Brokerage, on the other hand, promotes the dis-
families, friends and religious circles (sometimes semination of new information and resources

5605-Scott-Chap18.indd 259 4/7/2011 4:54:33 PM


260 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

across groups or social circles, which creates ben- communication, propagate new information, and
efits and change. Although at higher risk for play important roles to coordinate terrorist attacks
betrayal and infiltration, such loosely connected (e.g. by supplying chemicals, weapons, forged
networks may be more difficult to trace and are documents or other resources).
able to respond more flexibly to change. Researchers have to be cautious, however, not
Clandestine networks somehow need to balance to overestimate the importance of centrality. The
between the efficiency, flexibility and security meaning attached to this measure may not be
requirements for their operations. The systematic straightforward and can be contingent upon the
analysis of affiliation, communication and activity type of network (e.g. hierarchical or decentral-
patterns in radical or terrorist networks may help ised) or data (Carley et al., 2001). Moreover, key
to understand and predict the behaviour of these leaders and suicide terrorists (i.e. ‘sleeper cells’
social systems and to identify their weak spots. preparing for action) may prefer to keep a low
profile and operate in the periphery of a larger
network. To keep connected to the main body of
the network they may be relying on liaisons (e.g.
THE STUDY OF SOCIAL STRUCTURES high central actors) and only coordinate actions
when necessary (see Chen, 2006; Krebs, 2001;
Tsvetovat and Carley, 2007). Adding to this,
For decades, traditional link analysis has been
Borgatti (2006) argued that traditional measures
used in the law enforcement and intelligence
such as centrality (or even cutpoints and cutsets)
domains to visually map clandestine structures
do not provide optimal solutions in certain
(Harper and Harris, 1975; Klerks, 2001; Schroeder
problem scenarios. For counterterrorism purposes,
et al., 2003). Social network analysis (SNA) adds
for example, one may want to target an optimal set
to this that structural patterns are modelled
of actors and not actors who would be optimal
mathematically, providing a variety of quantified
targets if isolated individually based on their
metrics of network activity, positions, power,
centrality ranks. Moreover, he argues, there is
dependency and social roles (Wasserman and
a difference between maximal disruption or frag-
Faust, 1994). Sparrow (1991a, 1991b) was about
mentation of a network by neutralizing actors (i.e.
the first to emphasise the importance of network
key player negative) and maximal diffusion
analysis to (criminal) intelligence. Other scholars
or gathering of information for preventive or intel-
have endorsed this view and postulate SNA as a
ligence purposes (i.e. key player positive).
sophisticated array of tools that can help unravel
Ideally, the qualities associated with actors
clandestine networks and improve the ability to
(e.g. their abilities), ties (e.g. their nature or
detect, prevent, and respond to terrorist events
duration) and resources (e.g. uniqueness) should
(Asal and Rethemeyer, 2006; Carley et al., 2001,
be taken into account in studying terrorist
2007; Chen, 2006; Koschade, 2006; Reid et al.,
networks (Sparrow, 1991b; Tsvetovat and Carley,
2004; Ressler, 2006; Van der Hulst, 2009a).
2007). Borgatti (2006) emphasised the need to
incorporate actor attributes into the key player
metrics to make fragmentation (or information)
Typical actors of importance dependent on both network position and particular
traits of the involved actors. Building on the key
One of the most frequently reported metrics in player problem, Schwartz and Rouselle (2008)
social network research is actor centrality proposed two core concepts for the analysis of
(Bonacich, 1972; Burt, 1992; Freeman, 1979). covert networks: (1) network capital (NC) for
Actor centrality is used as a measure relative optimised fragmentation, and (2) intelligence
importance to infer social control. Terrorists may worth (IW) for optimised information gathering.
be of influence in a network or plot, for example, Both measures are based on actors’ centrality and
because they are active players connected to many the propensity to share resources, while addition-
people (i.e. degree centrality), because they are ally taking into account the actual resources of
able to quickly access or diffuse information and actors (for NC), and the actual information gaps
resources to and from the network (i.e. closeness and tie strength between actors (for IW).
centrality), because they can bring people together
and control the flows of communication and
resources between otherwise disparate parts of the Typical tasks, roles, and resources
network (i.e. betweenness or max-flow centrality), of importance
or because their neighbours are well positioned
(i.e. eigenvector centrality). In particular actors Although meant to come by surprise, terrorist
who frequently broker connections are in attacks are far from random and generally require
powerful positions: they can control the flow of careful planning, preparation and coordinated

5605-Scott-Chap18.indd 260 4/7/2011 4:54:33 PM


TERRORIST NETWORKS: THE THREAT OF CONNECTIVITY 261

Planning

Target
Strategic selection Ideological
leader leader S
u
r
C Funding v s
o e e
n Advisors Advisors i c
t l u
Intelligence l r
r i
a
o n t
l (Military) c y
Recruitment Preparation Action e
training
&

Material
Transport ICT
support

Resource Specialised
concentrators experts

Cooperation (community)

Figure 18.2 Script of key tasks and roles of a terrorist plot

effort of multiple, interrelated actors. Identifying alone focus on the various processes involved in a
the elementary (sequence of) segments of a terror- terrorist plot. The meta-matrix, proposed by
ist plot (e.g. key tasks, roles, and activities), and Carley and associates, is considered as an excep-
associating these patterns to perpetrators will tion. Carley et al. (2001) argued that if centrality
allow a more thorough understanding of logistics, measures are used as a lead to disrupt networks
opportunity structures, and terrorist strategies (e.g. to limit information flows or general task
(cf. Cornish and Clarke, 2002). Figure 18.2 illus- performance) or to identify emergent leaders (e.g.
trates a hypothetical scenario of a terrorist plot actors close to the original leader in terms of task,
from planning, to recruitment, to facilitating activ- knowledge and resource networks), multiple
ities, to the actual operation. networks should be considered simultaneously
The rectangles in Figure 18.2 represent tasks (see also Moon and Carley, 2007). The meta-
and are distinguished in a ‘plan’ and ‘do’ segment matrix serves as a good example and combines
(see also Rothenberg, 2001: 37 who distinguishes information from multiple classification systems
between these two categories of people). The (e.g. actors along with their knowledge, attributes,
ellipses represent essential roles as distinguished resources, tasks or events, group membership,
by Tsvetovat and Carley (2007: 68)4: ‘ideological roles, actions and locations).
(often charismatic) and strategic leaders’,
‘advisors’, ‘resource concentrators’ and ‘special-
ised experts’. If the systematic analysis of terrorist Dynamic network analysis
cells or networks could be associated to such key
tasks and roles (including demographical, socio- By and large, one of the major drawbacks of SNA
psychological, cultural and contextual factors), is that it treats networks as static systems whereas
this may offer rich clues about the functioning of they are fluid and subject to change. Three clus-
actors and groups. Most studies that report on ters of methods are distinguished to examine
terrorist networks, however, do not even distin- dynamic networks: descriptive, mathematical and
guish between different types of relationships, let simulation studies (Borgatti and Foster, 2003).

5605-Scott-Chap18.indd 261 4/7/2011 4:54:33 PM


262 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The least sophisticated way is to compare network have demonstrated this (e.g. Arquilla and Ronfeldt,
properties over time in a descriptive manner. More 2001; Sageman, 2004, 2008). In the absence of
sophisticated are mathematical studies, such as actual network metrics, however, most of the work
exponential random graph or p* models (see remains limited to the discussion of social
Robins, this volume), that allow the testing networks as a paradigm, some theoretical argu-
of hypotheses. These studies estimate model ments, or basic qualitative analysis. The same
parameters from data and evaluate how well goes for the academic network literature, where
these parameters fit with observed data (see also the majority of papers is essentially descriptive
Snijders et al., 2010). Agent-based simulation (but limited) or outline the potential value of SNA
studies, finally, model actors as strategic rational to study clandestine networks. The actual number
decision-makers (referred to as agents) who act to of empirical studies (at least those that are
maximise utility. Agents can learn from prior publicly available) remains sparse and few studies
events and the choices of multiple agents deter- actually test hypotheses (Contractor and Monge,
mine how the network evolves (Tsvetovat and 2004). Critical of this development, Asal and
Carley, 2007). Only recently, the development of Rethemeyer (2006: 68) described the domain
more advanced statistical tools and computational as much theory building with little empirical veri-
techniques has increased the interest in SNA fication. In fact, SNA research in the domain of
applications from the law enforcement and terrorism is overwhelmingly concentrated on
intelligence domains (Carley, 2004; Stohl and the development of advanced algorithms and
Stohl, 2007).5 Certainly, information on the integrated software systems.6 Evaluating what is
research efforts from the intelligence domain is state of the art, Ressler (2006) emphasised quite
not likely to be made public. So what do we really keenly that other than the work of Carley and
know about the structural properties of terrorist associates (CASOS, Carnegie Mellon University)
networks? the complex modelling of terrorist networks is
rather limited. Without the pretension of being
exhaustive we will review some fundamental
research findings known from the international
WHAT DO WE KNOW? literature.

There are essentially two kinds of researchers who


study terrorist networks: operational analysts with Empirical analysis
domain expertise (i.e. investigators on the job),
and scientific researchers with the expertise to Applications of social network analysis in the
model behaviour (i.e. academics) (Ressler, 2006; counterterrorism domain appear to still be in its
Schroeder et al., 2003). Both deal with unavoida- infancy, but the topic raises a lot of interest (if not
ble collection biases. In the former category inves- adrenaline) from researchers along with the need
tigations start with a prime suspect and little by for advanced methodological development. Some
little the ego-network of a suspect is mapped studies that are found in the academic literature
inside-out. The drawback of this method, known are more exploratory, somewhat speculative and
as snowball sampling, is that it is biased towards less sophisticated in their analysis than others.
highly connected actors, which may lead to wrong Most of the work relies heavily on publicly avail-
perceptions of the core-periphery structure of a able sources, such as media reports, and varies in
network (DSTL, 2004). The latter category is scope. Based on the co-occurrence of names of
biased mostly because they lack access to restricted terrorist organisations or cross-links of Web sites
data and integrated datasets (Reid et al., 2004). As on the Internet, for example, network metrics are
a result, research on terrorist networks relies to a used to identify key ideological groupings or
great extent on open data sources, such as archival clusters of hate groups and activist organisations
data that provide information of terror incidents (Basu, 2005; Chen, 2006; Garfinkel, 2003).
(e.g. court documents, indictments, testimonies) Memon et al. (2008) used publicly available data
or media reports (Baker and Faulkner, 1993; of the train bombings in Madrid (2004) and on the
Krebs, 2001; Sageman, 2004). However, these London tube (2005) to explore and illustrate how
sources are likely to be incomplete if not wrong, critical actors from online sources such as the
and most scientists lack the required domain Internet can be detected. According to Jordán
expertise to interpret their results. This is probably (2008), a social network analysis of maps of
one of the reasons why systematic and empirical the London underground suggested that the bomb-
studies of terrorist networks, at least those that are ings in 2005 may have been chosen to cause
publicly available, are extremely scarce. maximal damage to the transport system as a
Domain experts are increasingly aware of the critical infrastructure (i.e. by blocking the shortest
importance of networks, and compelling books pathways).

5605-Scott-Chap18.indd 262 4/7/2011 4:54:33 PM


TERRORIST NETWORKS: THE THREAT OF CONNECTIVITY 263

Other analyses are more typical to descriptive centrality metrics, provided the network with
case studies. Based on secondary analysis, for access to valuable and unique resources (e.g. state
example, the four major terrorist groups of the secrets, document forgery, international training
Global Salafi Jihad (GSJ) (N = 364) (as identified camps, and links to another terrorist cell). One
by Sageman, 2004) were all found to be scale-free of the women (i.e. the wife of one of the core
networks (Chen, 2006; Qin et al., 2005). The few members) stood out as well as being in a position
high-degree and between-central actors were to play an important brokering function in the
positively identified by domain experts as the GSJ network.
leaders of the four geographical ‘clumps’, and
block-modelling analysis identified coordinators
between Osama bin Laden and these four clumps. The 9/11 hijacking plot
In addition to the GSJ leaders, the immediate Probably the most cited analysis, however, is the
associates and coordinators of the leaders (i.e. the one by Krebs (2001, 2002) who became renowned
‘lieutenants’) were also high between central. for being the first to examine the 9/11 hijacking
Interestingly, 65 per cent of the ties among leaders network using SNA metrics based on information
were characterised as strong and trusted (e.g. gathered from open sources (newspapers). This
family, friends) as opposed to only 38 per cent of section provides a comprehensive summary of the
the ties among leaders and followers. The impor- main results. The four airplanes that crashed in
tance of weak ties was also emphasised by the United States on September 11, 2001 involved
Rodríguez (2004), who explored the social 19 hijackers who were linked to Al Qaeda. They
network underlying the Madrid bombings. were highly connected through trusted prior con-
A sophisticated analysis was performed on the tacts, had probably bonded after completing a
Jemaah Islamiyah terrorist network responsible training camp in Afghanistan, and had shared
for the Bali bombings (October 2002) by Koschade living arrangements, P.O. boxes, credit cards and
(2006). Compared to findings about the 9/11 phone numbers. Some attended the same college,
hijackers (N = 19, density 16 per cent) (Krebs flight school or training camp, and some were tied
2001, 2002 – see following section), the Jemaah by kinship (Jonas and Harper, 2006). To remain
Islamiyah network was much more cohesive secret, however, the strong ties between members
(N = 17, density 43 per cent).7 Two dense clusters of disparate cells were rarely active once
were involved with activities that required consid- the hijackers were in the United States (Krebs,
erable coordination: the bomb construction team 2001: 49).
(plan A) and a support team to be called on for The core network (N = 19, k = 54) had a
assistance when necessary (plan B). Both the field density of 16%, a clustering coefficient of 0.41,
and the logistic commanders (i.e. Samudra and and an average path length of 4.75. When dormant
Idris) were by far the most central actors of the cross-ties were taken into account (i.e. temporary
network (measured by standardised degree, sleeper links to coordinate activities) (k = 66), the
betweenness, and closeness centrality). Overall, average path length dropped from 4.75 to 2.79.
the network was quite centralised around the Krebs used datasets of different size: one of the
bombing operation, with the support team and two ‘entire plot’ (N = 63) and a smaller segment of the
support actors being kept relatively isolated from core of the operation (i.e. hijackers and their direct
the core. associates) (N = 37). The average actor centrality
A secondary analysis of the Dutch Hofstad and group centralisation for both networks are
network (Van der Hulst, 2009b) identified the core presented in Table 18.1.
of the network (N = 13) to be highly cohesive. All
actors who made an assault on people’s lives
(or prepared for action) – as well as the Syrian Table 18.1 Average actor centrality and
fugitive and alleged ideological leader of the group centralisation of the 9/11 plot
group, Al Issa – were highly central in terms of
degree, closeness, betweenness and eigenvector Bigger Core of
and flow betweenness. Most central were the plot operation
actors involved in recruitment and propaganda (N = 63) (N = 37)
activities. Advisers and facilitators who were
involved in criminal activities were operating on Degree centrality 0.081 0.128
the periphery of the network. Interestingly, actors Betweenness centrality 0.032 0.046
who were central in all centrality metrics except Closeness centrality 0.352 0.393
for brokering (i.e. betweenness or flow between- Degree centralisation 0.289 0.306
Betweenness centralisation 0.565 0.296
ness) were sympathisers and provided services to
Closeness centralisation 0.482 0.372
the core (e.g. housing). The reverse, actors who
were brokers but who were not central in the other Source: From Krebs (2001, 2002)

5605-Scott-Chap18.indd 263 4/7/2011 4:54:33 PM


264 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Table 18.2 Centrality metrics of 9/11 hijackers, direct and indirect associates
(ID) Actor centrality Degree (rank) Betweenness (rank) Closeness (rank)

N = 63 N = 37 N = 63 N = 37 N = 63 N = 37
a
33 - Mohammed Atta 0.361 0.417 0.588 0.318 0.587 0.571
(1) (1) (1) (2) (1) (1)
40 - Marwan Al-Shehhia 0.295 0.389 0.088 0.158 0.466 0.500
(2) (2) (7) (4) (2) (4)
46 - Hani Hanjoura 0.213 0.278 0.126 0.227 0.445 0.507
(3) (3,4,5) (5) (3) (3) (3)
55 - Nawaf Alhazmi 0.180 0.278 0.154 0.334 0.442 0.537
(4,5) (3,4,5) (4) (1) (4) (2)
21 - Essid S.B. Khemais 0.180 – 0.252 – 0.433 –
(4,5) (2) (7)
15 - Zacarias Moussaoui 0.131 0.056 0.232 0.000 0.436 0.371
(13) (34) (3) (36) (5,6) (22)
25 - Ramzi bin Al-Shibh 0.164 0.222 0.048 0.010 0.436 0.414
(6,7) (6) (9) (19) (5,6) (12)
41 - Ziad Jarraha 0.164 0.278 0.017 0.076 0.424 0.480
(6,7) (3,4,5) (17) (8) (9) (5)

The metrics are based on the top five central actors for the core (N = 37) and the bigger plot (N = 63). The relative
rankings in centrality are between brackets.
a
Identified as a pilot of one of the hijacked airplanes.
Source: From Krebs (2001, 2002)

Although the reported analyses did not include with Bin Al-Shibh was an active player in both the
standardised measures (which makes it difficult bigger plot and the core operation. These findings
to compare between groups) the findings suggest are consistent with publicly available sources that
that, on average, actors in the core were more state that Bin Al-Shibh and Moussaoui intended to
central than in the bigger plot. Interestingly, the take part in the 9/11 plot as pilots. Bin Al-Shibh,
bigger plot was more dominated by a single few however, failed to obtain a visa to enter the United
actors in terms of coordination (i.e. closeness States and continued to facilitate between the 9/11
centrality) and connecting segregated parts of the operatives and Al Qaeda leaders in Afghanistan
network (i.e. betweenness centrality). A summary and Pakistan. Moussaoui was arrested three weeks
of actor centralities (with relative rankings prior to the attacks. Essid S.B. Khemais is believed
between brackets) is presented in Table 18.2. to have supervised a regional network of Al Qaeda
Both analyses consistently identified three of operations in Europe (Global Security).8
the four pilots (Mohammed Atta, Marwan Over the years, various other studies of the 9/11
Al-Shehhi and Hani Hanjour) and Nawaf Alhazmi network appeared and were based on some variant
(senior operative and considered second-in- of the Krebs dataset. Some added network metrics
command to Mohammed Atta) in the top five of that were not presented in earlier work; others
key central actors. Mohammed Atta seems to be explored new algorithms and illustrated results
even more between central in the bigger, perhaps (for matters of convenience, the analyses are not
planning, plot than in the core of the operation. reported) (Brams et al., 2006; Latora and
The centrality of other actors also varied with Marchiori, 2004; Shaikh et al., 2007; Qin et al.,
network size. Ziad Jarrah (the fourth pilot), for 2005). The majority of studies, however, serve
example, was more central in the core but less so exploratory purposes or illustrations and do not
in the bigger plot. The reverse holds for Essid elaborate much about the results. Some are even
Sami Ben Khemais, Ramzi bin Al-Shibh and incomplete and focus on visualisations without
Zacarias Moussaoui, who were quite central in the full reports of the network metrics. Moreover, dif-
bigger plot but far from central to the core of ferent criteria (not reported) are used for boundary
the operation. Interestingly, Moussaoui and specification. Broadly speaking, most findings are
Bin Al-Shibh appeared to coordinate activities quite consistent with the ones reported by Krebs
and broker connections in the bigger plot only, (2001). The problem with most studies is,

5605-Scott-Chap18.indd 264 4/7/2011 4:54:33 PM


TERRORIST NETWORKS: THE THREAT OF CONNECTIVITY 265

however, that the data used in the analysis are of 64 per cent to infer network topology and pre-
based on media reports that are not complete, and dict terrorist links. Based on these findings the
the results cannot be tested for their validity or authors emphasise that the inference of network
reliability. The study of Qin et al. (2005) appears topology can assist in strategic and tactical deci-
an exception with analysis based on more pro- sion making (e.g. to prioritise intelligence and
found qualitative data material of Sageman (2004). deploy assets).
Their analysis of the first order 9/11 network iden-
tified Osama bin Laden as the most influential
actor (i.e. in terms of betweenness centrality) and Effective intelligence strategies
Ayman Al-Zawahiri – bin Laden’s chief deputy Tsvetovat and Carley (2007) performed simula-
within the Al Qaeda movement – as the most tion experiments to evaluate the effectiveness of
active (i.e. in terms of degree centrality). Although intelligent wiretapping strategies (e.g. based on
the analysis results seem to identify key members metrics of degree and betweenness centrality).
of the terrorist plot, media attention may have The goal was to optimise the breadth and
been selective towards the pilots and Al Qaeda accuracy of network identification at the lowest
leaders. On the other hand, be this as it may, parts possible costs in terms of intelligence resources.
of the analyses support information about actors SNA-based sampling turned out to be more
in such a way that it may offer good starting points effective than snowball or random sampling, with
and leads to further investigation. After all, intel- the best outcomes generated when combined with
ligence will not only provide investigative leads the content of communications (e.g. central in
but also ‘squeeze’ more out of information that is cognitive demand and knowledge exclusivity).
readily available but would otherwise be over-
looked. Nevertheless, one needs to be reminded
that SNA can never change the quality of data that Signal change
serves as input to the analysis. More recently, McCulloh and Carley (2008)
presented an interesting study that combined SNA
with statistical process control charts to detect
significant changes in communication networks as
Practice-based simulation an alert system to possible signals of threat. The
experiments technique successfully signalled network change
in communication links between Al Qaeda
All 19 hijackers later appeared to be within two members (1988–2004), with the initial root of the
steps of Al Qaeda members who had been targeted tragic events of 9/11 being traced back to 1997
by the CIA well over a year before the 9/11 (i.e. the reunification of Al Qaeda leader Osama
attacks occurred (Dryer, 2006). Given that hind- bin Laden, and Ayman Al Zawahiri, leader of
sight examining (with known perpetrators, modus Egyptian Islamic Jihad).9
operandi, and targets) is relatively easy, Jonas and
Harper (2006) questioned whether the mere use of
innovative technology would have been able to
prevent the 9/11 attacks. To what extent can SNA Methodological issues
actually be used to detect hidden structures, Specific methodological problems have been
improve on intelligence strategies or signal change emphasised extensively in the academic literature.
that can serve as an early warning system? We These relate, for example, to data access, data
briefly discuss some studies. quality (e.g. open sources), the validity of results,
boundary specification, inevitable missing data,
correlated measures, network changes, statistical
Identify missing links assumptions and scaling in relation to network
One of the main problems to combat terrorism is size (Carley, 2004; Reid et al., 2004; Sparrow,
that actors may not be discovered even though 1991b; Stohl and Stohl, 2007; Van der Hulst,
they are in fact key players of a terrorist plot. 2009a). The boundary specification problem may
Moreover, for social network analytical purposes, be of particular concern when studying clandes-
incomplete data can cause undesirable bias. The tine networks. Whereas the decisions of what
identification of missing actors and links is there- constitutes a network link and who should be
fore a major challenge to overcome. Research included in the network under investigation
methods are being developed to effectively dis- depend on the research aims of the investigator
cover core relevant actors (Maeno and Ohsawa, (see also Scott, 2000: 54), it remains difficult to
2009). In an impressive study by Rhodes and distinguish significant terrorist connections and
Keefe (2007), for example, a Bayesian statistical activities from casual connections to ignorant
inference approach reached a prediction accuracy acquaintances or sympathisers.

5605-Scott-Chap18.indd 265 4/7/2011 4:54:33 PM


266 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

What’s more, imperfect and missing data affect Detail and differentiation
analytical outcomes (although this is inherent to
any analysis of clandestine networks since they First of all, a lot of unnecessary confusion that
operate covertly and underground). It’s important stems from the literature is the lack of differentia-
that researchers are aware of these consequences tion between terrorist networks (e.g. their govern-
and differentiate in their results, since some ance and scope). Failing to make this distinction
measures are more robust to incomplete data than limits the development of a practicable topology
others. Centrality measures, for example, are quite and counterterrorism strategies that warrant such
robust in random networks under small amounts precision. Another lost opportunity reflected in
of random error (e.g. 10 per cent or less) (Borgatti many studies is the failure to accumulate rich data
et al., 2006).10 The problem becomes more by way of differentiating between distinctive
serious, however, if data are not randomly missing properties of ties, activities and resources in the
but result from systematic errors in data collection data. Data are often insufficiently explored and
(e.g. missing peripheral actors) (Borgatti et al., exploited, limiting a ‘dynamic and coherent theory
2006). The good news is that recent studies have of social action’ (Stohl and Stohl, 2007: 102).
shown that it is possible to estimate networks from Stohl and Stohl (2007), for example, stressed the
just parts of it (Rhodes and Keefe, 2007). importance to distinguish between uniplex ties
Nevertheless, more research is needed to model (e.g. a shared ideology reinforced by the Internet)
networks with parameters that are robust in the and multiplex ties (e.g. actors sharing not just an
face of missing data (Carley, 2004), to estimate ideology but also ethnical, kinship or friendship
the effects under various types of missing data ties). Other relevant distinctions may be the
(Butts, 2000), and to develop tools to identify duration of ties, their role categories (formal,
areas where important data may be missing informal or both), resources (instrumental, expres-
(Rhodes and Keefe, 2007). sive or both), channels of communication (e.g.
phone calls, emails, Web sites, face-to-face
meetings) and the variety of activities in relation
to structure (e.g. travel records, money transfers)
(Carley et al., 2004; Krebs, 2001; Van der Hulst,
CRITICAL REFLECTION AND 2004, 2009a).
FUTURE DIRECTIONS Also remarkably limited attention is paid to the
association of structure with actual roles (e.g.
A critical review of the state of the art today shows leadership, experts, facilitators), demographic
that SNA appears to be a promising field in the attributes (e.g. age, sex, family status, nationality,
fight against terrorism. However, its application is ethnicity, education, occupation, working status),
still in its infancy and its toolbox should not be psychological attributes (e.g. personality,
considered as a panacea (Carley et al., 2001). attitudes, values, religious background), knowl-
Moreover, the SNA community should be aware edge attributes (e.g. type of education, type of
of the downside of proliferation since there are a occupation, religion, expertise), even behavioural
whole lot of studies that appear to play fast and attributes (e.g. activities, criminal records) and
loose with academic standards. The influx of aca- geography. Although labour-intensive, the strength
demics from different disciplines is considered to of the SNA method comes with such details,
be a necessary requirement for advanced meth- and the formation, evolvement and consequences
odological tools (in particular for counterterror- of social structures may be contingent upon
ism purposes). There’s a looming risk, however, these properties (Burt, 1997; Contractor
for SNA to become overlooked and swallowed as and Monge, 2004; Robins, 2009; Van der Hulst,
a mere trick of knowledge discovery, data mining 2004, 2009a).
and mass surveillance. Whereas SNA may be
useful in retrieving information from huge vol-
umes of data, the discipline is much more than Empirical studies
that and the link to social theory and sciences
should not be dismissed. In the following sections Second, a lot of work in the realm of SNA and
we address four critical issues to explore and terrorism has been focussed on the development
encourage new directions of research that will of advanced methods and software. Empirical
move the field beyond its current limits: (1) the network studies, however, are quite rare and con-
need for more detailed definitions and differentia- centrate for the main part on Islamic terrorism.
tion of networks, (2) more empirical network There is a strong need for more empirical case
studies, (3) integrated theory and hypothesis test- studies to evaluate and complement these findings
ing, and (4) maximised exploitation of available in order to develop a topology of static and
network tools. dynamic network properties. These studies should

5605-Scott-Chap18.indd 266 4/7/2011 4:54:33 PM


TERRORIST NETWORKS: THE THREAT OF CONNECTIVITY 267

explicitly consider the preliminary stages of most studies do not even bother to distinguish
terrorism (e.g. radicalisation, recruitment), other between these levels. Insofar as network metrics
groups and related phenomena (e.g. animal rights, are used, the most obvious ones (e.g. centrality)
environmental activists, cyber terrorism, network appear to be applied without deliberate thinking
dynamics of youth, the role of women in terrorist about what metrics best apply to a particular situ-
networks) and incorporate work from other fields ation or research problem. This lack of creativity,
or disciplines (e.g. social movements) (cf. Macy et simply choosing metrics because others do so,
al., 2004; Wiktorowicz, 2001; Zanini and Edwards, may cause an abundance of misapplications.
2001). A particular area of interest that has been Part of the criticism addressed here probably
neglected so far is the cross-links between terror- stems from the shift of focus from small-scale to
ism and organised crime. We know that crime has large-scale networks (such as the Internet). Issues
become a critical source of terrorist funding, but it such as sampling, missing data, variable distribu-
remains unclear to what extent activities are actu- tions, modelling change, visualisation techniques,
ally joined efforts, on what basis actors decide to theory-driven computational algorithms, metrics
cooperate, and whether these cross-links should or statistics will remain ongoing methodological
be considered to pose a ‘new threat’ or offer ‘new challenges in the future (Carley, 2004; McCulloh
opportunities’ to counter them (e.g. infiltration) and Carley, 2008; Reid et al., 2004). Moreover, we
(Makarenko, 2004; Shelley and Picarelli, 2005; expect the trend for collaborative and multidisci-
Stohl, 2008). Finally, of course, future research is plinary research to increase even further (e.g. to
needed to evaluate the effectiveness of SNA-based develop software systems for automated collec-
counterterrorism strategies and interventions tion, manipulation, and identification of networks
(cf. Lum et al., 2006). from huge volumes and variable types of data).
In fact, scholarly disciplines from information
technology, knowledge management, data mining
and social network analysis are likely to merge in
Integrated theory and this domain. However, given that the thriving
hypothesis testing force behind terrorism is still behaviourally moti-
vated and characterised by human factors (both
Third, an alarming trend observed in the literature locally and globally), it may be wise to regain
is the lack of theory-driven research and the this balance for research purposes and get ‘the
apparently thoughtless applications of descriptive sociology’ back in.
network measures. To improve our understanding
of terrorist networks (and be able to provide
actionable knowledge in terms of prevention),
future network studies should build on explana- IN SUM
tory mechanisms related to social, cultural and
social psychological theories (e.g. attitudes, To conclude, although interest is rising, the
norms, status, identity) (Contractor and Monge application of SNA to the study of terrorism is still
2004; Koschade, 2006; Ressler, 2006; Robins and in its infancy. Methodologically and technically,
Kashima, 2008; Steglich et al., 2010; Stohl and however, progress has been achieved over recent
Stohl, 2007). For valid interpretations of network years. The time is ripe for academics and for
analyses and the development of automated infor- security and intelligence agencies to fully exploit
mation retrieval and data manipulation, domain new opportunities in SNA research. More than in
experts may be consulted to help identify behav- other areas of network research, it is not unlikely
ioural risk indicators and associated parameters. for this domain to transform into a practice-based,
multidisciplinary field of cross-disciplinary
collaborations between computer scientists,
Analytical exploitation system developers, social scientists and domain
experts. Bridging this gap will allow us to:
Fourth, the analytical possibilities of SNA are
extensive but they are not fully exploited (Asal • Improve our understanding of complex and
and Rethemeyer, 2006). Powerful tools and covert networks (e.g. identify patterns of activ-
metrics other than centrality, for example, tend ity, roles, governing mechanisms);
to be overlooked whereas they can add useful • Identify and uncover clandestine networks (e.g.
(perhaps even better) insights. Although hypothe- core members, overlap between subgroups,
ses can be tested at different levels (e.g. actors, missing links);
ties, subgroups, the network as a whole, or an • Issue more timely and critical warnings of
interplay of variables) (Borgatti and Foster, 2003; terrorist plots (e.g. through intelligence plat-
Reid et al., 2004; Wasserman and Faust, 1994), forms); and

5605-Scott-Chap18.indd 267 4/7/2011 4:54:33 PM


268 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

• Develop more effective counterterrorism and various sources worldwide in the areas of defense,
control strategies (e.g. identify vulnerabilities intelligence and homeland security.
and seek out optimal intelligence, infiltration 9 McCulloh and Carley (2008) emphasise that
and destabilisation strategies). the results should be interpreted with care because
findings were not validated. Moreover, the change
New theoretical paradigms may push innovative detection method can only be applied to normally
progress even further, which at the same time may distributed network measures (which may imply
warrant caution for the discipline to become a that it cannot be used for networks smaller than
mere infusion of technology at the expense of 30 nodes) and after a period of dynamic equilibrium
pure substance. We trust this to be a critical warn- (to estimate parameters).
ing to all researchers investigating terrorism to 10 Borgatti et al. (2006) estimate the correlation
keep an eye on the balance between theory, between true and observed centrality (in random
research, practice and technology. networks) to be still 0.90 if 5 per cent of network ties
are randomly missing.

NOTES
REFERENCES
1 Many studies concentrate on the process of
knowledge management and technological solutions Arquilla, J. and Ronfeldt, D. (2001) Networks and Netwars:
to facilitate conditions prior to the analysis (e.g. The Future of Terror, Crime and Militancy. Washington
efficient data collection, automated filtering DC: Rand.
processes, data mining, information fusion). Because Asal, V. and Rethemeyer, R.K. (2006) ‘Researching terrorist
data mining and knowledge management are not networks’, Journal of Security Education, 1(4): 65–74.
equivalent to social network analysis these subjects Baker, W.E. and Faulkner, R. (1993) ‘The social organization
are beyond the scope of this chapter. of conspiracy: Illegal networks in the heavy electronical
2 Arquilla and Ronfeldt (2001) used the term equipment industry’, American Sociological Review, 58(6):
netwar (after Zanini, 1999) to refer to conspirators 837–60.
who, in the absence of a formal enemy, heavily rely Barabási, A.-L. and Albert, R. (1999) ‘Emergence of scaling in
on information and communication technology (ICT). random networks’, Science, 286: 509–12.
3 Note that strong ties may appear as weak ties Basu, A. (2005) ‘Social network analysis of terrorist
if these ‘dormant linkages’ are activated only when organizations in India’, at the 2006 Conference of the
necessary (Krebs, 2001). North American Association for Computational Social and
4 With kind permission from Springer Organizational Science.
Science+Business Media: Computational & Mathe- Bonacich, P. (1972) ‘Factoring and weighting approaches to
matical Organization Theory, ‘On effectiveness of status scores and clique identification’, Journal of
wiretap programs in mapping social networks’, vol. Mathematical Sociology, 2: 113–20.
13, 2007, p. 68, M. Tsvetovat & K.M. Carley. Borgatti, S. (2006) ‘Identifying sets of key players in a
5 Carley et al. (2007), for example, created an network’, Computational and Mathematical Organization
integrated toolbox (DNA) that combines features of Theory, 12(1): 21–34.
automated extraction, link analysis (visualisation), Borgatti, S., Carley, K.M. and Krackhardt, D. (2006) ‘On the
statistical analysis and multiagent dynamic modelling robustness of centrality measures under conditions of
(simulation). imperfect data’, Social Networks, 28(2): 124–36.
6 Some scholars in computer science and engi- Borgatti, S.P. and Foster, P.C. (2003) ‘The network paradigm
neering, such as Chen and associates (the Artificial in organizational research: A review and topology’, Journal
Intelligence Lab, University of Arizona), concentrate of Management, 29(6): 991–1013.
on automated analysis and dark web mining. Borum, R. and Gelles, M. (2005) ‘Al-Qaeda’s operational
7 For further comparion: the overall network evolution: Behavioral and organizational perspectives’,
density of the Revolutionary Organisation November Behavioral Sciences and the Law, 23: 467–83.
17 (N = 22) was 27 per cent (Rhodes and Keefe, Brams, S.J., Mutlu, H. and Ramirez, S.L. (2006) ‘Influence in
2007), of the complete network of the Madrid terrorist networks: From undirected to directed graphs’,
bombings (N = 74) 9 per cent (Rodríguez, 2004), Studies in Conflict and Terrorism, 29(7): 703–18.
and of the complete network (N = 67) and the core Burt, R.S. (1992) Structural Holes: The Social Structures
(N = 13) of the Hofstad network in the Netherlands of Competition. Cambridge, MA: Harvard University
24 per cent and 62 per cent, respectively (Van der Press.
Hulst, 2009b). Burt, R.S. (1997) ‘The contingent value of social capital’,
8 GlobalSecurity.org is an online database that Administrative Science Quarterly, 42(2): 339–65.
provides comprehensive information and reference Burt, R.S. (2005) Brokerage and Closure: An Introduction to
materials (e.g. profiles of terrorist suspects) from Social Capital. Oxford: Oxford University Press.

5605-Scott-Chap18.indd 268 4/7/2011 4:54:33 PM


TERRORIST NETWORKS: THE THREAT OF CONNECTIVITY 269

Butts, C. (2000) Network Inference, Error, and Informant (In) Harper, W.R. and Harris, D.H. (1975) ‘The application of link
Accuracy: A Bayesian Approach. Pittsburgh, PA: Carnegie analysis to police intelligence’, Human Factors, 17(2):
Mellon University. 157–64.
Carley, K.M. (2003) ‘Dynamic network analysis’, in R. Breiger, Jonas, J. and Harper, J. (2006) ‘Effective counterterrorism and
K. Carley and P. Pattison (eds.), Dynamic Social Network the limited role of predictive data mining’, Policy Analysis,
Modeling and Analysis: Workshop Summary and Papers. 584: 1–12. Washington, DC: Cato Institute.
Washington, DC: National Academy Press. pp. 133–45. Jordán, F. (2008) ‘Predicting target selection by terrorists: A
Carley, K.M. (2004) ‘Linking capabilities to needs’, in network analysis of the 2005 London underground attacks’,
R. Breiger, K. Carley and P. Pattison (eds.), Dynamic Social International Journal of Critical Infrastructures, 4(1/2):
Network Modeling and Analysis: Workshop Summary 206–14.
and Papers. Washington, DC: National Academy Press. Kadushin, C. (2002) ‘The motivational foundation of social
pp. 324–44. networks’, Social Networks, 24: 77–91.
Carley, K.M., Diesner, J., Reminga, J. and Tsvetovat, M. (2004) Klerks, P. (2001) ‘The network paradigm applied to criminal
An Integrated Approach to the Collection and Analysis of organisations’, Connections, 24(3): 53–65.
Network Data. Pittsburgh, PA: Carnegie Mellon University. Koschade, S. (2006) ‘A social network analysis of Jemaah
Carley, K.M., Diesner, J., Reminga, J. and Tsvetovat, M. (2007) Islamiyah: The applications to counterterrorism and intelli-
‘Toward an interoperable dynamic network analysis gence’, Studies in Conflict and Terrorism, 29: 559–75.
toolkit’, Decision Support Systems, 43: 1324–47. Krebs, V.E. (2001) ‘Mapping networks or terrorist cells’,
Carley, K.M., Lee, J.-S. and Krackhardt, D. (2001) ‘Destabilizing Connections, 24(3): 43–52.
networks’, Connections,24(3): 79–92. Krebs, V.E. (2002) ‘Uncloacking terrorist networks’, First
Centola, D. and Macy, M. (2007) ‘Complex contagions and Monday, 7(4). www.firstmonday.org/issues/issue7_4/krebs.
the weakness of long ties’, American Journal of Sociology, Latora, V. and Marchiori, M. (2004) ‘How science of complex
113: 702–34. networks can help in developing strategy against terror-
Chen, H. (2006) Intelligence and Security Informatics for ism’, Chaos, Solitions and Fractals, 20: 69–75.
International Security: Information Sharing and Data Lin, N., Cook, K. and Burt, R.S. (2001) Social Capital: Theory
Mining. New York: Springer. and Research. New York: Aldine de Gruyter.
Coates, J.F. (1996) ‘A thriving future for terrorism’, Lum, C., Kennedy, L.W. and Sherley, A. (2006) ‘Are counter-
Technological Forecasting and Social Change, 51: terrorism strategies effective? The results of the Campbell
295–99. systematic review on counter-terrorism evaluation research’,
Contractor, N.S. and Monge, P.R. (2004) ‘Using multi- Journal of Experimental Criminology, 2: 489–516.
theoretical multi-level (MTML) models to study adversarial Macy, M.W., Kitts, J.A., Flache, A. and Benard, S. (2004)
networks’, in R. Breiger, K. Carley, and P. Pattison (eds.), ‘Polarization in dynamic networks: A Hopfield model of
Dynamic Social Network Modeling and Analysis: Workshop emergent structure’, in R. Breiger, K. Carley and P. Pattison
Summary and Papers. Washington, DC: National Academy (eds.), Dynamic Social Network Modeling and Analysis:
Press. pp. 324–44. Workshop Summary and Papers. Washington, DC: National
Cornish, D.B. and Clarke, R.V. (2002) ‘Analyzing organized Academy Press. pp. 162–73.
crimes’, in A. Piquero and S.G. Tibbetts (eds.), Rational Maeno, Y. and Ohsawa, Y. (2009) ‘Analyzing covert social
Choice and Criminal Behavior. New York: Garland. network foundation behind terrorism disaster’, International
pp. 41–62. Journal of Services Sciences, 2(2): 125–41.
Dean, G. (2007) ‘Criminal profiling in a terrorism context’, in Makarenko, T. (2004) ‘The crime-terror continuum: Tracing
R.N. Kocsis (ed.), Criminal Profiling: International Theory, the interplay between transnational organised crime and
Research, and Practice. Totowa, NJ: Humana Press. terrorism’, Global Crime, 6(1): 129–45.
pp. 169–88. McCulloh, I.A. and Carley, K.M. (2008) Social Network
Dryer, A. (2006) ‘How the NSA does social network analysis’, Change Detection. CASOS technical report CMU-
Washington Post. ISR-08–116. Pittsburgh, PA: Carnegie Mellon University.
DSTL (2004) Network Methods as a Tool for Defence McPherson, M., Smith-Lovin, L. and Cook, J.M. (2001) ‘Birds
Analysis. London: UK Defence Science and Technology of a feather: Homophily in social networks’, Annual Review
Laboratory. of Sociology, 27: 415–44.
Erickson, B.H. (1981) ‘Secret societies and social structure’, Memon, N., Larsen, H.L., Hicks, D.L. and Harkiolakis, N.
Social Forces, 60(1): 188–210. (2008) ‘Detecting hidden hierarchy in terrorist networks:
Freeman, L.C. (1979) ‘Centrality in social networks, I: Some case studies’, in C.C. Yang et al. (eds.), Intelligence
Conceptual clarification’, Social Networks, 1(3): 215–39. and Security Informatics—LNCS 5075. Berlin: Springer-
Friedkin, N.E. and Johnsen, E.C. (1999) ‘Social influence Verlag. pp. 477–89.
networks and opinion change’, Advances in Group Milgram, S. (1967) ‘The small world problem’, Psychology
Processes, 16: 1–29. Today, 2(1): 60–67.
Garfinkel, S.L. (2003) ‘Leaderless resistance today’, First Moon, I.-C. and Carley, K.M. (2007) ‘Modeling and simulation
Monday, 8(3). www.firstmonday.org. of terrorist networks in social and geospatial dimensions’,
Granovetter, M.S. (1973) ‘The strength of weak ties’, American IEEE Intelligent Systems, special issue on Social Computing,
Journal of Sociology, 78: 1360–80. 22: 40–49.

5605-Scott-Chap18.indd 269 4/7/2011 4:54:33 PM


270 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Morselli, C., Giguère, C. and Petit, K. (2007) ‘The efficiency/ Snijders, T.A.B., Steglich, C.E.G. and Van de Bunt, G.G. (2010)
security trade-off in criminal networks’, Social Networks, ‘Introduction to stochastic actor-based models for network
29: 143–53. dynamics’, Social Networks, 32: 44–60.
Qin, J., Xu, J.J., Hu, D., Sageman, M. and Chen, H. (2005) Sparrow, M.K. (1991a) ‘Network vulnerabilities and strategic
‘Analyzing terrorist networks: A case study of the Global intelligence in law enforcement’, Journal of Intelligence
Salafi Jihad network’, in P. Kantor et al. (eds.), Intelligence and Counterintelligence, 5(3): 255–74.
and Security Informatics—LNCS 3495. Berlin: Springer- Sparrow, M.K. (1991b) ‘The application of network analysis to
Verlag. pp. 287–304. criminal intelligence: An assessment of the prospects’,
Rapoport, D. (2003) ‘The four waves of rebel terror and Social Networks, 13: 251–74.
September 11’, in C. Kegley (ed.), The New Global Steglich, C., Snijders, T.A.B. and Pearson, M. (2010) ‘Dynamic
Terrorism. New Jersey, NJ: Prentice Hall. pp. 36–51. networks and behavior: Separating selection from
Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., influence’, Sociological Methodology, 40: 329–93.
Sageman, M. and Chen, H. (2004) ‘Terrorism knowledge Stohl, C. and Stohl, M. (2007). ‘Networks of terror: Theoretical
discovery project: A knowledge discovery approach to assumptions and pragmatic consequences’, Communication
addressing the threats of terrorism’. Working paper. Theory, 17: 93–124.
Ressler, S. (2006) ‘Social network analysis as an approach to Stohl, M. (2008) ‘Networks, terrorists and criminals: The
combat terrorism: Past, present, and future research’, implications for community policing’, Crime, Law and
Homeland Security Affairs, 2(2). www.hsaj.org/pages/ Social Change, 50: 59–72.
volume2/issue2/pdfs/2.2.8.pdf. Tsvetovat, M. and Carley, K.M. (2005) ‘Structural knowledge
Rhodes, C.J. and Keefe, E.M.J. (2007) ‘Social network and success of anti-terrorist activity: The downside of
topology: A Bayesian approach’, Journal of the Operational structural equivalence’, Journal of Social Structure 6.
Research Society, 58: 1605–11. www.casos.cs.cmu.edu/publications/papers/.
Robins, G. (2009) ‘Understanding individual behaviors within Tsvetovat, M. and Carley, K.M. (2007) ‘On effectiveness of
covert networks: The interplay of individual qualities, wiretap programs in mapping social networks’,
psychological predispositions, and network effects’, Trends Computational and Mathematical Organization Theory, 13:
in Organized Crime, 12(2): 166–87. 63–87.
Robins, G. and Kashima, Y. (2008) ‘Social psychology and Van der Hulst, R.C. (2004) ‘Gender differences in workplace
social networks: Individuals and social systems’, Asian authority: An empirical study on social networks’. Thesis,
Journal of Social Psychology, 11: 1–12. Groningen: Groningen University.
Rodríguez, J.A. (2004). ‘The March 11th terrorist network: Van der Hulst, R.C. (2009a) ‘Introduction to Social Network
In its weakness lies its strength’, Paper presented at the VIII Analysis (SNA) as an investigative tool’, Trends in Organized
Congreso Español de Sociología, Alicante. Crime,12(2): 101–21.
Rothenberg, R. (2001) ‘From whole cloth: Making up the Van der Hulst, R.C. (2009b) ‘Terroristische netwerken en intel-
terrorist network’, Connections, 24(3): 36–42. ligence: Een sociale netwerkanalyse van de Hofstadgroep
Sageman, M. (2004) Understanding Terror Networks. [Terrorist networks and intelligence: A social network
Philadelphia: University of Pennsylvania Press. analysis of the Dutch Hofstad network]’, Tijdschrift voor
Sageman, M. (2008) Leaderless Jihad: Terror Networks in the Veiligheid, 8(2): 8–27.
Twenty-First Century. Philadelphia: University of Wasserman, S. and Faust, K. (1994) Social Network Analysis:
Pennsylvania Press. Methods and Applications. Cambridge: Cambridge
Schroeder, J., Xu, J. and Chen, H. (2003) ‘CrimeLink Explorer: University Press.
Using domain knowledge to facilitate automated crime Watts, D.J. (1999) ‘Networks, dynamics and the small world
association analysis’, Lecture Notes and Computer Science, phenomenon’, American Journal of Sociology, 105(2):
2665: 168–80. 493–527.
Schwartz, D.M. and Rouselle, T. (2008) ‘Targeting criminal Wiktorowicz, Q. (2001) ‘The new global threat: Transnational
networks: Using social network analysis to develop salafis and jihad’, Middle East Policy, 8(4): 18–38.
enforcement and intelligence priorities’, IALEIA Journal, Xu, J., Marshall, B., Kaza, S. and Chen, H.C. (2004) ‘Analyzing
18(1): 18–44. and visualizing criminal network dynamics: A case study’,
Scott, J. (2000) Social Network Analysis. London: Sage. in H. Chen et al. (eds.), Intelligence and Security
Shaikh, M.A., Wang, J, Yang, Z. and Song, Y. (2007) ‘Graph Informatics – LNCS 3073. Berlin: Springer-Verlag.
structural mining in terrorist networks’, in R. Alhaij et al. pp. 359–77.
(eds.), Advanced Data Mining and Applications—LNAI Zanini, M. (1999) ‘Middle Eastern terrorism and netwar’,
4632. Berlin: Springer-Verlag. pp. 570–77. Studies in Conflict and Terrorism, 22(3): 247–56.
Shelley, L.I. and Picarelli, J.T. (2005) ‘Methods and motives: Zanini, M. and Edwards, S.J.A. (2001) ‘The networking of
Exploring links between transnational organized crime and terror in the information age’, in J. Arquilla and D. Ronfeldt
international terrorism’, Trends in Organized Crime, 9(2): (eds.), Networks and Netwars: The Future of Terror, Crime
52–67. and Militancy. Washington, DC: Rand. 29–60.

5605-Scott-Chap18.indd 270 4/7/2011 4:54:33 PM


19
Scientific and Scholarly
Networks
Howard D. White

INTRODUCTION associated in a given literature. Readers especially


want to know who is linked to whom and
In Randall Collins’s (1998) authoritative phrase, how closely, because that can reveal both intel-
scientific and scholarly networks are “coalitions lectual and social structures within a specialty or
in the mind.” Key ties in them are of two sorts. discipline.
They may be social, involving direct interactions If not available from transaction logs, data on
among living persons such as coauthors or other authors as persons must be gathered through
colleagues. Or they may be cultural, involving labor-intensive interviews and surveys, since their
persons known only through reading, which social interactions go largely unrecorded. In con-
induces ties beyond the boundaries of personal trast, data on their connections in literatures – in
acquaintanceship. Both social and cultural ties, texts – are available in existing bibliographic data-
moreover, can appear in the same network. bases, whose records can be mined with relative
Citation networks, for example, are frequently ease. Hence, many studies of S&SNs are biblio-
“sociocultural,” in that scholars may routinely cite metric in nature. They reveal patterns of, for
and be cited with living or dead acquaintances, example, coauthorship, cocitation, or co-term
living or dead contemporaries they have never relationships; the latter are noun phrases that
met, and dead non-contemporaries they could not co-occur in the titles, indexing, abstracts, or full
possibly have met. Contrast that with exclusively texts of publications. (A network of author names
social networks, such as those consisting of sexual can be converted into a network of co-terms and
partners or drug users who share needles. vice versa; see, for example, Lievrouw et al.,
As a matter of course, scientists and scholars 1987). As units of analysis in network studies, the
must not only read but write; their eminence names of publishing scientists or scholars thus
grows with publication output and peer recogni- have an unusual ambiguity. On the one hand, they
tion of its value. In writing, furthermore, they can be understood as referring to persons, realized
must link their texts with earlier ones by using in the flesh as interviewees. On the other, they can
appropriate terminology and references to be understood as referring to bylines, realized in a
precedent work. These practices define learned database as bibliographic types with countable
literatures – bodies of writings with specialized tokens. (The string “Barry Wellman,” for example,
vocabularies and explicit cross-textual links. may refer to a Toronto-based professor or to
Scientific and scholarly networks (S&SNs) are words appearing across the title-pages of his
thereby uniquely grounded in literatures. Even books and articles.) Either usage – person or
studies of personal communication in such byline – may appear in a study without involving
networks – who emailed whom and how fre- the other. But this ambiguity can also be exploited
quently, who shared data, and the like – generally in the same study: social variables on persons can
support an ultimate interest in the authors be put in a matrix with bibliometric variables on

5605-Scott-Chap19.indd 271 4/13/2011 2:32:21 PM


272 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

the same persons as bylines, and relationships can persons exchange messages heavily with others
be sought between them. Moreover, if the indi- as well. These eight are the group’s superlative
viduals in a network can be ranked and compared communicators.
on a variable, this necessarily makes for the However, the visualization reveals an interest-
superlatives – highest-lowest, most-least, best- ing split. The eight persons with the highest cita-
worst – that pique human interest. (Bibliometric tion counts, the group’s superlative scholars, are
rankings not tied to networks may be even more all on the lower periphery of the network. On the
provocative, but they will not be treated in any basis of their one-year counts, from 46 to 170,
depth here.1) these worthies are all more eminent than the per-
sons in the core. Yet they are linked to only one or
two core researchers, and their message volume is
comparatively low. Furthermore, the three most
THE EIES FILE eminent citees, those with counts of 56, 64, and
170, are all recipients of messages from “19” at
Superlative positions are particularly noticeable the center. They did not send him or anyone else
when network data are visualized. As an illustra- enough messages to meet the ≥ 25 threshold.
tion, consider a well-known data file on how (For example, the most highly cited EIES member,
32 geographically dispersed social scientists used “170” at lower right, sent a total of four messages
the Electronic Information Exchange System to “19” and five each to two other members
(EIES) in the pre-Internet days of 1978. Funded during the entire study.) Other high-ranked citees
by a grant from the National Science Foundation, in the lower periphery, those with counts of
EIES allowed these researchers to send then-novel 54, 46, and 31, also received more messages than
email and newsgroup messages to each other by they sent.
dedicated computers (Freeman and Freeman, The split characterizes, then, a core of less
1980). The 32 were themselves specialists in established, possibly younger researchers who
social networks research and now became linked used the EIES technology vigorously, and a
nodes in their own emergent structure. The varia- peripheral group of more established, possibly
bles in the file include the number of messages older researchers who were much cooler toward
between each pair of researchers, their disciplines, it. (Did the latter regard newfangled email as
and their citation counts for 1978 from the Social a distraction from more serious writing?) This
Sciences Citation Index, which is a rough gauge non-meeting of minds and tastes is not explained
of their eminence as authors. by disciplinary affiliation. While there are other
The EIES matrices are distributed as specimen identifiable subgroups in the network (persons
data with UCINet, a leading analytical software with middling citation and message counts;
package, and can be visualized with its built-in persons with few or no citations and few EIES
NetDraw. Figure 19.1 displays one result, an inter- partners), the possible social and psychological
play of social and bibliometric variables. The differences between the less eminent “enthusi-
nodes represent the 32 (unidentified) researchers, asts” and the more eminent “lurkers” remain
with node shapes coding their disciplines. The provocative 30 years after the 1978 experiment.
nodes are also sized proportionately to the
researchers’ citation counts for 1978, which are
added as labels. Links have been pruned to repre-
sent only flows of at least 25 messages between SOCIAL TIES
pairs. Message volume is represented by link
widths, and so the thinnest represent flows of Almost all studies of S&SNs are historical, based
about 25; the thickest, about 560. Arrow heads on time-bound relationships of real (if sometimes
indicate direction of flow; if links are one-headed, unidentified) individuals or their publications. The
only the target person received 25 or more mes- exception would be studies that simulate the
sages from the other pair member; if two-headed, dynamics and properties of such networks by
both persons did. The higher value for the pair computer (e.g., Barabási et al., 2002; Börner
determines thickness. et al., 2004) and even these are validated against
The EIES network plainly has a core of highly historical data. Granted the base in history,
interactive researchers. The person at the center however, the styles of research on S&SNs differ
with 19 citations – call him “19” – has ties at the sharply, depending on whether one approaches
≥ 25 level with all but three other group members. networks abstractly, at a level in which individual
This same central person is connected by dense authors are hidden in summary measures, or
message traffic with an inner ring of seven others concretely, at a level in which they and their works
having (clockwise from lower left) 17, 18, 12, 15, are discussed in rich detail. The physicists Mark
1, 9, 3, and 0 citations. Several of these latter Newman and Albert-László Barabási usually take

5605-Scott-Chap19.indd 272 4/13/2011 2:32:21 PM


SCIENTIFIC AND SCHOLARLY NETWORKS 273

4 32 6

1 1
6

3
11 23
9
15

12
0 2

11 23

18 1
19

46

34
40
54

17 4
31
Circles: sociology 56
Squares: anthropology
Triangles: statistics/mathematics
Diamonds: psychology/communication 170

64 0
16

Figure 19.1 Messages ≥ 25 sent between the EIES researchers

the first approach; the sociologist Randall is the effect of the EIES postings on degree of
Collins, the second. In between are studies that acquaintanceship as of September, given the
derive the communication, collaboration, or January baseline. This was done in Freeman and
citation patterns of named authors from numeric Freeman (1980).
matrices.
Remarks on some pairwise social ties in author
matrices follow. The authors are presumed to be
living, although recent decedents could also
appear. The examples of ties from the literature
Modes of communication
are meant simply to be typical; they do not to White et al. (2004a) described communication
exhaust the possibilities. modes among 16 members of Globenet, a pseudo-
nym for a small multinational organization devoted
to multidisciplinary research in human develop-
Degree of acquaintanceship ment. The Globenetters met informally in small
groups and also formally three times a year. The
As described in Wasserman and Faust’s textbook 16 were asked how frequently they used specific
(1994: 62–63), the variables in the EIES file also modes with one another – face-to-face conversa-
included self-reported degrees of acquaintance- tion, telephone, paper/post, email, and fax – and
ship between each pair of researchers in January whether communications were scholarly or non-
and September 1978. As one would expect, the scholarly. Except for email, the list is like one in
scale (slightly paraphrased here) was ordinal: 0, Lievrouw et al. (1987). Nowadays, one would
Do not know; 1, Have heard of but not met; 2, expect email to dominate in any dispersed aca-
Have met; 3, Am a friend of; 4, Am a close demic group, but the other modes still occur and
personal friend of. An obvious hypothesis to test must be presented in questionnaires.

5605-Scott-Chap19.indd 273 4/13/2011 2:32:21 PM


274 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Type of collaboration models of the Internet and the Web (Newman


et al., 2006). Coauthorship networks are among
There are many kinds of collaboration besides those frequently studied, both within library and
coauthorships (Sonnenwald, 2007, has examples), information science and beyond it. However,
and they may or may not be acknowledged in print influential theorists from other disciplines such as
(Cronin, 1995, Cronin et al., 2003). Obviously Newman and Barabási do not write about this
they will vary from field to field. Some research- form of collaboration primarily as historians.
ers, for instance, give software or machine- They are interested in the structural and evolution-
readable data to others (McCain, 2000), and some ary properties of very large networks regardless of
exchange physical materials, such as fruit flies in what, or whom, the nodes represent. Hence, they
Drosophila genetics (McCain, 1991). The catego- will analyze structures in websites or electrical
ries of Globenetters’ collaborations used in White grids as readily as people. If they do sometimes
et al. (2004a) include reading each other’s papers write about people, it is because the necessary
and discussing each other’s ideas. These are data are already computerized, solid, and vast,
varieties of the “trusted assessor” role noted in with scores or hundreds of thousands of names
Mullins (1973: 18–19) and Chubin (1976). linked in bibliographic records.
According to Laudel (2002), coauthorship credit A famous precedent sketched by Newman and
in bylines results from divisions of creative labor explored at length by de Castro and Grossman
among peers. Acknowledgements, a lesser credit, (1999) is the network of persons who coauthored
go to peers who simply consult as trusted papers with the Hungarian mathematician Paul
assessors, provide access to equipment, transmit Erdös (1913–1996). He was hugely prolific, and,
know-how, or stimulate ideas. in wry homage, friends have assigned an Erdös
A noteworthy collaboration between non-peers number of 1 to his more than 500 immediate coau-
is the mentor-pupil relationship. For the field of thors, an Erdös number of 2 to those who coautho-
library and information science, this relationship red papers with the 1s, and so on. According to
is quantified and visualized on an interesting Wikipedia, “Some have estimated that 90% of the
website called MPACT (Marchionini et al., 2006). world’s active mathematicians have an Erdös
Collins (1998) observes that mentor-pupil ties are number smaller than 8 . . . .” Grossman (2007)
almost invariably integral to the close-knit struc- discusses this phenomenon on the Web, with
ture of S&SNs. His book includes many diagrams downloadable raw data; for visualizations, see
of intellectual lineages in which such ties are Batagelj and Mrvar (2000).
shown for world-class figures. For example, his Other visualizations of coauthorship that may
transgenerational diagram of “Young Hegelians interest present readers include one in Otte and
and Religious/Political Radicals, 1835–1900” Rousseau (2002) of 57 social network researchers
(p. 766) shows that the German philosopher (many well-known, such as Barry Wellman, Lin
Friedrich Schelling taught Søren Kierkegaard, Freeman, Patrick Doreian, Stanley Wasserman)
Friedrich Engels, Mikhail Bakunin, and Jacob and a larger one of 630 network scientists in
Burckhardt. Burckhardt in turn taught Friedrich Börner (2007). The latter gives hyperlinks to color
Nietzsche. By publishing research on scientific or enlargements of its coauthorship maps on the Web.
scholarly problems in creative reaction to the
work of others, intellectuals build up what Collins
terms “cultural capital.” Over time, the perceived
novelty and importance of their ideas earn them
varying degrees of recognition (through, for Conflicts between authors
example, citation or commentary). It is advanta- Collins (1998: 1) starts his book with the
geous for pupils to have mentors whose cultural sentence, “Intellectual life is first of all conflict
capital they can share, and no less advantageous and disagreement.” He argues that scientists and
for mentors to have pupils who can extend their scholars vie for attention and recognition either by
lines of thought. Renown and resources depend on enhancing an existing body of thought or by
individuals’ positions in networks, where being attacking it from a rival viewpoint. The tie between
the focus of attention or not translates into posi- Bakunin and Karl Marx in his diagram “Young
tions of relative centrality and peripherality. Hegelians and Religious/Political Radicals,
1835–1900” is one of mutual opposition. Marx is
also shown as attacking Max Stirner, and Stirner
Coauthorships as attacking G. W. F. Hegel, his former teacher.
The novelists Ivan Turgenev and Fyodor
Quantitative studies of networks of all kinds have Dostoyevsky are shown to be at odds with
grown rapidly in the past two decades, prompted the “Russian nihilists”–Nikolai Chernyshevsky,
not least by fascination with graph-theoretic Dimitri Pisarev, and Sergey Nechaiev. The conflicts

5605-Scott-Chap19.indd 274 4/13/2011 2:32:22 PM


SCIENTIFIC AND SCHOLARLY NETWORKS 275

Collins notes are not based on his systematic of the EIES group). Bibliometrically, the works
assessment of each pair of authors in an published in invisible colleges are concentrated in
“intellectual hostility” matrix; he simply codes relatively few core journals, with the remainder
salient oppositions from his reading. But such a scattered over many more peripheral journals;
matrix could be formed. In our own day, countless also, the indexing of these publications involves
intellectuals both obscure and famous have clashed relatively few core terms that are used again and
(e.g., Stephen Jay Gould and Steven Pinker). again, while many peripheral terms are used with
Conflicts and competition may of course occur decreasing frequency. Cognitively, members of
between subdisciplinary groups as well as indi- invisible colleges must strike a balance between
viduals. Throughout his book Collins asserts that, cores and peripheries as they seek information
at any given time, fields are structured by three to (cf. Sandstrom, 2001). If they look only to the
six groups competing for “attention space”: “What cores – that is, read and talk to the same insiders,
I refer to as the law of small numbers proposes cite only personal acquaintances and themselves,
that there is always a small number of rival posi- retrieve publications already known, search
tions at the forefront of intellectual creativity; on familiar indexing terms and in familiar
there is no single inner chamber, but there are journals – they risk research that is inbred and
rarely more than half a dozen” (Collins, 1998: 42). redundant. If they look only to the peripheries –
We will see an example of opposed groups later in that is, consult people at the edge of (or beyond)
a cocited author map of science studies. their specialties, expand their vocabularies for
document retrieval, browse widely for novel items,
read to push the limits of interdisciplinarity – they
A note on invisible colleges risk research that is eccentric and noncumulative.
Invisible colleges grow as subject specialties over
This 17th-century term was repurposed by Derek time, Crane implied, when individual members
J. de Solla Price (1961) and later examined at avoid either of these extremes.
book length by the sociologist Diana Crane (1972).
Originally it referred to a group of amateurs in
natural philosophy – a kind of forerunner to the CITATION TIES
Royal Society – who met periodically in London
to discuss ideas on the science and technology of
the day. In Price’s 20th-century usage, it refers to Author intercitation
in-groups of researchers who work in different
locales but who intercommunicate intensively One way to find the inner and outer rings of
because of their common interests in subject specialties is to analyze intercitation – the record of
specialties (cf. Zuccala, 2006). who has cited whom within a fixed set of authors.
Price saw modern invisible colleges emerging Such data start with the author names in identical
as vehicles for quick transmission of scientific order on the rows and columns of a matrix. (The
news. He guessed that up to 100 scientists could same structure appears in the EIES matrix of send-
efficiently trade messages by word of mouth or ers and receivers of email.) Each row name desig-
informal letters as a corrective to slow-paced nates a possible citer of other members of the set
journal publication. Whatever their numbers, his (a sender). Each column name designates the same
invisible colleges comprise living researchers who person as a possible citee of the other members
exhibit all the social ties mentioned previously in (a receiver). From citation indexes, counts of “out-
this section. Members convene meetings; talk to citations” sent and “incitations” received are placed
and write other members; battle over claims and in the off-diagonal cells, as in Figure 19.2. Cells on
theories; exchange drafts, preprints, and reprints the diagonal can be left blank or filled with self-
of their articles for critical scrutiny; and routinely citations. The resulting matrix is asymmetric,
enter into various forms of collaboration, includ- since, for example, author A and author B need not
ing coauthorships. This last practice is adaptive cite each other equally.
because it speeds up productivity and allows more
authors to gain credit for publications.
Building on Price, Crane (1970, 1972) saw
invisible colleges as developing core-and- A B C
periphery structures on several levels (White and A - 3 2
McCain, 1989: 130). Socially, the ties in them are B 5 - 0
very unequally distributed, with a few core people
(“stars”) defined by many more communicative C 9 4 -
or productive activities than peripheral people
(as was manifest in the indegrees and outdegrees Figure 19.2 Intercitation matrix

5605-Scott-Chap19.indd 275 4/13/2011 2:32:22 PM


276 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 19.2, which excludes self-citations, Biologist 1 to Ecologist 2). While 31 is the largest
shows that author A has received the most single flow of outcitation, the author receiving
citations from others, 14, while author C has sent incitations from the most other authors – five – is
the most, 13. Theoretically, A may be regarded as Ecologist 3. His citations from others total 30,
an intellectual leader (influencing the group’s suggesting that he is something of an intellectual
ideas), whereas C is more of an organizational influence among these scientists. The subnetwork
leader (binding the group together). These two of Ecologists and Biologists is central to the
roles, discussed in Mullins (1973), appeared group; the others are peripheral, especially the
clearly among the Globenetters in White et al. two linked Economists and the isolate
(2004a). Geographer.
Figure 19.3 displays an unpublished network
from a study of communication patterns in a
national organization for multidisciplinary water Author cocitation
research (Dimitrova et al., 2007). Made with
NetDraw, it reveals how 12 academics have cited As noted earlier, intercitation ties may and often
each other the years. The data were obtained in do – but need not – coincide with social ties
2007 from Scisearch and Social Scisearch com- among the living. The same is true of cocitation
bined. To preserve anonymity, real names have ties. However, the sources of intercitation and
been masked by disciplinary identifications. As in cocitation are quite different. Intercitation occurs
Figure 19.1, two-headed arrows represent mutual only among authors in a predesignated set (whether
citation, whereas one-headed arrows represent formally organized or not). Cocitation is studied
citation that went unreciprocated. Intercitation for authors in a predesignated set, but those doing
counts ranged from 1 (thinnest links) to 31 (from the cociting are authors in general, an open-ended

Earth Scientist

Geographer

Biologist 2 Ecologist 1

Ecologist 3
Economist 2

Ecologist 2

Biologist 1 Economist 1

Public Health Spec

Engineer

Microbiologist

Figure 19.3 Intercitation map of 12 water researchers

5605-Scott-Chap19.indd 276 4/13/2011 2:32:23 PM


SCIENTIFIC AND SCHOLARLY NETWORKS 277

group possibly running into the thousands. Author science, the history of technology, the sociology
cocitation analysis thus reveals the “citers’ of scientific communication, and bibliometrics.
consensus” about a field. It is especially useful for But when he and Diana Crane are cited together
identifying major authors and grouping them into (as they are in 416 articles in Social Scisearch at
specialties – for example, researchers on terrorism this writing), the topic their joint names symbolize
as seen in Reid and Chen (2005). is most likely to be “invisible colleges.” When
Two authors are cocited when any of their either Price or Crane is cited separately, that topic
works appear in the references of another work by is of course not necessarily implied.
anyone (White and McCain, 1989). Every time It frequently happens that highly cocited
works by the two authors co-occur in an authors are “on the same side” intellectually; they
additional list of references, their cocitation count may even have written works together. But
goes up by one. It is the cociting works them- cocitation can also reflect conflicts or oppositions
selves that are counted, and not the number of the sort Collins displays. In an early paper on
of works by either author that are cocited in cocited author networks, McCain (1983) mapped
reference lists. Author cocitation networks are macroeconomists and found that the nodes for
created from matrices of such counts. James Tobin and Milton Friedman were algorith-
The first studies of cocitation involved mically placed in close proximity. This is not
scientific articles as the linked nodes. Cocited because the two are soulmates, but because citers
authors as nodes are simply aggregations of cited have so often joined them as symbols of warring
articles or other publications. Thus, an “author” schools of thought. A textbook quoted by McCain
in this sense is a collection of bylines – an (p. 289) calls Tobin “the outspoken arch-opponent
oeuvre – not a person. But, to repeat, data on oeu- of Milton Friedman’s analysis of monetary
vres and on their authors as persons can be com- problems and of his opposition to activist govern-
bined in the same matrix for analysis. ment intervention.” Sandstrom and White (2007)
As seen in Figure 19.4, cocitation is symmetric: likewise assembled the authors most highly
A’s count with B equals B’s with A. Any two cocited with the anthropologist Marvin Harris for
authors whatever may be substituted for A and B; a chapter in a book on his intellectual legacy. The
for instance, White (2000) cocites Eugene top three were Clifford Geertz, Marshall Sahlins,
Garfield, the father of citation analysis, with and Claude Levi-Strauss, all of whom Harris has
Walt Whitman. But if such pairings are not severely criticized (with Sahlins returning the
widely picked up by others (as Garfield-Whitman favor).
has not been), they have only idiosyncratic Figure 19.5 illustrates some cocited author
meanings. It is the repeated cocitation of a pair of relations. It is an “ego-centered” map of late
authors over time that implies some important tie 20th-century science studies that was created with
between them. the multifaceted Derek J. de Solla Price as seed.
Small (1978) advanced the idea that scientific The map shows him (bottom center) and the 24
articles may be repeatedly cited because they other authors most frequently cited with him in
serve as convenient shorthand for specific Arts and Humanities Citation Index (AHCI)
concepts: a chemist simply invokes, say, “Cromer during 1988–1997.2 Names have the terse
and Weber, 1965” rather than explaining the con- “surname-hyphen-initials” format of the AHCI
cept of “atomic scattering factors.” So, too, a database; Price becomes “Price-DJD.” The
highly cocited author pair may come to imply a numbers on the links are the cocitation counts for
fairly stable meaning over time. The most common each author pair. The structure displayed is a
reason for cocitation is probably perceived simi- Pathfinder Network (PFNET), whose algorithm
larity of topic (or sometimes of method). Cocited examines the cocitation count for every pair of
author pairings tend to narrow the range of topics authors in the matrix and then draws links reflect-
that two author names might imply singly. For ing only the highest (or tied highest) counts
example, Derek J. de Solla Price was a polymath between author pairs. Thus Garfield’s highest
who made major contributions to the history of count in these data is with Price, but Price’s and
Crane’s are with the sociologist Robert K. Merton.
All other ties are pruned away, even though most
author pairs in the matrix have counts greater
A B C than zero, and Price has nonzero counts with
A - 22 7 everyone.
B 22 - 0 Given the names and barebones cocitation links
of Figure 19.5, a knowledgeable interpreter can
C 7 0 - discern a “coalition in the mind” – one involving
different generations, multidisciplinarity, personal
Figure 19.4 Cocitation matrix ties, and conflicts, as Collins would predict

5605-Scott-Chap19.indd 277 4/13/2011 2:32:24 PM


278 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

EDGE-D
GIERYN-TF CHUBIN-D

39 13
9 9
BARNES-B
SHAPIN-S 191 115
SIMON-HA LATOUR-B 186 COLLINS-HM
61
38 137 GILBERT-GN
BENDAVID-J
22
KUHN-TS
24
59 GILLISPIE-CC
COHEN-1B
81

BARBER-B
21
MERTON-RK
25 21
HAGSTROM-WO CRANE-D
28 6
20 7
ZUCKERMAN-H 19 LANDES-DS GARVEY-W
COLE-JR
6
PRICE-DJD

8
14
6
GRIFFITH-BC
GARFIELD-E
BEDINI-SA

Figure 19.5 PFNET of Derek J. de Solla Price and 24 authors cocited with him

(see also the map in White and McCain, 2000). science centered on Bruno Latour.3 The map also
The map does not capture the latest generation of picks up individual authors who have engaged in
leaders in science studies, but rather two previous controversies (e.g., Latour vs. H. M. Collins; Griffith
ones. Some of the authors in it are dead (e.g., vs. Edge). Price was much closer intellectually to
Price died at 61 in 1983; Merton at 92 in 2003), Merton than to Latour, which is why relatively few
and the living are very senior in their fields. constructivists appear in his top 24 cocitees. (To
Specialties represented include bibliometrics some degree, this opposition is maintained in two
(Garfield, Griffith, Simon), the sociology of journals, Scientometrics, which is Pricean and rela-
science (Merton and the group around him; tively Mertonian, and Social Studies of Science,
Ben-David, Gieryn, Chubin), the history of which is constructivist.) It is fitting that the two
science (Kuhn, Gillispie, Cohen, Shapin), the opposed schools are joined in the map through
history of technology, notably of scientific instru- Thomas S. Kuhn, a supremely equivocal figure.
ments (Bedini, Landes), and the sociology of Distinguishing Mertonians and anti-Mertonians
scientific knowledge (Latour, Edge, Barnes, H. M. (broadly, constructivists), Doty et al. (1991: 26)
Collins, Gilbert). Social ties include husband-wife comment: “. . . the work of Thomas Kuhn, espe-
(Merton-Zuckerman) mentor-pupil (e.g., cially The Structure of Scientific Revolutions (1970)
Merton-Cole, Price-Crane), acquaintances (e.g., with its emphasis on the cognitive aspects of
Gieryn-Latour), close personal friends (e.g., Price- science, has usually been placed on the anti-
Griffith), and coauthors (e.g., Zuckerman-Cole, Mertonian side. The identification of Kuhn as an
Garvey-Griffith). anti-Mertonian, however, is clearly wrong-headed:
Because of the way author cocitation works, both Merton and Kuhn expressed admiration for the
Figure 5 automatically captures two schools of other’s work and disappointment in those who
thought that began competing for attention space in insisted on their incompatibility…. ”
the 1970s – American sociology of science Author cocitation maps stimulate one to look
centered on Merton and constructivist accounts of for such guidance in interpreting linkages. It is

5605-Scott-Chap19.indd 278 4/13/2011 2:32:24 PM


SCIENTIFIC AND SCHOLARLY NETWORKS 279

especially interesting to have authors comment on Code, a popular history of genetics from its 19th
cocitation networks centered on them, as does the century origins to the work on the structure of
population geneticist Montgomery Slatkin in DNA by Watson and Crick and their immediate
White et al. (2004b). successors in the 1950s. Garfield and his
coauthors wanted to know the extent to which the
lines of influence claimed by Asimov could also
Historiographs be traced through citation chains, then newly
available in the database that became the Science
These are descent-chains of scientific or scholarly Citation Index. They indeed found overlaps
publications ordered by year. They resemble between Asimov’s account and the citation record.
genealogies, in the sense of earlier writings that They also found some connections missed by
give rise to later writings like a series of “begats.” Asimov that would have enriched his history.
They also somewhat resemble Collins’s diagrams As the founder of the Institute for Scientific
of interpersonal relationships. Although their unit Information (now Thomson Reuters) and the
of analysis is individual publications (and not databases offered through the Web of Science,
oeuvres or persons), they can corroborate intel- Garfield has had a lifelong interest in citation-
lectual influences on scientists and scholars as based historiography. In recent years he and a
persons, including self-influence. The example in team of programmers have developed HistCite, a
Figure 19.6, to be discussed shortly, is taken from tool for analyzing citation-linked literatures down-
the literature on “small world” networks and loaded from the Web of Science (Garfield et al.,
includes two authors already mentioned, Barabási 2003). HistCite can, for example, array the linked
and Newman. publications in chronological order, rank them by
The first major historiograph appeared in citation counts, show the differing productivity of
Garfield et al. (1964). That technical report drew the authors, journals, and organizations that
its inspiration from Isaac Asimov’s The Genetic contributed them, and create historiographs of

1967 - MILGRAM S

1998 - WATTS DJ

1999 - BARTHELEMY M

1999 - BARABASI AL

1999 - BARABASI AL

2000 - NEWMAN MEJ 2000 - ALBERT R 2001 - NEWMAN MEJ

2001 - STROGATZ SH

2001 - LILJEROS F

2000 - JESPERSEN S 2001 - SCALA A 2001 - MANRUBIA SC

2002 - KARIMIPOUR V

Figure 19.6 Historiograph of “small-world“ papers descending from Milgram

5605-Scott-Chap19.indd 279 4/13/2011 2:32:24 PM


280 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

publications that meet a certain threshold of kinds of publications they produce (e.g., Börner,
citedness. HistCite is now a commercial product, 2007).
but Garfield provides free access on the Web to A fair number of quantitative studies of S&SNs
many data sets formatted for historiographic report the size and density of coauthor clusters in
analysis. disciplines or specialties (e.g., Börner et al.,
Figure 19.6 renders a small subset of one of 2005), along with standard measures of author
the HistCite data sets – a bibliography of publica- centrality (e.g., degree, betweenness, closeness)
tions through 2002 that cite Stanley Milgram’s and average number of links between authors
“Small World Problem” (the famous 1967 (e.g., Otte and Rousseau, 2002, Liu et al., 2005).
article that gave rise to the idea of “six degrees of Also seen are studies that examine the growth
separation”). The data, which are available in trends of coauthorships within and across discipli-
Batagelj and Mrvar (2006), have been specially nes and across nations (e.g., Ding et al., 1999,
formatted for Pajek, a free software package for Yoshikane and Kageura, 2004). A third kind
visualizing large matrices. (The Pajek download of study seeks variables correlated with coauthor-
site can be reached from the page just referenced.) ship, such as disciplinary and social ties, instituti-
A genealogical macro included with Pajek (All onal affiliations, and academic rank (e.g.,
Before–All After) makes well-structured diagrams Rodriguez and Pepe, 2008).
from HistCite input, like the one in Figure 19.6. Because contemporary science involves costly
(HistCite’s more tangled plot of some of the same projects with many participants, all of whom want
“small world” papers is reproduced in Garfield, recognition for their efforts, team-authored papers
2004: 132 and Börner, 2007: 816). are now commonplace. Beaver (2004) gives
For clarity of presentation, Pajek commands evidence of one payoff: scientific papers with
have been used to limit the diagram to 14 articles multiple authors are cited more frequently and for
out of 396. All but the most recent four at bottom longer periods, on average, than single-authored
had sizeable citation counts, ranging from 365 for papers, even when both kinds appear in high-
Watts [with Strogatz] to 33 for Liljeros [with impact journals. He concludes that collaboration
others]. Milgram’s count is 148. The arrows, all with peers (not students) increases epistemic
pointing downward, reflect the relation “cited by.” authority. This would not invariably be true, of
As a nice feature of the Pajek algorithm, the course; most disciplines have classics by lone
central chain from Watts to Karimipour automati- intellects. But the trends show collaborative
cally consists of articles that cite all or almost all authorship on the rise, whether the fields are big
of the articles above them. However, Figure 19.6 (e.g., biomedicine, chemistry, mathematics in
suggests not the complete history of Milgram’s Glänzel, 2002; sociology in Moody, 2004) or
“Small World Problem” — note the long time-gap small (e.g., Australian library and information
between it and the next article — but the science in Willard et al., 2008). Moreover, teams
explosion of interest that occurred when network increasingly consist of scientists from different
modeling was taken over by mathematical nations.
sophisticates, mostly from physics. Milgram Bordons and Gomez (2000) and Cronin (2001)
published in Psychology Today. Thirty years later, review issues of authorial credit when multiple
successors like Newman, Barabási, Douglas J. contributors are involved. “Multiple authorship in
Watts, Steven H. Strogatz, and Réka Albert were publication,” write Bordons and Gomez (2000:
publishing in Science, Nature, Physica A, Physical 201), “raises the probem of how credit for the
Review E, and the Proceedings of the National papers should be distributed. Among the solutions
Academy of Sciences. (They were also reinventing proposed we can mention that of giving total
some of Price’s work in the process; see Newman credit to the first author (first author counting),
et al., 2006: 17–18.) assigning full credit to every author (total coun-
ting) or giving an equal fraction of the credit to
each of the authors (fractional counting).*** The
total counting method is most frequently used in
collaboration studies.”
COAUTHORSHIP STUDIES But what now counts as “authorship” and what
do author positions on title pages mean? This
Although widely understood, the coauthor tie has matters because considerations of credit affect
different implications in different academic what the nodes and links in network displays
disciplines. These variations cause analysts to represent. To traditionalists, an author is someone
study such factors as the conventions of author- who writes publishable prose, and in collaborative
ordering in bylines, the number of coauthors listed work the person most responsible for the prose
on a given publication, the number of times should automatically be first author. But some
authors have published together, and the different research groups dilute “authorship” by adding

5605-Scott-Chap19.indd 280 4/13/2011 2:32:24 PM


SCIENTIFIC AND SCHOLARLY NETWORKS 281

honorific names to bylines (e.g., directors of science in which smaller collaborations are the
laboratories where the research is conducted). norm (average two people), and the SPIRES high-
Others put the head of the research team first in energy physics database with an average of
the byline sequence, regardless of who contrib- 9 authors per paper.” His most striking statistic is
uted most to the paper, or put the main author of average collaborators per author: about four in
the paper last. Another variation is to list multiple computer science and theoretical high energy
authors alphabetically, which again obscures physics, about 15 in biomedicine and astrophys-
relative merit. ics, and 173 for experimental (as opposed to
The Web of Science databases now distinguish theoretical) high-energy physics in the SPIRES
between first and secondary authors when data. He shows that papers and collaborators per
crediting citations in coauthorships. (Only first author are well fit by power laws with exponential
authors used to be credited.) Frandsen and cutoffs (the truncation perhaps an artifact of the
Nicolaisen (2008) show that, in information five-year window of analysis).
science, where many researchers are savvy about All Newman’s networks, moreover, exhibit a
Web of Science conventions, first author position so-called giant component, defined as “a large
usually goes to the principal writer (the one group of individuals who are all connected to one
to whom correspondence should be directed), another by paths of intermediate acquaintances”
but in economics, where many researchers are (Newman, 2001: 407). In several fields these
bibliometrically innocent, names in author teams components comprise roughly 80 to 90 percent of
are often simply alphabetized. Consequently, scientists under study. The scientists least
while multiple authorships grew in both fields connected are the theoretical high-energy physi-
during 1978–2007, alphabetization of names cists (71 percent) and the computer scientists
increased in economics but decreased in informa- (57 percent). Newman found that, in fact, scien-
tion science. tists are typically within six links of each other,
Analysts of collaborative networks in science even in a large field like biomedicine – another
also encounter papers with coauthor counts that instance of the legendary six degrees of separa-
far exceed historical norms. Cronin (2001) calls tion. (In Newman, 2004a, he names the best
this phenomenon “hyperauthorship” and notes its connected scientists in three fields, which is
prevalence in parts of biomedicine and especially unusual for network analysts from physics.)
in experimental high-energy physics, where papers Furthermore, working with the clustering coeffi-
with more than 100 (and even more than 1,000) cient C (Watts and Strogatz, 1998), he finds “a
authors can be found. What is the meaning very strong clustering effect in the scientific
of “total counting” when 100 authors each get community: two scientists typically have a
full credit for a single paper, or of “fractional 30 percent or greater probability of collaborating
counting” when each gets one one-hundredth of if they have both collaborated with another third
it? Who, either way, is intellectually accountable scientist” (Newman, 2001: 408). Evidently
for the paper? More to the point here, how does science requires high levels of interpersonal
one study collaborative networks when “author- linkage. The humanities, which still include many
ship” has become a concept wholly vague and scholars who publish alone, would presumably be
diffuse? much more fragmented.
The answer is that collaborative networks are Barabási et al. (2002) continued this line of
summed up by statistics that gloss over such research by showing how networks of collabora-
concerns. Influential work by Newman (2001, tive scientists evolve. By analyzing coauthorship
2004a, 2004b) offers a template of key measures data from mathematics and neuroscience at
(see also Börner et al., 2004). Using various one-year intervals over the period 1991–1998,
bibligraphic databases, Newman assembled data they show that Newman’s measures are time-
on author collaborations in biomedicine, various dependent. Among their conclusions are that (1)
specialties of physics, amd computer science links attached to author-nodes follow power-law
during 1995 through1999. In Newman (2004b) he (also known as scale-free) distributions, with rela-
added data on collaborations in mathematics from tively few highly connected nodes and a long tail
1940 through ca. 2003. He thus is able to report of increasingly less-connected nodes; (2) paths of
total papers and total authors, average papers per links between nodes are relatively short and
author and authors per paper, and average collabo- decrease over time, which is characteristic of
rators per author (among other things). “Authors “small world” as opposed to randomly-generated
typically wrote about four papers in the five year networks; and (3) the relative size of the “giant
period covered by this study,” he observes component” increases over time. The mode by
(Newman, 2001: 406). “The average paper had which networks grow is called “preferential
about three authors. Notable exceptions are in attachment.” That is, new nodes “. . . link with
theoretical high-energy physics and computer higher probability to those nodes that already have

5605-Scott-Chap19.indd 281 4/13/2011 2:32:24 PM


282 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

a larger number of links . . .” (Barabási et al., effect of specialty on the likelihood of having
2002: 599). More specifically, new authors are coauthored. Authors who write in historical, qual-
likelier to write papers with people already rich in itative, radical and interpretive specialties are less
coauthors, a form of cultural capital. (Price called likely to coauthor than those writing in more
the same phenomenon “cumulative advantage,” positivist and quantitative specialties” (Moody,
often translated as “the rich get richer.”) The other 2004: 224). For predicting the degree of embed-
mode of evolution is that authors already in the dedness in the coauthorship network – the number
network join to form new coauthorships, again of other authors to whom a collaborator is directly
according to preferential attachment. This latter or indirectly linked – specialty is less important
mode adds a greater fraction of new links to the than the ability to upgrade a research team’s meth-
network than links created by new authors odological sophistication. “Coauthorship,” says
(Barabási et al., 2002: 613). Moody (2004: 235) “is not evenly distributed
across sociological work. As predicted by others,
coauthorship is more likely in specialties that
admit to an easier division of labor. Research
THE TRUE GLUE method seems particularly important, showing
that quantitative work is more likely to be coau-
What binds scientific and scholarly networks thored than non-quantitative work.”
together? At the most basic level, it is what A third example involves coauthorship, cocita-
members can competently write about – what they tion, and intercitation. As noted above, White
know, rather than whom. People with et al. (2004a) analyzed pairwise data for the
complementary substantive talents will often have 16 members of Globenet, the goal being to
personal relationships, ranging from hostility discover whether any of a range of social and
to friendship to loving intimacy. Given the spe- communication variables predicted intercitation
cialization of learned interests, it is not surprising in, first, their journal articles over a period of more
when those who share them find occasions in their than two decades and, second, in a summative
lives to meet. But, in research, social and affective 1999 book to which all Globenetters contributed.
ties are secondary to intellectual relevance. Considered separately, nine variables turned out to
Disciplines and specialties exist to bring people be correlated with intercitation in articles. Social
with mutually relevant interests together. At the ties were (1) knowing a person before Globenet
same time, they exist to remind the living of the was formed, (2) being friends with a person, and
continuing relevance of authors now dead. (3) having sought a person’s advice. Intellectual
Various articles suggest the importance of what ties were (4) cocitation count, (5) being in the
may broadly be called intellectual ties. Rodriguez same discipline, and (6) having read a person’s
and Pepe (2008), for example, studied the work. Ties that combined the social with the intel-
U.S.-based Center for Embedded Networked lectual were (7) having collaborated with a person,
Sensing and used four different algorithms to (8) being an editor of the 1999 book, or (9) coau-
detect structural communities among its multi- thoring a chapter in the book.
disciplinary, multi-institutional teams of coau- However, when the nine were entered into a
thors. Characteristics on which communities regression to predict intercitation in articles, a
might be based were academic department, single variable wiped out all the others: the cocita-
university affiliation, country of origin, and tion count for each pair of Globenetters. In other
academic position. For the 291 coauthors in the words, a cocitation count, which represents how
sample, all four algorithms showed that common citers in general view any pair of authors, was the
academic department is by far the strongest best predictor of how any two authors viewed
characteristic, with university affiliation also each other. This is not to say that ties such as
significant. This suggests that perceived intellec- friendship, advice-seeking, and collaboration
tual ties are reinforced by physical proximity. But are unreal or unimportant. It is to say that the
of course proximity means little in coauthorship main force driving citation over time, and sub-
without the requisite knowledge and interests on suming other ties, is perceived similarity of topic
both sides. and method. This is what repeated cocitation
Moody (2004) provides another example of the captures.
importance of mutually relevant knowledge. By contrast, intercitation in the book did not
Drawing mainly on data from Sociological vary with cocitation patterns at all. Rather, it
Abstracts, he presents a complex multivariate varied principally with being one of the book’s
analysis of coauthorship in 36 topical areas over editors or coauthors. But even these are not purely
the period 1963–1999. Here, only two major find- social relations; they are grounded, once more, in
ings will be quoted. With regard to participation ties that are intellectual and content-laden. As we
in the coauthorship network, “There is a clear saw in Rodriguez and Pepe (2008) and Moody

5605-Scott-Chap19.indd 282 4/13/2011 2:32:24 PM


SCIENTIFIC AND SCHOLARLY NETWORKS 283

(2004), such ties are the “true glue” binding coau- academic departments, to be ranked. The latter
thors. The same point is made about citation in measures are contested because policy-makers may
White et al. (2004a: 112): use them to determine levels of funding for the
units – something many researchers want to leave to
. . . social ties are neither necessary for citation peer review. (These researchers tend to mistrust bib-
(one may cite authors without knowing them) nor liometric data, often justifiably.) At the same time,
sufficient for citation (knowing authors is not peer review in large-scale research evaluations
reason enough to cite them). Nor is there a clear has become laborious to the point of breakdown,
temporal arrow in the matter: citing may or may thereby inviting bibliometric rankings as a more
not lead to meeting, and meeting may or may not cost-effective and efficient replacement. A large and
lead to citing. So any attempt to explain citation fast-growing literature addresses this controversy.
primarily in terms of acquaintanceship fails. For a Hicks (2009) surveys outcomes from America, Britain,
better explanation of why people cite, one must and Australia and links them to a good introductory
look to intellectual factors, such as commonality of bibliography.
discipline, subject matter, research methods, and 2 The 10-year subset of AHCI was given by its
perspective (e.g., theoretical versus empirical, publisher, Thomson Reuters, to Drexel University for
quantitative versus qualitative.) research purposes. To obtain the map, Price’s name
is entered into AuthorWeb, network visualization
Thus, coauthor networks and citation networks software developed at Drexel. Price and his 24
have a unified interpretation in the sense that highest cocitees are retrieved in rank order of their
both derive from perceptions of intellectual cocitation counts with him. The software then
relevance. retrieves the cocitation counts of all 24 with each
This interpretation justifies their study in an other and forms a matrix with (25 x 24) / 2 = 300
analytical framework that combines papers unique author pairs. The PFNET algorithm is one
published (productivity) with citations received of three in AuthorWeb that can operate on this
(impact) to show the relative success of collabora- matrix.
tions. To take a last example, Börner et al. (2005) 3 These counts for authors in science studies are
have devised impact weights for coauthored taken from a decade of humanities journals in which
papers that reflect the citations shared by each social constructivists like Latour loom large. Were the
author team. When the data are visualized, with data from journals covered by the Social Sciences
authors as nodes, links representing coauthor- Citation Index during the same decade, counts for
ships, and thickness of links representing the all pairs would be higher, and those of the construc-
summed citations received, it is apparent how tivists would not dominate as here. Also, in this
various authors are connected and which teams Price-based matrix, Gieryn’s and Chubin’s works are
have had the greatest impact. This is important most highly cocited with Latour’s, but they are not
because increasing coauthorship in many fields members of his school. Further data would bring
presages, according to Börner et al. (2005: 66), Randall Collins into this map; for example, he studied
“a more interdisciplinary, globally connected and coauthored articles with Joseph Ben-David.
science as opposed to science driven by single
experts.” Börner’s metaphor for this is “the
emerging global brain.” Any single instance of
it would be, quite fittingly, one of Collins’s
“coalitions in the mind.” REFERENCES

Barabási, A. L., Jeong, H., Néda, Z., Ravasz, E., Schubert, A.


and Vicsek, T. (2002) ‘Evolution of the social network of
NOTES scientific collaborations’, Physica A, 311: 590–614.
Batagelj, V. and Mrvar, A. (2000) ‘Some analyses of Erdös
1 Such rankings generally reflect authorial collaboration graph’, Social Networks, 22: 173–86.
productivity (measured by publication counts) or Batagelj, V. and Mrvar, A. (2006) ‘Citation networks’, http://
authorial impact (measured by citation counts), or vlado.fmf.uni-lj.si/pub/networks/data/cite/default.htm
some combination thereof. The h-index and the (accessed May 2009).
g-index, explained in Wikipedia and in many papers Beaver. D. deB. (2004) ‘Does collaborative research have
on the Web, have gained currency as ways of greater epistemic authority?’ Scientometrics, 60(3):
comparing the productivity and impact of individual 399–408.
scientists. These indicators are still controversial (and Bordons, M. and Gomez, I. (2000) ‘Collaboration networks in
various refinements have been proposed), but even science’. In Blaise Cronin and Helen B. Atkins (eds), The
more controversial are measures that permit the Web of Knowledge; A Festschrift in Honor of Eugene
productivity and impact of research units, such as Garfield. Medford NJ: Information Today. pp. 197–213.

5605-Scott-Chap19.indd 283 4/13/2011 2:32:25 PM


284 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Börner, K. (2007) ‘Making sense of mankind’s scholarly Communication: Technology and Impacts. (AAAS Selected
knowledge and expertise: Collecting, interlinking, and Symposium Series, No. 52.) New York: Westview Press.
organizing what we know and different approaches to pp. 77–85.
mapping (network) science’. Environment and Planning B: Garfield, E. (2004) ‘Historiographic mapping of knowledge
Planning and Design, 34: 808–25. domains literature’. Journal of Information Science, 30(2):
Börner, K., Dall’Asta, L., Ke, W. and Vespignani, A. (2005) 119–45.
‘Studying the emerging global brain: Analyzing and Garfield, E., Pudovkin, A. I. and Istomin V. S. (2003) ‘Why do
visualizing the impact of co-authorship teams’. Complexity, we need algorithmic historiography?’ Journal of the
10(4): 57–67. American Society for Information Science and Technology,
Börner, K., Maru, J.T. and Goldstone, R.L. (2004) ‘The 54(5): 400–412.
simultaneous evolution of author and paper networks’. Garfield, E., Sher, I.H. and Torpie, R.J. (1964) The Use of
Proceedings of the National Academy of Sciences, Citation Data in Writing the History of Science. Philadelphia:
101(Supp 1): 5266–73. Institute for Scientific Information. http://www.garfield.
Chubin, D.E. (1976) ‘The conceptualization of scientific library.upenn.edu/papers/useofcitdatawritinghistofsci.pdf
specialties.’ Sociological Quarterly, 17(4): 448–76. (accessed May 2009).
Collins, R. (1998) The Sociology of Philosophies: A Global Glänzel, W. (2002) ‘Coauthorship patterns and trends in the
Theory of Intellectual Change. Cambridge MA and London: sciences: A bibliometric study with implications for data-
Belknap Press of Harvard University Press. base indexing and search strategies – 1980–1998’. Library
Crane, D. (1970) ‘The nature of scientific communication and Trends, 50(3): 461–73.
influence’. International Social Science Journal, 22(1): Grossman, J.W. (2007) ‘The Erdös Number Project’. http://
28–41. www4.oakland.edu/enp/ (accessed May 2009).
Crane, D. (1972) Invisible Colleges: Diffusion of Knowledge in Hicks, D. (2009) ‘Evolving regimes of multi-university research
Scientific Communities. Chicago: University of Chicago evaluation’. Higher Education, 57(4): 393–404.
Press. Kuhn, T.S. (1970) The Structure of Scientific Revolutions.
Cronin, B. (1995) The Scholar’s Courtesy: The Role of 2nd. ed. Chicago: University of Chicago Press.
Acknowledgements in the Primary Communication Process. Laudel, G. (2002) ‘Collaboration and reward. What do we
London: Taylor Graham. measure by co-authorships?’ Research Evaluation, 11(1):
Cronin, B. (2001) ‘Hyperauthorship: A postmodern perversion 3–15.
or evidence of a structural shift in scholarly communication Lievrouw, L.A., Rogers, E.M., Lowe, C.U. and Nadel, E. (1987)
practices?’ Journal of the American Society for Information ‘Triangulation as a research strategy for identifying invisible
Science and Technology, 52(7): 558–69. colleges among biomedical scientists’. Social Networks,
Cronin, B., Shaw, D. and Barre, K.L. (2003) ‘A cast of 9: 217–48.
thousands: Coauthorship and subauthorship collaboration Liu, X., Bollen, J., Nelson, M.L. and Sompel, H.V.D. (2005)
in the 20th century as manifested in the scholarly journal ‘Co-authorship networks in the digital library research
literature of psychology and philosophy’. Journal of the community’. Information Processing and Management, 41:
American Society for Information Science and Technology, 1462–80.
54(9): 855–71. Marchionini, G., Solomon, P., Davis, C. and Russell, T. (2006)
de Castro, R. and Grossman, J.W. (1999) Famous trails to Paul ‘Information and library science MPACT: A preliminary
Erdös. Mathematical Intelligencer, 21(3): 51–63. analysis’. Library and Information Science Research, 28:
Ding, Y., Foo, S. and Chowdhury G. (1999) ‘A bibliometric 480–500. The visualizations are at http://ils.unc.edu/mpact
analysis of collaboration in the field of information (accessed May 2009).
retrieval’. International Information and Library Research, McCain, K.W. (1983) ‘The author co-citation structure of
30: 367–76. macroeconomics’. Scientometrics, 5: 277–89.
Dimitrova, D., Koku, E., Wellman, B. and White, H. (2007) McCain, K.W. (1991) ‘Communication, competition, and
Network Mapping Study (Final Report): Prepared for the secrecy; The production and dissemination of research-
Canadian Water Network. Accessed December 2010. related information in genetics.’ Science Technology and
Doty, P., Bishop, A.P. and McClure, C.R. (1991) ‘Scientific Human Values, 16(4): 491–516.
norms and the use of electronic research networks’. McCain, K.W. (2000) ‘Sharing digitized research-related
Proceedings of the 54th Annual Meeting of the American information on the World Wide Web.’ Journal of
Society for Information Science, 28: 24–38. the American Society for Information Science, 51(14):
Frandsen, T.F. and J Nicolaisen, J. (2008) ‘Reactive tendencies 1321–27.
of bibliometric indicators: Alphabetization of authorship in Milgram, S. (1967) ‘The small world problem’. Psychology
economics and information science’. Proceedings of the Today, 1(1): 60–67.
71st Annual Meeting of the American Society for Moody, J. (2004) ‘The structure of a social science collabora-
Information Science and Technology, 45: unpaginated tion network: Disciplinary cohesion from 1963 to 1999’.
CDROM. American Sociological Review, 69(2): 213–38.
Freeman, L. and Freeman, S. (1980) ‘A semi-invisible Mullins, N.C. (1973) Theories and Theory Groups
college: Structural effects on a social network group.’ In in Contemporary American Sociology. New York: Harper
M. M. Henderson and M. J. MacNoughton (eds), Electronic and Row.

5605-Scott-Chap19.indd 284 4/13/2011 2:32:25 PM


SCIENTIFIC AND SCHOLARLY NETWORKS 285

Newman, M.E.J. (2001) ‘The structure of scientific collabora- Sonnenwald, D.H. (2007) ‘Scientific collaboration’. Annual
tion networks’. Proceedings of the National Academy of Review of Information Science and Technology, 41:
Sciences, 98: 404–9. 643–81.
Newman, M.E.J. (2004a) ‘Who is the best connected Wasserman, S. and Faust, K. (1994) Social Network Analysis;
scientist? A study of scientific coauthorship networks’. In Methods and Applications. Cambridge, UK: Cambridge
E. Ben-Naim, H. Frauenfelder, Z. Toroczkai (eds), Complex University Press.
Networks. Berlin: Springer. pp. 337–70. Watts, D.J. and Strogatz, S.H. (1998) ‘Collective dynamics of
Newman, M.E.J. (2004b) ‘Coauthorship networks and “small-world” networks’. Nature, 393: 440–42.
patterns of scientific collaboration’. Proceedings of the White, H.D. (2000) ‘Toward ego-centered citation analysis’. In
National Academy of Sciences, 101(Supp 1): 5200–5205. Blaise Cronin and Helen Barsky Atkins (eds), The Web of
Newman, M., Barabási, A.-L. and Watts, D.J. (eds) (2006) The Knowledge: A Festschrift in Honor of Eugene Garfield.
Structure and Dynamics of Networks. Princeton: Princeton Medford NJ: Information Today. pp. 475–96.
University Press. White, H.D. and McCain, K.W. (1989) ‘Bibliometrics’. Annual
Otte, E. and Rousseau, R. (2002) ‘Social network analysis: Review of Information Science and Technology, 24:
A powerful strategy, also for the information sciences’. 119–86.
Journal of Information Science, 28(6): 443–55. White, H.D. and McCain, K.W. (2000) ‘In memory of Belver C.
Price, D. de.S. (1961) Science since Babylon. New Haven Griffith’. Journal of the American Society for Information
and London: Yale University Press. (Enlarged edition, Science, 51(10): 959–62.
1975.) White, H.D., Wellman, B. and Nazer, N. (2004a) ‘Does citation
Reid, E. and Chen, H. (2005) ‘Mapping the contemporary reflect social structure? Longitudinal evidence from the
terrorism research domain: Researchers, publications, and “Globenet” interdisciplinary research group’. Journal of the
institutions analysis’. In P. Kantor et al. (eds), Lecture Notes American Society for Information Science and Technology,
on Computer Science, 3495: 322–39. 55: 111–26.
Rodriguez, M.A. and Pepe, A. (2008) ‘On the relationship White, H.D., Lin, X., Buzydlowski, J. and Chen, C. (2004b)
between the structural and socioacademic communities ‘User-controlled mapping of significant literatures’.
of a coauthorship network’. Journal of Informetrics, 2: Proceedings of the National Academy of Sciences,
195–201. 101(Supp 1): 5297–302.
Sandstrom, P.E. (2001) ‘Scholarly communication as a Willard, P., Kennan, M.A., Wilson, C.S. and White, H.D.
socioecological system’. Scientometrics, 51(3): 573–605. (2008) ‘Publication by Australian LIS academics: A prelimi-
Sandstrom, P.E. and White, H.D. (2007) ‘The impact of nary investigation’. Australian Academic and Research
cultural materialism; A bibliometric analysis of the Libraries, 39(2): 65–78.
writings of Marvin Harris’. In Lawrence A. Kuznar and Yoshikane, F. and Kageura, K. (2004) ‘Comparative analysis
Stephen K. Sanderson (eds), Studying Societies and of coauthorship networks of different domains: The
Cultures; Marvin Harris’s Cultural Materialism and Its growth and change of networks’. Scientometrics, 60(3):
Legacy. Boulder CO and London: Paradigm Press. 433–44.
pp. 20–55. Zuccala, A. (2006) ‘Modeling the invisible college’. Journal of
Small, H.G. (1978) ‘Cited documents as concept symbols’. the American Society for Information Science and
Social Studies of Science, 8(3): 327–40. Technology, 57(2): 152–68.

5605-Scott-Chap19.indd 285 4/13/2011 2:32:25 PM


20
Cultural Networks
Paul DiMaggio

Forty years ago, this chapter’s title might have 1994; Mische, this volume). Although few
seemed oxymoronic. Early network analysis was students of culture employ formal network-
rooted in social psychology (sociometry) or in a analytic methods, their theories lead them to the
radical structuralism (blockmodeling) that viewed edge of SNA, where exemplary studies bring the
culture as a fog obscuring social reality, rather two fields ever closer.
than as a legitimate analytic category (Freeman, Social-scientific work on culture has three ana-
2004; White et al., 1976).1 For their part, cultural lytic foci: formally organized systems that pro-
analysts either defined culture so broadly that it duce and distribute cultural products; expressive
encompassed all patterned behavior and symbol symbols that facilitate the production of individual
systems (anthropologists) or so abstractly that it and group identities and intergroup boundaries;
resisted empirical research (Parsonsian sociolo- and the symbolic organization of meaning. Relational
gists). Even communications scholars who used theories are central to each of these topics.
network analysis to understand information flows Cultural production systems. Research on the
largely avoided questions of meaning central to arts has converged on the analysis of art worlds
the study of culture (Rogers, 1962). (Becker, 1982), fields (Bourdieu, 1983), and
Things have changed. Developments in both production systems (Peterson and Anand, 2004;
social network analysis (SNA) and the study of Caves, 2002). Becker (1974) argues that collabo-
culture have brought these fields closer together. rative networks (“artworlds”) produce art and that
As Breiger (2004) has noted, White’s embrace of these, rather than individual “artists,” are the
cultural analysis in Identity and Control (1992a), proper objects of social-scientific analysis.
the connectionist turn in cognitive science (Strauss Bourdieu depicts artists and other creative work-
and Quinn, 1997), and developments in cultural ers (scientists, preachers, chefs) as constrained by
sociology and anthropology (e.g., Fuhse, 2009) their positions in fields (champs), readily recon-
have contributed to this trend. Moreover, the rise ceived as networks, that influence returns to
of the Internet has made it easier to conceive of different aesthetic strategies. The production of
culture as a kind of network (Castells, 2000; culture approach, developed in research on media
Turner, 2006), while generating vast amounts of industries (Peterson and Berger, 1971), studies
textual data amenable to SNA. how networks of collaborating organizations guide
I hope to convince the reader that network the flow of symbolic goods from creators through
analysis is the natural methodological framework gatekeepers to publics. The economics variant
for empirically developing insights from leading (Caves, 2002) contrasts systems that internalize
theoretical approaches to cultural analysis. For production in firms to those (increasingly
the most influential analytic approaches to cul- prevalent) that organize production through social
ture, relationality is central to understanding how networks and short-term projects. Although foun-
cultural systems operate (Emirbayer and Goodwin, dational papers in each tradition used the term

5605-Scott-Chap20.indd 286 4/6/2011 11:53:29 AM


CULTURAL NETWORKS 287

“network” only casually, recent studies have structures that link meanings, values, stories and
employed SNA to realize the potential of forma- rhetorics” (Mohr and White, 2008). Such an
tive ideas. Work on science (White, this volume) approach lends itself to the use of single-mode
has formalized the foundational imagery of the networks of co-occurrence relations among such
“invisible college” (Crane, 1972) in analogous cultural elements as words, tropes, attitudes,
ways. Research in this area focuses on single- symbols, or tastes.
mode networks of relations among culture This chapter reviews network studies in these
producers and on dual-mode networks linking three areas seriatim. I define “network analysis”
producers to gatekeepers. liberally, including some studies that generate
Culture, identity, and boundaries. Students of relationality matrices suitable for conventional
culture examine ways in which expressive network methods but that produce results with
symbols, tastes, and styles constitute and signal nonnetwork scaling and clustering methods.
identities and define social boundaries (Lamont I favor studies depicting systems as networks over
and Molnár, 2002). This approach descends from those using spatial methods; and focus on
Weber’s argument that status groups develop empirical work, neglecting research that uses com-
distinctive cultures useful for claiming honor, putational network models to contribute to theories
identifying in-group members, and maintaining of cultural change. I avoid two relevant topics –
solidarity (Weber, 1946 [1925]); and from sociology of science and research on diffusion and
Durkheim’s (1933 [1893]) contention that contagion – to which other chapters are devoted.
complex societies require new forms of cultural
cohesion based on occupational differentiation
and on diffusion of ideas and symbols through
exchange networks (i.e., organic vs. mechanical
solidarity). Shared culture facilitates the construc- CULTURAL PRODUCTION SYSTEMS
tion and persistence of social networks through
two mechanisms. First, visible symbols permit Much social-scientific work on culture examines
persons to recognize others with whom they share settings – industries, professions, organizations,
a status or identity (Goffman, 1951); second, informal work groups – in which cultural products
shared knowledge, tastes, and styles produce are produced. By “cultural product,” I refer to
bonding by facilitating and by enhancing discrete and apprehensible human creations –
emotional rewards derived from conversational songs, paintings, newspaper articles, meals,
exchange (Collins, 2004; Erickson, 2004). It fol- sermons, laws, poems, scientific papers,
lows that relations between persons and cultural garments – associated with institutionalized fields
symbols are characterized by duality, such that of cultural production. Such cultural products are
shared tastes or interests constitute social groups produced in and by networks of collaborating
and shared publics constitute genres or subcul- firms and persons.
tures (DiMaggio, 1987; Breiger, 2000). This Early examples of this approach – White and
perspective lends itself to the use of two-mode White’s study of the origins of impressionism
networks (Borgatti, this volume) to depict ties (1965), Bourdieu’s study of photographers
between persons (or organizations) and cultural (Bourdieu et al., 1965), Becker’s analyses of the
products, symbols, or beliefs. visual and performing arts (1974), Peterson and
Meaning through relations. The Swiss linguist Berger’s (1971) and Hirsch’s (1972) work on
Ferdinand de Saussure (1977 [1916]), argued that cultural industry systems – used network imagery
linguistic meaning emerges from relations among rather than network methods, but formal work
words and phonemes. The Russian semiotician followed quickly.
Mikhail Bakhtin extended the principle to longer Perhaps the earliest such study was Kadushin’s
textual elements, and beyond texts to other symbol examination of the U.S. intellectual elite (1974).
systems (1986). Because interpretive work on Kadushin identified several critical characteristics
culture views meaning as reflecting the relation- common to many cultural production networks,
ship between words or symbols rather than including circularity (high levels of mutual
the fixed content of each, network analysis of awareness and attention); unclear boundaries;
relations among cultural objects is a natural way opacity to outsiders; limited roles for formal
to address the problem of meaning (Mohr, 1998). institutions, which serve as interaction foci but do
More recently, students of mental models (Carley not claim long-term, complete commitments from
and Palmquist, 1992) and narrativity (Franzosi, creative workers; dense cores and sparse peripher-
1998) have advanced a relational understanding of ies, without formal leadership structures; and
culture and cognition consistent with the view that chronic resource uncertainty and ambiguity of
“in addition to social networks, institutional life is prestige, both leading to active exchange of infor-
organized around cultural networks, relational mation and evaluations.

5605-Scott-Chap20.indd 287 4/6/2011 11:53:30 AM


288 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Four approaches have dominated recent authors and critics. DeNooy argues that networks,
network analyses of creative fields: Bourdieu’s themselves shaped by authors’ social origins,
theory of competition; theories of efficient bound- constitute literary genres that double as author
aries; research on small worlds; and analyses of identities, which in turn influence social and
structural mechanisms that induce creative or aesthetic hierarchies. DeNooy’s approach is novel
financial success. SNA has also addressed the in that he uses balance theory and triad censuses
chronic challenge of sampling artist populations, to understand microstructures that generate
which can rarely be identified through standard hierarchy. Giuffre (2001) also draws on field
means. theory to analyze relationships between networks
(New York photographers sharing gallery
representation during the 1980s) and genre
classifications. The most successful photogra-
ANALYZING FIELDS phers sustained structural and aesthetic ambiguity,
bridging positions in the network and defying
Bourdieu (1983) views fields as sites of strategic critical efforts to label their styles. Kirschbaum
competition between actors with varying degrees and Vasconcelos (2007) explore relationships
of cultural capital (ease and familiarity with between social networks and genre classifications
prestigious forms of culture) and economic in a study of Brazilian tropicália music, which
resources. (He identified social capital [ego they portray as emerging out of the accretion
networks] as a third resource, but failed to develop of collaboration ties among artists previously
this insight empirically [1986].) To simplify recording in structurally distant genres.
considerably, Bourdieu contends that the volume
and composition (i.e, relative proportion) of
economic and cultural capital that actors possess
influence the social relations they can form, ORGANIZING CULTURAL MARKETS
which, in turn, shape expected returns from
alternative creative strategies. Much work on cultural industries suggests that
Anheier and Gerhards’s (1991; Anheier et al., coordination by contract or the use of ad hoc
1995) study of literary authors in Cologne, project teams are more efficient ways to allocate
Germany, unites Bourdieuian analysis with SNA. talent than through formal organization when each
The researchers collected data on friendship, product is unique and markets are uncertain
awareness, assistance, and reference-group ties, (Peterson and Berger, 1971; Caves, 2002).
using blockmodels to describe the field’s structure Network analysts have begun to contribute to this
and correspondence analysis (Bourdieu’s favored literature.
technique) to map network position onto attitudes, In an exemplary study of the organization of
membership, literary genres, and professional live popular music in the Boston area, Foster and
success. The network was sparse, with dense colleagues (2006) analyze linkages between
connections limited to a small elite, and it was performance venues and two kinds of bands –
vertically bifurcated between producers of literary “cover” bands (which reproduce tunes by promi-
and vernacular fiction. nent recording artists) and “indie” bands (which
In an innovative study, DeNooy (2002) create and perform original material). The authors
produced an affiliation network of 18 Dutch and combine several kinds of data: a band-by-
Flemish literary magazines and 249 authors who club network based on more than 10,000 perform-
published in them from 1970 to 1981, and used ances, interviews with club booking staff, advice
Markov Monte Carlo estimation procedures networks among booking agents, and classifica-
to explore relationships between authors’ and tion of bands by expert informants. They find that
magazines’ prestige. Unsurprisingly, prestigious the cover-band segment is characterized by close
authors flowed to prestigious magazines. More ties among club managers, but weak club-artist
tellingly, the flow was predicted not by static ties, whereas the indie sector is dominated by
popularity but by a dynamic prestige measure, club-focused patron-client nets, a difference they
intended to operationalize Bourdieu’s (1983) ideas attribute to greater market uncertainty in the
about the dual constitution of locations in the latter.
literary field, that tracked recent movements Giuffre (1999) employs blockmodeling and
between magazines. optimal-matching sequence analysis to explore
Several other studies explore Bourdieu’s how networks shaped careers of New York
insight that genre classifications are homologous photographers between 1981 and 1992. She
to social distinctions. DeNooy (2003b) links depicts careers as a two-mode game wherein
Bourdieu’s argument to White’s theory of catnets both photographers and galleries try to move
in a study of relations among 40 Dutch literary up by forming ties to increasingly prestigious

5605-Scott-Chap20.indd 288 4/6/2011 11:53:30 AM


CULTURAL NETWORKS 289

counterparts. Thus, photographers’ prestige is degree distributions, path lengths, and assortativ-
subject to choices that other photographers make ity, despite substantial institutional change and
to join or leave the galleries with which each much volatility in the clustering coefficient. Good
is associated. Another study of artist-gallery times on Broadway were characterized by
networks (Boari and Corrado, 2007) contends that moderate clustering, whereas both high and low
endemic uncertainty led contemporary artists to coefficients were associated with financial and
invest heavily in identifying and occupying critical downturns. These results, Uzzi argues,
structural holes, producing a system with marked suggest that low and high clustering produce
small-world properties. different forms of stagnation, whereas moderate
clustering optimizes cross-fertilization.

SMALL-WORLD STUDIES
HOW NETWORKS SHAPE
In his analysis of the Internet Movie Database CREATIVITY AND SUCCESS
(IMDB; www.imdb.com) actor-by-film network
(transformed to an actor-collaboration net), Uzzi’s work is unusual in its focus on system
Watts (1999) first observed that artistic networks properties. But research on the relationship
(among others) display small-world properties: a between social networks and success in cultural
coincidence of high levels of local clustering and fields dates back to Merton’s essay, “The Matthew
very low average path distances (both compared Effect in Science” (1968), and to the Whites’
to random nets). His example engendered an study of the Impressionist movement (1965).
explosion of descriptive studies of collaboration Collins’s (1989, 1998, 2000) conflict theory of
networks, all reporting that their fields are “small intellectual change, illustrated by his magisterial
worlds” (e.g., Gleiser and Danon [2003] on early study of the social organization of philosophical
jazz musicians; Jacobson and Sandler [2008] on schools over more than two millennia, and
musicians’ Myspace friends; DeLima e Silva et al. developed further in a comparative study (Collins
[2004] on Brazilian popular musicians). and Guillen, 2009) of philosophers and architects,
The challenge in such studies, which is only offers a valuable framework. Collins makes
sometimes met, is to connect structural analysis of several claims about networks that drive intellec-
fields as small worlds to substantive questions tual movements. First, intellectual and creative
worth engaging – for example, by using compara- progress is characterized by strong positive
tive methods or linking structural properties to network externalities, causing temporal and spa-
field performance. An exemplar of the former tial concentration of significant movements.
approach (Park et al., 2006; Teitelbaum et al., Second, the most eminent thinkers are densely
2008) compares two “networks” of musical connected to well-known peers. Third, reputa-
recording artists – an actual network of recording tional contagion (“halo” or “Matthew” effects)
collaboration and a similarity matrix based on lifts all boats in an ascendant school (i.e., a
expert judgments about the same bands’ styles. densely connected cluster of culture producers
Although both networks exhibit standard who share an identity). Fourth, movement leaders
small-world properties, the similarity network create new ties to extend their influence outward
maps neatly onto genres, whereas the collabora- (and not to extract rents by occupying structural
tion network is an amalgam of geographic holes). Fifth, schools tend toward schism through
clusters, center-spoke structures around major generational conflict. Sixth, systems have a
bands, and diffuse collaborations. The authors use carrying capacity of three to six active schools at
innovative visualization methods to demonstrate any one time. Finally, institutional change often
that increased cross-genre collaboration has unleashes rapid network elaboration and an
reduced the coincidence of partitions based explosion of creativity. Crossley (2009) empha-
on stylistic similarity and those based on collabo- sizes similar themes in his analysis of networks
ration over time. that produced Britain’s punk music scene: the
Uzzi’s study of Broadway musicals (2008; indispensability of a critical mass of strong recip-
Uzzi and Spiro, 2005) is an exemplar of research rocal ties, positive network externalities, resource
on how small-world properties affect system pooling, reputational contagion, and identity as a
performance. Uzzi examines the network of key collective good.
artistic team members and producers involved in Burt (2004) offers a valuable approach to
523 original musical productions mounted understanding the relationship between individual-
between 1945 and 1989 (where edges connect level network location and creativity. He argues
participants who worked together on a that unique occupancy of brokerage positions
production). He finds stability over that period in (“structural holes”) exposes occupants to a broad

5605-Scott-Chap20.indd 289 4/6/2011 11:53:30 AM


290 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

range of ideas. Such boundary-spanners, in turn, groundbreaking paper that offers a better solution,
generate more ideas, and the ideas they generate Heckathorn and Jeffri (2001) use respondent-
are better received than those of their less cosmo- driven sampling (RDS), a method of highly con-
politan counterparts. Although Burt’s evidence trolled respondent referrals developed to study
comes from research on an electronics company, such hidden populations as HIV-positive drug
the argument readily generalizes to artistic users, to identify populations of jazz musicians in
creativity. four U.S. cities. McPherson (2001) describes the
Much research analyzes how network position applicability of another network-based method,
affects individual or team success, and much of hypernetwork sampling, to locating artists through
this work focuses on the film industry. Films are sample surveys in populations too large to be
produced by ad hoc creative teams, generating accessed by RDS.
comparatively dense and rapidly evolving
collaboration networks. Faulkner and Anderson
(1987) first documented the prevalence of status
homophily in team development and the associa- CULTURE, IDENTITY, AND
tion between team status and box-office revenues. BOUNDARIES
The availability of IMDB data has stimulated this
literature, which typically depicts networks in
Any cultural analysis must take into account iden-
which creative workers are nodes, participation in
tities: how identities (of people and things) emerge,
the same film project creates an edge, and edges
how they are sustained, and under what conditions
decay over time. Notable examples include
they become salient. Cultural analysis must also
Esparza and Rossman’s study (2006) of the impact
take into account the way that actors employ clas-
of ties to Academy members and team-member
sification schemes to categorize one another
performance on an actor’s risk of receiving an
(Lamont and Molnár, 2002). In worlds organized
Oscar nomination; Cattani and Ferriani’s (2008)
around groups (moieties, clans, villages, castes,
study of the impact of individual and team central-
classes-for-themselves) identities and boundaries
ity on award nominations and financial success;
are relatively unproblematic. In worlds organized
and Sorenson and Waguespack’s study of repeat
around fluid, open-ended, functionally differenti-
contracting between production teams and film
ated networks, social identity and intergroup
distributors (2006).
boundaries are more complex, context-dependent,
Other work focuses on musical innovations in
and ambiguous (Castells, 1997; Tilly, 1998).
jazz. Kirschbaum and Vasconcelos (2006) use
Network analysts have provided four powerful
musician/recording affiliation matrices from 1930
ideas (and methods to go with them) for under-
to 1969 to trace the emergence of Swing, Bop,
standing these processes.
and other genres. Innovation develops on the
network’s periphery, with innovators moving to
the core as new styles gain recognition. Grandadam
(2008) explores the collaboration network Fundamental ideas: duality,
induced by the Blue Note record label, demonstra- catnets, network switching, and
ting that the label’s efforts to boost new artists by homology between structural and
giving them established sidemen increased cultural diversity
network integration and facilitated the emergence
of new genres. The first of these four ideas is duality (Breiger,
1974) – the recognition that each mode in a
two-mode network constitutes the identity of the
other. Initially, duality referred to the mutual
USING NETWORK THEORY TO constitution of groups (defined by persons who
FIND ARTISTS join them) and persons (defined by the intersec-
tion of group affiliations). But we may also think
It is difficult to study artists’ communities system- of cultural entities as constituted by and constitut-
atically because artists are often hard to find: ing the actors who share them. We see this most
independent contractors who find work through easily in language: in a linguistically diverse
informal contacts join few formal organizations, community, analysis of a two-mode network
rarely advertise, and only rise to public attention if representing utterances as a set of ties between
they become relatively successful. Conventional speakers and the words they employ would quickly
solutions to this problem – ethnography, studying partition speakers into language groups (and, with
artists tied to identifiable institutions, or relying the right algorithm, identify bilinguals) and
on lists of union members or grant winners – would partition word sets into languages (perhaps
introduce different forms of selection bias. In a identifying loan words as well). By analogy, one

5605-Scott-Chap20.indd 290 4/6/2011 11:53:30 AM


CULTURAL NETWORKS 291

might use actor-by-artwork nets (with links of like with diverse repertoires are more likely to find
and dislike) to identify genres and taste groups; common interests or identities that facilitate the
actor-by-consumer-good nets (with ties represent- creation of ties. Erickson (1996) demonstrated
ing possession) to identify subcultures; and actor- this relationship empirically in her classic study of
by-proposition nets (with ties of belief and participants in the Ontario private security indus-
disbelief) to identify thought communities and try (see also Lizardo, 2006).
belief systems.
A second critical idea is that shared identities
serve as shortcuts in network formation, raising
the probability that two persons will form a Duality and cultural analysis
positive tie. Harrison White (2008 [1965]) cap-
tured this insight in his early work on catnets – the The notion of duality has informed studies of
intersection of networks and social categories. social-welfare agencies in Progressive America,
Subsequent empirical work confirmed White’s the changing healthcare system in the twentieth-
insight, indicating that persons meeting one century United States, pornography in Denmark,
another for the first time establish footing by and curricular and program change in U.S.
identifying common ties (shared friends) or shared universities. Much of this work also draws on
categorical identities (Erickson, 1975). Extending the notion of “institutional logic” (Friedland
White’s insight from named roles to categories of and Alford, 1991), conceived as a set of rules
shared culture (tastes, beliefs, communication that links particular practices to particular
styles) provides further leverage in understanding identities.
patterns of network formation. John Mohr pioneered the application of duality
A third important concept is network switching to cultural analysis in a remarkable set of papers
(Mische and White, 1998). Traditional views of employing data from New York City social service
culture as coherent, stable, and grounded in values directories from the late nineteenth and early
rendered cultural theory powerless to explain such twentieth centuries, coded as a three-mode
ubiquitous phenomena as people’s ability to network of organizations by groups receiving
hold apparently inconsistent beliefs, rare but assistance by services offered (Mohr, 1994;
earth-shaking events like political revolutions and Mohr and Duquenne, 1997; Mohr and Guerra-
genocides, or large-scale shifts in social attitudes Pearson, 2010). Mohr studied the evolution of
like religious revivals. More recently, scholars in the social-service domain from an institutional
sociology and anthropology have reconceived logic based on private charity to one rooted in
culture as a repertoire of loosely coupled repre- professionalism and social progressivism. This
sentations, fluid and variably shared within social transformation entailed changes in prevailing
groups (Swidler, 1986; Hannerz, 1996). Parallel beliefs about salient group identities, about
work in cognitive psychology has demonstrated problems associated with such groups, and
the schematic basis of culture, the domain- about appropriate treatments for such problems.
specificity of schema, and the role of social Mohr’s use of SNA to study this transformation
context in triggering alternative constructions of grew out of the insight that classes of organiza-
social reality (D’Andrade, 1995; DiMaggio, tions, clients, problems, and treatments were
1997). White (1995; Mische and White, 1998) mutually constitutive.
drew on research on linguistic code-switching to In a similar manner, Ruef (1999) used thou-
highlight the role of networks as contexts that sands of texts on the healthcare system to con-
trigger particular identities, representations, value struct a matrix of organization type by descriptor.
orientations, and the cultural symbols associated Subjected to multidimensional scaling, these data
with them. Movement across social networks illuminated the discursive construction of the
shifts attention across social domains (e.g., work, healthcare field, enabling him to map the transfor-
family, politics, community), evoking distinctive mation of health care in the late twentieth century.
schematic structures associated with each. White Jensen (2006) coded as ties shared visual and
(1992a) coined the term netdoms to refer to textual elements in Danish film posters to identify
networks specific to a particular domain. the gradual emergence of a comedy-soft-porn
A final idea is that the diversity of culture is genre after sexually explicit films were legalized
homologous to the diversity of social networks in the late 1960s. Rawlings and Bourgeois (2004)
(DiMaggio, 1987; Erickson, 2001). This insight explored the internal differentiation of agricultural
formalizes traditional ideas about cosmopolitan- education, analyzing nets constituted by over-time
ism (Merton, 1949). People with diverse social data on the availability of 117 degree programs
networks have the most diverse cultural reper- (e.g., dairy technology, rural sociology, agricul-
toires as well because diverse networks enable tural bacteriology) at 65 agricultural schools
people to learn more culture and because dyads between 1890 and 1940.

5605-Scott-Chap20.indd 291 4/6/2011 11:53:30 AM


292 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The conventional method for analyzing bilinguals, which revealed, first, that bilinguals
duality in person-group networks is structural- use different languages and speech forms when
equivalence analysis, which enables the analyst speaking to persons in different parts of their
simultaneously to identify and assign cases to social networks; and, second, that speakers
structural positions in each of two populations. switch among speech forms within conversations
Although students of person-by-culture networks in order to reference different parts of their social
employ this method (Breiger and Mohr, 2004), worlds.
they also use other approaches such as corre- This tradition has developed in several direc-
spondence analysis and Galois lattices. Breiger tions. One is toward more sophisticated network
(2000) uses correspondence analysis to identify measures: Milroy and Margrain (1980) developed
blocks of Supreme Court justices based on a measure of social network density and
their interest in and control over decisions in sev- multiplexity that significantly predicted the extent
eral areas of law (see also DeNooy, 2003a). Mohr to which working-class Belfast residents used
and Duquenne (1997) employ Galois lattices to traditional working-class speech forms (see
depict the mutual constitution of social groups Villena-Ponsada, 2005, for similar results in
and treatment modalities in Progressive-era Spain). Others have focused on how listeners’
New York. Mohr and colleagues (2004; see also identities influence language use: Gal (1979),
Mohr and Lee, 2000), drawing on University employing data from dyads of residents of
of California documents, use Galois lattices a Hungarian town on the Austrian border, demon-
to analyze the mutual constitution of student strated that the status of speakers’ conversational
categories (especially ethnic labels) and university partners was a stronger predictor of speakers’
services (e.g., summer programs and mentoring) language use than the status of the speakers
as the system adapted to a ban on affirmative- themselves. Other research has emphasized
action programs. the way in which references to context within
conversations induce code-switching: Gal’s
Hungarian respondents were more likely to use
German words when discussing formal topics;
NETWORKS, CONTEXTS, AND Labov (1972) found that African-American young
IDENTITIES people adopted standard American English
for discussing solemn topics; and Wei (1994)
If, as White (1992b: 210) puts it, “actual human reported that bilingual Chinese in the United
beings take shape as ensembles of identities,” Kingdom marked disagreements with parents
a central challenge for social science is to and grandparents by switching to English in mid-
understand how social relations evoke particular conversation.
identities in particular places at particular times.
Relevant research began and flourished in
the field of sociolinguistics but has expanded to From code-switching to
other fields.2 culture-switching
As White (1995) has argued, one can view work
on language as a paradigm for research on culture
Code-switching: How networks more broadly, with conversational topics,
shape talk and how language expressed tastes or other opinions, or interactional
marks network domains styles serving as privileged indicators. Research
suggests that conversational topics, like linguistic
Basil Bernstein and John Gumperz initiated codes, can mark identities and provide coherence
fundamental work on the relationship between to networks. In a study of community-college
language and social networks in the 1960s. counseling encounters, Fred Erickson (1975)
Bernstein (1971), drawing on Durkheim, demon- found that unacquainted dyads began conversa-
strated, first, that persons with more complex tions by trying to establish membership in the
social networks (i.e., less closure and multiplex- same network through common kin, friends, or
ity) used more formal speech forms and more acquaintances or, failing that, to find shared avo-
abstract concepts (“elaborated code”) than per- cational interests. Consistent with this, Erickson
sons with simpler, more densely connected, nets; (1996) reported that the breadth of conversational
and, second, that persons more often use topics in which subjects engaged, and their
elaborated code when speaking in public settings range of local cultural knowledge increased with
and with acquaintances than when conversing in the diversity of their social networks. Using
private with intimates. Gumperz (1982) described Erickson’s network-diversity measure, Harshaw
“code-switching” based on his research on and Tindall (2005) predict the complexity of

5605-Scott-Chap20.indd 292 4/6/2011 11:53:31 AM


CULTURAL NETWORKS 293

personal identities and the range of values respond- to identify distinct patterns of interest in and
ents place on forest resources. Bearman and Parigi understanding of nanotechnology. (Some book
(2004) demonstrate a correspondence between buyers appeared to associate nano with science,
topic and role relationship: Americans talk with and others with science fiction.)
their spouses about kids and money, with their
friends about religion and community affairs, and
with everyone about news and politics.
Networks shape conversational norms as well Identities from third parties
as topics and codes. Gibson’s (2005) innovative
Identities may be chosen or imposed. An
study of social relationships and conversational
innovative study of industry boundaries (Kennedy,
shifts demonstrates the influence of social ties on
2005) uses longitudinal analysis of two co-
conversational roles. For example, superiors claim
occurrence matrices – one of the names of
turns and respond when addressed less than
workstation firms used in articles in the business
subordinates, friends reinforce one another’s
press, and one on peer references in press releases
interventions, and subordinates redirect attention
by these same firms – to demonstrate that
to their superiors. Interactional styles (e.g., modes
the companies’ own definitions of industry
of address) also reflect actors’ efforts to upgrade
boundaries follow rather than precede boundaries
their networks, as McLean (1998) argues in his
emergent from media narratives. Kennedy argues
analysis of job-seekers’ letters in Renaissance
that these media narratives, rather than direct
Florence. At the meso level, Eliasoph and
experience, are the source of executives’
Lichterman (2003) find that persons in different
understandings of “both the meaning of market
relational settings (e.g., taverns vs. community
categories and the structure of competitive rivalry
meetings) enforce varying expectations about
and their positions in it.”
conversation topics and styles (e.g., joking, or
earnestness).
Several researchers have developed social
network implications of Weber’s and Bourdieu’s Networks and political identities
theories of culture’s role in establishing and
maintaining group boundaries. In such work, Bearman’s (1993) study of the elite patronage and
aesthetic taste plays a similar role to language in ideological change in the century preceding
marking identity and facilitating the development the British Civil Wars combines blockmodels of
of new ties; and network structure, in turn, influ- multiple relations among elites with analysis of
ences the breadth and nature of persons’ tastes. ideology. The author argues that the elite’s
Lizardo (2006), using the General Social Survey, embrace of Puritanism appeared as traditional
reports a positive association between the size of social structure fell into crisis and that religious
people’s networks and the number of activities in faith served to bridge local networks, creating a
which they participate. A model in which tastes rhetoric that united gentry with many different
predict ties fits better than the reverse. Moreover, grevances under a common banner.
consistent with the contention that high culture Mische’s (2007) ambitious analysis of Brazilian
differentiates and popular culture provides activist groups in the 1990s combines the study of
cohesion, Lizardo finds that a high-culture taste switching dynamics with analysis of duality. The
pattern is associated with more strong ties, whereas author focuses on actors who linked different
engagement in popular culture is associated with sectors of the social movement that effected the
larger weak-tie nets. In a study of college impeachment and removal from office of Brazil’s
students’ ego networks and cultural participation, president in 1992. Such boundary-spanners
Kane (2004) reports that personal-network manipulated different identities and forms of
density is associated with interest in sports, that discourse to produce successful intergroup
ego-net heterogeneity is associated with taste for collaborations. Mische and Pattison (2000) use
high culture, and that these associations are Galois lattices to analyze a three-mode network
stronger for women than for men. Yair (1995) consisting of movement organizations, political
constructs a network cross-national alliances, causes, and political events. They demonstrated
based on votes for candidates in the Eurovision that Brazil’s SMOs shifted from single-issue
Song Contest. strategies to collaboration across multiple issues.
Consumption patterns also reflect structure in In so doing, they produced an efficacious move-
networks. Schweitzer (1993) used lattice models ment integrated by the voluntary suppression of
to reveal the dual ordering of persons and goods controversial positions (much as Bearman’s
in communities in the developing world. local elites used religion to elide difference).
Schummer (2005) analyzed co-purchase networks Mische’s work challenges us to reconceptualize
(derived from person-by-book-purchase matrices) “networks as multiple, cross-cutting sets of

5605-Scott-Chap20.indd 293 4/6/2011 11:53:31 AM


294 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

relations sustained by conversational dynamics, researchers have taken promising steps in


shared story-lines and shifting definitions of social applying SNA to the study of meaning, in general,
settings” (2003: 258) – not just to explore the and of narrativity (a central theme in the study of
relationship of networks to cultural phenomena, culture), specifically. As a rule, studies that focus
but to view networks themselves as cultural on meaning employ two-mode networks to graph
formations. the co-occurrence of terms in some set of
texts (e.g., newspaper articles, reference books,
interview transcripts, or opinion surveys), whereas
studies of narrativity analyze single-mode
CULTURE AND BOUNDARIES ON-LINE data associated through some form of temporal
ordering.
Most of the work described in this section focuses
on networks of face-to-face interaction. We know
little about how the dynamics of identity and
social-boundary enactment on-line. But the rela- Extracting meaning from
tive ease of harvesting large-scale network data networks of cultural elements
on-line makes the topic irresistible, and the ability
Earlier I described Mohr’s research as a dualistic
of such research to address core social-science
approach to revealing salient identities. Yet it is
problems is significant.
also a means of producing networks from texts in
Adamic and Adar’s (2003) exemplary study of
order to recreate shared meaning. Mohr and Neely
links between personal home pages at Stanford
(2009) use structural-equivalence methods to
and MIT presents a method that could address
identify institutional logics in the practices of
a chronic problem for students of cultural
carceral institutions in late-nineteenth-century
boundaries: identifying which tastes, interests, or
New York. Rendering operational ideas from
competencies have the greatest impact on the
Foucault (1977), the authors treat relational
formation of networks. The authors identify shared
patterns between social identities (rows) and
interests that raise the probability of links, and of
treatments applied to persons with these identities
the emergence of community, more than others:
(columns) as describing a semiotic code.
at Stanford, pearl tea (an identity marker for
Such codes can define frames (combinations of
members of one sorority), technology systems,
symbols, examples, and arguments that evoke
and infectious diseases (a research interest) were
particular understandings of a social issue) as well
highly salient, whereas at MIT, references to
as identities. Vedres and Csigo (2002) studied
fraternities, neuroscience, and an Hispanic Union
frames employed in economic-policy discourse
group were strong predictors. At both Stanford
during a key period in Hungary’s postsocialist
and MIT personal homepage links were associ-
transition. The authors blockmodel a matrix of
ated with shared outlinks to sites related to science
statements by speech acts to identify “frames”
and to ethnic identity; at MIT, but not at Stanford,
(that is, structural positions characterized by
religious sites (Campus Crusade for Christ, a
frequent use of some statements and avoidance of
Pagan student group) were also salient. The paper
others) and then analyze discursive strategies by
offers a model for how SNA can convert chronic
exploring the sequencing of frame combinations
theoretical disputes in the study of culture into
over brief periods of public controversy.
productive empirical research programs.
Yeung (2005) uses Galois lattices to compare
the meaning of relationships reported by
members of 49 urban communes, based on
associations among trait attributions that com-
NETWORKS OF MEANING mune members made to one another in a survey
and the ways dyad members characterized their
Nothing is more central to the study of culture ties. Terms like “love” and “charisma,” he demon-
than the interpretation of meaning, yet nothing is strates, take on different meanings (i.e., are
more difficult. In the humanities and anthropol- associated with different attributions to both
ogy, interpretation is often a matter of virtuoso personalities and relationships) in different
performance. Interpretive accountability, however, communes. Yeung explains how differences in
requires replicable procedures for representing community structure generate these cultural
meaning. Of available approaches, SNA best differences.
captures the foundational insight that meaning DiMaggio and colleagues (2007, 2008) devel-
emerges from relations among cultural elements oped a network-analytic approach to attitude-
rather than inhering in the elements themselves. survey data in order to address schematic
Although there are still relatively few examples, heterogeneity among respondents. Central to the

5605-Scott-Chap20.indd 294 4/6/2011 11:53:31 AM


CULTURAL NETWORKS 295

approach is the insight that similar answers may Anjewierden and colleagues (2004) take a
mean different things depending on the other similar approach on-line, using network methods
responses to which they are linked. The method to ask if bloggers who use the same phrases
represents mental models graphically after understand their meanings in the same way. The
partitioning respondents into subsets based on a authors identify a set of terms (proper names
relational similarity matrix. The key to the method and topics) and produce a network for each of
(which was implemented algorithmically by Amir several blogs, with terms as nodes and ties repre-
Goldberg [2011]) is a proximity measure based senting co-occurrence, expressed as conditional
on relations between responses to pairs of items probabilities. The software permits users to
(i.e., patterns of shared relevance) rather than produce graphical representations of concept
responses to individual items (i.e., patterns of networks from each blogger’s corpus, as well as to
shared opinion). Using this approach to analyze compare networks of different bloggers.
Americans’ attitudes toward science, religion, and
the occult, DiMaggio et al. (2008) find that only
half of the U.S. public perceive science and Narrative networks
religion as mutually antagonistic, with other
subsets viewing science and religion as mutually The notion of narrativity is central to much
supportive (and opposed to less legitimate forms cultural research. Indeed, White (1992a) contends
of belief), orthogonal, or jointly suspect. that narratives constitute social life by making
Earlier I noted the centrality of code-switching action interpretable. Because narratives are
to work on culture and identity. The analogous sequential and because they often generate multi-
switching mechanism for meaning in texts is ple forks, graphic representation is natural.
multivocality (containing many voices or Moreover, the tendency for narratives within a
meanings). Multivocal elements, by inviting speech community to become conventionalized,
diverse readings, may appeal to heterogeneous so that similar tropes or sequences appear within
readerships and become switches for semantic different narratives, renders SNA a natural way to
segmentation among multiple interpretive explore similarity (DeNooy, 2001) and intertextu-
communities (Bakhtin, 1986). In a pioneering ality (Kristeva, 1980). Specific elements of narra-
study, Carolan (2008) analyzes readership overlap tive theory – for example, the distinction between
among often-downloaded articles from a leading ancillary statements and kernels (statements so
educational research journal. In contrast to studies central to the narrative that their removal under-
based on co-citation nets, he finds a single giant mines the stability of the narrative network) –
component, at the center of which is a set of reinforces the resonance between narrativity and
articles notable for multivocality. By bringing in SNA (Franzosi, 1998).
readers from varying communities, he argues, Bearman and Stovel (2000) analyze a set of
the articles in the multivocal core “maintain essays prepared by German Nazis for an essay
ecological control over how readership flows contest in 1934. The narratives describe how the
across the network” (70). authors became Nazis. They were rich in detail, so
Kathleen Carley has developed empirical that the number of links between events was suf-
approaches to representing mental models as ficient to construct meaningfully dense networks.
networks of concepts (Carley and Palmquist, Focusing on a single narrative, the authors com-
1992) derived from analysis of texts. Carley builds bine SNA and content analysis to identify rela-
bridges between work in cognitive science and tionships among, and the relative importance of,
sociology of culture to develop a structural macro events, local events, and thought processes
theory of meaning. Her models are syntactic (i.e., (recognition, realization, and so on) in the authors’
classifying textual elements by their structural conversion to Nazism.
relation to one another) as well as semantic. The Smith (2007) likewise uses SNA to explore
investigator extracts concepts from a set of texts “how meaning emerges from the structure of rela-
(e.g., utterances collected through fieldwork, tions among narrative elements” (p. 24). The
novels, or chains of synonyms in a thesaurus), author analyzes life-history narratives from
defines a set of relations among them, explores the Istrians, residents of a contested region containing
relations among concepts present in the texts, and both ethnic Croats and ethnic Italians that was
represents these relations as a graph. Carley and partitioned between Italy and Yugoslavia after
collaborators have applied this method to analyz- World War II. She compares narratives from
ing Americans’ maps of “drama” and “comedy,” current residents of Italian and Croatian Istria
changing depictions of robots in science fiction to those of immigrants in an Istrian neighborhood
novels, children’s story recall (Carley, 1994), and in New York. Whereas in Europe, the stories
the development of the organizational culture of Italians and Croats vary dramatically, in
research field (Hill and Carley, 1999). New York, where Istrians of both types share

5605-Scott-Chap20.indd 295 4/6/2011 11:53:31 AM


296 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

churches and other institutions, narratives omit large, a relational understanding of culture
contentious elements. Links among story compo- demands relational analytic methods.
nents are expressed as ties and aggregated to As we have seen, a large body of scientific work
graphic representations of typical story types by has developed out of efforts to give concrete
ethnic group and place of residence. expression to relational theories of culture.
The application of SNA to problems of Longstanding habits of mind – the reluctance of
meaning is less well developed than are network many students of culture, in the social sciences as
approaches to creative communities, group well as the humanities, to employ formal methods
boundaries, or identity formation, and the and the radical structuralism explicit in formative
enterprise faces distinct challenges. Analysis of contributions to modern SNA – stood in the way of
natural language is challenging for well-known these developments. It is no accident that well over
reasons (homonyms, divergent spellings, synonyms, half of the books and papers cited in this chapter
variously punctuated compound words, and so have been published (if at all) in the twenty-first
on), but computer scientists are making progress century. But however long in coming, the move-
on these technical issues (e.g., Anjewierden and ment has reached critical mass, and social network
Efimova, 2006; on visualization, DeJordy et al., analysis will play an increasingly important role in
2007). In addition, however, investigators face a research on culture in years to come.
range of nontechnical choices about the kind of
information to collect (e.g., should proper nouns
be tagged for valuation or treated identically
regardless of evaluative content? should textual ACKNOWLEDGMENTS
elements be classified [e.g., as actor, action, or
object of action?]). They also face choices about I am grateful to Stephanie Schacht for assistance
how to interpret co-occurrence ties (e.g., does in identifying and digesting materials reviewed in
co-occurrence imply mutual relevance, shared this chapter and to Ron Breiger, Peter Carrington,
approval, functional interdependence, or some- and Amir Goldberg for helpful comments.
thing else?). Researchers who employ SNA to
study narrative contend with especially daunting
challenges: time is central to narrative but difficult
to represent in matrix form, and narrative NOTES
networks are often very sparse. Yet researchers
have made advances and research objectives 1 In early, long unpublished, work, White wrote
often dictate the right answer to methodological of the need to introduce “cultural elements into our
dilemmas. Most important, such work, properly very definitions of the elementary terms of social
conducted, can bring scientific rigor to acts of structure.” Shared meanings, he argued, make ties
interpretation and, in so doing, bring problems of interpretable and define network boundaries: “there
meaning back to the center of cultural analysis. must be a common culture to define a type of
relation sharply and clearly, if there is to be a net”
(2008 [1965], 2, 3). Although the acuity of White’s
insight that local cultures provide schemata that
shape members’ perception of networks was soon
CONCLUSION confirmed experimentally (Killworth and Bernard,
1976), early blockmodeling work bracketed culture
I have contended in this chapter that social (Santoro, 2008).
network analysis (SNA) is the natural way to 2 A separate research tradition has identified what
refine and explore empirically several central appears to be an increasing salience of cultural factors,
ideas in the study of culture: that cultural products including educational background (Smits, 2003) and
are produced by networks of collaborating crea- religious faith (Sherkat, 2004), to marital selection, an
tive professionals and organizations rather than by especially important network link. Such research has
individual geniuses; that group and individual not employed social network data, however.
identity emerges from relations among persons
and between persons and many kinds of culture;
and that meaning itself emerges from relations
among symbols or other elements of texts, broadly REFERENCES
defined. To be sure, not all cultural processes are
sustained or mediated through social networks; Adamic, L. and Eytan, A. (2003) ‘Friends and neighbors on the
constitutive understandings embedded in physical Web’, Social Networks, 25: 211–30.
arrangements or transmitted by media may oper- Anheier, H.K. and Gerhards, J. (1991) ‘Literary myths and
ate at least somewhat independently. But by and social structure’, Social Forces, 69(3): 811–30.

5605-Scott-Chap20.indd 296 4/6/2011 11:53:31 AM


CULTURAL NETWORKS 297

Anheier, H.K., Gerhards, J. and Romo, F.P. (1995) ‘Forms of Carolan, B.V. (2008) ‘The structure of educational
capital and social structure in cultural fields: Exploring research: The role of multivocality in promoting cohesion
Bourdieu’s social topography’, American Journal of in an article interlock network’, Social Networks, 30:
Sociology, 100(4): 859–903. 69–82.
Anjewierden, A., Brussee, R. and Efimova, L. (2004) Castells, M. (1997) The Power of Identity, vol. 2 in The
‘Shared conceptualizations in weblogs’, Manuscript, Information Age: Economy, Society, Culture. New York:
https://doc.telin.nl/dsweb/Get/Document-43470/Shared_ Blackwell.
conceptualisations_in_weblogs.pdf (accessed January 5, Castells, M. (2000) ‘Materials for an exploratory theory of the
2009). network society’, Journal of Sociology, 51(1): 5–21.
Anjewierden, A. and Efimova, L. (2006) ‘Understanding Cattani, G. and Ferriani, S. (2008) ‘A core/periphery
weblog communities through digital traces: A framework, perspective on individual creative performance: Social
a tool and an example’, in Robert Meersman, Zahir Tari, networks and cinematic achievements in the Hollywood
and Pilar Herrero (eds), On the Move to Meaningful film industry’, Organization Science, 19(6): 824–44.
Internet Systems. Lecture Notes in Computer Science, Caves, R. (2002) Creative Industries: Contracts between Art
Volume 4277. New York: Springer. pp. 279–89. and Commerce. Cambridge: Harvard University Press.
Bakhtin, M.M. (1986) Speech Genres and Other Late Essays. Collins, R. (1989) ‘Toward a theory of intellectual change: The
Edited by Caryl Emerson and Michael Holquist. Translated social causes of philosophies’, Science, Technology and
by Vern McGee. Austin: University of Texas Press. Human Values, 14(2): 107–40.
Bearman, P. (1993) Relations into Rhetorics: Local Elite Social Collins, R. (1998) The Sociology of Philosophies: A Global
Structure in Norfolk, England: 1540–1640. New Brunswick, Theory of Intellectual Change. Cambridge: Harvard
NJ: Rutgers University Press. University Press.
Bearman, P. and Parigi, P. (2004) ‘Cloning headless frogs and Collins, R. (2000) ‘The sociology of philosophies: A précis’,
other important matters: Conversation topics and network Philosophy of the Social Sciences, 30(2): 157–201.
structure’, Social Forces, 83(2): 535–57. Collins, R. (2004) Interaction Ritual Chains. Princeton:
Bearman, P. and Stovel, S. (2000) ‘Becoming a Nazi: A model Princeton University Press.
for narrative networks’, Poetics, 27: 69–90. Collins, R. and Guillen, M. (2009) ‘Mutual halo effects in
Becker, H.S. (1974) ‘Art as collective action’, American cultural production networks: Eminence and success
Sociological Review, 39(6): 767–76. among modernist architects’, working paper, Wharton
Becker, H.S. (1982) Art Worlds. Chicago: University of School, University of Pennsylvania.
Chicago Press. Crane, D. (1972) Invisible Colleges: Diffusion of Knowledge in
Bernstein, B. (1971) Class, Codes and Control, Volume 1: Scientific Communities. Chicago: University of Chicago
Theoretical Studies Towards a Sociology of Language. Press.
Boston: Routledge & Kegan Paul. Crossley, N. (2009) ‘The man whose web expanded:
Boari, C. and Corrado, R. (2007) ‘Network and egocentric Network dynamics in Manchester’s post/punk music scene
uncertainty: Relationships among art galleries in the 1976–1980’, Poetics, 37: 24–49.
contemporary art system’, paper presented at the 23rd D’Andrade, R. (1995) The Development of Cognitive
EGOS Colloquium, http://papers.ssrn.com/sol3/papers. Anthropology. New York: Cambridge University Press.
cfm?abstract_id=1013270 (accessed January 5, 2009). DeJordy, R., Borgatti, S.P., Roussin, C. and Halgin, D.S. (2007)
Bourdieu, P. (1983) ‘The field of cultural production, or the ‘Visualizing proximity data’, Field Methods, 19: 239–63.
economic world reversed’, Poetics, 12(4–5): 311–56. DeLima e Silva, D., Soares, M.M., Henriques, M.V.C.,
Bourdieu, P., Boltanski, L., Castel, R. and Chamboredon, J-C. M.T. Schivani Alves, S.G. de Aguiar, Carvalho, T.P.D.,
(1965) Un art moyen: Essai sur les usages sociaux de la Corso, G. and Lucena, L.S. (2004) ‘The complex network of
photographie. Paris: Editions de Minuit. the Brazilian popular music’, Physica A, 332: 559–65.
Breiger, R.L. (1974) ‘The duality of persons and groups’, Social DeNooy, W. (2001) ‘Stories and social structure: A structural
Forces, 53: 181–90. perspective on literature in society’, in Dick Schram
Breiger, R.L. (2000) ‘A tool kit for practice theory’, Poetics, 27: and Gerard Steen (eds), The Psychology and Sociology
91–115. of Literature: In Honor of Elrud Ibsch. Amsterdam:
Breiger, R.L. (2004) ‘The analysis of social networks’, in J. Benjamins. pp. 359–77.
Melissa Hardy and Alan Brymann (eds), Handbook of Data DeNooy, W. (2002) ‘The dynamics of artistic prestige’, Poetics,
Analysis. London: Sage. pp. 505–26. 30(3): 147–67.
Breiger, R.L. and Mohr, J.M. (2004) ‘Institutional logics from DeNooy, W. (2003a) ‘Fields and networks: Correspondence
the aggregation of organizational networks: Operational analysis and social network analysis in the framework of
procedures for the analysis of counted data’, Computational field theory’, Poetics, 31: 305–27.
and Mathematical Organization Theory, 10: 17–43. DeNooy, W. (2003b) ‘Artistic classifications as collective
Burt, R.L. (2004) ‘Structural holes and good ideas’, American representations’, paper presented at the 6th conference of
Journal of Sociology, 110(2): 349–99. the European Sociological Association, http://home.
Carley, K.M. (1994) ‘Extracting culture through textual medewerker.uva.nl/w.denooy/bestanden/ESA2003.pdf
analysis’, Poetics, 22: 291–312. (accessed January 5, 2009).
Carley, K.M. and Palmquist, M. (1992) ‘Extracting, representing, DiMaggio, P. (1987) ‘Classification in art’, American
and analyzing mental models,’ Social Forces, 70(3): 601–36. Sociological Review, 52 (4): 440–55.

5605-Scott-Chap20.indd 297 4/6/2011 11:53:31 AM


298 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

DiMaggio, P. (1997) ‘Culture and cognition’, Annual Review Gal, S. (1979) Language Shift: Social Determinants of
of Sociology, 23: 263–87. Linguistic Change in Bilingual Austria. New York: Academic
DiMaggio, P., Goldberg, A. and Shepherd, H. (2008) ‘Science Press.
vs. religion? A new look at an old opposition using data Gibson, D. (2005) ‘Taking turns and talking ties: Networks
on public attitudes in the U.S.’, paper presented at the and conversational interaction’, American Journal of
Annual Meeting of the American Sociological Association, Sociology, 110(6): 1561–97.
Boston. Giuffre, K. (1999) ‘Sandpiles of opportunity: Success in the
DiMaggio, P., Shepherd, H. and Goldberg, A. (2007) art world’, Social Forces, 77(3): 815–32.
‘Can exploring schematic heterogeneity in attitude data Giuffre, K. (2001) ‘Mental maps: Social networks and the
help us adjudicate debates about white Americans’ racial language of critical reviews’, Sociological Inquiry, 71(3):
attitudes?’ paper presented at the annual meeting of the 381–93.
American Sociological Association, New York. Gleiser, P.M. and Danon, L. (2003) ‘Community structure in
Durkheim, E. (1933 [1893]) The Division of Labor in Society. jazz’, Advances in Complex Systems, 6(4): 565–73, arXiv:
Translated by George Simpson. New York: Free Press. cond-mat/0307434v2 [cond-mat.dis-nn].
Eliasoph, N. and Lichterman, P. (2003) ‘Culture in interaction’, Goffman, I. (1951) ‘Symbols of class status’, British Journal of
American Journal of Sociology, 108(4): 735–94. Sociology, 2 (4): 294–304.
Emirbayer, M. and Goodwin, J. (1994) ‘Network analysis, Goldberg, A. (2011) ‘Mapping shared understandings
culture, and the problem of agency’, American Journal of using Relational Class Analysis: The case of the cultural
Sociology, 99(6): 1411–54. omnivore reexamined’, American Journal of Sociology
Erickson, B.H. (1996) ‘Culture, class and connections’, 116(5) (in press).
American Journal of Sociology, 102(1): 217–51. Grandadam, D. (2008) ‘Evolving networks and the finest in
Erickson, B.H. (2001) ‘Networks and linkages: Cultural jazz’, paper presented at the Creative Industries and
aspects’, in N.J. Smelser and P.B. Baltes (eds), International Intellectual Property Conference, May 22–23, 2008,
Encyclopedia of the Social & Behavioral Sciences. London, http://www.dime-eu.org/working-papers/wp14/41
Amsterdam: Elsevier. pp. 10505–9. (accessed March 18, 2009).
Erickson, F. (1975) ‘Gatekeeping and the melting pot’, Gumperz, J.J. (1982) Discourse Strategies. New York:
Harvard Educational Review, 45(1): 44–70. Cambridge University Press.
Erickson, F. (2004) Talk and Social Theory. Cambridge, Hannerz, U. (1996) Transnational Connections: Culture,
UK: Polity. People, Places. New York: Routledge.
Esparza, N. and Rossman, G. (2006) ‘I’d like to thank the Harshaw, H.W. and Tindall, D.B. (2005) ‘Social structure,
Academy: Complementary productivity and social net- identities and values: A network approach to understand-
works’, working paper CCPR-035–06, California Center for ing people’s relationships to forests’, Journal of Leisure
Population Research, University of California, Los Angeles. Research, 37(4): 426–49.
Faulkner, R.R. and Anderson, A.B. (1987) ‘Short-term Heckathorn, D.D. and Jeffri, J. (2001) ‘Finding the beat: Using
projects and emergent careers: Evidence from Hollywood’, respondent-driven sampling to study jazz musicians’,
American Journal of Sociology, 92(4): 879–909. Poetics, 28: 307–29.
Foster, P., Borgatti, S. and Jones, C. (2006) ‘The contingent Hill, V. and Carley, K.M. (1999) ‘An approach to identifying
value of embeddedness: Gatekeeper search and decision consensus in a subfield: The case of organizational
making in a local culture market’, paper presented at the culture’, Poetics, 27:1–30.
Organizations and Markets Workshop, Graduate School of Hirsch, P.M. (1972) ‘Processing fads and fashions: An
Business, University of Chicago, http://www.chicagogsb. organization set approach to cultural industry systems’,
edu/research/workshops/orgs-markets/docs/Foster- American Journal of Sociology, 77(4): 639–59.
LocalMarkets.pdf (accessed January 5, 2009). Jacobson, K. and Sandler, M. (2008) ‘Musically meaningful or
Foucault, M. (1977) Discipline and Punish. New York: just noise? An analysis of on-line artist networks’.
Pantheon. Proceedings of the CMMR http://doc.gold.ac.uk/~map01bf/
Franzosi, R. (1998) ‘Narrative analysis – or why (and how) papers/kjacobson_cmmr2008.pdf.
sociologists should be interested in narrative’, Annual Jensen, M. (2006) ‘Legitimizing illegitimacy: Identity spaces
Review of Sociology, 24: 517–54. and markets for illegitimate products’, manuscript,
Freeman, L.C. (2004) The Development of Social Network University of Michigan, http://www.chicagogsb.edu/
Analysis: A Study in the Sociology of Science. Vancouver, research/workshops/orgs-markets/docs/jensen-legitimacy.
BC: Empirical Press. pdf (accessed January 5, 2009).
Friedland, R. and Alford, R. (1991), ‘Bringing society back in: Kadushin, C. (1974) The American Intellectual Elite. Boston:
Symbols, practices, and institutional contradictions’, Little, Brown.
in Walter W. Powell and Paul DiMaggio (eds), The New Kane, D. (2004) ‘A network approach to the puzzle of
Institutionalism in Organizational Analysis. Chicago: women’s cultural participation’, Poetics, 32: 105–27.
University of Chicago Press. pp. 232–63. Kennedy, M.T. (2005) ‘Behind the one-way mirror: Refraction
Fuhse, J.A. (2009) ‘The meaning structure of social networks’, in the construction of product market categories’, Poetics,
Sociological Theory, 27(1): 51–73. 33: 201–26.

5605-Scott-Chap20.indd 298 4/6/2011 11:53:31 AM


CULTURAL NETWORKS 299

Killworth, P.D. and Bernard, H.R. (1976) ‘Informant accuracy Mohr, J.W. and Duquenne, V. (1997) ‘The duality of culture
in social network data’, Human Organization, 35(3): and practice: Poverty relief in New York City, 1888–1917’,
269–86. Theory and Society, 26(2/3): 305–56.
Kirschbaum, C. and Vasconcelos, F. (2006) ‘Jazz: Structural Mohr, J.W. and Guerra-Pearson, F. (2010) ‘The duality of
changes and identity creation in cultural movements’, in niche and form: The differentiation of institutional space
Martin Kornberger and Siegfried Gudergan (eds), Only in New York City, 1888–1917’, in Greta Hsu, Ozgecan
Connect: Neat Words, Networks and Identities. Malmo, Kocak, & Giacomo Negro (eds), Categories in Markets:
Sweden: Liber, Copenhagen Business School. pp. 230–56. Origins and Evolution, Research in the Sociology of
Kirschbaum, C. and Vasconcelos, F. (2007) ‘Tropicália: Organizations, 31: 321–68.
Strategic maneuvers in networks of musicians’, RAE. Mohr, J.W. and Lee, H.K. (2000) ‘From affirmative action to
Revista de Administração de Empresas, 47: 10–26, http:// outreach: Discourse shifts at the University of California’,
www.rae.com.br/rae/index.cfm?FuseAction=Artigo& Poetics, 28: 47–71.
ID=3453&Secao=ARTIGOS&Volume=47&numero=3& Mohr, J.W. and Neely, B. (2009) ‘Modeling Foucault: Dualities
Ano=2007. of power in organizational fields’, in Renate Meyer, Kerstin
Kristeva, J. (1980) Desire in Language: A Semiotic Approach Sahlin-Andersson, Marc Ventresca & Peter Walgenbach
to Literature and Art. New York: Columbia University (eds), Ideology and Organizational Institutionalism,
Press. Research in the Sociology of Organizations, 27: 203–56.
Labov, W. (1972) Sociolinguistic Patterns. Philadelphia: Mohr, J.W. and White, H.C. (2008) ‘How to model an
University of Pennsylvania Press. institution’, Theory and Society, 37: 485–512.
Lamont, M. and Molnár, V. (2002) ‘The study of boundaries in Park, J., Celma, O., Koppenberger, M., Cano, P. and Buldú,
the social sciences’, Annual Review of Sociology, 28: J.M. (2006) ‘The social network of contemporary popular
167–95. musicians’, Physics and Society arXiv:physics/0609229v1
Lizardo, O. (2006) ‘How cultural tastes shape personal [physics.soc-ph].
networks’, American Sociological Review, 71: 778–807. Peterson, R.A. and Anand, N. (2004) ‘The production of
McLean, P.D. (1998) ‘A frame analysis of favor seeking in the culture perspective’, Annual Review of Sociology, 30:
Renaissance: Agency, networks, and political culture’, 311–34.
American Journal of Sociology, 104(1): 51–91. Peterson, R.A. and Berger, D. (1971) ‘Entrepreneurship in
McPherson, M. (2001) ‘Sampling strategies for the arts: organizations: Evidence from the popular music industry’,
A hypernetwork approach’, Poetics, 28: 291–306. Administrative Science Quarterly, 16(1): 97–106.
Merton, R.K. (1949) ‘Patterns of influence: Local and cosmo- Rawlings, C.M. and Bourgeois, M.D. (2004) ‘The complexity
politan influentials’, in Paul F. Lazarsfeld (ed.), of institutional niches: Credentials and organizational
Communication Research, 1948–49. New York: Duell, differentiation in a field of U.S. higher education’, Poetics,
Sloan & Pearce. pp. 441–74. 32: 411–37.
Merton, R.K. (1968) ‘The Matthew Effect in Science’, Science, Rogers, E.M. (1962) Diffusion of Innovation. New York: The
159(3810): 56–63. Free Press.
Milroy, L. and Margrain, S. (1980) ‘Language loyalty and Ruef, M. (1999) ‘Social ontology and the dynamics of
social network’, Language and Society, 9(1): 43–70. organizational forms: Creating market actors in the health-
Mische, A. (2003) ‘Cross-talk in movements’, in Mario Diani care field, 1966–94’. Social Forces, 77: 1403–32.
and Doug McAdam (eds), Social Movements and Networks: Santoro, M. (2008) ‘Framing notes: An introduction to
Relational Approaches to Collective Action, New York: “Catnets”’, Sociologica, http://www.sociologica.mulino.it/
Oxford University Press. pp. 258–80. doi/10.2383/26574.
Mische, A. (2007) Partisan Publics: Communication and Saussure, F. de (1977 [1916]) Course in General Lingustics.
Contention Across Brazilian Youth Activist Networks. Translated by W. Baskin. Glasgow: Fontana/Collins.
Princeton: Princeton University Press. Schummer, J. (2005) ‘Reading nano: The public interest in
Mische, A. and Pattison, P. (2000) ‘Composing a civic arena: nanotechnology as reflected in purchase patterns of
Publics, projects and social settings’, Poetics, 27: 163–94. books’, Public Understanding of Science, 14: 163–83.
Mische, A. and White, H. (1998) ‘Between conversation and Schweizer, T. (1993) ‘The dual ordering of actors and
situation: Public switching dynamics across network possessions’, Current Anthropology, 34(4): 469–83.
domains,’ Social Research, 65(3): 695–724. Sherkat, D.E. (2004) ‘Religious intermarriage in the United
Mohr, J. (1994) ‘Soldiers, mothers, tramps and others: States: Trends, patterns and predictors’, Social Science
Discourse roles in the 1907 New York City charity Research, 33: 606–25.
directory’, Poetics, 22: 327–57. Smith, T. (2007) ‘Narrative boundaries and the dynamics of
Mohr, J. (1998) ‘Measuring meaning structures’, Annual ethnic conflict and conciliation’, Poetics, 35: 22–46.
Review of Sociology, 24: 345–70. Smits, J. (2003) ‘Social closure among the higher educated:
Mohr, J.W., Bourgeois, M. and Duquenne, V. (2004) ‘The logic Trends in educational homogamy in 55 countries’, Social
of opportunity: A formal analysis of the University of Science Research, 32: 251–77.
California’s outreach and diversity discourse’, Center for Sorenson, O. and Waguespack, D.M. (2006) ‘Social structure
Studies in Higher Education working paper CSHE-9–04, and exchange: Self-confirming dynamics in Hollywood’,
University of California. Administrative Science Quarterly, 51(4): 560–89.

5605-Scott-Chap20.indd 299 4/6/2011 11:53:31 AM


300 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Strauss, C. and Quinn, N. (1997) A Cognitive Theory of Watts, D.J. (1999) ‘Networks, dynamics and the small world
Cultural Meaning. Cambridge: Cambridge University phenomenon’, American Journal of Sociology, 105(2):
Press. 493–527.
Swidler, A. (1986) ‘Culture in action: Symbols and strategies’, Weber, M. (1946 [1925]) ‘Class, status and party’, in Hans
American Sociological Review, 51(2): 273–86. Gerth and C. Wright Mills (eds. and trans.), From Max
Teitelbaum, T., Balenzuela, P., Cano, P. and Buldú, J.M. Weber: Essays in Sociology. New York: Oxford University
(2008) ‘Community structures and role detection in music Press. pp. 180–95.
networks’, Chaos 18, doi: 10.1063/1.2988285. Wei, L. (1994) Three Generations, Two Languages, One
Tilly, C. (1998), Durable Inequality. Berkeley: University of Family: Language Choice and Language Shift in a
California Press. Chinese Community in Britain. Clevedon, UK: Multilingual
Turner, F. (2006) From Counterculture to Cyberculture: Stewart Matters.
Brand, the Whole Earth Network, and the Rise of Digital White, H.C. (1992a [2nd ed. 2008]) Identity and Control.
Utopianism. Chicago: University of Chicago Press. Princeton: Princeton University Press.
Uzzi, B. (2008) ‘A social network’s changing statistical White, H.C. (1992b) ‘Social grammar from culture: Reply to
properties and the quality of human innovation’, Journal Steven Brint’, Sociological Theory, 10(2): 209–13.
of Physics A: Mathematical and Theoretical, 41, doi:10. White, H.C. (1995) ‘Network Switchings and Bayesian Forks’,
1088/1751–8113/41/22/224023. Social Research, 62: 1035–62.
Uzzi, B. and Spiro, J. (2005) ‘Collaboration and creativity: The White, H.C. (2008) ‘Notes on the constituents of social
small world problem’, American Journal of Sociology, structure – Soc. Rel. 10 – Spring ’65’, Sociologica, http://
111(2): 447–504. www.sociologica.mulino.it/doi/10.2383/26575.
Vedres, B. and Csigo, P. (2002) ‘Negotiating the end of White, H.C., Boorman, S.A. and Breiger, R.L. (1976) ‘Social
transition: A network approach to local action in political structure from multiple networks (part 1): Blockmodels of
discourse dynamics, Hungary 1997’, Institute for Social and roles and positions’, American Journal of Sociology, 81(4):
Economic Research and Policy, Columbia University, 730–80.
working paper, http://www.iserp.columbia.edu/research/ White, H.C. and White, C. (1965) Canvasses and Careers:
working_papers/downloads/2002_06.pdf (accessed Institutional Change in the French Painting World. Chicago:
January 5, 2009). University of Chicago Press.
Villena-Ponsoda, J.A. (2005) ‘How similar are people who Yair, G. (1995) ‘“Unite Unite Europe”: The political and
speak alike?: An interpretive way of using social networks cultural structures of Europe as reflected in the Eurovision
in social dialectology research’, in Peter Auer, Frans song contest’, Social Networks, 17: 147–61.
Hinskens, and Paul Kerswill (eds), Dialect Change: Yeung, K.-T. (2005) ‘What does love mean? Exploring
Convergence and Divergence in European Languages. network culture in two network settings’, Social Forces,
Cambridge: Cambridge University Press. pp. 303–34. 84(1): 391–420.

5605-Scott-Chap20.indd 300 4/6/2011 11:53:31 AM


21
Social Networks, Geography
and Neighbourhood Effects
Ron Johnston and Charles Pattie

The United States, according to Bishop (2008: 5), Curtice and Steed (1982) noted a growing spatial
has over recent years developed a ‘stark geo- polarisation of the electorate – which later studies
graphical pattern of political belief, one that has have confirmed at a variety of scales (Johnston
grown more distinct in presidential elections since and Pattie, 2006). Like Bishop, too, they associ-
1976. . . . [It] has been sorting itself, sifting at the ated this – at least in part – with selective migra-
most microscopic levels of society, as people have tion, although later studies found little evidence
packed children, CDs, and the family hound and that this made a substantial contribution to the
moved’. When moving, he argues, people deploy polarisation (McMahon et al., 1992; Denver
a range of criteria in selecting their new home at and Halfacree, 1992). To others, a much more
the neighbourhood scale, and this includes making important influence has been the operation of
‘choices about who their neighbors will be and contextual or neighbourhood effects. Following
who will share their new lives’. Such choices, he on from the seminal work of Butler and Stokes
contends, have major political impacts. Thus (1969: 182), which concluded that ‘once a parti-
at the county scale, whereas in 1976 less than san tendency becomes dominant in a local area
one-quarter of all Americans lived in places in processes of opinion formation will draw addi-
which one of the candidates for the presidency tional support to the party that is dominant’,
won by a landslide, by 2004 the proportion was Miller (1977, 1978) argued that ‘contact is a con-
more than one-half. The country has become spa- dition for consensus’ (1977: 48) so that contact,
tially more polarised politically because in their including within neighbourhoods, would generate
migration patterns ‘people were creating new, polarisation:
more homogeneous relations’ (6).
Those homogeneous neighbourhoods then Social contacts are structured by family, choice of
become self-perpetuating societal divisions. friends, social characteristics and locality. If party
Again, as Bishop (2008: 6) expresses it, ‘The like- appeals to group interest or group attitudes evoke
minded neighbourhood supported the like-minded any differential political responses, the patterns of
church, and both confirmed the image and beliefs contact between individuals will tend to increase
of the tribe that lived and worshipped there’. Other the political consensus within high-contact
local institutions – schools, formal clubs and asso- groups.
ciations and so forth – sustain and enhance these
processes, as do informal interactions with neigh- Indeed, he found that locality was a better predic-
bours. A greater homogeneity of ways of living tor of how people voted than their social charac-
was shaping a greater spatial polarisation of teristics because ‘people who talk together vote
political beliefs and voting patterns. together’ (Miller, 1977: 65). Others have argued
Such political/electoral polarisation is not unique similarly, Andersen and Heath (2002: 126), for
to the United States. In the United Kingdom, example, contending that

5605-Scott-Chap21.indd 301 4/19/2011 3:25:46 PM


302 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

we would expect to find tendencies towards class conversation’ – than vice versa. The result will be
voting to be reinforced among voters who regu- the observed polarisation.
larly associate with others from the same social
class. On the other hand, we would expect to find These propositions in turn rest on a series of
the tendency towards class voting to be under- assumptions. For the present purposes the most
mined among voters who frequently interact with important of these is that much social interaction
people from other social classes since the interac- takes place in localised social networks involving
tion will tend to move them towards agreement neighbours. Such social networks are extremely
with members of other social classes. Simply put, unlikely to be isolated – many members will have
the more that people interact with members of links to either or both of other, nonlocal networks
other social classes, the weaker we expect class (based on workplaces or family/kin, for example)
voting to be. and separate networks in adjacent neighbour-
hoods: such external links are continual sources of
Many studies using aggregate (ecological) data new information to the importing networks, pro-
have come up with findings that are consistent viding stimuli to which they respond, in some
with this hypothesis – basically that there is a cases altering their attitudes and behaviour as a
greater spatial polarisation of voting for a given consequence. The local social network is thus
party than there is of the social groups who tend structure within which information (almost invari-
to support that party (e.g. there is greater polarisa- ably interpreted information) flows – with the
tion in voting for the British Labour party than consequences just discussed. But relatively little is
there is of people in the social classes – basically known about such flows: they are assumed to be
blue-collar workers – among whom that party there because observed patterns of behaviour are
derives its greatest support). But almost all consistent with models and hypotheses that
of these provide circumstantial evidence only assume their existence.
of the neighbourhood effect; the patterns are Such arguments apply to a much wider set of
consistent with that effect, but the processes are attitudes and behaviours than those associated with
unobserved. electoral decision making. Just as political informa-
Underpinning the argument for the neigh- tion and attitudes flows through such networks so,
bourhood effect is the following series of too, does a wide range of other material that is
propositions. linked to other types of behaviour – such as the
adoption of innovations, as argued by Mark (1998)
1 Locational decisions involve a considerable with regard to musical preferences. Furthermore,
degree of social selection, whereby people such networks are also identified as the major con-
choose to live in areas – especially residential duits for other flows – of infectious diseases, for
neighbourhoods – where people like themselves example. Again, aggregate patterns are consistent
dominate. with such models but in many cases the underlying
2 The neighbourhood social networks that processes – the actual flows along the network
people join are thus dominated by people like links – are not revealed, with some exceptions (e.g.
themselves, not only in their socio-economic, in Rothenberg et al.’s 2005 study of the spread of
-demographic, and other characteristics but also HIV in Colorado Springs, CO; they found that geo-
in their ideologies, attitudes, and behaviour. graphical distance between the homes of individuals
Such interaction sustains and may even enhance was not ‘fully explanatory’ but nevertheless ‘geog-
their own attitudes and behaviour; living among raphy distance may be an integral part of some
people who think and act like you merely network configurations that can foster the transmis-
reinforces your own tendencies and makes it sion of disease’[511]; see also Rothenberg, 2007).1
even more likely that you will think and act In reviewing the literature on the link between
accordingly. local social networks, information spread, and
3 Nevertheless, for a variety of reasons few attitudes/behaviour, therefore, we have to com-
local areas are socially and behaviourally bine works that directly address the hypotheses
homogeneous and most will contain some people identified here – that social networks are geo-
from different social backgrounds than the graphically concentrated and that flows through
majority. Some social contacts within the neigh- those networks influence attitudes and behaviour –
bourhood are thus likely to expose people to with a wider set that identifies patterns consistent
attitudes and behaviours different from their with those hypotheses but that does not reveal the
own. Those in the majority locally will have less ongoing processes. In undertaking that task, much
exposure to such ‘deviant’ tendencies than will of our attention focuses on political attitudes and
those in the minority to the majority’s norms so it voting behaviour as one example of such proc-
is much more likely that the minority will be esses and patterns, highlighting evidence from
converted to the majority view – ‘conversion by both types of study.

5605-Scott-Chap21.indd 302 4/19/2011 3:25:46 PM


SOCIAL NETWORKS, GEOGRAPHY AND NEIGHBOURHOOD EFFECTS 303

ON THE SPATIALITY OF SOCIAL have stressed for more than half a century, since a
NETWORKS pioneer established that the geographical field was
a ‘discipline in distance’ (Watson, 1955; Johnston,
A core argument in much social science over 2003) – most encounters, especially our frequent
many decades has been a major difference between encounters with kin, colleagues, and friends, are
rural and urban areas in the nature of social inter- spatially constrained, not least because of the
action there. In Tönnies’s well-known dichotomy, time, cost, and effort involved in overcoming
the former were characterised by gemeinschaft – the friction of distance (Hägerstrand, 1982). Both
or community – whereas the latter were character- the establishment and the maintenance of such
ised by gesellschaft – or association. The social contacts are spatially constrained; social
assumption, for it was little more than that, was worlds are geographically structured.
that rural areas – including relatively small settle- These contentions were substantially exempli-
ments – were based on intense patterns of social fied in a study of the social networks of people
contact whereas urban areas were characterised by living in a variety of Californian places as reported
much diverser and more transient contact patterns, by Tilly (1982). Most respondents had each had a
with relatively few intense relationships, reflect- social network of 15–19 identified individuals; the
ing the fragmentation of such places (as with the largest group within those networks was composed
spatial separation of home and workplace). of kin (over 40 per cent of all those named), with
Empirical research challenged this dichotomy, work colleagues and neighbours each making up a
however, by identifying both communities as further 10 per cent. Nonkin, nonwork associate
exemplifying gemeinschaft within urban areas neighbours did not dominate such networks, there-
(especially, though not exclusively, working-class fore, but were a significant component of people’s
residential areas and enclaves comprising minor- contact circles. But local people – who could be in
ity immigrant communities) whereas, on the other two or even all three of those categories – were a
hand, many ‘urban’ patterns of living were spread- major component of the average social network:
ing into rural areas, leading to the breakdown of they were some 16 persons, of whom five lived
many of the well-established communities there. within 5 minutes’ drive of a respondent’s home
The importance of social networks is stressed and a further six between a 5- to 60-minute drive
by Tilly (1992: 2): away; the final five lived even more distant. And
although there were differences between type of
settlement (semirural, town, metropolitan, regional
It is through personal networks that society is core – the latter basically San Francisco and
structured and the individuals integrated into Oakland) in the number of local (within a 5-minute
society. . . . [D]aily life proceeds through personal drive) kin named, there were few differences in the
ties: workers recruit in-laws and cousins for jobs on number of nonkin; respondents in each type of
a new construction site; parents choose their chil- place had the same number (averaging 3.6) mem-
dren’s pediatricians on the basis of personal recom- bers of their social network living within a 5-minute
mendation; and investors get tips from their tennis drive from their home (i.e. neighbours), although
partners. . . . The interactions among the abstract those living in the metropolitan area and its core
parts of society – “the family”, “the economy”, and named more people living further away (i.e. they
so on – usually turn out to be personal dealings had both larger and spatially more dispersed social
between real individuals who know one another, networks than their rural counterparts). Overall,
turn out to be operations of personal networks. . . . however, Tilly (1982: 162) found that people living
All through life, the facts, fictions, and arguments in small towns were more involved with their fellow
we hear from kin and friends are the ones that residents than those living in larger settlements and
influence our actions most. Reciprocally, most that ‘urbanites [especially high-income urbanites]
people affect their society only through personal substitute more distant relations for the foregone
influences on those around them. Those personal local ones’ (1982: 167).
ties are also our greatest motives for action: to When the nature of interpersonal contacts is
protect relatives, impress friends, gain the respect taken into account, Tilly (1982: 174–75) found
of colleagues, and simply enjoy companionship. that the percentage that were with near-neighbours
varied considerably. The activities considered
If, therefore, we want, in Tilly’s words, to ‘protect ranged from the sociable (visiting and having
relatives, impress friends, gain the respect of col- dinner together) through discussing a hobby,
leagues, and simply enjoy companionship’ then we discussing personal issues, obtaining advice on
must interact with individuals – usually, though not important matters, and lending money and
necessarily (academics can win the respect of their
colleagues through the written word alone), through as one moves from exchanges for which distance
face-to-face contact. Because – as geographers is crucial to ones for which it is a marginal cost,

5605-Scott-Chap21.indd 303 4/19/2011 3:25:46 PM


304 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

from contacts requiring frequent physical presence satisfaction were also linked to neighbourhood
to ones calling for occasional interactions possibly social characteristics – and these are influenced
by telephone or mail, and from casual matters to by both structured, primary-group, and unstruc-
critical matters, the advantage of close associates tured (casual) interactions within the local
declines. For sociable interactions, distant associ- milieu.
ates were much less often cited than nearby ones. These data were derived from surveys that pre-
For discussion of hobbies, which often involves date widespread use of the Internet and mobile
engaging in the hobby together, nearby associates phones, which many argue have changed the
were again more commonly cited, though not as nature of conversation networks; proximity is no
much more. Physical presence promotes discussing longer as important in sustaining contacts and
personal matters, but it is not essential and the delivering information. Thus, for example,
advantage of local associates is marginal. Giving Wellman has identified three types of community –
advice on important decisions and lending money lost, saved, and liberated – which differ, among
in an emergency can easily be done occasionally other characteristics, on the importance of face-to-
and at a distance, and there is no advantage to face and phone contact, which they contrast with
proximity. a number of other typologies (see Wellman and
Potter, 1999). Surveys of Toronto residents in the
If, therefore, much of the information flowing 1960s showed that although ‘people who live near
through social networks that is linked to a range of each other continue [as in traditional gemeinschaft
attitudes and behaviours associated, for example, communities] to have more frequent contact’ (64),
with politics and voting – much of which may be nevertheless proximity in this case is a relative
unstructured and unplanned – then neighbourhood concept; most of the networks involving nonkin
circles are likely to be important. friends were metropolitanwide in their spatial
This conclusion is sustained by Huckfeldt’s range rather than just the respondents’ immediate
(1988) study of neighbourhood contexts among a neighbourhoods. Only 13 per cent of their most
sample in Detroit. The respondents’ networks intimate relationships were with people living in
were very much structured by social class, and the same neighbourhood (Wellman, 1979, 1996).
across all classes around 40 per cent had a major- Wellman’s data allow exploration of whether
ity of their friends drawn from their local neigh- distance was an important constraint on social
bourhood (within a 10-minute drive) and less than interaction prior to the Internet’s creation, and
one-third had no friends locally. The local social they provide a baseline against which later studies
context was an important influence on friendship can be assessed. Analysis of a 1978 survey shows
choice, however; people living in areas where not only the expected distance-decay pattern in
class x is dominant are more likely to have one or the intensity of social interaction with both kin
more friends drawn from that class, whatever their and nonkin intimates, but also that there was a
own class may be. In line with the earlier argu- marked decrease in the frequency of face-to-face
ment on neighbourhood effects, therefore, people contacts if the distance between the two individu-
in a minority in an area are likely to be exposed to als’ addresses was more than five miles (Mok
the majority view there. And this is likely to have et al., 2007) although none of the East York
the hypothesised effects with regard to political respondents had most of their active social ties
attitudes. Huckfeldt (1996: 50) found that work- with individuals living within one mile’s walking
ing-class respondents in a Buffalo, New York, distance of their homes (Wellman et al., 1988);
study were much more likely to identify with the telephone contact only starts to decline beyond a
Democratic party if they lived in strongly than distance of 100 miles. A 2005 survey of residents
weakly working-class neighbourhoods (0.60 as in the same area allowed a comparison with those
against 0.48), whereas the reverse was the case findings. It showed that, as in 1978, face-to-face
with nonworking-class individuals (0.49 as against contact declined above a distance of 5 miles
0.37). The differences between neighbourhood between the two individuals’ homes, and phone
types were as large as those between classes contact at about 100 miles, but email contact was
within neighbourhood types – which is consistent only slightly sensitive to distance. There is thus a
with Miller’s argument. Furthermore, members of continuing pattern of face-to-face contact being
the middle class (according to their occupation, local and phone contact being regionally struc-
etc.) who identified with the working class were tured, but the new, Internet-enabled form of com-
much more likely to identify as Democrats the munication is largely unconstrained by distance
more working-class friends they had and the more (Mok et al., 2008). Social networks have not been
working-class the neighbourhood in which they transformed as much as extended, therefore, and
lived. And the differences according to context the relative importance of local as against regional
extended well beyond political affiliation: friend- and distant contacts depends on whether they are
ship selection, ethnic loyalties, and residential kin or nonkin, intimates or not, since the intensity

5605-Scott-Chap21.indd 304 4/19/2011 3:25:46 PM


SOCIAL NETWORKS, GEOGRAPHY AND NEIGHBOURHOOD EFFECTS 305

of contact varies by group, as well as by income politicians’ leadership credentials. In turn, such
(Carrasco et al., 2008a, b). In a parallel study of material may influence how people vote at elec-
movers to a wired suburb, Hampton and Wellman tions. The study of social networks in operation
(2001) found that those who did not realise the can thus enable investigations of political action
potential of the Internet experienced a decline in and advance understanding of election outcomes.
their social contacts after the move, whereas those Further if, as argued above, there is a clear spatial
who did experienced no change – but this included configuration to many social networks, especially
contacts with their neighbours as well as with those based on face-to-face interaction, then the
more distant others; Hampton and Wellman thus result of such information flows through locally
concluded that although for some the move focused networks should be realised in clear
reduced both contact with and support from patterns of political behaviour, as argued above.
friends and relatives, for those who used the Following this argument, the logical research
Internet being wired fostered contact and support design is to study the processes leading to the pat-
both near and far in what Wellman (1999) describes terns, using the results of investigations of the
as a more ‘loosely-coupled world’. flow of electorally relevant information through
As cyberspace becomes more important and local networks to account for observed voting pat-
localised, intense communities decline in their terns. Relatively little research has adopted this
significance and we move into a situation that format, however, for a variety of reasons – many
Wellman (2001: 3) and others term glocalization: of them associated with the cost of such intensive
research strategies. Thus, as exemplified here, the
Except in situations of ethnic or racial segregation, outcomes have been of two types: the identifica-
contemporary Western communities are usually tion of voting patterns, which are consistent with
loosely-bound, sparsely-knit, ramifying networks the concept of a neighbourhood effect, leading to
of specialized ties. Rather than being full inferences that these have been generated by local
members of one solidary neighbourhood or kin- residents discussing relevant issues; and the study
ship group, community has become “glocalized”. of people’s decision making in the context of their
Contemporary urbanites juggle limited member- conversations, which if they show that these lead
ships in multiple, specialized, far-flung, interest- to some people changing their minds regarding
based network communities as they deal with how they vote can imply that the outcome will be
shifting amorphous networks of kin, neighbours, consistent with neighbourhood effects. The two
friends, workmates, and organizational ties. clearly should be integrated, but few studies have
Only a minority of network members are directly done so, hence the organisation of the following
connected with each other. Most friends and sections.
relatives live in different neighbourhoods; many
live in different metropolitan areas. At work,
people often work with distant others and not
those sitting near them. People usually obtain Local social context and
support, sociability, information and a sense of neighbourhood effects
belonging from those who do not live in the same
neighbourhood. As discussed above, if conversations, especially
conversations with individuals having opposing
views on political issues and who to vote for in
an election, stimulate people to reconsider their
INFORMATION FLOW THROUGH own positions, then in any social network with a
majority of the population supporting one view/
NETWORKS AND NEIGHBOURHOOD candidate/party and the remainder supporting
EFFECTS another, the weight of opinion encountered is
more likely to lead adherents of a majority view
Whatever their spatial dimensions, social net- to switch to the minority than vice versa. The
works are communication conduits whereby people outcome would be that the majority view within
exchange information, which may be entirely fac- the network would dominate to a greater degree
tual or involve value judgements. Those flows, it than could be predicted from knowledge of the
is argued, can influence people’s beliefs, attitudes, individuals’ personal characteristics (e.g. whether
and behaviour, so that knowing who speaks to they would vote Conservative or Labour at
whom and about what can be crucial in exploring British general elections). And if those conversa-
who thinks and does what. In political contexts, tion networks are spatially constrained, then the
for example, this can include discussions about a political complexion of areas should be more
variety of electoral matters – such as parties’ poli- polarised than their social composition implies –
cies, governments’ performance, and individual as suggested by Cox (1969) in a seminal paper.

5605-Scott-Chap21.indd 305 4/19/2011 3:25:46 PM


306 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

This argument has been the foundation for a Social interaction is not the only process that
large number of ecological studies using aggre- can generate voting patterns consistent with the
gate areal data at a wide variety of scales. In many neighbourhood effect, however. Many people’s
of these the independent variables, representing voting decisions are based on their evaluations of
the local context, are predominantly socio- government policy, especially economic policy.
economic and demographic data taken from cen- They will reward governments that have delivered
suses and the dependent variables are election economic prosperity by voting for their return to
results. Many of them – especially in the United power but will punish them by voting for an
Kingdom where there is a paucity of voting data opposition party (especially one that seems likely
at other than the Parliamentary constituency scale, to govern well) if they have not. Such calculi oper-
where the average constituency contains some ate at a variety of scales: the individual level
70,000 electors – are at much larger spatial scales (‘Have I prospered over the last year?’; ‘Do I
than local neighbourhoods within which much think my income/quality of living will improve
social interaction is assumed to occur. Nevertheless, over the next year?’); the national level (‘Has the
if such large-scale analyses find the polarised pat- national economy improved recently?’; ‘Will it
terns associated with the neighbourhood effect during the immediate future?’); and the regional/
this can be taken as circumstantial evidence sus- local level (‘Have things improved locally
taining that argument. If, say, the Labour party in recently?’; ‘Will they continue to do so?’). And
a dominantly working-class British Parliamentary calculi can refer to a range of government
constituency has a greater share of the votes cast policies – on aspects of the welfare state, for
than predicted from its class composition (as is example (Johnston and Pattie, 2001a, 2001b).
generally the case: Johnston et al., 1988), this Context is important in these calculi, too: indeed,
could indicate that (a) more neighbourhoods in the studies using the bespoke neighbourhood approach
constituency have predominantly working-class found that people who were economically opti-
than nonworking-class populations and (b) that mistic about their own financial situation were
therefore a pro-Labour neighbourhood effect will less likely to vote for the government to be
dominate across the constituency. returned to office if they lived in relatively deprived
Such circumstantial evidence – of which there areas than they were if they lived in places
is a great deal (as reviewed in Johnston and Pattie, where their neighbours were also prospering
2006; see Cho and Rudolph, 2008) – has increas- (Johnston et al., 2000). Context, it seems, stimu-
ingly been sustained by other evidence that has lated altruistic behaviour.
merged survey data on individuals’ voting behav- Another geographically variable influence on
iour with census data on their local contexts. (An voting decisions is party campaigning, much of
early example was Harrop et al., 1992.) Such which is spatially focused to ensure that a party’s
work has been extended recently with studies supporters turn out in those constituencies where
using contextual data on what have been termed their participation is most needed – in particular,
‘bespoke neighbourhoods’ in which instead of the marginal seats that could be won or lost
locating each survey respondent in a relatively depending on who abstains. As such activity has
large census area – such as an electoral ward in the become increasingly targeted by a range of
United Kingdom – very small-area census data are advertising and other strategies aimed at contact-
used to identify the characteristics of the immedi- ing and mobilising individual voters (and hoping
ate area around each respondent’s home. These that they will mobilise others through their social
have found clear patterns, circumstantially even networks) – with clear impacts, especially with
stronger, entirely consistent with the neighbour- regard to the intensity of campaigns mounted
hood effect; voters from any class background by opposition candidates/parties (Pattie and
were more likely to vote for a party the larger the Johnston, 2008b). The outcome of such geograph-
proportion of the local population that was drawn ically focused campaigns is likely to be a pattern
from that party’s ‘natural’ class supporters of voting consistent with that generated by the
(McAllister et al., 2001). Furthermore, this rela- classic neighbourhood effect – which could mean
tionship was found at a variety of spatial scales for that social interaction is an irrelevant influence.
the bespoke neighbourhoods: the greater the inten- However, analyses incorporating both economic
sity of local support for a particular party, the voting and party campaign intensity into the
greater the polarisation of voting towards it bespoke neighbourhood approach have shown that
(Johnston et al., 2001, 2005a, 2007). And later all three are complementary: parties perform
work showed that patterns consistent with the better in areas where they have stimulated pros-
neighbourhood effect were much stronger among perity, where they have campaigned most inten-
respondents, the higher their levels of local social sively, and where the local social network is likely
capital and interaction with their neighbours to be favourably inclined towards them (Johnston
(Johnston et al., 2005b). et al., 2007). In sum, therefore, there is a very

5605-Scott-Chap21.indd 306 4/19/2011 3:25:47 PM


SOCIAL NETWORKS, GEOGRAPHY AND NEIGHBOURHOOD EFFECTS 307

substantial body of research findings that is focused on politics (Leighley, 1990; McClurg,
entirely consistent with the neighbourhood effect 2003, 2006a, 2006b).
hypothesis and implies that information flowing The content of conversations is likely to be at
through social networks influences voting least as important as their prevalence. It is one
decisions – but that evidence is overwhelmingly thing to be surrounded by individuals who all
circumstantial only. confirm the correctness of one’s own opinions,
and some may seek to achieve this, by their choice
of networks (Finifter’s 1974 study of American
car-plant workers demonstrated that individuals
Conversion through conversation who held a minority view – supporting the
Republicans in a predominantly Democrat-voting
Discussion between citizens lies at the heart of environment – not only were more likely to form
most theories of democracy. For democracy friendships with like-minded people at work but
to function there has to be scope for diversity were also less likely than their Democrat-
of opinion, free expression of those opinions, supporting workmates to discuss politics outside
and resolution of differences and conflicts. the workplace). It is potentially quite another
Political conversations provide one means for thing to be faced with widespread disagreement.
spreading salient information, opinion, and argu- Most individuals will encounter at least some
ment through an electorate, and they can enable disagreement within their discussion networks,
individuals to determine their positions on the however, and few can insulate themselves from
relevant issues and/or personalities by testing their heterogeneous opinions; pressures towards homo-
views against those of others. A celebrated two- geneity of opinion within networks notwith-
step flow model of political communication, for standing, disagreement is an endemic feature
instance, argues that local ‘opinion leaders’ pick of conversation (Huckfeldt et al., 2004). And,
up political information from the media and then of course, some disagreement is essential for
in their turn pass this information on to others in influence to occur (McPhee, 1963). Where people
their communities with whom they are in contact agree entirely, they cannot persuade.
(Katz and Lazarsfeld, 1955). Individuals’ social The impact of disagreement within networks
networks might be dominated by others who on participation has proved controversial. Classic
largely share their own views, prejudices, and pluralist accounts of democracy suggest that
values, but they may encounter others with very where differences of opinion exist, people and/or
different views from their own. Conversations groups will be mobilised to represent the various
with others are likely to reinforce one’s own views expressed, thereby acting as a mobilising
beliefs in the former case, whereas in the latter force (Dahl, 1989). But psychological models
they may well cause individuals to question their suggest that as individuals are conflict-averse
opinions – especially if they are not strongly com- they will try to avoid conflict, whether by acquies-
mitted to any position, candidate, or party and cence or by silence (Festinger, 1957; Ulbig
hold minority views within the conversation net- and Funk, 1999). In line with that position some
work. Other things being equal, therefore, such have shown that countervailing opinions in dis-
holders of minority views may change their minds cussion networks can discourage participation, in
and agree with the network’s majority. Evidence part by increasing uncertainty among citizens
supports this argument; the more supporters of a (Mutz, 2002a, 2002b; Mutz and Mondak, 2006;
particular party an individual talks to, the more Pattie and Johnston, 2008a). McClurg (2006a),
likely they are to switch their vote to that party if on the other hand, reports that the impact of
they previously either voted for an alternative or disagreement is modified by context, in particular
abstained (Huckfeldt and Sprague, 1995; Pattie by whether an individual is part of a local political
and Johnston, 2000, 2001). majority or minority. His results suggest that
Involvement in relevant conversations could political participation by individuals who share
also encourage political participation (Putnam, the majority view in their local context is unaf-
2000), with information on how to take part and fected by exposure to disagreement in their
providing indirect confirmation that one’s associ- discussion networks but those in the local minor-
ates are likely to participate, hence enhancing the ity become less likely to participate as their expo-
impact of social norms – although those already sure to disagreement increases: disagreement
likely to participate may, as a result of their com- disincentivises participation by those in the local
mitment, be more likely to discuss politics with minority.
others than those not intending to participate. Individuals are more likely to participate if they
Studies confirm that those with extensive conver- feel their discussants are politically sophisticated
sation networks participate more than those with and less likely to do so if they feel discussants lack
limited networks, particularly if conversations are expertise (McClurg, 2006b).

5605-Scott-Chap21.indd 307 4/19/2011 3:25:47 PM


308 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Putting it all together who supported a particular party was strongly


related to whether an individual living there also
What much of the literature reviewed above lacks identified with that party, whatever her or his indi-
is an integration of the two main approaches to vidual characteristics. Not everybody is converted
studying neighbourhood effects – information to the local majority view, of course; later studies
flow through social networks, and spatially polar- showed that disagreement with one’s main discus-
ised aggregate voting patterns. Our conclusions sant is sometimes sustained through interaction,
are very strong in providing support for the argu- not diminished – especially if that disagreement is
ment that locally focused social interaction does inconsistent with the general tenor of opinion
influence people’s voting decisions in ways that within an individual’s network (Huckfeldt et al.,
are very likely to generate polarised patterns, but 2002). And, of course, reaction to the local milieu
the evidence is not conclusive. depends upon the nature of that awareness:
A few people have sought to remedy this – Baybeck and McClurg (2005) found that a sub-
largely through very small-scale studies of selected stantial majority of the South Bend respondents
locales (e.g. Fitton, 1973) or by deploying sample could accurately represent the characteristics of
data in which contact with neighbours was sur- their home neighbourhood – and then, as they put
veyed (Curtice, 1995). By far the most important it, ‘When a neighbourhood’s majority becomes
of such studies, however, have been the large obvious, even opposing voters seem capable of
sample surveys conducted by Huckfeldt and his figuring that out’ (p. 509).
collaborators, which have studied social networks Although the early Huckfeldt studies integrated
in their spatial settings. The original, seminal work social networks and neighbourhood contexts much
(Huckfeldt and Sprague, 1995) used a survey of more firmly than almost all other analysts, never-
the residents of South Bend, Indiana, who were theless the network geographies were to a consid-
interviewed on three occasions before and after the erable extent inferred. Later work in two cities
1984 U.S. presidential election and who provided took the work further, however, by using post-
information about those with whom they discussed coded information on the respondents’ and their
political issues (subdivided into spouses, other kin, main discussants’ homes to establish the degree of
and nonkin). These and other data on the individ- spatial dispersion of those networks. As antici-
ual were integrated with data on the neighbour- pated from other work on the geography of social
hoods in which they lived; one-third of the interaction reviewed earlier, the networks were
nominated discussants lived in the respondents’ not intensely localised: for kin (excluding spouses)
home neighbourhoods and 40 per cent worked at only 23 per cent lived within 1 km. of the respond-
the same location. (Only 6 per cent were both ent’s home and the average distance between
workmates and neighbourhood co-residents.) The the two locations was 6.4 km.; for nonkin, the
impact of discussants’ political choices was great- percentage was only 15 and the mean distance
est when the respondent’s nominated main discus- 8.4 km – nevertheless over half of this group lived
sant was a spouse; with the immediate household, within 15 minutes’ driving time of the respond-
the main discussant’s influence was greatest when ent’s home (Baybeck and Huckfeldt, 2002a). The
the respondent correctly identified that person’s more dispersed the network, however, the less
own political preferences (in 1984, whether or not intense were the discussions taking place within
he or she supported Reagan or Mondale). it. Information is spread more widely through the
Huckfeldt and Sprague’s (1995: 189) conclu- more dispersed networks, across a wider range of
sion that ‘vote preferences are socially structured, neighbourhood contexts – even though they do not
not only by the characteristics of the voter, but necessarily connect individuals who are socially
also by the characteristics and preferences of and politically more diverse than is the case with
others with whom the voter discusses politics’ was the spatially more clustered networks, the neigh-
extended by incorporating further variables to bourhoods act as the ‘bridges between socially
represent the political characteristics of their and politically diverse locales’ (p. 273), or what
respondents’ neighbourhood socio-political Granovetter (1973) terms the ‘weak ties’ that
milieux but also the apparent intensity of the elec- introduce (perhaps dissonant) information to oth-
tion campaign there. They found that contact with erwise separate networks and locales, even though
voters in a neighbourhood influenced not only two individuals so connected are less likely to
those connected but also others in the locality, converge in their opinions over an election cam-
with the contact thus acting as ‘a catalyst that sets paign than are two similar individuals who are
into motion a series of events’ (255) because members of spatially higher density networks,
‘people know their neighbour’s politics, and one among whom contact is also more frequent
reason they know is party organization aimed at (Baybeck and Huckfeldt, 2002b). Spatially dis-
informing them’ (p. 254). Thus, the proportion of persed networks, it seems, create a politically
a neighbourhood’s respondents (their sample was homogeneous overlay on a politically diverse
spatially clustered to allow this to be estimated) urban area – a conclusion that is now being

5605-Scott-Chap21.indd 308 4/19/2011 3:25:47 PM


SOCIAL NETWORKS, GEOGRAPHY AND NEIGHBOURHOOD EFFECTS 309

explored with experimental data (e.g. Ahn et al., electoral system in the United Kingdom since 1955’. British
2007).2 Journal of Political Science, 12: 249–98.
Dahl, R. (1989) Democracy and Its Critics. New Haven: Yale
University Press.
Denver, D.T. and Halfacree, K. (1992) ‘Inter-constituency
NOTES migration and turnout at the British general election of
1983’. British Journal of Political Science, 22: 248–54.
1. The type of relationship that was involved in Festinger, L. (1957) A Theory of Cognitive Dissonance. Palo
the disease spread would also be important. Contact Alto: Stanford University Press.
with prostitutes was less likely to be structured with Finifter, A. (1974) ‘The friendship group as a protective envi-
neighbourhood networks, for example. ronment for political deviants’. American Political Science
2. See the special issue on social networks in Review, 68: 607–25.
PS: Political Science and Politics, 44(1), 2011. Fitton, M. (1973) ‘Neighbourhood and voting: A sociometric
explanation’. British Journal of Political Science, 3:
445–72.
Granovetter, M. (1973) ‘The strength of weak ties’. American
REFERENCES Journal of Sociology, 78: 1360–80.
Hägerstrand, T. (1982) ‘Diorama, path and project’. Tijdschrift
Ahn, T.K., Huckfeldt, R. and Ryan, J.B. (2007) voor Economische en Sociale Geografie, 73: 323–39.
‘Networks, groups, and contextual constraints on political Hampton, K. and Wellman, B. (2001) ‘Long distance commu-
communication’. Available at http://faculty.psdomain. nity in the network society: Contact and support beyond
ucdavis.edu/rhuckfeldt. Last accessed 14 February 2011. Netville’. American Behavioral Scientist, 45: 476–95.
Andersen, R. and Heath, A.F. (2002) ‘Class matters: The Harrop, M., Heath, A. and Openshaw, S. (1992) ‘Does neigh-
persisting effects of contextual social class on individual bourhood influence voting behaviour—and why?’ In
voting in Britain’, 1964–97. European Sociological Review, I. Crewe, P. Norris, D. Denver and D. Broughton (eds),
18: 125–38. British Elections and Parties Yearbook 1. Hemel Hempstead:
Baybeck, B. and Huckfeldt, R. (2002a) ‘Spatially dispersed ties Harvester Wheatsheaf. pp. 103–20.
among interdependent citizens; connecting individuals and Huckfeldt, R.R. (1988) ‘Social contexts, social networks, and
aggregates’. Political Analysis, 10: 261–75. urban neighborhoods: Environmental constraints on friend-
Baybeck, B. and Huckfeldt, R. (2002b) ‘Urban contexts, spa- ship choice’. American Journal of Sociology, 89: 651–69.
tially dispersed networks and the diffusion of political Huckfeldt, R.R. (1996) Politics in Context: Assimilation and
information’. Political Geography, 21: 195–210. Conflict in Urban Neighborhoods. New York: Agathon
Baybeck, B. and McClurg, S.D. (2005) ‘What do they know Press.
and how do they know it? An examination of citizen aware- Huckfeldt, R., Johnson, P.E. and Sprague, J. (2002) ‘Political
ness of context’. American Politics Research, 33: 492–520. environments, political dynamics, and the survival of
Bishop, B. (2008) The Big Sort: Why the Clustering of Like- disagreement’. Journal of Politics, 64: 1–21.
Minded America Is Tearing Us Apart. Boston: Houghton Huckfeldt, R., Johnson, P.E. and Sprague, J. (2004) Political
Mifflin. Disagreement: The Survival of Diverse Opinions within
Butler, D. and Stokes, D. (1969) Political Change in Britain: Communication Networks. Cambridge: Cambridge
Forces Shaping Electoral Choice. London: Macmillan. University Press.
Carrasco, J.-A., Miller, E.J. and Wellman, B. (2008a) ‘How far Johnston, R.J. (2003) ‘Order in space: Geography as a disci-
and with whom do people socialize? Empirical evidence pline in distance’. In R.J. Johnston and M. Williams (eds.),
about the distance between social network members’. A Century of British Geography. Oxford: Oxford University
Transportation Research Record: Journal of the Press for the British Academy. pp. 303–46.
Transportation Research Board, 2076: 114–22. Johnston, R.J., Dorling, D.F.L., Tunstall, H., Rossiter, D.J.,
Carrasco, J.-A., Hogan, B., Wellman, B. and Miller, E.J. McAllister, I. and Pattie, C.J. (2000) ‘Locating the
(2008b) ‘Agency in social activity interactions: The role of altruistic voter: Context, egocentric voting and support for
social networks in time and space’. Tijdschrift voor the Conservative party at the 1997 general election
Economische en Sociale Geografie 99: 562–83. in England and Wales’. Environment and Planning A,
Cho, W.K.T. and Rudolph, T.J. (2008) ‘Emanating political 32: 673–94.
participation: Untangling the spatial structure behind par- Johnston, R.J., Jones, K., Propper, C. and Burgess, S. (2007)
ticipation’. British Journal of Political Science, 38: 273–89. ‘Region, local context, and voting at the 1997 general
Cox, K.R. (1969) ‘The voting decision in spatial context’. election in England’. American Journal of Political Science,
Progress in Geography, 1: 83–117. 51: 640–54.
Curtice, J. (1995) ‘Is talking over the garden fence of Johnston, R.J. and Pattie, C.J. (2001a) ‘Dimensions of retro-
political import?’ In M. Eagles (ed.), Spatial and Contextual spective voting: Economic performance, public service
Models in Political Research. London: Taylor and Francis. standards and Conservative party support at the 1997
pp. 195–209. British general election’. Party Politics, 5: 39–54.
Curtice, J. and Steed, M. (1982) ‘Electoral choice and the Johnston, R.J. and Pattie, C.J. (2001b) ‘It’s the economy,
production of government: The changing operation of the stupid—but which economy’? Geographical scales,

5605-Scott-Chap21.indd 309 4/19/2011 3:25:47 PM


310 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

retrospective economic evaluations and voting at the British Mutz, D. (2002a) ‘The consequences of cross-cutting networks
1997 general election’. Regional Studies, 35: 309–19. for political participation’. American Journal of Political
Johnston, R.J. and Pattie, C.J. (2006) Putting Voters in Their Science, 46: 838–55.
Place: Geography and Elections in Great Britain. Oxford: Mutz, D. (2002b) ‘Cross-cutting social networks: Testing
Oxford University Press. democratic theory in practice’. American Political Science
Johnston, R.J., Pattie, C.J. and Allsopp, J.G. (1988) A Nation Review, 96: 111–26.
Dividing? The Electoral Map of Great Britain 1979–1987. Mutz, D. and Mondak, J. (2006) ‘The workplace as a context
London: Longman. for cross-cutting political discourse’. The Journal of Politics,
Johnston, R.J., Pattie, C.J., Dorling, D.F.L., McAllister, I., 68: 140–55.
Tunstall, H. and Rossiter, D.J. (2001) ‘Housing tenure, local Pattie, C.J. and Johnston, R.J. (2000) ‘People who talk
context, scale and voting in England and Wales’, 1997. together vote together: An exploration of contextual effects
Electoral Studies, 20: 195–216. in Great Britain’. Annals of the Association of American
Johnston, R.J., Propper, C., Burgess, S., Sarker, R., Bolster, A. Geographers, 90: 41–66.
and Jones, K. (2005a) ‘Spatial scale and the neighbour- Pattie, C.J. and Johnston, R.J. (2001) ‘Talk as a political
hood effect: Multinomial models of voting at two recent context: Conversation and electoral change in British
British general elections’. British Journal of Political Science, elections’. Electoral Studies, 20: 17–40.
35: 487–514. Pattie, C.J. and Johnston, R.J. (2008a) ‘It’s good to talk: Talk,
Johnston, R.J., Propper, C., Jones, K., Sarker, R., Bolster, A. and disagreement and tolerance’. British Journal of Political
Burgess, S. (2005b) ‘Neighbourhood social capital and neigh- Science, 38: 677–98.
bourhood effects’. Environment and Planning A, 37: 1443–57. Pattie, C.J. and Johnston, R.J. (2008b) ‘Still talking but is
Katz, E. and Lazarsfeld, P.F. (1955) Personal Influence: anybody listening? The changing face of constituency
The Part Played by People in the Flow of Mass campaigning in Britain, 1997–2005’. Party Politics, 14.
Communications. Glencoe, IL: Free Press. Potterat, J.J. et al. (2002) ‘Sexual network structure as an
Leighley, J.E. (1990) ‘Social interaction and contextual indicator of epidemic phase’. Sexually Transmitted
influences on political participation’. American Politics Infections, 78: 152–58.
Quarterly, 18: 459–75. Putnam, R. D. (2000) Bowling Alone. New York: Simon and
Mark, N. (1998) ‘Birds of a feather sing together’. Social Schuster.
Forces, 77: 453–85. Rothenberg, R. (2007) ‘Maintenance of endemicity in urban
McAllister, I., Johnston, R.J., Pattie, C.J., Tunstall, H., environments: A hypothesis linking risk, network structure
Dorling, D.F.L. and Rossiter, D.J. (2001) ‘Class dealign- and geography’. Sexually Transmitted Infections, 83: 10–15.
ment and the neighbourhood effect: Miller revisited’. Rothenberg, R., et al. (2005) ‘Social and geographic distance
British Journal of Political Science, 31: 41–59. in HIV risk’. Sexually Transmitted Disease, 32: 506–12.
McClurg, S.D. (2003) ‘Social networks and political participa- Tilly, C. (1982) To Dwell among Friends: Personal Networks in
tion’. Political Research Quarterly, 56: 448–64. Town and City. Chicago: University of Chicago Press.
McClurg, S.D. (2006a) ‘Political disagreement in context: The Ulbig, S.G. and Funk, C.L. (1999) ‘Conflict avoidance and
conditional effect of neighborhood context, disagreement political participation’. Political Behavior, 21: 265–82.
and political talk on electoral participation’. Political Watson, J.W. (1955) ‘Geography: A discipline in distance.
Behavior, 28: 349–66. Scottish Geographical Magazine, 71: 1–13.
McClurg, S.D. (2006b) ‘The electoral relevance of political Wellman, B. (1979) ‘The community question: The intimate
talk: Examining disagreement and expertise effects in networks of East Yorkers’. American Journal of Sociology,
social networks on political participation’. American Journal 84: 1201–31.
of Political Science, 50: 737–54. Wellman, B. (1996) ‘Are personal communities local? A
McMahon, D., Heath, A.F., Harrop, M. and Curtice, J. (1992) Dumptarian reconsideration?’ Social Networks, 18: 347–54.
‘The electoral consequences of north-south migration’. Wellman, B. (1999) ‘From little boxes to loosely-bound net-
British Journal of Political Science, 22: 419–43. works: The privatization and domestication of community’,
McPhee, W.N. (1963) Formal Theories of Mass Behavior. in J. Abu-Lughod (ed.), Sociology for the Twenty-First
New York: The Free Press of Glencoe. Century: Continuities and Cutting-Edges. Chicago:
Miller, W.L. (1977) Electoral Dynamics in Britain since 1918. University of Chicago Press. pp. 94–114.
London: Macmillan. Wellman, B. (2001) The Persistence and Transformation of
Miller, W.L. (1978) ‘Social class and party choice in England: Community: From Neighbourhood Groups to Social
A new analysis’. British Journal of Political Science, 8: Networks. Report to the Law Commission of Canada.
259–84. Toronto: Wellman Associates.
Mok, D., Wellman, B. and Basu, R. (2007) ‘Did distance Wellman, B., Carrington, P. and Hall, A. (1988) ‘Networks as
matter before the internet? Interpersonal contact and sup- personal communities’. In B. Wellman and S.D. Berkowitz
port in the 1970s’. Social Networks, 29: 430–61. (eds.), Social Structures: A Network Approach. Cambridge:
Mok, D., Wellman, B. and Carrasco, J.-A. (2008) ‘Does Cambridge University Press. pp. 130–84.
distance matter in the age of the internet?’ Available at Wellman, B. and Potter, S. (1999) ‘The elements of personal
http://homes.chass.utoronto.ca/~wellman/publications/ communities’. In B. Wellman (ed.), Networks in the Global
Last accessed 14 February 2011. Village. Boulder, CO: Westview Press. pp. 49–82.

5605-Scott-Chap21.indd 310 4/19/2011 3:25:47 PM


22
A Multiple-Network Analysis
of the World System
of Nations, 1995–1999
Edward L. Kick, Laura A. McKinney,
Steve McDonald, and Andrew Jorgenson

INTRODUCTION A brief summary of this legacy is warranted


here and in our concluding remarks. Consider, for
In this chapter we address the theoretical and instance, Comte’s ([1842] 1854) pioneering work,
empirical foundations of network approaches in which centered on a rapidly industrializing Europe
macrosociological studies of the world system, we and the networks of societal-level changes that led
offer multiple-network findings to address the the most “primitive” societies to their modern
structure of the modern world system and nations’ forms. As well, Spencer (1887), Tönnies (1887),
positions in it. With these results, we replicate the and Durkheim ([1893] 1964: 236–60) emphasized
pioneering global network findings of Snyder and the movement from simple and undifferentiated
Kick (1979). Their effort still enjoys considerable forms of societal linkages (gemeinschaft; mechan-
currency in the literature (see Mahutga, 2006), ical solidarity) to more complex and interdepend-
but they use network data from the early 1960s ent forms (gesellschaft; organic solidarity),
that are now a dated representation of the modern which broadened the societal division of labor.
world system. Weber (1921 [1978]), in addition, addressed link-
Network analyses such as ours are relatively ages across national boundaries when he wrote
new in the study of macrosociology. Empirical about the role of the spread of Western cultural
analysis of social networks truly “arrived” in soci- values in the expansion of capitalism and modern
ology only in the last three decades (Granovetter, societal forms.
1973; White et al., 1976; Wellman, 1983), and These classical approaches follow themes
applications of network analysis to the study of articulated in the network thinking of earlier
the world system began with Snyder and Kick writers, such as Adam Smith (1776 [1977]), in
(1979). However, their work, as well as our Wealth of Nations. Smith advocated that nations
present treatment, remains indebted to historical exploit their “comparative advantage” in the
and contemporary theories of the effects of net- international system by engaging in networks of
work dynamics on a range of national develop- trade that maximize their economic well-being.
ment outcomes. For instance, the modernization The comparative advantage of Western European
and world-system/dependency perspectives that countries was obvious to those nineteenth-century
Snyder and Kick test owe much of their theo- sociologists who theorized about the economic
rization to classical treatments of the societal- and noneconomic dynamics that brought the
level networks that prompt national economic Western world to the fore in the global system.
development. Their emphases are apparent, as well, in the

5605-Scott-Chap22.indd 311 4/13/2011 2:37:02 PM


312 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

contemporary modernization and world-system/ were central to Snyder and Kick’s effort.
dependency approaches to global structure and Throughout our replication we recognize that the
national well-being that drove the network analy- network applications we develop rest ultimately
sis of Snyder and Kick (1979) and which prompt on classical foundations. The network metaphor,
our replication of their work. whether expressly labeled as such or not, is central
to centuries of thought on national development.

Contemporary articulations
Snyder and Kick test themes taken from contem- GLOBAL STRUCTURE AND KEY
porary “modernization” theory, which uses classi- NETWORKS
cal networking constructs such as “differentiation”
and “integration,” in arguing that the global
Overview of global-system arguments
exchanges that bring Western technology and
value systems to developing countries can spur The global system, just like all social systems
change by removing traditional obstacles to (Emerson, 1962; Homans, 1961; Blau, 1964;
national development (Parsons, 1966; Eisenstadt, Cook et al., 1983), reflects the structure and
1974). Others also follow Weber and argue that processes of exchange among its constituent units.
links to Western social institutions introduce new The global-system units we focus upon theoreti-
values such as the Protestant ethic, which can help cally and empirically are nation-states, although
poor nations grow their economies and compete in multinational corporations and global cities
the global division of labor (Inkeles and Smith, (Sassen, 1998) are central to the modern world
1974; Rostow, 1960). economy, too. We agree with Sklair (1999) that
Snyder and Kick also emphasize that moderni- the ascendancy of globalizing forces is not so
zation approaches in macrosociology have been powerful that the existence of the nation-state is
challenged by Marxian-inspired dependency and in serious doubt, and we conclude that a continu-
world-system perspectives on the global system ing emphasis on the international system is
and national well-being. Economists of Latin warranted.
American dependency such as Prebisch (1962) We focus on the work of world-system and
challenge the view that “westernization” creates dependency theorists, who to some extent disa-
evolutionary progress in Third World societies. gree over the relative importance of a range of
They propose instead that the international mechanisms of “value transfer” in the world
division of labor is controlled by rich countries system (Chase-Dunn and Rubinson, 1977; Arrighi
and the linkages that bring westernization also and Drangel, 1986). For present purposes we
bring unequal exchanges that engender underde- emphasize the important role of global trade and
velopment in poorer societies (Frank, 1966; the fact that the commodity exports of periphery
Cardoso, 1970; Cardoso and Faletto, 1979; nations typically are concentrated in primary
Evans, 1979). products, including agricultural goods. In contrast
World-system theory focuses upon a world- to the more favorable outcomes theorized by
wide system of networks that emerged in the Adam Smith and the progress anticipated by mod-
middle to late 1400s (Wallerstein, 1974), in which ernization approaches, global trade networks help
investments and expansive trade networks greatly to ensure that as periphery nations follow their
favored the most powerful or “core” nations. Core “comparative advantage” they will in comparative
advantages have come at the expense of a “periph- terms continue to be technologically and educa-
ery” (e.g., Africa), due to the exploitive nature of tionally disadvantaged, with substantial segments
these global relationships of exchange (Armer of their labor forces engaged only in the least
et al., 1989). “Semiperipheral” countries are a advanced production activities. Economic stagna-
heterogenous and widespread tier of countries that tion and a lack of mobility in the world system
benefit relative to the periphery from these are a consequence of the structure of peripheral
global arrangements but, due to similar dynamics, societies’ participation in the global trade network
continue to fall further behind the core, in relative (Kentor, 1998). The opposite is true for the
terms. This makes it difficult for peripheral core nations that head the global hierarchy. In
or semiperipheral countries to attain the advanced relative terms, they benefit greatly from these
societal characteristics of Western European structural arrangements in which they trade
nations, as had been idealized by many nineteenth- capital-intensive, high-end goods and services
century sociologists. with the periphery and semiperiphery.
World-system arguments and network studies Semiperipheral nations, including much of the
of them dominate our treatment, just as they Middle East, Latin America, Asia, and part of

5605-Scott-Chap22.indd 312 4/13/2011 2:37:03 PM


A MULTIPLE-NETWORK ANALYSIS OF THE WORLD SYSTEM OF NATIONS, 1995–1999 313

Africa, share the global network characteristics of international order that benefits them relative to
both the core and periphery (Terlouw, 1993; the semiperiphery and periphery (Meyer et al.,
Arrighi and Drangel, 1986: 12). The “buffering” 1997; Schofer and Meyer, 2005; True and
position of the semiperiphery stems from its Minstrom, 2001; Hafner-Burton and Tsutsui,
networks of trade, which include their export of 2005).
finished goods, high-demand resources, and We argue, too, that power-dependence relations
the products of industrialization to dependent in other social systems (groups, organizations,
peripheral nations, coupled with their trade sub- societies) seldom hinge on mechanisms of eco-
servience to the technically advanced core (World nomic exchange only, and in the interests of gen-
Bank, 2008). Global trade networks structure the eral social science theory an approach to
relatively rapid industrializations of the semipe- social-system structure that explicitly recognizes
riphery, compared to the periphery, which are its many dimensions is appropriate. Based on this
accompanied by transitions in national institutions logic, Snyder and Kick and the present treatment
and human well-being. Consequently, much of the rely upon multiple networks of international
semiperiphery reflects the evolutionary change linkages that are economic and noneconomic in
theorized in the classical macrosociology theories nature.
and modernization treatments identified earlier.
This is true, even though it has also led to some
alarming environmental outcomes in semiperi-
pheral countries (see, e.g., Burns et al., 1994; Network relationships and
McKinney et al., 2009). national attributes
Also a necessary preliminary to our study, we
point to a tendency to mistrust country classifica-
Critical issues in conceptualizing tions derived from global, multiple-network
the world system results, such as those we subsequently present.
For instance, Bollen (1983) questions Snyder and
Economic and noneconomic linkages Kick’s (1979) country classifications for three of
With the primary themes of world-system theory the 118 countries analyzed, because these coun-
established, we focus upon key issues in concep- tries are “outlier” cases in his regression analysis
tualizing that system. We follow Snyder and of political democracy.
Kick’s logic in emphasizing that, aside from eco- A concern with “classification error” and the
nomic linkages, fundamental roles in the world use of other national attributes to re-classify
system are played by cultural networks (Snyder nations as a remedy is understandable but ques-
and Kick, 1979; Ramirez and Boli, 1987; Meyer tionable. A number of theorists have noted the
et al., 1997) and political-military networks inability of attribute-based “substantialist” inquiry
(Snyder and Kick, 1979; Szymanski, 1981; to account for the relational characteristics of
Giddens, 1985; Mann, 1988; Chase-Dunn, 1989). social actors and historical processes (e.g.,
The roles of noneconomic linkages in globaliza- Granovetter, 1985; Emirbayer, 1997). Further, and
tion are increasingly acknowledged in their own more concretely, world-system theory is a struc-
right as direct effects on societies, but also due to tural theory based on the analysis of linkages
their deep interpenetration with other linkages among global units (especially nations) and
having comparable impacts (see Galtung, 1971; the consequences of these linkages for them
Sklair, 1999). (Wallerstein, 1974; Chirot, 1985). Unit attributes
Because this view about the importance of may be a result of the structure but it is inappro-
noneconomic forces to world-system approaches priate to use attributes to identify the components
is contested in some studies (Delacroix and of that structure (i.e., the “positions” of nations
Ragin, 1981; Nemeth and Smith, 1985), we offer in the system). When taken to its logical conclu-
a few illustrations. Consider, for instance, that by sion, the classification or reclassification of
the sale of conventional armaments the United countries’ world-system positions based on the
States is provided access to “police” and control attribute or outcome measures used to test the
much of the world system that is geographically theory essentially renders the world-system per-
remote from it (e.g., most recently, the spective true by definition. Based on this logic,
Middle East) (see Albrecht et al., 1974; Mann, Snyder and Kick and the present study use multi-
1986). As well, Beckfield (2008) emphasizes that ple network analyses of international linkages to
intergovernmental organizations (IGOs) exert identify world-system structure and nations’ posi-
a powerful impact on national policies and tions in it, and we invite replications that use net-
international trade, as core states employ IGOs work methodologies to address the veracity of our
and an emerging world polity to oversee an results.

5605-Scott-Chap22.indd 313 4/13/2011 2:37:03 PM


314 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Other network relationships restricts his analyses to wealthy OECD nations.


and international attributes Even with the restricted dataset, he finds core/
periphery relationships between nations, suggest-
Some studies claim that indicators such as invest- ing power differences between economically
ment dependence, trade concentration, and so on, developed nations. What is more, his analytic
measure “position” or “control” in the world strategy is very similar to that of Snyder and Kick
system (Rubinson, 1976; Delacroix and Ragin, (1979), as both studies identify blockgroups on
1978; Kentor, 1981). However, these are continu- the basis of structural equivalence (i.e., identical
ous variables that stratify nations on given criteria. relations among countries).
They do not represent position any more than an Also using CONCOR, Nemeth and Smith
individual’s income or education measures his or (1985) attempt to differentiate periphery, semipe-
her (discrete) class position (Wright and Perrone, riphery, and core relations based on patterns of
1977; see also White and Breiger, 1975: 68). trade in commodities between nations. Their find-
Missed are the institutional locus of transnational ings reveal a core, a strong semiperiphery, a weak
flows; for example, the value of trade of a given semiperiphery, and a periphery. Following the
peripheral nation does not identify whether tran- identification of the four distinct categories,
snational capital flows originate entirely, partly, or regression analyses suggest that the core nations
negligibly from, say, the core or other types of have higher levels of wealth and lower child mor-
nations. The differential effect of those origins is tality rates than nations in the weak semiperiphery
theoretically plausible and is a central component and periphery, and higher wealth generation and
of world-system theorization. The multiple- energy consumption than all noncore nations.
network approach, in contrast, is a superior meth- Largely drawing from Nemeth and Smith
odology for measuring such flows, and this logic (1985), Smith and White (1992) employ the meas-
is our justification for the methodologies used ure of regular equivalence and also conduct an
here and by Snyder and Kick. That said, we now analysis of mobility in the world system. Through
briefly review the empirical literature in sociology the use of regular equivalence (which groups
that employs the multiple-network approach to actors based on their ties to similar others), Smith
world-system structure. and White (1992) analyze trade data and identify
five world-system zones: core, strong semiperi-
phery, weak semiperiphery, strong periphery,
and weak periphery. Their analysis of world-sys-
Empirical articulations of world-system tem mobility indicates that from 1965 to 1980,
structure and national consequences upward mobility was more common than down-
ward mobility. However, causal explanations
A number of scholars have used social network for these mobility patterns were left for future
analysis to examine the structure of the core/ investigations.
periphery hierarchy and to evaluate hypotheses More recently, Mahutga (2006) utilizes an
concerning the relational structure of the modern analytic strategy similar to that of Smith and
world system and its impact on national character- White (1992) to assess changes in the structure of
istics.1 As Lloyd et al. (forthcoming) suggest, the world economy from 1965 to 2000. Through
most of these studies are nested within two gen- the analysis of trade data for different commodity
eral approaches to the identification of the world types, Mahutga finds that core/periphery patterns
system’s structure that vary with respect to the of interaction remained relatively intact through-
forms of relational data employed. One approach, out the 35-year period, that commodity exchanges
which explicitly focuses on economic exchanges, across the zones of the world system remained
distinguishes between trade relationships for par- unequal, and that a small number of nations
ticular forms of commodities. The other general experienced notable upward mobility in the
approach, which follows in the footsteps of Snyder interstate system.
and Kick (1979), combines noneconomic and The second approach, which builds on the
economic data to study the relational structure of original analyses conducted by Snyder and
the world system. In the following paragraphs we Kick (1979), involves the analyses of various
briefly summarize key contributions to each of forms of relational data. Surprisingly, this body of
these approaches.2 sociological inquiry is much smaller than the
The first approach largely begins with Breiger approach that focuses explicitly on international
(1981), who utilizes a structural equivalence crite- trade relationships. In fact, we identify only two
rion with the CONCOR program to analyze trade additional studies that make noteworthy contribu-
relationships. He focuses on the trade of raw tions to this approach. First, in a follow-up to
materials, agricultural products, manufactured Snyder and Kick (1979), Kick and Davis (2001)
goods, and energy resources. However, Breiger employ a structural equivalence analysis, which

5605-Scott-Chap22.indd 314 4/13/2011 2:37:03 PM


A MULTIPLE-NETWORK ANALYSIS OF THE WORLD SYSTEM OF NATIONS, 1995–1999 315

confirms that the core consists of the Western SIPRI Web site). A binary coding scheme was
industrial nations. These nations dominate the used, with “1” representing arms transfers from
world system in political, military, transportation, an exporting country to the recipient nation for
communication, sociocultural, and economic net- 1995–99 inclusive.
works. Second, Van Rossem (1996) utilizes rela-
tional data on the presence of foreign troops,
diplomatic exchange, imports, and exports. To IGOs The data on IGOs reflect shared affilia-
“test the world-systems paradigm as a general tions. The data were converted from two-mode
theory of development” (Van Rossem, 1996: 508), data (country-to-organization relations) to one-
Van Rossem employs a role equivalency measure mode data (country-to-country relations). This
based on the triad census. In the analyses he also conversion created a nondirected matrix with cell
attempts to determine if the core/periphery hierar- contents representing the number of affiliations
chy is best treated as continuous or categorical. shared across countries. To match the other three
Regarding the structure of the world system, Van binary network relations matrices, the values in
Rossem’s (1996) results are relatively consistent the matrix were dichotomized, with values that
with Snyder and Kick (1979) and Kick and Davis exceeded the mean set to one and all other values
(2001). However, he stresses that “coreness” in set to zero. We tested multiple cutpoints for this
the world system is more continuous than categor- conversion but settled on the mean value because
ical, and his world-system position measurements it resulted in a matrix with sufficient variability
do not appear to be directly related to economic for the blockmodeling analysis and ultimately
development, which greatly contrasts with Snyder produced a similar set of blocked results as the
and Kick’s earlier (1979) panel analyses. valued data. Beckfield (2008) was kind enough to
share his IGO data with us.

Embassies Data for the embassies matrix are


Our network methodology taken from the list of representations in foreign
for analyzing the world system countries (Anzinger, 2002). This source provides
for each “sender” nation a list of “recipient” coun-
Data tries in which an embassy headquarters exists. For
We operationally define world-system structure each “sender” country we coded a 1 if that country
according to four types of international networks sent foreign representation (i.e., an embassy) to
(trade; arms transfers; IGOs; and embassies) for another “host” nation, and 0 otherwise.
the 1995–99 period. The four networks were The matrices vary in their densities, with the
first represented by separate adjacency matrices, trade and IGO data being the most dense (44 and
with each instance of a “tie” from one member to 41 percent densities, respectively) and the embas-
another coded “1” in the appropriate cell, and the sies and arms transfer data the least (7 and 2 per-
absence of a “tie” coded “0.” Our blockmodel cent, respectively). Each individual matrix was
analyses are based on 166 nations for which joined (or stacked) into a single file and analyzed
data were available for all networks. Our coding simultaneously.3 The four networks together cap-
procedures utilized a series of years (1995–99) ture the substantively important dimensions of tran-
that minimize idiosyncratic characteristics of a snational interaction discussed above and permit a
single year, capture the modern era, and permit reasonable replication of Snyder and Kick (1979).
researchers to examine time-ordered reciprocities
between the modern global structure and the
attributes of nations.
ANALYSES
Trade Trade data are taken from the International
Monetary Fund (IMF, 2000). The IMF only We used the CONCOR program in UCINET
records annual transactions totaling $1 million (Borgatti et al., 2002). CONCOR (Breiger
or more, so $1 million for any year in the time et al., 1975; White et al., 1976) identifies block-
period from 1995 to 1999 becomes the threshold groups on the basis of structural equivalence,
for coding a tie in the trade matrix. which determines the extent to which actors
display identical relationships with other actors.
While others (e.g., Mahutga, 2006) have argued
Armament Transfers The Stockholm Inter- that structural equivalence provides an overly
national Peace Research Institute (SIPRI, 2007) stringent criterion for identifying positioning in
presents transfers of conventional weaponry, the world system, we employ this technique in
including aircraft, naval vessels, missiles, and order to replicate the methodological choices of
armored fighting vehicles (downloaded from the Snyder and Kick.

5605-Scott-Chap22.indd 315 4/13/2011 2:37:03 PM


316 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Specifically, CONCOR splits the initial net- This nodal block clearly forms the “core of the
work matrix into two structurally distinct groups core” of the world system, although the density of
and then splits each of the two resulting groups block 1’s ties to the other blocks tends to trail
into two more groups, and so on. The process of off as we move from this center. Blocks 2 and 3
block splitting continues until a single actor occu- are tied to the rest of the system in ways that
pies a block group or all actors in the block rather closely resemble this centermost block.
group have identical network relations. However, When taken together, and with a few exceptions,
UCINET allows researchers to determine how blocks 1, 2, and 3 reproduce much of the “core”
many partitions to make. We base partitioning in Snyder and Kick’s study. The exceptions
decisions on the goals of maximizing block group compose a set of nations with the least prima
homogeneity and making comparisons with the facie validity to us, such as India, Indonesia,
partitions reported by Snyder and Kick. Malaysia, Pakistan, the Philippines, Thailand,
To identify potential “outliers,” we compute and possibly even China, despite its recognizable
individual country densities with the rest of the ascendancy in the system in recent times. We
system (total send-and-receive ties for each coun- note that when we partitioned this block further,
try divided by all possible ties) and compare this these “hangers-on” to core standing split off
with the densities across the system for their from the Western European nations and the
respective block groups. Thus, we use degree cen- center core.
trality as a criterion to test for validity in block The densities of linkages fall off for succeeding
groups, and we report outlying countries below. blocks, starting with the Eastern European cluster,
consisting of a heterogeneous grouping of what
might be conceded to be “upper semiperipheral”
countries. Block 4 is more weakly tied to the rest
of the system than is the core of blocks 1–3, even
FINDINGS though it is more strongly tied than the remaining
blocks. Thereafter, the Southeast Asian/Middle
Table 22.1 shows our listing of ten blocks, pre- East, Former Soviet, Middle East, and South
sented across from Snyder and Kick’s (1979) find- American blocks form more of a traditional semi-
ings. Table 22.2 presents the densities of ties periphery of the system. We make this designation
within and between each of the blocks of nations, because they are rather extensively tied through-
calculated separately for each of the four types of out the system when compared with the remaining
tie (i.e., operator-specific densities), and also the two blocks (9, 10), although less expansively
mean over all four relations. Figure 22.1 depicts connected than blocks 1–4.
the magnitude of densities with bolder lines The Africa block (9) and a cluster of predomi-
reflecting greater ties. nantly South Pacific and Middle Eastern nations
The clusterings presented in Table 22.1 are occupy the periphery of the world system.
ordered in a rough hierarchy in anticipation of the Densities show some dependencies in blocks 9
information on densities reported in Table 22.2. and 10 upon the core, but an even greater de-
Before moving to the density data and relevant coupling from the bulk of the global social system
evidence for these preliminary impressions, we than is true for blocks 1–8.
highlight a few of the most obvious cases of Table 22.2’s densities of overall ties suggest a
“outliers.” In block 4, Albania is noted as an outly- structure for the global system that very roughly
ing country, with an overall density score that is parallels world-system arguments and the results
considerably lower than that of the block mean presented by Snyder and Kick. The gradual decline
(individual country coefficients are available upon in ties moving from core to periphery in the
request). This is understandable based on its well- system appears to support more “continuous”
known international linkage characteristics. In the interpretations of the world-system hierarchy,
same block Russia is a prominent outlier, and so is rather than purely “discrete” interpretations
Ukraine in block 6, the most prominent global that rely on dichotomous (core/periphery) or
players from the former Soviet Union. Outlying trichotomous (core/semiperiphery/periphery)
cases are to be expected, given the stringent com- articulations (see Chase-Dunn, 1989; Van Rossem,
binatorial rules that attend structural equivalence 1996).
modeling (see Mahutga, 2006). In the trade densities matrix, with few excep-
The densities presented in Table 22.2 (see also tions, all blocks remain very closely tied in
Figure 22.1, created using NetDraw – see Borgatti exports and imports to the most central core block.
et al., 2002) suggest that for all relations taken The other two seemingly core blocks also repro-
together (“All”) what we call the “center core” duce this role overall in the global economy struc-
block is more extensively linked with all the rest ture. Pending further analyses, two semiperipheries
of the system than are any of the other blocks. appear to be in evidence in the trade matrix in

5605-Scott-Chap22.indd 316 4/13/2011 2:37:03 PM


A MULTIPLE-NETWORK ANALYSIS OF THE WORLD SYSTEM OF NATIONS, 1995–1999 317

Table 22.1 Blockmodel country lists from current study and from Snyder and Kick (1979)

Results for 1995–1999 Results for Circa 1960–65

Block 1 (Center Core Block) – France, Germany, Italy, Block C (Core) – Australia, Austria, Belgium, Canada,
Netherlands, United Kingdom, United States Denmark, France, Greece, Italy, Japan, Luxembourg,
Netherlands, Norway, Portugal, South Africa, Spain,
Sweden, Switzerland, United Kingdom, United States,
West Germany, Yugoslavia
Block 2 (Western European Block) – Austria, Belgium- Block D (Semiperiphery) – Bulgaria, Cuba, Cyprus, East
Luxembourg, Brazil, Denmark, Finland, Greece, Ireland, Germany, Hungary, Iran, Iraq, Ireland, Israel, Jordan,
Israel, Norway, Poland, Portugal, Spain, Sweden, Kenya, Lebanon, Romania, Turkey, USSR
Switzerland, Turkey
Block 3 (Asian Block) – Australia, Canada, China, India, Block D´ (Semiperiphery) – Burma, Ceylon, Finland,
Indonesia, Japan, Malaysia, Pakistan, Philippines, South India, Malaysia, Pakistan, Philippines, Saudi Arabia,
Africa, South Korea, Thailand Taiwan
Block C´ (Semiperiphery) – Argentina, Peru, South
Korea, Uruguay, Venezuela
Block 4 (Eastern European Block) –Albania*, Bulgaria, Block F (Periphery) – Cambodia, China, Czechoslovakia,
Croatia, Czech Republic, Hungary, Malta, New Zealand, Jamaica, Iceland, Laos, Malta, Mongolian Republic,
Romania, Russia*, Slovak Republic, Slovenia Nepal, New Zealand, Poland, Thailand, Trinidad and
Tobago
Block 5 (Southeast Asian/Middle East Block) – Block F´ (Periphery) – Afghanistan, Albania, Indonesia,
Afghanistan, Bahrain, Cameroon, Kuwait, Myanmar, Kuwait, North Korea, South Vietnam, Syria
Nepal, North Korea, Oman, Saudi Arabia, Singapore*,
United Arab Emirates, Vietnam
Block 6 (Former Soviet Block) – Armenia, Azerbaijan, Block E (Periphery) – Bolivia, Brazil, Chile, Colombia,
Belarus, Bosnia and Herzegovina, Estonia, Georgia, Ecuador, North Vietnam, Panama, Paraguay
Iceland, Kazakhstan, Kyrgyz Republic, Latvia, Lithuania,
Macedonia, Moldova, Ukraine**, Uzbekistan,
Turkmenistan, Yugoslavia
Block 7 (Middle East Block) – Bangladesh, Cyprus, Egypt, Block E´ (Periphery) – Costa Rica, Dominican Republic,
Iran, Jordan, Lebanon, Morocco, Sri Lanka, Syrian Arab El Salvador, Guatemala, Haiti, Honduras, Mexico,
Republic, Tunisia Nicaragua
Block 8 (South American Block) – Algeria, Argentina, Block A (Periphery) – Algeria, Burundi, Chad, Congo,
Bahamas, Barbados*, Bolivia, Cape Verde, Chile, Ethiopia, Libya, Malagasy Republic, Morrocco, Rwanda,
Colombia, Costa Rica, Cote d’Ivoire, Cuba, Dominican Somalia, Sudan, Tunisia, Uganda, United Arab Republic,
Republic, Ecuador, El Salvador, Guatemala, Guyana, Yemen
Haiti, Honduras, Jamaica, Kenya, Mexico, Nicaragua,
Nigeria, Panama, Paraguay, Peru, Suriname*, Trinidad
and Tobago, Uruguay, Venezuela
Block 9 (African Block) – Angola, Benin, Botswana, Block B (Periphery) – Cameroun, Central African
Burkina Faso, Burundi, Cambodia, Central African Rep., Republic, Dahomey, Gabon, Ghana, Ivory Coast, Liberia,
Chad, Comoros*, Congo, Djibouti, Equatorial Guinea*, Mali, Mauritania, Niger, Nigeria, Republic of Guinea,
Ethiopia, Gabon, Gambia, Ghana*, Guinea, Guinea- Senegal, Sierra Leone, Togo, Upper Volta
Bissau, Lesotho, Liberia, Libya, Madagascar, Malawi,
Mali, Mauritania, Mauritius, Mozambique, Namibia,
Niger, Rwanda, Senegal*, Sierra Leone, Somalia,
Sudan*, Swaziland, Tanzania*, Togo, Uganda, Zambia,
Zimbabwe
Block 10 (South Pacific/Middle East Block) – Bhutan,
Brunei Darussalam, Eritrea, Fiji, Iraq, Laos, Mongolia,
Papua New Guinea, Qatar, Solomon Islands, Tajikistan,
Tuvalu, Yemen

*outlier (±.1); **outlier (±.15), block means are in parens.

5605-Scott-Chap22.indd 317 4/13/2011 2:37:03 PM


318

Table 22.2 Block densities

5605-Scott-Chap22.indd 318
Center Core Western Europe Asian Eastern Europe SE Asian/ME Former Soviet Middle East South America African South Pacific/ME

All

1. Center Core .917 .906 .917 .739 .517 .517 .742 .651 .458 .295
2. Western Europe .700 .606 .615 .537 .289 .376 .498 .466 .309 .145
3. Asian .705 .610 .663 .495 .393 .211 .527 .467 .346 .250
4. Eastern Europe .606 .527 .506 .487 .182 .303 .407 .279 .123 .079
5. SE Asian/ME .372 .250 .382 .114 .186 .059 .277 .076 .081 .074
6. Former Soviet .456 .346 .199 .293 .070 .217 .150 .061 .028 .033
7. Middle East .571 .460 .513 .371 .279 .111 .470 .239 .204 .115
8. South America .571 .431 .428 .240 .072 .036 .254 .375 .113 .018
9. African .388 .247 .291 .091 .055 .012 .184 .108 .231 .013
10. South Pacific/ME .228 .081 .192 .040 .070 .008 .100 .014 .012 .029

Trade

1. Center Core 1.000 1.000 1.000 1.000 .986 .990 .967 .994 1.000 .808
2. Western Europe .956 .948 .972 .952 .872 .945 .933 .920 .778 .554
3. Asian .986 .978 .970 .902 .896 .750 .933 .858 .777 .679
4. Eastern Europe 1.000 .939 .909 .864 .621 .738 .818 .536 .311 .259
5. SE Asian/ME .972 .811 .896 .447 .576 .230 .717 .258 .273 .186
6. Former Soviet .951 .824 .657 .679 .260 .636 .482 .218 .087 .113
7. Middle East .917 .840 .925 .782 .733 .359 .889 .290 .317 .269
THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

8. South America .972 .762 .714 .409 .242 .122 .357 .501 .114 .033
9. African .842 .533 .563 .227 .171 .047 .230 .095 .121 .017
10. South Pacific/ME .718 .297 .500 .140 .179 .018 .208 .018 .012 .064

4/13/2011 2:37:03 PM
5605-Scott-Chap22.indd 319
Arms

1. Center Core .667 .711 .792 .258 .431 .108 .317 .244 .067 .141
2. Western Europe .100 .095 .111 .048 .044 .047 .040 .044 .010 .021
3. Asian .111 .028 .091 .030 .063 .005 .050 .022 .029 .032
4. Eastern Europe .030 .030 .076 .064 .076 .064 .100 .045 .045 .028
5. SE Asian/ME .014 .017 .028 .000 .008 .005 .017 .000 .002 .006
6. Former Soviet .000 .004 .039 .021 .015 .011 .047 .008 .025 .005
7. Middle East .000 .000 .008 .000 .000 .012 .022 .007 .000 .000
8. South America .000 .000 .000 .000 .000 .000 .000 .006 .001 .000
9. African .000 .000 .000 .000 .000 .000 .002 .000 .001 .002
10. South Pacific/ME .000 .005 .000 .000 .000 .005 .000 .000 .002 .000

Embassies

1. Center Core 1.000 .911 .875 .712 .458 .461 .717 .444 .271 .167
2. Western Europe .744 .381 .378 .152 .089 .043 .073 .044 .022 .000
3. Asian .722 .433 .591 .182 .153 .044 .150 .128 .019 .058
4. Eastern Europe .409 .145 .174 .055 .023 .005 .018 .015 .002 .014
5. SE Asian/ME .306 .022 .146 .000 .008 .000 .025 .006 .000 .006
6. Former Soviet .363 .090 .054 .064 .005 .037 .006 .002 .000 .005
7. Middle East .400 .053 .142 .009 .033 .006 .011 .013 .002 .000
8. South America .389 .104 .139 .033 .008 .004 .010 .033 .001 .000
9. African .217 .028 .044 .005 .000 .000 .005 .000 .001 .000
10. South Pacific/ME .128 .015 .038 .007 .006 .000 .000 .000 .002 .000
A MULTIPLE-NETWORK ANALYSIS OF THE WORLD SYSTEM OF NATIONS, 1995–1999
319

4/13/2011 2:37:03 PM
320

5605-Scott-Chap22.indd 320
Table 22.2 Cont.

IGOs Center Core WesternEurope Asian Eastern SE Asian/ME Former Soviet Middle East South America African South Pacific/ME
Europe

1. Center Core 1.000 1.000 1.000 .985 .194 .510 .967 .922 .492 .064
2. Western Europe 1.000 1.000 1.000 .994 .150 .467 .947 .856 .427 .005
3. Asian 1.000 1.000 1.000 .864 .458 .044 .975 .858 .558 .231
4. Eastern Europe .985 .994 .864 .964 .008 .406 .691 .518 .132 .014
5. SE Asian/ME .194 .150 .458 .008 .152 .000 .350 .039 .050 .096
6. Former Soviet .510 .467 .044 .406 .000 .184 .065 .016 .000 .009
7. Middle East .967 .947 .975 .691 .350 .065 .956 .647 .498 .192
8. South America .922 .856 .858 .518 .039 .016 .647 .961 .335 .038
9. African .492 .427 .558 .132 .050 .000 .498 .335 .801 .031
10. South Pacific/ME .064 .005 .231 .014 .096 .009 .192 .038 .031 .051
THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

4/13/2011 2:37:03 PM
A MULTIPLE-NETWORK ANALYSIS OF THE WORLD SYSTEM OF NATIONS, 1995–1999 321

Center core

Asian Middle East

Western European Eastern European

African South American

South Pacific/Middle East Former Soviet

South East Asian/Middle East

Figure 22.1 Circle graph of density relations between blocks

blocks 4 and 5, and blocks 6–8, respectively, and ties followed by blocks 4, 7, and 8, then 5, 6,
the sharpest degree of de-coupling again is visible and 9. Block 10 again occupies an essentially de-
with peripheral blocks 9 and 10. coupled, peripheral role. The thick regional ties
Arms transfers show significantly different reflected in the diagonal add an interesting nuance
arrangements. Only the center core links to much to Beckfield’s (2008) recent emphasis on global,
of the core and semiperiphery of the system. as opposed to regional, political and cultural
The relative absence of arms export ties from norms. A tendency toward universal norms may
block 1 to the former Soviet block is interpretable be indicated in the breadth of center core and
on the basis of the continuation of “cold war poli- European ties in the system, but the persistence of
tics.” Arms exports for the rest of the world regional dynamics is evident as well.
system are trivial or simply do not exist. Although A comparison of network structure, country
the Eastern European block is somewhat more classifications, and inferences here and in Snyder
prominent than others, no clear division of an and Kick (1979) is instructive. With some
“upper” and “lower” semiperiphery is evident. exceptions, both studies identify what best may
Most apparent is a center core/noncore structura- be described as a “loose” core/semiperiphery/
tion, with a few select, central core gatekeepers at periphery structure that reflects a centuries-long
the helm. consistency in global structure, despite changes in
Embassy memberships replicate the nodal posi- hegemons and some vertical mobility, either
tion of the center core, but again secondarily of ascendancy or decline, in the system.
the Western European and Asian core – block 3’s Parallels in the core blocks (C in Snyder and
density profile approximates that of the Western Kick; center core, Western European, and some of
European core. Across the semiperipheral clusters the Asian blocks here) across the two treatments
homogeneity in generic structure relative to the are evident. The identification of a set of most
core is evident, and the relative de-coupling of central core nations refines the results Snyder and
blocks 9 and 10 again is evident. Kick present, although had they iterated their
IGO relational data display a relatively denser block C, similar partitions likely would have
set of international ties. The center core is rela- surfaced. The present study finds evidence for the
tively more dominant than others, but blocks 2 and “coreness” of a newer set of the very large Asian
3 approximate one another in the breadth of their countries, which for the most part dominate the

5605-Scott-Chap22.indd 321 4/13/2011 2:37:03 PM


322 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

global population period and are certainly to be component, the center and European core (blocks
viewed as “emerging,” relative to their positions in 1 and 2) clearly are the most broadly and inten-
1960–65, the era of data for the Snyder and Kick sively connected actors in the system. As well, this
study. This consistency is less true for the clusters is relatively true for the large and ascending Asian
of countries outside the world system’s core, countries and the prominent “ex-colonies” of
although we find a true periphery of African Great Britain (block 3). The more semiperipheral
countries that squares with Snyder and Kick’s blockgroups (4–8) are directly and rather strongly
periphery blocks A and B. We also identify connected with the core blocks, but less so with
another periphery block (10) that includes a each other.
number of countries not analyzed by Snyder and The representations in Figure 22.2 do not dis-
Kick. Events surrounding Iraq’s position in the play the extensiveness of global connections that
system during the 1995–99 period of isolation are shown in Figure 22.1, and they do not fully
versus 1960–65 suggest a rather clear interpreta- reflect the density coefficients or the related
tion of why it has “moved” to peripheral standing interpretations we made above. Nevertheless, the
in our replication. representations in Figure 22.2 have their own
Snyder and Kick identify several other periph- appeal in terms of simplicity, while offering a
eral clusters (E, E´, F, and F´) comprised of number of conclusions that mesh with our more
Central and South American countries, and Asian complex visual representations in the form of
countries, that we feel for the most part are better density scores.
classified in the lower semiperiphery today. The
rest of our semiperiphery contains roughly the
same countries designated as such by Snyder and
Kick (blocks C´, D and D´). In recent years, the
ascendancy of a number of formerly peripheral or CONCLUSIONS AND IMPLICATIONS
near-peripheral countries (Brazil, China) is strik-
ing (see Evans, 1995; Smith and White, 1992; Our introductory remarks noted that Adam Smith
Sklair, 1999). It is also true that a number of (1776) argued for the principle of comparative
world-system studies identify an expansive and advantage. His articulation centers on a world
heterogeneous semiperiphery (Wallerstein, 1974; division of labor in which countries export the
Terlouw, 1993; Arrighi and Drangel, 1986). Their commodities that, by gift of nature or labor, they
clustering of African, South and Central American, are able to market for maximal profit. He
Pacific, and Asian nations in the semiperiphery recognized this as a mechanism for national
roughly parallels the classifications presented here. advance, although it by no means guarantees
parity between nations. Indeed, the converse may
be true. Nineteenth-century sociologists adopted
Graphical interpretation the organic metaphor Smith and others developed
To graphically represent network linkages in a and applied in examining the networks endog-
simpler way, we applied NetDraw (Borgatti et al., enous to nations and their impacts on national
2002) to dichotomize block densities. Blocks are trajectories. More contemporary modernization
considered to be linked if their density scores theorists accepted these network themes as a focal
exceed the mean block density score (.313). These point in their theorizations about the global
relationships were graphed using the spring system, viewing the westernization of the world as
embedding graph theoretic, which locates nodes foundational for the advance of nations relative to
based on relative geodesic distances (see Figure their earlier circumstances. Modern dependency
22.2). As before, ties with higher density scores and world-system applications contest these inter-
are thicker. Furthermore, the nodes are sized on pretations and focus on how internation links
the basis of their betweenness centrality scores, serve to ensure the progress of richer core socie-
which measures the extent to which actors are ties at the relative, though perhaps not absolute,
positioned on paths with the shortest tie length expense of more dependent nations.
between other actors (Knoke and Yang, 2008). Our findings address these network themes and
The center core block clearly stands out in this although space limitations prevent us from tying
regard, as it is directly and rather strongly our results to national development characteris-
connected to the other block groups. tics, they do set the stage for subsequent examina-
Overall, Figure 22.2 shows a world system that tions of the impacts of global structure on
is almost entirely connected, as anticipated by national development in the contemporary world.
world-system theorizations. The exceptions are Essentially we offer an alternative to Snyder and
the peripheral blocks (African; South Pacific), Kick’s earlier study, which set a foundation for the
which are in many ways structural isolates from short- and longer-run effects of world-system
the rest of the system. Within the connected graph structure circa the early 1960s. Our results for the

5605-Scott-Chap22.indd 322 4/13/2011 2:37:03 PM


A MULTIPLE-NETWORK ANALYSIS OF THE WORLD SYSTEM OF NATIONS, 1995–1999 323

Eastern European
South Pacific/Middle East

Middle East

Western European

South American

Center Core Former Soviet


Asian

African South East Asian/Middle East

Figure 22.2 Network graph with spring embedding of density relations between blocks

current period show the axes of the westernization Our results roughly conform with the core/
of the world addressed in classical treatments semiperiphery/periphery structure identified by
in macrosociology, as well as contemporary the pioneers of world-system theory (Wallerstein,
world-system/ dependency and modernization 1974) and in early empirical applications (Snyder
approaches. Thus, our network analyses allow for and Kick, 1979). Nevertheless, at a more specific
the testing of longstanding theoretical streams, empirical level, we find multiple cores, which
including foundational principles about compara- agrees with Breiger’s (1981) network analysis of
tive advantage, the “evolutionary” progress of OECD trade relations. As well, our findings iden-
nations outside the developed world as compared tify what might be viewed as a dual or upper
with Western European countries, the role of (blocks 5–6) and lower-tiered (blocks 7–8) semi-
westernization in prompting or limiting national periphery, which is initially argued in Delacroix
development throughout the world, and the and Ragin (1981) and shown in Nemeth and
ascension of alternative global powers (e.g., the Smith’s (1985) and Smith and White’s (1992)
“Asian block”). network analyses of international trade. Mahutga’s
The data employed here reflect modern regional (2006) finding of continuity in a core/periphery
and global reconfigurations and introduce some trade structure across the period 1965 to 2000
new, theoretically justifiable operators that resem- also is confirmed in the present analysis (see also
ble those employed by Snyder and Kick. We Snyder and Kick, 1979; Kick, 1987; Kick and
might anticipate that this alone would lead to Davis, 2001).
notable variations in results between the present When taken as a whole, we think our results
effort and their earlier study and with other prima- suggest it is appropriate to apply ideal-typical
rily economic approaches to world-system struc- categories such as “core,” “semicore,” “upper
ture. However, our treatment of world structuration semiperiphery” and “lower semiperiphery,” and
and the positionality of nations in it shows there “periphery” to the structure of the contemporary
are significant parallels between our findings and world system. However, our results are suggestive
those from prior treatments. of another alternative, the characterization of the

5605-Scott-Chap22.indd 323 4/13/2011 2:37:03 PM


324 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

system as a hierarchy that can be measured by a Apart from these substantive issues there are
continuous metric of power and dependency some important implications from this study with
instead of more discrete types. More concretely, respect to methodology. CONCOR produced a set
cell densities overall, and for both economic and of theoretically and empirically defensible blocks,
noneconomic operators when taken together but one might consider employing alternative
(except for military transfers), suggest the possi- modeling strategies. Wasserman and Faust
ble explanatory power of cluster-based rankings (1994) have criticized the way that CONCOR
on a 1–10 scale, with the scores reflecting the partitions data into an even number of block-
relative power/dependency of nations in the groups, which can potentially lead to a degree of
system. This strategy may not align squarely arbitrariness in the results. Here we use CONCOR
with Wallerstein’s (1974) tripartite articulations of to more closely approximate the original block-
the world system, or Frank’s (1966) earlier “North- modeling analysis of 30 years prior, but future
South” approach. Nonetheless, it squares with research should consider a comparison of the
more recent formulations that advocate for con- results derived from these distinct approaches
tinuous gradations as appropriate measures of (e.g., Burt, 1990; Batagelj et al., 1991; Lloyd
nations’ positions in the world system (Chase- et al., forthcoming).
Dunn, 1989; Kentor, 2000). Moreover, while the present effort was driven
Kentor (2000: 26) argues that “a reformulation by a replication of Snyder and Kick’s pioneering
of the problem of (whether) position in the core/ study, future research might also consider devel-
periphery hierarchy is a continuum or discrete oping world-system blocks on the basis of differ-
strata (zones) should be empirically determined ent forms of network equivalence. Structural
rather than assumed on an a priori basis.” We equivalence sets a strict criterion for the identifi-
agree with him on this point, and with his view cation of equivalent actors – identical links to
that despite the utility of using ideal-typical others – but some have suggested that regular
approaches for analyzing certain substantive equivalence may be more appropriate, since this
issues, in the case of the world system and its blocks together countries based on ties to simi-
effects the complexity is much greater than a larly positioned actors rather than identical actors
three-tiered, or two-tiered, hierarchy can effec- (Lloyd et al., forthcoming). Future studies might
tively capture. Further, these nuances are best also do blocking based on other forms of equiva-
understood by a power/dependency approach that lence as well, including automorphic equivalence
expressly acknowledges and empirically treats the (Knoke and Yang, 2008). Researchers should
multiple, and sometimes combined, avenues carefully consider both the theoretical and empiri-
for global power offered by economic, military, cal implications of utilizing different forms of
political, and cultural opportunities. equivalence.
We view multiple-network approaches based In the future, researchers should also consider
on economic and noneconomic ties as the optimal employing a more deductive approach to analyz-
way to address the structural configuration of the ing the structure of the world system and its
world (social) system, if not the world economy. consequences. The generalized blockmodeling
There is a rough parity in generic results using approach available in Pajek is particularly appro-
economic versus noneconomic ties, but a fruitful priate for hypothesis testing (Doreian et al., 2005).
direction for subsequent research would be a more Using this technique, one could (1) test whether
theoretically driven project linking the position of various block densities meet a prior theoretical
nations in each network type to relevant domestic criterion for a core/semiperiphery/periphery struc-
outcomes and antecedents. For instance, cultural ture or (2) assess stability and change in the
or military centrality may be viewed as an optimal structure of the world system. Each of these inno-
route for global power or ascendancy for some vations would aid in describing and explaining the
nations (India, Israel). structure of the world system and its impact on a
Our results should prove useful to studies range of national outcomes, such as economic
linking world-system structure and block development, environmental degradation, and
membership to the international and domestic many other important national characteristics.
characteristics of nations. The continuing replica- We invite a range of replications based on
tions and use of the original Snyder and Kick these suggestions and others. As well, we
findings are evidence of its durability, but our advocate a closer inspection of the block member-
present findings extend to a far larger and more ships advanced in network studies of the world
current world system than was analyzed before. system – in effect, a meta-analysis of networkers’
Thus, it may be helpful in addressing the central conclusions. Part of that analysis might be the use
questions of classical and contemporary macroso- of different schemas in predicting a variety of
ciology as they apply to the modern era. national characteristics, ranging from economic

5605-Scott-Chap22.indd 324 4/13/2011 2:37:03 PM


A MULTIPLE-NETWORK ANALYSIS OF THE WORLD SYSTEM OF NATIONS, 1995–1999 325

development and inequality to population and Blau, P.M. (1964) Exchange and Power in Social Life.
environmental transitions. New York: John Wiley.
Bollen, K. (1983) ‘Orld system position, dependency, and
democracy—the cross-national evidence’. American
Sociological Review, 48(4): 468–79.
Borgatti, S.P. and Everett, M.G. (1992) ‘Notions of position in
ACKNOWLEDGEMENT
social network analysis’. Sociological Methodology, 22: 1–35.
Borgatti, S., Everett, M., et al. (2002) UCINET. Harvard
We wish to thank SAGE’s anonymous referees and Analytic Technologies.
the editors for their helpful criticisms although we Breiger, R. (1981) ‘Structures of economic interdependence
bear sole responsibility for this paper’s content. among nations’. In Continuities in Structural Inquiry.
London: Sage. pp. 353–79.
Breiger, R.L., Boorman, S.A. et al. (1975) ‘Algorithm for clus-
tering relational data with applications to social network
NOTES analysis and comparison with multidimensional-scaling’.
Journal of Mathematical Psychology, 12(3): 328–83.
1 Related bodies of inquiry beyond the scope of Burns, T.J., Kick, E.L. et al. (1994) ‘Demography, develeop-
the current discussion involve using network analysis mentand deforestation in a world-system perspective’.
to study the global city system (e.g., Alderson and International Journal of Comparative Sociology, 35(3–4):
Beckfield, 2004; Smith and Timberlake, 2001), the 221–39.
structure of the world polity (e.g., Beckfield, 2008), Burt, R.S. (1990) ‘Detecting role equivalence’. Social Networks,
and global interlocking directorates (e.g., Kentor and 12(1): 83–97.
Jang, 2004). Burt, R.S. (1992) Structural Holes. Cambridge, MA: Harvard
2 For a more detailed summary of these bodies of University Press.
literature, see Lloyd et al. (forthcoming). Cardoso, F.H. (1970) ‘Structural and institutional impediments
3 We also blocked the data by combining the to development’. Revista Mexicana de Sociologia, 32(6):
matrices into a single matrix by summing the cell 1461–82.
values across all relations. Both strategies produced Cardoso, F.H. and Faletto, E. (1979) Dependency and
findings reflective of the same hierarchical structure Development in Latin America. Berkeley: University of
for the system. They produced near-identical block California Press.
memberships, except for nations in the “middle Chase-Dunn, C. (1989) Global Formation: Structures of the
tiers” of the global hierarchy. In the end, we utilized Global Economy. Cambridge, MA: Basil Blackwell.
the standard stacking procedure because it retains Chase-Dunn, C. and Rubinson, R. (1977) ‘Toward a structural
the greatest amount of information and replicates perspective on the world system’. Politics and Society 7(4):
previous analyses. 453–76.
Chirot, D. (1985) ‘The rise of the west’. American Sociological
Review, 50(2): 181–95.
Comte, A. ([1842] 1854) The Positive Philosophy of Auguste
REFERENCES Comte. New York: D. Appleton.
Cook, K.S., Emerson, R.M., et al. (1983) ‘The distribution of
Alderson, A.S. and Beckfield J. (2004) Power and Position in power in exchange networks—theory and experimental
the World City System. results’. American Journal of Sociology, 89(2): 275–305.
Anzinger, G. (2002) ‘Governments on the WWW: Representa- Delacroix, J. and Ragin, C.C. (1978) ‘Modernizing institutions,
tions in foreign countries’. http://www.gksoft.com/govt/en/ mobilization, and 3rd-world development—cross-national-
representations.html (accessed May 31, 2008). study’. American Journal of Sociology, 84(1): 123–50.
Armer, M., Jeong, I. et al. (1989) ‘The contributions of school- Delacroix, J. and Ragin, C.C. (1981) ‘Structural blockage—
ing to economic growth in East Asia: Japan, Korea, and a cross-national-study of economic dependency, state
Taiwan’. American Sociological Association Proceedings efficacy, and underdevelopment’. American Journal of
Paper. Sociology, 86(6): 1311–47.
Arrighi, G. and Drangel J. (1986) ‘The stratification of the Doreian, P., Batagelj, V. and Ferligoj, A. (2005) ‘Positional
world-economy: An exploration of the semi-peripheral analyses of sociometric data’. In P. Carrington, J. Scott
zone’. Review, 10(1): 9–74. and S. Wasserman (eds), Models and Methods in Social
Batagelj, V., Doreian, P., et al. (1991) An Optimizational Network Analysis. New York: Cambridge University Press.
Approach to Regular Equivalence. 11th Annual Sunbelt pp. 77–97.
Social Network Conference, Tampa, Florida. Durkheim, E. ([1893] 1964) The Division of Labor in Society.
Beckfield, J. (2008) ‘The dual world polity: Fragmentation Glencoe, IL: The Free Press.
and integration in the network of intergovernmental Eisenstadt, S.N. (1974) ‘Studies of modernization and socio-
organizations’. Social Problems, 55(3): 419–42. logical theory’. History and Theory, 13(3): 225–52.

5605-Scott-Chap22.indd 325 4/13/2011 2:37:03 PM


326 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Emerson, R. (1962) ‘Power-dependence relations’. American McKinney, L.A., Fulkerson, G.M., et al. (2009) ‘Investigating
Sociological Review, 27(1): 31–41. the correlates of biodiversity loss: A cross-national quanti-
Emirbayer, M. (1997) ‘Manifesto for a relational sociology’. tative analysis of threatened bird species’. Human Ecology
American Journal of Sociology, 103(2): 281–317. Review, 16(1): 103–13.
Evans, P. (1979) Dependent Development: The Alliance of Meyer, J.W., Boli, J. et al. (1997) ‘World society and the nation-
Multinational, State, and Local Capital in Brazil. Princeton, state’. American Journal of Sociology, 103(1): 144–81.
NJ: Princeton University Press. Meyer, J. W., Hannan, M.T., et al. (1979) ‘National economic
Frank, A.G. (1966) ‘The development of underdevelopment’. development, 1950–1970: Social and political factors’.
Monthly Review, 18: 17–31. In J. W. M. a. M. T. Hannan (eds), National Development
Galtung, J. (1971) ‘Structural theory of imperialism’. Journal of and the World System: Educational, Economic, and Political
Peace Research, 8(2): 81–117. Change 1950–1970. Chicago: University of Chicago Press.
Giddens, A. (1985) The Nation-State and Violence. Berkeley: pp. 85–116.
University of California Press. Nemeth, R.J. and Smith, D.A. (1985) ‘International trade and
Granovetter, M. (1973) ‘Strength of weak ties’. American world system structure: A multiple network analysis’.
Journal of Sociology, 78(6): 1360–80. Review, 8: 517–60.
Hafner-Burton, E.M. and Tsutsui, K. (2005) ‘Human rights in a Parsons, T. (1966) ‘Religion in a modern pluralistic society’.
globalizing world: The paradox of empty promises’. Review of Religious Research, 7(3): 125–46.
American Journal of Sociology, 110(5): 1373–411. Prebisch, R. (1962) ‘The economic development of Latin
Homans, G. (1961) Social Behavior. New York: Harcourt, America and its principal problems’. Economic Bulletin for
Brace and World. Latin America, 7(February 1962): 1–22.
IMF (2000) Direction of Trade Statistics. Washington, DC: Ramirez, F. and J. Boli. (1987) ‘The political construction
International Monetary Fund. of mass schooling: European origins and worldwide
Inkeles, A. and Smith, D.H. (1974) Becoming Modern: institutionalization’. Sociology of Education, 60: 2–17.
Individual Change in Six Developing Countries. Cambridge, Robinson, W.I. (2004) A Theory of Global Capitalism:
MA: Harvard University Press. Production, Class and State in a Transnational World.
Kentor, J. (1981) ‘Structural determinants of peripheral Cambridge, MA: Cambridge University Press.
urbanization—the effects of international dependence’. Rostow, W.W. (1960) The Stages of Economic Growth: A
American Sociological Review, 46(2): 201–11. Non-communist Manifesto. Cambridge, MA: Harvard
Kentor, J. (1998) ‘The long-term effects of foreign investment University Press.
dependence on economic growth, 1940–1990’. American Rubinson, R. (1976) ‘World-economy and distribution of
Journal of Sociology, 103(4): 1024–46. income within states—cross-national-study’. American
Kentor, J. (2000) Capital and Coercion. London: Taylor and Sociological Review, 41(4): 638–59.
Francis Group—The Garland Publishing, Inc. Sassen, S. (1998) Globalization and Its Discontents. New York:
Kentor, J. and Jang, Y.S. (2004) ‘Yes, there is a (growing) New Press.
transnational business community—A study of global Schofer, E. and Meyer, J.W. (2005) ‘The worldwide expansion
interlocking directorates 1983–98’. International Sociology, of higher education in the twentieth century’. American
19(3): 355–68. Sociological Review, 70(6): 898–920.
Kick, E.L. (1987) ‘World-system structure, national SIPRI (2007) ‘Arms transfers database’. Stockholm International
development, and the prospects for a socialist world Peace Research Institute. http://armstrade.sipri.org/arms_
order’. In T. Boswell and A. Bergesen (eds), America’s trade/values.php (accessed June 31, 2008).
Changing Role in the World System. New York: Praeger. Sklair, L. (1999) The Transnational Capitalist Class. Oxford:
pp. 127–55. Blackwell.
Kick, E.L. and Davis, B.L. (2001) ‘World-system structure and Smith, A. (1776 [1977]) An Inquiry into the Nature and Causes
change—An analysis of global networks and economic of the Wealth of Nations. Chicago: University of Chicago
growth across two time periods’. American Behavioral Press.
Scientist, 44(10): 1561–78. Smith, D.A. and Timberlake, M.F. (2001) ‘World city networks
Knoke, D. and Yang, S. (2008) Social Network Analysis, and hierarchies, 1977–1997—An empirical analysis of
Thousand Oaks, CA: Sage. global air travel links’. American Behavioral Scientist,
Lloyd, P., Mahutga, M.C. and Leeuw, J.D. (Forthcoming) 44(10): 1656–78.
‘Looking back and forging ahead: Thirty years of social Smith, D.A. and White, D.R. (1992) ‘Structure and dynamics
network research on the world-system’. of the global economy—network analysis of international-
Mahutga, M.C. (2006) ‘The persistence of structural inequal- trade 1965–1980’. Social Forces, 70(4): 857–93.
ity? A network analysis of international trade, 1965–2000’. Snyder, D. and Kick, E.L. (1979) ‘Structural position in
Social Forces, 84(4): 1863–89. the world system and economic-growth, 1955–1970—
Mann, M. (1986) The Sources of Social Power. Cambridge, multiple-network analysis of transnational internations’.
MA: Cambridge University Press. American Journal of Sociology, 84(5): 1096–26.
Mann, M. (1988) States, War and Capitalism. Oxford: Spencer, H. (1887) The Factors of Organic Evolution. London:
Blackwell. Williams and Norgate.

5605-Scott-Chap22.indd 326 4/13/2011 2:37:03 PM


A MULTIPLE-NETWORK ANALYSIS OF THE WORLD SYSTEM OF NATIONS, 1995–1999 327

Szymanski, A. (1981) The Logic of Imperialism. New York: Wasserman, S. and K. Faust. (1994) Social Network Analysis:
Praeger. Methods and Applications. Cambridge, MA: Cambridge
Terlouw, C. P. (1993) ‘The elusive semiperiphery—a critical- University Press.
examination of the concept semiperiphery’. International Weber, M. ([1921] 1978) Economy and Society. Berkeley:
Journal of Comparative Sociology, 34(1–2): 87–102. University of California Press.
Tönnies, F. (1887) Gemeinschaft and Gesellschaft. Leipzig: Wellman, B. (1983) ‘Network analysis: Some basic principles’.
Fues’s Verlag. Sociological Theory, 1: 155–200.
True, J. and M. Minstrom. (2001) ‘Transnational networks and White, H.C., Boorman, S.A. and Breiger, R.L. (1976) ‘Social-
policy diffusion: The case of gender’. International Studies structure from multiple networks. 1. Blockmodels of roles
Quarterly, 45: 27–57. and positions’. American Journal of Sociology, 81(4):
Van Rossem, R. (1996) ‘The world system paradigm as general 730–80.
theory of development: A cross-national test’. American White, H.C. and Breiger, R.L. (1975) ‘Pattern across net-
Sociological Review, 61(3): 508–27. works’. Society, 12(5): 68–73.
Wallerstein, I. (1974) The Modern World System: World Bank (2008) World Development Indicators. CD-ROM.
Capitalist Agriculture and the Origins of the European Wright, E.O. and Perrone, L. (1977) ‘Marist class categories
World-Economy in the Sixteenth Century. New York: and income inequality’. American Sociological Review,
Academic Press. 42(1): 32–55.

5605-Scott-Chap22.indd 327 4/13/2011 2:37:04 PM


5605-Scott-Chap22.indd 328 4/13/2011 2:37:04 PM
SECTION III

Concepts and Methods

5605-Scott-Chap23.indd 329 4/6/2011 11:55:33 AM


5605-Scott-Chap23.indd 330 4/6/2011 11:55:33 AM
23
A Brief Introduction to
Analyzing Social Network Data
Robert A. Hanneman and Mark Riddle

INTRODUCTION available in Wasserman and Faust (1994), John


Scott (2000), and our own online text (Hanneman
Social network analysts use two kinds of tools and Riddle, 2005) (this chapter and the following
from mathematics to represent information about chapter are cut-down and edited versions).
patterns of ties among social actors: graphs and Working with network data and calculating
matrices. In this chapter, we’ll provide a very measures of their properties is almost always done
quick sketch about how social networks can be with software. We will present a number of exam-
represented with these tools and we will discuss ples using the UCINET package (Borgatti et al.,
some of the things that these representations let us 2002), because we are most familiar with it. There
see more clearly. We’ll extend our look at the are, however, a number of excellent software tools
“toolkit” of social network analysts by looking at that you will want to review (see Huisman and
how they approach some of the most commonly van Duijn, this volume) when you want to try
asked questions about the texture of whole net- your hand.
works and the ways that individuals are embedded
in them.
There is a lot more to these topics than we will
cover here. The visual representation of social
networks as graphs is discussed in depth in the USING GRAPHS TO REPRESENT
chapter by Lothar Krempel in this volume. SOCIAL RELATIONS
Mathematics has whole subfields devoted to
“graph theory” and to “matrix algebra.” Social A good drawing of a graph can immediately sug-
scientists have borrowed just a few things that gest some of the most important features of over-
they find helpful for describing and analyzing all network structure. Are all the nodes connected?
patterns of social relations. Representing data as Are there many or few ties among the actors? Are
matrices is the basis for manipulating data and there subgroups or local “clusters” of actors that
calculating the measures we discuss in the next are tied to one another but not to other groups?
chapter. The chapter by Pip Pattison (this volume) Are there some actors with many ties, and some
shows some advanced applications. with few?
By the time you’ve worked through this chapter A good drawing can also indicate how a par-
and the next, we hope that you will have an intro- ticular “ego” (node) is “embedded” in (connected
ductory understanding of the most commonly to) its “neighborhood” (the actors that are
used formal representations of social networks connected to ego, and their connections to one
and some of the most commonly used basic another). By looking at “ego” and the “ego
descriptive indexes. This is only an introduction; network,” we can get a sense of the structural
longer and more complete presentations are constraints and opportunities that an actor faces;

5605-Scott-Chap23.indd 331 4/6/2011 11:55:33 AM


332 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

we may be better able to understand the role that variation, with different organizations serving as
an actor plays in a social structure. “sources,” “receivers,” and “transmitters.”
Graphs representing networks are composed of Individual organizations are “embedded” in
nodes (the individual actors) and relations. Either the network in quite different ways. The Educ
arcs (one-directional arrows) or edges (lines with- organization has multiple alternative sources of
out arrow heads) represent which actors are tied to information from different regions of the network
which others, for asymmetric and symmetric rela- but does not serve as a source of information for
tions, respectively. Figure 23.1 shows an example others. The WRO (welfare rights organization) is
of information sharing among 10 organizations as isolated; the UWAY (United Way) seems to be
studied by Knoke and Wood (1981). (The original “central.”
versions, in color, of the images in this chapter can Graphs can be more or less informative and can
be seen at http://faculty.ucr.edu/~hanneman/ highlight or obscure features. Krempel (this
chapter_23_figures.htm.) volume) provides an extended treatment of visu-
Figure 23.1 is a “directed graph.” That is, it alization. But let us identify a few key features of
provides information that is asymmetric and not graphs that can be helpful for getting started.
necessarily reciprocated. In this example, each
node represents an organization, and each relation
represents whether or not it provides information
to each other organization (if a relation has the Graphing node and relation attributes
value of zero, it is not graphed).
Looking at the “big picture”, we note that the Using colors and shapes are useful ways of
“texture” of the network is uneven. All but one conveying information about what “type” of actor
organization is connected to others, but overall the each node is. Institutional theory might suggest
density of connections isn’t very high. There is a that information exchange among organizations
good bit of variability in how connected the of the same type would be more common than
organizations are. There seems to be qualitative information exchange between organizations of

Welfare

UWay

News

Coun WRO

Mayor Educ

Comm
Indu

West

Figure 23.1 Directed graph of information ties (Knoke bureaucracies)

5605-Scott-Chap23.indd 332 4/6/2011 11:55:33 AM


A BRIEF INTRODUCTION TO ANALYZING SOCIAL NETWORK DATA 333

Welfare

UWay

News

Coun WRO

Mayor Educ

Comm
Indu

West

Figure 23.2 Knoke information network with government/nongovernment (solid) and


generalist/specialist (shaded) indicated

different types. Some of the organizations here are network; for example, nodes might be shown with
governmental (Welfare, Coun, Educ, Mayor, sizes proportional to the number of ties each actor
Indu); some are nongovernmental (UWay, News, has. Figure 23.3 combines the quantitative and
WRO, Comm, West). Ecological theory of qualitative, using color and size to indicate fea-
organizations suggests that a division between tures describing how each node is embedded in
organizations that are “generalists” (e.g., perform the network.
a variety of functions and operate in several differ- Figure 23.3 shows four subgroups, which are
ent fields) and organizations that are “specialists” shaded differently to identify which nodes are
(e.g., work only in social welfare) might affect members of which “K-core” (a K-core is one
information-sharing patterns. approach to identifying coherent subgroups in a
A visual inspection of the Figure 23.2 with the graph, discussed in the next chapter). In addition,
two attributes highlighted by node color and shape the sizes of the nodes in each K-core are propor-
is much more informative about the hypotheses of tional to the sizes of the K-core. The largest group
differential rates of connection among black and contains government members (Mayor, County
lightly shaded (red and blue, respectively, in our Government, Board of Education), as well as the
online version) and among circles and squares. It main public (Welfare) and private (United Way)
doesn’t look like this diagram is very supportive welfare agencies. A second group, colored in solid
of either of our hypotheses. black, groups together the newspaper, chamber of
Nodes may differ quantitatively as well as commerce, and industrial development agency.
qualitatively. In a graph of trade flows in the world Substantively, this actually makes some sense!
system of nationally bounded economies, for The relations among the actors can also have
example, it might be useful to make each node’s “attributes.” It can be very helpful to use color and
size proportional to its GDP. The quantities that size to indicate difference of kind and amount
distinguish nodes may also be based on measures among the relations. Where the ties among actors
that describe their relational positions in a have been measured as a value, the magnitude of

5605-Scott-Chap23.indd 333 4/6/2011 11:55:34 AM


334 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Welfare
WRO

UWay

News

Coun
Mayor
Educ

Comm

Indu

West

Figure 23.3 Knoke information exchange network with K-cores

the tie can be suggested by using thicker lines to closeness of points indicates similarity (by some
represent stronger ties. Dashed lines, or lines of definition, and there are many alternative defini-
different colors, can be used to indicate different tions) of nodes. The X and Y axes may also sug-
kinds of relations among actors, allowing multi- gest patterns to be explored. Note that the public
plex data (data with more than one kind of nodes tend to be grouped to the lower right, and that
relation) to be displayed in a single graph. the private organizations are not very clustered.

Node location Ego networks (neighborhoods)


Most graphs of networks are drawn in a two-di- A very useful way of understanding complicated
mensional “X-Y axis” space (Mage and some network graphs is to see how they arise from the
other packages allow three-dimensional rendering local connections of individual actors. The net-
and rotation). Where a node or a relation is drawn work formed by selecting a node, including all
in the space is essentially arbitrary — the full actors that are connected to that node, and all the
information about the network is contained in its connections among those other actors is called the
list of nodes and relations. Figure 23.4 shows “ego network” or (one-step) neighborhood of an
exactly the same network (Knoke’s money actor (“neighborhoods” can also be found for two
flow network) that has been rendered in several or more degrees of distance from ego).
different ways. To visualize the way in which individual nodes
The first drawing locates the nodes randomly, are embedded in the whole network, drawings of
the second drawing uses a “circle,” and the third their ego networks are often very helpful. One of
locates points according to its scores on a two-di- the basic insights of the social network perspec-
mensional nonmetric scaling of the similarity of tive is that actors’ attributes and behaviors are
the node’s tie profiles. It may be helpful to create shaped by those with whom they have direct rela-
graphs (based on the random graph) that group tions, and actors may act to re-shape these con-
certain cases close together, or create clusters so straints. Graphing individuals’ local networks and
that we can see differences in the patterns of ties comparing them (e.g., are the ego neighborhoods
within and between groups. Circle graphs high- of all government actors bigger than nongovern-
light which nodes are highly connected and which ment actors? Which actors have neighborhoods
are less so. Drawings that indicate scaling or clus- that are composed mostly of actors of the same
tering of network data, like the third one, may type?) can give great insight into similarities and
be particularly illustrative. In this drawing, the differences among actors.

5605-Scott-Chap23.indd 334 4/6/2011 11:55:34 AM


5605-Scott-Chap23.indd 335
Mayor West
WRO
Coun WRO
Comm Coun

West Coun
News UWay

Indu
UWay
News
News
Educ WRO
UWay Welfare
Educ Indu
Welfare Mayor Mayor
Indu West Comm

Comm Welfare Educ

Figure 23.4 Random, circle, and multidimensional scaling layouts


A BRIEF INTRODUCTION TO ANALYZING SOCIAL NETWORK DATA
335

4/6/2011 11:55:34 AM
336 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

A lot of the work that we do with social net- Consider the list of the Knoke organizations and a
works is primarily descriptive or exploratory, dummy coding of whether they are governmental
rather than confirmatory hypothesis testing. For (1) or not (0) in Figure 23.5.
small networks, visual inspection of graphs can Figure 23.5 actually has two column vectors:
give a feel of the overall “texture” of the social organization ID and coding of government or not
structure and can suggest how individuals are (the row and column labels 1–10 and 1G were
“embedded” in the larger structure. All of the added by UCINET). This makes the data array a
numerical indices that we will discuss in the ten-by-two (number of rows by number of col-
next chapter are really just efforts to attach num- umns) rectangular matrix. Rectangular matrices
bers to features that we naturally “see” in graphs. are simply “lists of lists” (either horizontally
Working with drawings can be a lot of fun, and or vertically).
it is a bit of an outlet for one’s creative side. A Most network data sets include arrays of vari-
well-constructed graphic can also be far more ables that describe the attributes of the nodes.
effective for sharing your insights than any These attributes can be purely qualitative (e.g., the
number of words. Large networks can be difficult name of the organization), or nominal, ordinal, or
to study visually, however. Formal description of interval (e.g., number of employees). Each varia-
the properties of networks and testing hypotheses ble can be stored in a single vector, or the vectors
about them require that we convert our graphs to can be gathered into a rectangular array like in the
numbers. example in Figure 23.5. These attribute data sets
look very much like conventional social science
data: rows representing cases, each coded with
columns representing variables.
USING MATRICES TO REPRESENT Arrays like Figure 23.5 are used to provide
information about each node. We may code this
SOCIAL RELATIONS information from our independent observations,
as in the example. Each node might also be
Graphs are very useful ways of presenting infor- described by a variable that is based on its rela-
mation about social networks. But when there are tional properties, such as its number of ties to
many actors or many kinds of relations, they can other nodes, or its “betweenness centrality.” A
become so visually complicated that it is very very common use of attribute vectors in social
difficult to see patterns. It is also possible to rep- network analysis is to indicate the “group” to
resent information about social networks in the which a case belongs. There is a special name for
form of matrices. We’ll briefly review some of the these kinds of codes: partitions. Partitions (like the
most commonly used matrix representations of codes of zero or one in Figure 23.5) can be used
social network data. The language of matrices and to select subsets of cases, rearrange the data, and
matrix operations is important if you are going to compute summary measures (e.g., what is
work with network data. You don’t have to do the
math (that’s why we have computers), but the
mathematical concepts provide an efficient way to
think about data handling and analysis.
A matrix is nothing more than an array (or list)
of data (usually named with a bold letter). We
might call a list of the 10 organizations names in
the Knoke bureaucracy study A. Each element
(organization name) can be indexed by its place in
the list (name 1, name 2, etc.). There are a several
types of matrices that are used, often in combina-
tion, in social network analysis.

Vectors
Matrices can have a single dimension (e.g., a list
of names). Matrices with one dimension are
called vectors; row vectors are “horizontal” lists
of elements, and column vectors are “vertical”
lists of elements. Row or column vectors are most
commonly used in social network analysis to Figure 23.5 Attribute vector for Knoke
present information about the attributes of nodes. bureaucracies data

5605-Scott-Chap23.indd 336 4/6/2011 11:55:34 AM


A BRIEF INTRODUCTION TO ANALYZING SOCIAL NETWORK DATA 337

the relative density of ties among government The simplest and most common matrix to
organizations relative to their average densities of show relations is binary. That is, if a tie is present,
ties to nongovernmental organizations?). a one is entered in a cell; if there is no tie, a
zero is entered. This kind of a matrix is the start-
ing point for almost all network analysis and is
called an “adjacency matrix” because it represents
Square matrices who is “next to” (adjacent) to whom in the social
space mapped by the relations that we have meas-
In formal mathematics, a network is defined as a
ured. Figure 23.6 shows two such adjacency
collection of nodes and relations. Generally, vec-
matrices.
tors or rectangular collections of vectors are used
A matrix may be symmetric or asymmetric. By
to describe the attributes of the nodes. Square
convention, in a directed (i.e., asymmetric) matrix,
matrices of two dimensions, in which both rows
the sender of a tie is the row and the target of the
and columns contain lists of the same nodes, are
tie is the column. Let’s look at a simple example.
used to describe the relations or connections
In Figure 23.6, we see that organization 1 sends
between each pair of actors. Consider the example
information to organization 2 (i.e., the entry in
in Figure 23.6.
cell 1, 2 = 1), and this relation is reciprocated
(i.e., the entry in cell 2, 1 =1). Organization 1 also
sends information to organization 7, but this tie is
not reciprocated. Asymmetric ties are not neces-
sarily reciprocated, though they may be. A
symmetric matrix represents “bonded ties” or
“co-membership” or any kind of social relation in
which, if A is tied to B, B must logically be tied
to A (which is the case in most institutionalized or
role relations).
Each node-by-node square matrix represents a
map of a particular relation between all pairs of
actors in the network. If there are multiple rela-
tions, as in Figure 23.6, these are represented as a
third dimension (or slice or stack). The quantity in
each cell of the matrix represents the strength
of the tie between two actors (in symmetric data)
or the quantity directed from the node on the row
to the node on the column. The strength of rela-
tions can be measured as a nominal dichotomy or
adjacency (as in our example), or at higher levels.
A more in-depth discussion of data types is
provided by Peter Marsden (this volume).
In representing social network data as matrices,
the question always arises: what do I do with the
elements of the matrix where i = j? That is, for
example, does organization 1 “send information”
to itself? This part of the matrix is called the main
diagonal. Sometimes the value of the main diago-
nal is meaningless, and it is ignored (and left
blank or filled with zeros or ones). Sometimes,
however, the main diagonal can be very important
and can take on meaningful values.

Multiplex matrices
Many social network analysis measures focus on
structures defined by patterns in a single kind of
Figure 23.6 Adjacency matrices of relationship among actors: friendship, kinship,
information and money ties among economic exchange, warfare, and so on. Social
Knoke’s bureaucracies relations among actors, however, are usually more

5605-Scott-Chap23.indd 337 4/6/2011 11:55:35 AM


338 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

complex, in that actors are connected in multiple multiple levels of analysis: individuals affiliate
ways simultaneously. In face-to-face groups of with groups and organizations; organizations are
persons, the actors may have emotional connec- linked in community ecology by their overlapping
tions, exchange relations, kinship ties, and other memberships.
connections all at the same time. Organizations Any array of relational data that maps the
exchange personnel, money, and information and connections between two different sets of actors is
can form groups and alliances. Relations among said to be “two-mode.” In sociological analysis,
nation-states are characterized by numerous forms it is common for one mode to be individual
of cultural, economic, and political exchange. actors and for the other mode to be sets of events,
Multiplex data consist of a series of matrices organizations, or identity categories. These types
(or “slices”), each of which is a square matrix of data are called affiliation networks because
describing a single type of tie among all pairs of they map the membership of connections, or
actors. The various relations may be symmetric or affiliations, of actors with structures. Borgatti
asymmetric and may be scored at different levels and Halgin (this volume) provide an in-depth
of measurement. The two matrices shown in treatment of the analysis of two-mode data.
Figure 23.6 are two slices of the Knoke bureaucra- It is not uncommon to translate two-mode data
cies data, showing information sending/receiving into a series of one-mode matrices. For example,
and money sending/receiving relations among the one might transform a matrix that displays
10 organizations. which persons were members of which voluntary
One may apply all the tools of network analysis organizations in a community into a matrix
to each matrix in multiplex data, separately. For showing how many times each pair of persons
example, is there greater network centralization in happened to be co-members. One can transform
the flow of money than there is in the flow of the same data into a one-mode matrix that shows
information among organizations? But we may how many times each pair of organizations
also wish to combine the information on multiple was connected by overlapping memberships.
relations among the same actors. There are two Asymmetric one-mode data can also be viewed as
general approaches: reduction and combination. two-mode data in which the same actors are the
The reduction approach seeks to combine infor- lists for the two modes.
mation about multiple relations among the same
set of actors into a single relation that indexes the
quantity of ties. The combination approach also
seeks to create a single index of the multiplex rela- Image matrices and hyper-graphs
tions, but attempts to represent the quality of ties,
resulting in a qualitative typology. Role algebras Relational matrices that show which actors are
(see Pattison, this volume) are a particularly connected to which others are of great descriptive
important approach to qualitative reduction of and practical use. Often, though, our interest is in
multiplex data. more abstract categories and relations among
A special type of multiplex data arises when we them. For example, it is interesting to note that the
obtain multiple reports or views about the same United States imports many relatively low-tech
social structure. This type of cognitive social manufactured goods from China, and it sells many
structure data maps the ties among pairs of actors high-tech and brand-name goods in return. To a
in each slice and has a slice for each perceiver. world-systems analyst, however, this relation is
One may wish to use matrix operations to com- simply one example of a larger class of equivalent
bine the multiple cognitive maps (e.g., averaging, relationships involving core and semiperipheral
minimum value, maximum value, etc.), or one nations. Ferligoj et al. (this volume) provide
may wish to find groups of perceivers who have an introduction to methods of identifying and
more or less similar views of the social structure. working with “equivalence classes.”
Once classes and their member nodes have
been identified, we can represent ties among them
with graphs. These hyper-graphs have classes as
Affiliation (two-mode) matrices nodes, and edges or arcs as defined by the equiva-
lence relation. Such graphs can greatly reduce
A central focus of sociological analysis is the the difficulty in visualizing networks with large
embedding of individuals in larger structures (e.g., numbers of nodes and can provide great analytic
families, organizations, communities, networks, insight.
identity categories). These larger structures The information in a hyper-graph can also be
are often seen as arising from the agency of indi- represented in matrix form. The original rows and
viduals. Social network analysis may be used to columns of the actor-by-actor relation matrix are
map and study the relations within and between re-arranged (permuted) to group the actors in the

5605-Scott-Chap23.indd 338 4/6/2011 11:55:36 AM


A BRIEF INTRODUCTION TO ANALYZING SOCIAL NETWORK DATA 339

same class together. This re-arranged matrix is (e.g., when actors joined the network and departed,
made up of “blocks” that map relations of mem- when ties were formed or dissolved). Data of
bers of a class to one another (in the diagonal these types are becoming increasingly common
blocks) and all the relations of the actors in one with the use of digital instruments for network
class to all those in another class in off-diagonal data collection (e.g., computer server logs, video
blocks. recordings). Generally, such dynamic data are
The blocked and permuted matrix is then often stored as lists of events (the network analysis
reduced to a new class-by-class matrix by sum- package Pajek has a number of data formats and
marizing the information within each block. algorithms specifically designed for dynamic
Sometimes, the average density of ties, or the data), and programming is used to build matrices
average value of tie strength, is used to summarize for analysis from them.
the blocked matrix. Frequently, some cut-off value
is chosen (often the average value of ties for the
entire network) and blocks are assigned a value of
1 if ties exceed the cut-off or 0 if they fall below CONCLUSION
the cutoff. This type of zero-one matrix, with
groups or equivalence classes as nodes, is called
the “image” matrix. Thoughtfully constructed Once a pattern of social relations or ties among a
image matrices can greatly simplify complex pat- set of actors has been represented in a formal way
terns among large numbers of actors (and, of (via a graph or matrix), we can define some
course, badly constructed matrices can obscure important ideas about social structure in quite
them). precise ways using mathematics for the defini-
tions. In the next chapter we will examine some of
the most commonly used approaches to describing
the “texture” of whole networks and the positions
Dynamic networks of individual nodes in them.
Increasing attention is being given to the dynam-
ics of networks, with particular attention to under-
standing how the embedding of actors in a
particular place in a network at one time may REFERENCES
effect change in their attributes or behavior and
how the attributes and behaviors of actors at one Borgatti, S.P., Everett, M.G. and Freeman, L.C. (2002) UCINET
point in time may shape the pattern of ties that are for Windows: Software for Social Network Analysis.
built and dissolved over time. Snijders (this Harvard, MA: Analytic Technologies.
volume) discusses approaches to studying net- Hanneman, R. and Riddle, M. (2005) An Introduction to Social
work dynamics; many of the statistical models for Network Methods. http://faculty.ucr.edu/~hanneman/
the analysis of network data discussed in the chap- nettext.
ters by van Duijn and Huisman and by Robins Knoke, D. and Kuklinski, J.H. (1982) Network Analysis. Beverly
(this volume) are specifically aimed at the analysis Hills, CA: Sage.
of change. Knoke, D. and Wood, J. (1981) Organized for Action:
A dynamic network can be represented as a Commitment in Voluntary Associations. New Brunswick,
series of matrix cross-sections, and it is often the NJ: Rutgers University Press.
case that dynamic data are observed this way. This Scott, J. (2000) Social Network Analysis: A Handbook. 2nd ed.
approach results in a multiplex matrix in which London: Sage.
one dimension (usually the slice) is defined by Wasserman, S. and Faust, K. (1994) Social Network Analysis:
“time.” Alternatively, we may have information on Methods and Applications. Cambridge: Cambridge
the exact times at which events began and ceased University Press.

5605-Scott-Chap23.indd 339 4/6/2011 11:55:36 AM


24
Concepts and Measures for
Basic Network Analysis
Robert A. Hanneman and Mark Riddle

NETWORKS AND ACTORS than graphs with low density (Watts, 2003).
Network analysts have developed a considerable
The social network perspective emphasizes multi- number of measures to describe the “texture” of
ple levels of analysis: differences among actors the “social fabric.” At the broadest level, the con-
are traced to the constraints and opportunities that cern is with the solidarity and robustness of the
arise from how they are embedded in networks; whole structure and with the presence of – and
the structure and behavior of networks are relations among – substructures.
grounded in and enacted by local interactions In the second half of this chapter we will shift
among actors. our perspective to the “bottom up.” We will focus
In this chapter we will examine basic concepts on some concepts and measures that provide
and measures used in formal social network insight into the ways that individuals are embed-
analysis. Despite the simplicity of the ideas, there ded in networks. For example, it is often the
are good theoretical reasons (and considerable case that actors who have many others in their
empirical evidence) to believe that these basic “neighborhood” (i.e., “alters” to whom “ego” has
properties of social networks have very important a direct connection) are more influential but
consequences for both individuals and the larger sometimes also more constrained than those who
social structures of which they are parts. have fewer connections. We will examine a
There are many ways that one could organize number of related approaches that identify differ-
this survey, and we will only be able to provide an ent aspects of the “ego network” of actors as
introduction. For more extended treatments, the potential sources of opportunity and constraint
reader may wish to consult John Scott’s Social (Wellman et al., 1988).
Network Analysis (2000), Stanley Wasserman and Throughout this chapter we’ll illustrate the
Katherine Faust’s Social Network Analysis: concepts and measures discussed with output
Methods and Applications (1994), David Knoke from the analysis of a small, binary, directed
and Song Yang’s Network Analysis (2008), and graph. These analyses are performed with UCINET
our own text (Hanneman and Riddle, 2005). (Borgatti et al., 2002), but there are many excel-
In the first half of this chapter we will focus on lent software packages that provide similar tools
the network as a whole; this sort of “top-down” (see, particularly, Huisman and van Duijin, this
perspective enables us to see and measure aspects volume).
of whole social structures (e.g., families, groups, Our illustrations will examine the flow of infor-
communities, markets, polities) that may be pre- mation among 10 formal organizations concerned
dictive of their dynamics. For example, networks with social welfare issues in one midwestern U.S.
where a high percentage of all possible ties among city (Knoke and Wood, 1981). Without reading
actors are actually present (high “density”) are further, take just a moment to examine the graph
often more prone to rapid “information cascades” of this network in Figure 24.1.

5605-Scott-Chap24.indd 340 4/6/2011 11:56:09 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 341

WELF

WRO

UWAY

NEWS
MAYR

COUN
COMM

INDU
EDUC

WEST

Figure 24.1 Knoke information exchange

The formal methods that we will be discussing THE WHOLE NETWORK


in this chapter are really just ways of indexing
features readily seen in the graph. From the “top Since networks are defined by their actors and the
down,” we can see, for example, that there are a connections among them, it is useful to begin our
limited number of actors here (size), and all of description by examining these very simple prop-
them are connected (a single component). Not erties. Small groups differ from large groups in
every possible connection is present (density), and many important ways; indeed, population size
there are thin spots (structural holes) in the fabric. figures largely in much sociological analysis
There are some sets of organizations where every- (Finsveen and van Oorschot, 2008; Totterdell
one exchanges information with everyone et al., 2008). The extent to which actors are con-
(cliques), and these cliques are connected by nected may be a key indicator of the “cohesion”
overlapping membership (bridges). (Burris, 2005; Fominaya, 2007; Moody and White,
Looking at the same graph from the “bottom 2003; Sanders and Nauta, 2004), “solidarity,”
up,” there appear to be some differences among “moral density,” and “complexity” of the social
the actors in how connected they are; compare organization (Crossley, 2008; Schnegg, 2007;
the newspaper to the welfare rights advocacy Urry, 2006).
organization. If you look closely, you can see that
some actors’ connections are likely to be recipro-
cated (that is, if A shares information with B, B
also shares information with A), while other Size and density
actors are more likely to be senders than receivers
of information. As a result of the variation in how The size of a network is often very important.
connected individuals are, and whether the ties are Imagine a group of 12 students in a seminar. It
reciprocated, some actors may be quite “central” would not be difficult for each of the students to
and others less so. Actors may have “equivalent” know each of the others fairly well and to build up
positions in the network, which constitute “types” exchange relationships (e.g., sharing reading
or “roles.” notes). Now imagine a large lecture class of 300
Social network analysts and graph theorists students. It would be extremely difficult for any
have developed a large number of formal algo- student to know all of the others, and it would be
rithms to index these kinds of features about virtually impossible for there to be a single face-
whole networks and about the positions of indi- to-face network for exchanging reading notes.
viduals within them. The remainder of this chapter Size is critical for the structure of social relations
is a quick tour of some of the most commonly because of the limited resources and capacities that
used approaches. each actor has for building and maintaining ties.

5605-Scott-Chap24.indd 341 4/6/2011 11:56:09 AM


342 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Our example network has 10 actors. The size of a are studying is really composed of more than one
network is indexed simply by counting the number subpopulation. In the Knoke information exchange
of nodes. data set, it turns out that all actors are reachable
In any network there are (k * k–1) unique by all others. A message or signal originating
ordered pairs of actors (i.e., AB is different from anywhere in the network could potentially be
BA, and self-ties are ignored), where k is the received by all other nodes.
number of actors. You may wish to verify this for
yourself with some small networks. So, in our
network of 10 actors, with directed data, there are Connectivity
90 logically possible relationships. If we had Even though one actor may be able to reach
undirected (i.e., symmetric) ties, the number another, the connection may not be a strong one.
would be 45, since the relationship AB would be If there are many different pathways that connect
the same as BA. The number of logically possible two actors, they have high “connectivity” in the
relationships then grows exponentially as the sense that there are multiple ways for a signal to
number of actors increases linearly. It follows reach from one to the other (Burris, 2005; Crossley,
from this that the range of logically possible 2008; Finsveen and van Oorschot, 2008; Fominaya,
social structures increases (or, by one definition, 2007; Haythornthwaite, 2005; Hermann, 2008;
“complexity” increases) exponentially with size. Kien, 2008; Kratke and Brandt, 2009). The meas-
The density of a binary network is simply the ure “connectivity” counts the number of nodes
proportion of all possible ties that are actually that would have to be removed in order to make
present. For a valued network, density is defined one actor unreachable by another. Figure 24.2
as the sum of the ties divided by the number of shows the point connectivity for the flow of infor-
possible ties (i.e., the ratio of all tie strength that mation among the 10 Knoke organizations.
is actually present to the number of possible ties). The result demonstrates the tenuousness of
The density of a network may give us insights organization 6’s (the welfare rights organization)
into such phenomena as the speed at which infor- connection as both a source (row) or receiver
mation diffuses among the nodes and the extent to (column) of information. To get its message to
which actors have high levels of social capital most other actors, organization 6 has only one
and/or social constraint. alternative; should a single organization refuse to
In our example data, we see that there are pass along information, organization 6 would
10 nodes; therefore, there are 90 possible connec- receive none at all! Point connectivity can be a
tions. Of these, 49 are actually present. The useful measure to get at notions of dependency
network density then is .5444. and vulnerability.

Distance
Connections The properties of the network that we have exam-
ined so far primarily deal with adjacencies, or the
Size and density give us the overall sense of the
range of possible social structures that could be
present in a population, but what really matters is
the pattern or “texture” of these connections.
There are many widely used indexes that summa-
rize various aspects of the structure of connections
in a graph.

Reachability
An actor is “reachable” by another if there is a set
of connections by which we can trace from the
source to the target actor, regardless of how many
others fall between them. If the data are asymmet-
ric or directed, it is possible that actor A can reach
actor B, but that actor B cannot reach actor A.
With symmetric or undirected data, of course,
each pair of actors either is or is not reachable to
one another. If some actors in a network cannot
reach others, there is potential for a division of the Figure 24.2 Point connectivity of Knoke
network. Or it may indicate that the population we information exchange

5605-Scott-Chap24.indd 342 4/6/2011 11:56:09 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 343

direct connections from one actor to the next. passes through more and more intervening nodes
But the way that people are embedded in networks between two actors.
is more complex than this. Two persons, call In our example, we are using simple directed
them A and B, might each have five friends. But adjacencies, and the results (Figure 24.3) are quite
suppose that none of person A’s friends have straightforward.
any friends except A. Person B’s five friends, in Because the network is moderately dense, the
contrast, each have five friends. The informa- geodesic distances are generally small. This
tion available to B, and B’s potential for suggests that information may travel pretty quickly
influence is far greater than A’s. That is, some- in this network.
times being a “friend of a friend” may be quite For each actor, that actor’s largest geodesic
consequential. distance is called its eccentricity, a measure of
To capture this aspect of how individuals are how far an actor is from the furthest other. For the
embedded in networks, one common approach is network as a whole, the diameter is defined as
to examine the distance between actors. If two the largest eccentricity. The mean (or median)
actors are adjacent, the distance between them is geodesic distance and the standard deviation in
one (that is, it takes one step for a signal to go geodesic distances may be used to summarize
from the source to the receiver). If A tells B, overall distance and the heterogeneity of distances
and B tells C (and A does not tell C), then actors in a network.
A and C are at a distance of two. The distances The use of geodesic paths to examine proper-
among actors in a network may be an important ties of the distances between individuals and for
macro-characteristic of the network as a whole. the whole network often makes a great deal of
Where distances are great, it may take a long time sense. There may be other cases, however, for
for information to diffuse across a population. It which the distance between two actors and the
may also be that some actors are quite unaware of connectedness of the graph as a whole is best
and not influenced by others; even if they are thought of as involving all connections, not just
technically reachable, the costs may be too high to the most efficient ones. For example, if I start
conduct exchanges. a rumor, it will pass through a network by all
The most commonly used definition of the pathways, not just the most efficient ones. How
distance between two actors in a network is geo- much credence another person gives my rumor
desic distance. For binary data, the geodesic may depend on how many times they hear it from
distance is the number of relations in the shortest different sources, and not merely how soon they
possible pathway from one actor to another. The hear it (Frank, 1996; Gallie, 2009; Gurrieri, 2008;
geodesic distance from one actor to another that is Lai and Wong, 2002; Rycroft, 2007). For uses of
not reachable is usually treated as infinite, or distance like this, we need to take into account all
equal to the largest observed distance in the graph. of the connections among actors.
Valued data are often dichotomized in order to One approach to measuring how connected two
calculate the geodesic distance. actors are is to ask how many different actors in
For valued networks, there are several alterna-
tive approaches to defining distances. Where we
have measures of the strengths of ties (e.g., the
dollar volume of trade between two nations), the
“nearness (the opposite of distance)” between two
actors is often defined as the strength of the weak-
est path between them. If A sends 6 units to B, and
B sends 4 units to C, the “strength” of the path
from A to C (assuming A to B to C is the shortest
path) is 4. Where we have a measure of the cost of
making a connection (as in an “opportunity cost”
or “transaction cost” analysis), the “distance”
between two actors is defined as the sum of the
costs along the shortest pathway. Where we have
a measure of the probability that a link will be
used, the “distance” between two actors is defined
as the product along the pathway (as in path
analysis in statistics).
Indices of nearness or distance may also be
weighted in various ways. For example, we might
imagine that the value or potency of a signal Figure 24.3 Geodesic distances for Knoke
decays exponentially, rather than linearly, as it information exchange

5605-Scott-Chap24.indd 343 4/6/2011 11:56:09 AM


344 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

the neighborhood of a source lie on pathways to a The extent to which a population is characterized
target. If I need to get a message to you, and there by “reciprocated” ties may tell us about the degree
is only one other person to whom I can send this of cohesion in populations. Some theorists feel
for retransmission, my connection is weak, even if that there is an equilibrium tendency toward
the person I send it to may have many ways of dyadic relationships to be either null or recipro-
reaching you. If, on the other hand, there are four cated and that asymmetric ties may be unstable. A
people to whom I can send my message, each network that has a predominance of null or recip-
of whom has one or more ways of retransmitting rocated ties over asymmetric connections may
my message to you, then my connection is be a more “equal” or “stable” network than one
stronger. The “flow” approach suggests that the with a predominance of asymmetric connections
strength of my tie to you is no stronger than the (which might be more of a hierarchy).
weakest link in the chain of connections, where There are several different approaches to index-
weakness means a lack of alternatives. For our ing the degree of reciprocity in a population.
directed information flow data, the results of Consider the very simple network shown in
UCINET’s count of maximum flow are shown in Figure 24.5. Actors A and B have reciprocated
Figure 24.4. ties, actors B and C have a nonreciprocated tie,
You should verify for yourself that, for exam- and actors A and C have no tie.
ple, there are four alternative routes in flows from What is the prevalence of reciprocity in this
actor 1 to actor 2, but five such points in the flow network? One approach is to focus on dyads, and
from actor 2 to actor 1. The higher the number of ask which pairs have a reciprocated tie between
flows from one actor to another, the greater the them. This would yield one such tie for three pos-
likelihood that communication will occur, and the sible pairs (AB, AC, BC), or a reciprocity rate
less “vulnerable” the connection. Note that actors of .333. More commonly, analysts are concerned
6, 7, and 9 are relatively disadvantaged. In particu- with the ratio of the number of pairs with a
lar, actor 6 has only one way of obtaining informa- reciprocated tie relative to the number of pairs
tion from all other actors (the column vector of with any tie. In large populations, most actors
flows to actor 6). are linked directly to relatively few other actors,
and it may be more sensible to focus on the degree
of reciprocity among pairs that have any ties
Reciprocity between them. In our simple example, this would
The smallest “social structure” represented in a yield one reciprocated pair divided by two tied
graph is a “dyad,” the relation between two actors. pairs, or a reciprocity rate of .500. In the Knoke
With symmetric dyadic data, two actors are either information tie network, the proportion of all
connected or they are not. Density tells us pretty dyads having a tie that has a reciprocated tie is
much all there is to know. If we are considering a .5313. This is neither “high” nor “low” in itself
directed relation, there are three kinds of dyads but does seem to suggest a considerable degree of
(no tie, a single tie, or ties in both directions). institutionalized horizontal connection within this

Figure 24.4 UCINET “maximum flow” for


Knoke information network Figure 24.5 Definitions of reciprocity

5605-Scott-Chap24.indd 344 4/6/2011 11:56:10 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 345

organizational population. One may also focus on display transitivity because there are not enough
relations, rather than on dyads, by asking what the ties to do so. One type with three relations (AB,
proportion is of all relations in the graph as part of BC, CB) does not have any ordered triples (AB,
reciprocated relations. For our example data, BC) and hence can’t display transitivity. In three
this approach yields a result of .6939. That is, of more types of triads, there are ordered triples
all the relations in the graph, 69% are parts of (AB, BC) but the relation between A and C is not
reciprocated ties. transitive. The remaining types of triads display
varying degrees of transitivity.
Figure 24.6 displays the results of one type of
Transitivity transitivity analysis of the Knoke information data.
The smallest social structure that has the true With 10 nodes, there are 720 triads. However,
character of a “society” is the triad, any “triple” only 146 have enough ties to display transitivity.
{A, B, C} of actors. Such a structure “embeds” That is, there are 146 cases where, if AB and
dyadic relations in a structure where “other” is BC are present, then AC is also present. There
present along with “ego” and “alter.” In (directed) are a number of different ways in which we could
triads, we can see the emergence of tendencies try to norm this count so that it becomes more
toward equilibrium and consistency of social meaningful. One approach is to divide the number
structures (“institutionalization”), as well as of transitive triads by the total number of triads of
features such as balance and transitivity. Triads all kinds (720). This shows that 20.28 percent
are also the simplest structures in which we can of all triads are transitive. Perhaps more meaning-
see the emergence of hierarchy. ful is to norm the number of transitive triads by
With undirected data, there are four possible the number of cases where a single link could
types of triadic relations (no ties, one tie, two ties, complete the triad. That is, norm the number of
or all three ties). Counts of the relative prevalence {AB, BC, AC} triads by the number of {AB, BC,
of these four types of relations across all possible anything} triads. Seen in this way, about two-
triples (that is, a “triad census”) can give a good thirds or all relations that could easily be transitive
sense of the extent to which a population is actually are.
characterized by “isolation,” “couples only,”
“structural holes” (i.e., where one actor is con-
nected to two others who are not connected to Clustering
each other), or “clusters.” Most of the time, most people interact with a
With directed data, there are actually 16 possi- fairly small set of others, many of whom know
ble types of relations among three actors, includ- one another. The extent of local “clustering” in
ing relationships that exhibit hierarchy, equality, populations can be quite informative about the
and the formation of exclusive groups (e.g., where texture of everyday life. Watts (1999) and many
two actors connect and exclude the third). Thus, others have noted that in large, real-world net-
small-group researchers suggest that all of the works (of all kinds of things) there is often a struc-
really fundamental forms of social relationships tural pattern that seems somewhat paradoxical.
can be observed in triads. Because of this interest, On one hand, in many large networks (like, for
we may wish to conduct a “triad census” for each example, the Internet), the average geodesic dis-
actor and for the network as a whole. tance between any two nodes is relatively short
Of the 16 possible types of directed triads, (Field et al., 2006; Hampton and Wellman, 1999).
six involve zero, one, or two relations, and can’t The “six degrees” of distance phenomenon is an

Figure 24.6 Transitivity results for Knoke information network

5605-Scott-Chap24.indd 345 4/6/2011 11:56:10 AM


346 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

example of this. So, most of the nodes in even average density. Since larger graphs are generally
very large networks may be fairly close to one (but not necessarily) less dense than smaller ones,
another. The average distance between pairs of the weighted average neighborhood density (or
actors in large empirical networks is often much clustering coefficient) is usually less than the
shorter than in random graphs of the same size. unweighted version. In our example, we see that
On the other hand, most actors live in local all of the actors are surrounded by local neighbor-
neighborhoods where most others are also con- hoods that are fairly dense; our organizations can
nected to one another. That is, in most large be seen as embedded in dense local neighbor-
networks, a very large proportion of the total hoods to a fairly high degree. Lest we overinter-
number of ties are highly “clustered” into local pret, we must remember that the overall density
neighborhoods. That is, the density in local neigh- of the entire graph in this population is rather
borhoods of large graphs tends to be much higher high (.54). So, the density of local neighborhoods
than we would expect for a random graph of the is not really much higher than the density of
same size. the whole graph. In assessing the degree of clus-
Most of the people we know may also know tering, it is usually wise to compare the clustering
one another, which gives the impression that we coefficient to the overall density.
live in a very narrow social world. Yet, at the same
time, we can be at quite short distances to vast
numbers of people whom we don’t know at all.
The “small-world” phenomena – a combination of Connections among groups
short average path lengths over the entire graph,
In addition to dyads, triads, and local clustering,
coupled with a strong degree of “clique-like”
the texture of connections in a network can be
local neighborhoods – seems to have evolved
affected by “categorical social units” or “subpop-
independently in many large networks.
ulations” defined either by shared attributes or
We’ve already discussed one part of this phe-
contexts. Persons of the same gender may be more
nomenon. The average geodesic distance between
likely to form friendship ties; persons who attend
all actors in a graph gets at the idea of how close
the same school are more likely to be acquainted.
actors are together. The other part of the phenom-
The extent to which these subpopulations are
enon is the tendency toward dense local neighbor-
open or closed (i.e., the extent to which most
hoods, or what is now thought of as “clustering.”
individuals have most of their ties within the
One common way of measuring the extent to
boundaries of these groups) may be a telling
which a graph displays clustering is to examine
dimension of social structure.
the local neighborhood of an actor (that is, all the
actors who are directly connected to ego), and to
calculate the density in this neighborhood (leaving Block density
out ego). After doing this for all actors in the In an organizational community, we might sup-
whole network, we can characterize the degree of pose that there may be competition (expressed as
clustering as an average of all the neighborhoods information hoarding) between organizations of
in the whole graph. the same type, and cooperation between organiza-
Figure 24.7 shows the clustering of the Knoke tions of different, complementary types. We have
information network. used an attribute or partition to divide the cases in
Two alternative measures are presented. The Knoke information exchange data into three sub-
“overall” graph clustering coefficient is simply the populations (governmental agencies, nongovern-
average of the densities of the neighborhoods mental generalists, and welfare specialists) so that
of all of the actors. The “weighted” version we can see the amount of connection within and
gives weight to the neighborhood densities pro- between groups. We can then examine the patterns
portional to their size; that is, actors with larger of ties within and between “blocks” of nodes of the
neighborhoods get more weight in computing the same type. Consider the results in Figure 24.8.

Figure 24.7 Clustering coefficient of Knoke information network

5605-Scott-Chap24.indd 346 4/6/2011 11:56:10 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 347

Figure 24.8 Block density of three subpopulations in Knoke information network

The density in the 1,1 block is .6667. That is, of densities of in-ties with all three subpopulations.
the six possible directed ties among actors 1, 3, The welfare specialists have high density of
and 5, four are actually present (ignoring the information sending to the other two blocks (but
diagonal, which is the most common approach). not within their block), and receive more input
We can see that the three subpopulations appear to from governmental than from nongovernmental
have some differences. Governmental generalists organizations.
(block 1) have quite dense in- and out-ties to The extent to which these simple characteriza-
one another, and to the other populations; non- tions of blocks characterize all the individuals
government generalists (block 2) have out-ties within those blocks – essentially the validity of
among themselves and with block 1 and have high the blocking – can be assessed by looking at the

5605-Scott-Chap24.indd 347 4/6/2011 11:56:10 AM


348 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

standard deviations within the partitions. The preponderance of external ties is not unexpected:
standard deviations measure the lack of homoge- under a random distribution, the E-I index would
neity within the partition, or the extent to which be expected to have a value of .467, which is not
the actors vary. very much different from the observed value.
We see that, given the group sizes and density
of the graph, the maximum possible value of the
Group-external and group-internal ties index (1.0) and its minimum value (+.25) are both
Krackhardt and Stern (1988) developed a very positive. If we re-scale the observed value of the
simple and useful measure of group embedding E-I index (.563) to fall into this range, we obtain a
based on comparing the numbers of ties within re-scaled index value of –.167. This suggests that,
groups to those between groups. The E-I given the demographic constraints and overall
(external–internal) index takes the number of ties density, there is a very modest tendency toward
of group members to outsiders, subtracts the group closure.
number of ties to other group members, and The last portion of the results gives the values
divides by the total number of ties. The resulting of the permutation-based sampling distribution.
index ranges from –1 (all ties are internal to the Most important here is the standard deviation of
group) to +1 (all ties are external to the group). the sampling distribution of the index, or its
Since this measure is concerned with any connec- standard error (.078). This suggests that the value
tion between members, the directions of ties are of the raw index is expected to vary by this much
ignored (i.e., either an out-tie or an in-tie from trial to trial (on the average) just by chance.
constitutes a tie between two actors). Given this result, we can compare the observed
The E-I index can be applied at three levels: the value in our sample (.563) to the expected value
entire population, each group, and each individual. (.467) relative to the standard error. The observed
That is, the network as a whole (all the groups) difference of about .10 could occur fairly fre-
can be characterized in terms of the boundedness quently just by sampling variability (p = .203).
and closure of its subpopulations. We can also Most analysts would not reject the null hypothesis
examine variation across the groups in their that the deviation from randomness was not “sig-
degree of closure; each individual can be seen as nificant.” That is, we cannot be confident that the
more or less embedded in its group. observed mild bias toward group closure is not
To assess whether a given E-I index value is random variation.
significantly different than what would be expected
by random mixing (i.e., no preference for within-
or without-group ties by group members), a per-
mutation test can be performed. A large number of Substructures
trials are run in which the blocking of groups is
maintained, and the overall density of ties is main- One of the most common interests of structural
tained, but the actual ties are randomly distributed. analysts is in the “substructures” that may be
A sampling distribution of the numbers of internal present in a network. The dyads, triads, and
and external ties under the assumption that ties are ego-centered neighborhoods that we examined
randomly distributed is calculated and used to earlier can all be thought of as substructures. In
assess the frequency with which the observed this section, we’ll consider some approaches to
result would occur by sampling from a population identifying larger groupings.
in which ties were randomly distributed. Many of the approaches to understanding the
Results for the blocked Knoke data are shown as structure of a network emphasize how dense con-
Figure 24.9. nections are built up from simpler dyads and
The observed block densities are presented triads to more extended dense clusters, such as
first. Since any tie (in or out) is regarded as a tie, “cliques.” This view of social structure focuses
the densities in this example are quite high. The attention on how solidarity and connection of
densities off the main diagonal (out-group ties) large social structures can be built up out of small
appear to be slightly more prevalent than the and tight components, a sort of “bottom up”
densities on the main diagonal (in-group ties). approach. Network analysts have developed a
Next, we see the numbers of internal ties (14, number of useful definitions and algorithms that
or 22 percent) and external ties (50, or 78 percent) identify how larger structures are compounded
that yield a raw (not rescaled) E-I index of +.563. from smaller ones: cliques, N-cliques, N-clans,
That is, this graph displays a preponderance of K-plexes, and K-cores all look at networks
external over internal ties. Also shown are the this way.
maximum possible numbers of internal and exter- We can also look for substructure from the “top
nal ties given the group sizes and density. down.” Looking at the whole network, we can
Note that, due to these constraints, the result of a think of substructures as areas of the graph that

5605-Scott-Chap24.indd 348 4/6/2011 11:56:10 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 349

Figure 24.9 E-I index output for the Knoke information network

seem to be locally dense but are separated, to constrained action. So the numbers and sizes of
some degree, from the rest of the graph. This regions, and their “connection topology” may be
idea has been applied in a number of ways: com- consequential for predicting both the opportunities
ponents, blocks/cutpoints, K-cores, Lambda and constraints facing groups and actors, as well
sets and bridges, factions, and f-groups will be as for predicting the evolution of the graph itself.
discussed here. It is important to note (Moody and Most computer algorithms for locating sub-
White, 2003), that bottom-up and top-down structures operate on binary symmetric data. We
approaches to substructures in graphs often do not will use the Knoke information exchange data for
identify the same groupings. The choice of method most of the illustrations that follow. Where algo-
should be informed by the researcher’s definition rithms allow it, the directed form of the data will
of a meaningful substructure for the purposes be used. Where symmetric data are called for, we
of analysis. will analyze “strong ties.” That is, we will sym-
The idea that some regions of a graph may metrize the data by insisting that ties must be
be less connected to the whole than others may reciprocated in order to count (i.e., a tie only
lead to insights into lines of cleavage and exists if xy and yx are both present). The reciproc-
division. Weaker parts in the “social fabric” also ity-symmetric data matrix and graph are shown in
create opportunities for brokerage and less Figure 24.10.

5605-Scott-Chap24.indd 349 4/6/2011 11:56:10 AM


350 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

10

5
6
3

8 2

7 4

Figure 24.10 Reciprocated relations in the Knoke information network

Bottom-up approaches: Clique, clan, plex, N-cliques


core, and f-group The strict clique definition (maximally connected
In a sense, all networks are composed of groups subgraph) may be too strong for many purposes. It
(or subgraphs). When two actors have a tie, they insists that every member of a subgroup should
form a “group.” One approach to thinking about have a direct tie with each and every other member.
the group structure of a network begins with this One alternative is to define an actor as a member of
most basic group and seeks to see how far this a clique if they are connected to every other
kind of close relationship can be extended. This is member of the group at some distance greater than
a useful way of thinking, because sometimes more one. Usually, a path distance of two is used.
complex social structures evolve, or emerge, from This corresponds to being “a friend of a friend.”
very simple ones. This approach to defining substructures is called an
Cliques are the (maximal) subgraphs of nodes N-clique, where n stands for the maximum length
that have all possible ties present among them- of paths to all other members (Figure 24.13).
selves. That is, a clique is the largest possible The cliques that we saw before have been made
collection of nodes (more than two) in which more inclusive by the relaxed definition of group
all actors are directly connected to all others. membership. The first N-clique includes everyone
Figure 24.11 shows part of the UCINET analysis but actor 6. The second is more restricted, and
of cliques in our symmetrized data. includes 6 (WRO), along with two elements of the
There are seven maximally complete subgraphs core. With larger and fewer subgroups, the mayor
present in these data. The largest one is composed (5) no longer appears to be quite so critical. With
of 4 of the 10 actors (2, 4, 5, and 7), and all of the the more relaxed definition, there is now an “inner
other smaller cliques share some overlap with circle” of actors that are members of both larger
some part of the largest clique. The second panel groupings. This can be seen in the co-membership
shows how “adjacent” each actor (row) is to each matrix and by clustering.
clique (column). Actor 1, for example, is adjacent In some cases, N-cliques can be found that
to two-thirds of the members of clique 5. There is have a property that is undesirable for many pur-
a very high degree of common membership in poses: it is possible for members of N-cliques to
these data. be connected by actors who are not, themselves,
We can look at the extent to which the cliques members of the clique. For most sociological
overlap with one another, as measured by applications, this is quite troublesome. To over-
the numbers of members in common, as in come this problem, some analysts have suggested
Figure 24.12. a related grouping, the N-clan. Members of the
A cluster analysis of the closeness of the “clan” are all connected at a distance n (or less),
cliques shows that cliques 6 and 7 are (a little) and all intermediate actors must also be members
separate from the other cliques. That is, there is a of the clan.
tendency toward one larger “clique of cliques” The K-plex is an alternative way of relaxing
and one smaller one. the requirement for clique membership (where

5605-Scott-Chap24.indd 350 4/6/2011 11:56:11 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 351

Figure 24.11 Cliques in the reciprocity-symmetric Knoke information network

members form a maximally complete subgraph). allowed k to be equal to 2 but insisted that each
It allows actors to be members of a clique if they K-plex should include at least four members.
have ties to all but k other members. For example, The K-plex method of defining cliques tends to
if A has ties with B and C, but not D; while both find “overlapping social circles” when compared
B and C have ties with D, all four actors could still to the maximal or N-clique method. The K-plex
be in a clique under the K-plex approach, as in approach to defining substructures makes a good
Figure 24.14. deal of sense for many problems. It requires that
This approach says that a node is a member of members of a group have ties to (most) other
a clique of size n if it has direct ties to n–k mem- group members and that a tie by way of nonclique
bers of that clique. In Figure 24.15, we have intermediaries (which are permissible in the

Figure 24.12 Clique overlap in the reciprocity-symmetric Knoke information network

5605-Scott-Chap24.indd 351 4/6/2011 11:56:11 AM


352 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 24.13 N-cliques of reciprocity-symmetric Knoke information network (N = 2)

N-clique approach) does not qualify a node for K-cores are a variation on K-plexes that may be
membership. The picture of group structure that particularly helpful with larger numbers of actors.
emerges from K-plex approaches can be rather The K-core approach allows actors to join the
different from that of N-clique analysis. group if they are connected to k members, regard-
less of how many other members they may not be
connected to. The K-core definition is intuitively
appealing for some applications. If an actor has
B ties to a sufficient number of members of a group,
they may feel tied to that group even if they don’t
A know many (or even most) members. It may be
that identity depends on connection, rather than
on immersion in a subgroup.

Top-down approaches: Component, cutpoint,


D
block, and faction
C The approaches we’ve examined to this point
start with the dyad, and extend this kind of tight
structure outward. Overall structure of the net-
Figure 24.14 Illustration of a K-plex (K = 2) work is seen as “emerging” from overlaps and

5605-Scott-Chap24.indd 352 4/6/2011 11:56:11 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 353

Figure 24.15 K-plex groups in Knoke reciprocity-symmetric information network

couplings of smaller components. Alternatively, the network and can point to how it might be
one might start with the entire network and decomposed into smaller units. This top-down
identify “substructures” as parts that are locally perspective leads us to think of dynamics that
denser or thinner than the field as a whole. operate at the level of group selection and to focus
Places where the social fabric is more thinly on the constraints under which actors construct
woven may define lines of division or cleavage in networks.

5605-Scott-Chap24.indd 353 4/6/2011 11:56:11 AM


354 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

There are numerous ways that one might define Lambda sets and bridges are alternative
the divisions and “weak spots” in a network. approaches to the issue of connectivity. Here we
Below are some of the most common approaches. ask if there are certain connections (rather than
Components of a graph are subgraphs that are nodes) in the graph that, if removed, would result
connected within – but disconnected between – in a disconnected structure. In our example, the
subgraphs. If a graph contains one or more only relationship that qualifies is that between
“isolates,” these actors are components. More EDUC and WRO. The Lambda set approach
interesting components are those that divide the ranks each of the relationships in the network in
network into separate parts with each having terms of importance by evaluating how much of
several actors. For directed graphs we can define the flow among actors in the net goes through
two different kinds of components. A weak each link. It then identifies sets of relationships,
component is a set of nodes that is connected, which, if disconnected, would most greatly dis-
regardless of the direction of ties. A strong rupt the flow among all of the actors. The math
component requires that there be a directed path and computation is rather extreme, though the
from A to B in order for the two to be in the same idea is fairly simple. We apply this to our Knoke
component. data in Figure 24.18.
Because the Knoke information network has a This approach identifies the 2 to 5 (MAYR to
single component, it isn’t very interesting as an COMM) linkage as the most important one in the
example. Let’s look instead at the network of large graph: it carries a great deal of traffic, and the
donors to California political campaigns, where graph would be most disrupted if it were
the strength of the relation between two actors is removed.
defined by the number of times that they contrib- M. E. J. Newman (2006) has advanced the
uted on the same side of an issue (Figure 24.16). closely related idea of “modularity” as an approach
If we set a very high cut-off value of 13 issues to identifying substructures in graphs. In Newman’s
in common to define membership in the same approach, substructures are defined by having
component, then our graph has only nonisolate more ties within, and fewer ties between, groups
components (made up of the Democratic Party than would be expected on the basis of the degrees
and the School Employees union). Progressively of the nodes. This is an important advance on
lower cut-offs produce multiple, separate compo- earlier approaches, which seek to minimize the
nents until we reach a value of seven issues in number of bridging ties between groups but do not
common. At this point, the nonisolated nodes all take account of group size or node degree.
become connected into a single component. Factions: Imagine a society in which each
Blocks and cutpoints (bi-components) are an person was closely tied to all others in their own
alternative approach to finding the key “weak” subpopulation (i.e., all subpopulations are cliques),
spots in the graph. If a node were removed, would and there are no connections at all between
the structure become divided into unconnected subpopulations (i.e., each subpopulation is a com-
parts? If there are such nodes, they are called ponent). Most real populations do not look like
“cutpoints.” One can imagine that such cutpoints this, but the “ideal type” of complete connection
may be particularly important actors. The divi- within and complete disconnection between sub-
sions into which cutpoints divide a graph are groups is a useful reference point for assessing the
called blocks (not the same usage of the term as degree of “factionalization” in a population.
in “blockmodels” or “block images”). Another If we took all the members of each “faction” in
name for a block is a “bi-component.” We this ideal-typical society and put their rows and
apply the bi-component idea to the Knoke data in columns together in an adjacency matrix (i.e.,
Figure 24.17. permuted the matrix so all members of the same
Two blocks are identified, with EDUC a group occupied adjacent rows and columns), we
member of both. This means that if EDUC would see a distinctive pattern of “1-blocks” and
(node 3) were removed, the WRO would become “0-blocks.” All connections among actors within a
isolated. faction would be present; all connections between
Moody and White (2003) provide new algo- actors in different factions would be absent. With
rithms for identifying nested cut-sets, and make a valued data, the average tie strength within a block
strong case for the close correspondence of their would be high; the average tie strength between
approach to graph substructure to the concept of blocks would be low.
“structural cohesion.” Their approach identifies We applied this idea to the Knoke data. After
hierarchies of nested cohesive groups and is par- running several alternative numbers of blocks, we
ticularly sensitive to identifying the robustness of settled on four as meaningful for our purposes.
groups in the face of the removal of individual This result is shown in Figure 24.19.
nodes, and the identification of K-components The “final number of errors” can be used as a
(maximal K-connected subgraphs). measure of the “goodness of fit” of the “blocking”

5605-Scott-Chap24.indd 354 4/6/2011 11:56:12 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 355

Figure 24.16 Weak component hierarchy for California political donors

of the matrix. This count (27) is the sum of the factions are identified, and we note that two of them
number of zeros within factions (where all the ties are individuals (10, 9), and one is a dyad (3, 6).
are supposed to be present in the ideal type) plus The “blocked” or “grouped” adjacency matrix
the number of ones in the nondiagonal blocks (ties shows a picture of the solution. We can see that
between members of different factions, which are there is quite a lot of density “off the main diago-
supposed to be absent in the ideal type). Since nal” where there shouldn’t be any. The final panel
there are 49 total ties in our data, being wrong of the results reports the “block densities” as
27 times is not a terribly good fit. It is, however, the number of ties that are present in blocks as
the best we can do with four “factions.” The four proportions of all possible ties.

5605-Scott-Chap24.indd 355 4/6/2011 11:56:12 AM


356 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 24.17 Cutpoints and blocks in the Knoke information network

Core-periphery and other blockmodels extend members of the periphery, and some ties
the idea of factions to identify groups or “types” (definitions vary) between core and periphery
(or, technically, equivalence classes) of cases members. Grouping cases into types based on
based on their patterns of ties (Boyd et al., 2006; similarity of their positions or roles in the graph
Clark, 2008; Raval and Kral, 2004). Patterns of has proven to be one of the most important
core and periphery are often found in sociological approaches to identifying substructures in social
data; in this blockmodel, there are many ties structures. Ferligoj et al. (this volume) cover this
among members of the core, few ties among topic in depth.

THE “EMBEDDED” INDIVIDUAL: EGO


NETWORKS

The approaches to exploring networks that we’ve


examined so far tend to be views from the “top
down.” That is, they focus attention on the whole
network’s structure, texture, and substructures.
For many problems, it can be useful to view social
networks from the “bottom up,” focusing attention
on individuals and their connections. Describing
and indexing the variation across individuals in
the way they are embedded in “local” social struc-
tures is the goal of the analysis of ego networks.
We need some definitions.
“Ego” is an individual “focal” node. A com-
plete network has as many egos as it has nodes.
However, our data may also consist of one or
many ego networks that are not connected to one
Figure 24.18 Lambda sets in the Knoke another. Egos can be persons, groups, organiza-
information network tions, or whole societies.

5605-Scott-Chap24.indd 356 4/6/2011 11:56:12 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 357

we mean the one-step neighborhood. The N-step


neighborhood expands the definition of the size of
ego’s neighborhood by including all nodes to
whom ego has a connection at a path length of N
or less, and all the connections among all of these
actors.

In and out, and other kinds


of neighborhoods
Most of the analyses of ego networks use simple
graphs (i.e., graphs that are symmetric and show
only the presence or absence of connections, but
not their direction). If we are working with a
directed graph, it is possible to define different
kinds of ego-neighborhoods. An out neighbor-
hood would include all the actors to whom ties are
directed from ego. An in neighborhood would
include all the actors who send ties directly to ego.
It is also possible to define a neighborhood of only
those actors with whom ego has reciprocated ties.
These are just a few of the ways of defining ego
neighborhoods; there isn’t a single “right” way for
every research question.

Strong and weak tie neighborhoods


Most analyses of ego networks use binary data
(actors are connected or they aren’t), which
makes defining the ego neighborhood fairly
straightforward. If we have measured the strength
of the relation between two actors or its valence
(positive or negative), however, we need to make
choices about the definition of “neighbor.” With
ties that are measured as strengths or probabilities,
a reasonable approach is to define a cut-off value
(or, better, explore several reasonable alterna-
tives). When ties are characterized as positive or
negative, the most common approach is to analyze
the positive tie neighborhood and the negative tie
neighborhood separately.
Ego network data commonly arise in two ways:
surveys may be used to collect information on ego
networks. We can ask each research subject to
Figure 24.19 Four-faction solution for the identify all of the actors to whom they have a con-
directed Knoke information network nection, and to report to us (as an informant) the
links among these other actors. Alternatively, we
could use a snowball method: first ask ego to iden-
A one-step neighborhood consists of ego and tify others to whom ego has a tie, then ask each of
all nodes to whom ego has a direct connection. those identified about their ties to additional
Importantly, the neighborhood also includes all of others. With each stage, the size of the network
the ties among all of the actors to whom ego has a increases, until all members of the component
connection. Neighborhoods of greater path length originally sampled have been included.
than one are rarely used in social network analy- Data collected in this way cannot directly
sis. When we use the term “neighborhood” here, inform us about the overall embeddedness of the

5605-Scott-Chap24.indd 357 4/6/2011 11:56:13 AM


358 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

networks in a population, but it can tell us about exchange data. That is, each ego’s neighborhood
the prevalence of various kinds of ego networks in is defined by those actors to whom ego sends
even very large populations. This kind of investi- information. A parallel analysis of in neighbor-
gation results in a data structure that is composed hoods might also be of interest.
of a collection of networks. As the actors in each Some measures of the structure of ego net-
network are likely to be different, the networks works are parallel to those for complete networks.
need to be treated as separate actor-by-actor Many others, though, reflect the particular inter-
matrices stored as different data sets. ests of “bottom-up” analysis, and describe ego’s
The second major way in which ego network opportunities and constraints due to how they are
data arise is by “extracting” them from regular embedded in their local structure of connections.
complete network data. This is the approach that The size of an ego network is the number of
we will take in our example. Rather than treating nodes that are one-step neighbors of ego, plus ego
the Knoke information exchange network as a itself. Actor 5 has the largest ego network; actors
single network, we will treat it at 10 ego networks 6, 7, and 9 have the smallest networks. The
(which happen to be connected and overlapping). number of directed ties is the number of connec-
One might, for example, extract all the ego net- tions among all the nodes in the ego network.
works from a full network where ego was male Among the four actors in ego 1’s network, there
and compare their structures to all the ego net- are 11 ties. The number of ordered pairs is the
works where ego was female. When you create a number of possible directed ties in each ego net-
sample of ego networks by extracting them from a work. In node 1’s network there are four actors, so
single full network, you need to remember that there are 4*3 possible directed ties. The density is
these are not independent samples from a popula- the number of actual ties divided by the number of
tion, and normal statistical sampling assumptions pairs (i.e., possible ties). Note that actors 7 and 9
don’t apply. live in neighborhoods where all actors send infor-
mation to all other actors; they are embedded in
very dense local structures. The welfare rights
organization (node 6) lives in a small world where
Connections the members are not tightly connected. This kind
of difference in the constraints and opportunities
There are quite a few characteristics of the facing actors in their local neighborhoods may be
ego-neighborhoods that may be of interest. very consequential, as we shall see in examining
Figure 24.20 displays a collection of many of the “structural holes” below.
most commonly used measures of the texture The average geodesic distance is the mean of
of ego’s neighborhood. In this example, we are the shortest path lengths among all connected pairs
looking at the one-step out neighborhood of in the ego network. Where everyone is directly
each of the 10 egos in the Knoke information connected to everyone (e.g., nodes 7 and 9), this

Figure 24.20 Ego network connections for Knoke information out neighborhoods

5605-Scott-Chap24.indd 358 4/6/2011 11:56:13 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 359

distance is one. In our example, the largest aver- “unexpected” given the size of the network, it is
age path length for connected neighbors is for useful to normalize the count of components by
actor 5 (average distances among members of the size. In our example, since there are no cases of
neighborhood is 1.57). The diameter of an ego multiple components, this is a pretty meaningless
network is the length of the longest path between exercise.
connected actors (just as it is for any network). The two-step reach goes beyond ego’s one-step
The idea of a network diameter is to index the neighborhood to report the percentage of all actors
span or extensiveness of the network: how far in the whole network that are within two directed
apart are the two furthest actors? In the current steps of ego. In our example, only node 7 cannot
example, they are not very far apart in the ego get a message to all other actors within “friend-
networks of most actors. of-a-friend” distance. The reach efficiency (two-
The size, density, and distances in an ego step reach divided by size) norms the two-step
neighborhood are very much parallel to the same reach by dividing it by size. The idea here is, how
ideas for whole networks. In addition to these much (nonredundant) secondary contact do I get
fairly basic and reasonably straightforward meas- for each unit of primary contact? If reach effi-
ures, ego network analysts have developed a ciency is high, then I am getting a lot of “bang for
number of approaches to understanding the role my buck” in reaching a wider network for each
that ego plays in connecting the neighborhood and unit of effort invested in maintaining a primary
to understanding ego’s positional advantage and contact. On the other hand, if I share many con-
disadvantage. tacts with my neighbors, I have low efficiency.
One interesting feature is the extent to which Ego may be the “go-between” for pairs of other
ego’s neighborhood consists of separate compo- actors. In an ego network, ego is connected to
nents of factions. To what extent does ego play a every other actor (by definition). If these others
critical role in connecting others? A weak compo- are not connected directly to one another, ego may
nent is the largest number of actors who are con- be a “broker” if ego falls on the paths between the
nected, disregarding the direction of the ties (a others. One item of interest is simply how much
strong component pays attention to the direction potential for brokerage there is for each actor
of the ties for directed data). In Figure 24.21, if (how many times pairs of neighbors in ego’s
ego (E) was connected to A and B (who are con- network are not directly connected). In our exam-
nected to one another), and ego is connected to C ple, actor 5, who is connected to almost everyone,
and D (who are connected to one another), but A is in a position to broker many connections.
and B are not connected in any way to C and D Normalized brokerage (brokerage divided by
(except by way of everyone being connected to number of pairs) assesses the extent to which
ego) then there would be two “weak components” ego’s role is that of a broker. One can be in a bro-
in ego’s neighborhood. kering position a number of times, but this is a
In our example, there are no such cases – each small percentage of the total possible connections
ego is embedded in a single component neighbor- in a network (e.g., the network is large). Given the
hood. That is, there are no cases where ego is the large size of actor 5’s network, the relative fre-
only connection between otherwise disjointed sets quency with which actor 5 plays the broker role is
of actors. The likelihood that there would be more not so exceptional.
than one weak component in ego’s neighborhood Betweenness is an aspect of the larger concept
would be a function of neighborhood size if con- of “centrality.” In an ego network, ego is “between”
nections were random. So, to get a sense of two other actors if ego lies on the shortest directed
whether ego’s role in connecting components is path from one to the other. The ego betweenness
measure indexes the percentage of all geodesic
paths from neighbor to neighbor that pass through
ego. Normalized betweenness compares the actual
A C betweenness of ego to the maximum possible
betweenness in neighborhood of the size and
connectivity of ego’s. The “maximum” value
E for betweenness would be achieved where ego is
the center of a “star” network; that is, no neigh-
bors communicate directly with one another, and
B D all directed communications between pairs of
neighbors go through ego.
The ideas of brokerage and betweenness are
Figure 24.21 Illustration of a graph with slightly differing ways of indexing just how
two weak components in the neighborhood central or powerful ego is within its own neigh-
of actor E borhood. This aspect of how an actor’s embedding

5605-Scott-Chap24.indd 359 4/6/2011 11:56:13 AM


360 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

may provide it with strategic advantage has Dyadic redundancy means that ego’s tie to an
received a great deal of attention. The next two alter is “redundant.” If A is tied to both B and C,
sections, on structural holes and brokerage elabo- and B is tied to C, A’s tie to B is redundant,
rate on ways of looking at positional opportunity because A can influence B by way of C. The
and constraint of individual actors. dyadic redundancy measure calculates, for each
actor in ego’s neighborhood, how many of the
other actors in the neighborhood are also tied to a
Structural holes given alter. The larger the proportion of others in
the neighborhood who are tied to a given “alter,”
Ronald Burt (1992) coined and popularized the the more “redundant” is ego’s direct tie. In the
term “structural holes” to refer to some very example, we see that actor 1’s (COUN) tie to actor
important aspects of positional advantage and 2 (COMM) is largely redundant, as 72% of ego’s
disadvantage of individuals that result from how other neighbors also have ties with COMM.
they are embedded in neighborhoods. Burt’s Actors that display high dyadic redundancy are
formalization of these ideas, and his development actors who are embedded in local neighborhoods
of a number of measures (including the computer where there are few structural holes.
program Structure, which provides these meas- Dyadic constraint is a measure that indexes the
ures and other tools), has facilitated a great deal of extent to which the relationship between ego and
further thinking about how and why the ways that each alter in ego’s neighborhood “constrains” ego.
an actor is connected affect their constraints and A full description is given in Burt’s 1992 mono-
opportunities, and hence their behavior. graph, and the construction of the measure
The basic idea is simple, as good ideas often is somewhat complex. At the core though, A is
are. Imagine a network of three actors (A, B, and constrained by its relationship with B to the
C), in which each is connected to each of the extent that A does not have many alternatives (has
others. Suppose that actor A wanted to influence few other ties except that to B), and A’s other
or exchange with another actor. Assume that both alternatives are also tied to B. If A has few alterna-
B and C may have some interest in interacting or tives to exchanging with B, and if those alternative
exchanging, as well. Actor A will not be in a exchange partners are also tied to B, then B is
strong bargaining position in this network, because likely to constrain A’s behavior. In our example,
both of A’s potential exchange partners (B and C) constraint measures are not very large, as most
have alternatives to treating with A; they could actors have several ties. COMM and MAYR are,
isolate A and then exchange only with one however, exerting constraint over a number of
another. others and are not very constrained by them. This
Now imagine that we open a “structural hole” situation arises because COMM and MAYR have
between actors B and C. That is, a relation or tie considerable numbers of ties, and many of the
is “absent” such that B and C cannot exchange actors to whom they are tied do not have many
(perhaps they are not aware of one another, or independent sources of information.
there are very high transaction costs involved in The effective size of the network (EffSize) is
forming a tie). In this situation, actor A has an the number of alters that ego has, minus the aver-
advantaged position because he or she has two age number of ties that each alter has to other
alternative exchange partners; actors B and C have alters. Suppose that A has ties to three other
only one choice, if they choose to (or must) enter actors. Suppose that none of these three has ties to
into an exchange. Ego A now has power with any of the others. The effective size of ego’s net-
respect to two dependent alters and is not con- work is three. Alternatively, suppose that A has
strained by the threat of being excluded from an ties to three others and that all of the others are
exchange opportunity. tied to one another. A’s network size is three, but
Burt developed a number of measures related to the ties are “redundant” because A can reach all
structural holes that can be computed on both three neighbors by reaching any one of them. The
valued and binary data. The normal practice average degree of the others in this case is two
in sociological research has been to use binary (each alter is tied to two other alters). So, the
(a relation is present or not). Interpretation of the effective size of the network is its actual size
measures becomes quite difficult with valued (three), reduced by its redundancy (two), to yield
data. The structural holes measures may be com- an efficient size of one.
puted for either directed or undirected data – and The efficiency (Efficie) norms the effective size
the interpretation, of course, depends on which is of ego’s network by its actual size; that is, it meas-
used. Here, we’ve used the directed binary data. ures the proportion of ego’s ties to its neighbor-
Figure 24.22 shows UCINET output for a “struc- hood that are “nonredundant.” The effective size
tural holes” analysis of the neighborhoods of each of ego’s network may tell us something about
of our 10 egos. ego’s total impact; efficiency tells us how much

5605-Scott-Chap24.indd 360 4/6/2011 11:56:13 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 361

Figure 24.22 Structural holes analysis for Knoke information exchange ego networks

impact ego is getting for each unit invested in alternatives in the neighborhood, they cannot con-
using ties. An actor can be effective without being strain ego’s behavior. The logic is pretty simple,
efficient, and an actor can be efficient without but the measure itself is not (see Burt’s 1992
being effective. book). The idea of constraint is an important one
The constraint (Constra) is a summary measure because it points out that actors who have many
of the extent to which ego’s connections are to ties to others may actually lose freedom of action
others who are connected to one another. If ego’s rather than gain it, depending on the relationships
potential trading partners all have one another among the other actors. This is the same basic
as potential trading partners, ego is highly insight as Bonacich’s analysis of the difference
constrained. If ego’s partners do not have other between influence and power.

5605-Scott-Chap24.indd 361 4/6/2011 11:56:13 AM


362 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The hierarchy is another quite complex meas- memberships of each of the three actors? There
ure that describes the nature of the constraint on are five possible combinations.
ego. If the total constraint on ego is concentrated If ego falls on a directed path between two
in a single other actor, the hierarchy measure will members of the same category as themselves (e.g.,
have a higher value; if the constraint arises from a woman falling between two other women in a
multiple actors in ego’s neighborhood, hierarchy path), ego is called a coordinator. If ego falls on
will have a lower value. The hierarchy measure the path between two members of a group of
does not assess the degree of constraint directly which they are not a part (e.g., a man falling on a
but, given some level of constraint on ego, it path from one woman to another), the members
measures an important property of dependency: are called consultants. If ego falls on the path from
inequality in the distribution of constraints on ego a member of another group to a member of its own
across the alters in its neighborhood. group (e.g., ego, a man, falls on a path from a
woman to another man), the ego is called a gate-
keeper. If ego falls on the path from another
Brokerage among groups member of its own group to a member of another
group, ego is a representative. Lastly, if ego falls
The extent to which ego is “between” alters is the on a path from a member of one group to another
focus of brokerage, betweenness, and structural but is not a member of either of those groups, ego
holes analyses; it is a major theme in the analysis is a liaison.
of ego networks. Gould and Fernandez (1989) As an example, we’ve taken the Knoke infor-
extended these ideas in an interesting way by mation exchange network and have classified
taking into account the possibility that egos and each of the organizations as either a general gov-
alters might also be affiliated with social groups. ernment organization (group 1), a private nonwel-
Suppose that ego’s network is composed of fare organization (group 2), or an organizational
both men and women (or any qualitative differ- specialist (group 3).
ence). We might be interested in the extent to Figure 24.23 shows the results of a basic analy-
which ego is “between” men and women in the sis of brokerage roles for each of the 10 egos in
network, rather than simply whether ego has high the Knoke directed information network.
betweenness, overall. Gould and Fernandez’s The actors have been grouped together into
“brokerage” notions examine ego’s relations with “partitions” for presentation; actors 1, 3, and 5, for
its neighborhood from the perspective of ego example, are the general government organiza-
acting as an agent in relations among groups (or tions group. Each row counts the raw number of
categories). times that each actor plays each of the five roles in
To examine the brokerage roles played by a the whole graph. While we have analyzed the
given actor, we find every instance where that entire graph here, the analysis could be restricted
actor lies on the directed path between two others. to the one-step neighborhood of each ego. Two
So each actor may have many opportunities to actors (5 and 2) are the main sources of intercon-
act as a “broker.” For each one of the instances nection among the three organizational popula-
where ego is a broker, we examine which kinds of tions. Organizations in the third population (6, 8,
actors are involved. That is, what are the group 9, 10), the welfare specialists, have overall low

Figure 24.23 Brokerage role scores for the Knoke information network

5605-Scott-Chap24.indd 362 4/6/2011 11:56:14 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 363

rates of brokerage. Organizations in the first popu- of “centrality.” The core idea is very simple: actors
lation (1, 3, 5), the government organizations, who are more “central” to social structures are
seem to be more heavily involved as liaisons than more likely to be influential or powerful (but pos-
as other roles. Organizations in the second popula- sibly also more constrained). But the simple idea
tion (2, 4, 7), nongovernmental generalists, play of being central turns out to not be so simple.
more diverse roles. Overall, there is very little Consider the situation of actor A in the three
coordination within each of the populations. simple networks in Figure 24.24.
A moment’s inspection suggests that actor A
has a highly favored structural position in the star
Centrality network (upper right). The star network shows
a neighborhood of maximum inequality: A is
Network analysts often describe the way that an central, and everyone else is equally peripheral. In
actor is embedded in a relational network as the circle network (upper left), all actors in the
imposing constraints on the actor and as offering neighborhood are in equivalent positions, and A is
the actor opportunities (Granovetter, 1982). Actors no more or less central than anyone else. In the
that face fewer constraints, and have more oppor- line network at bottom, A would seem to be
tunities than others, are in favorable structural marginalized, and the overall distribution of
positions. Having a favored position means that an advantage in the neighborhood is between the two
actor may extract better bargains in exchanges, extremes of the star and circle.
have greater influence, and may be a focus for But what are the sources of the advantage or
deference and attention from those in less favored disadvantage of the egos in the figures above? The
positions. centrality of an ego relative to its alters has been
The question of what we mean by having a approached in three major ways by network ana-
“favored position,” “more opportunities,” or lysts. One approach focuses on the actor’s degree.
“fewer constraints” has no single correct and final Actors who have more ties, that is, a higher degree
answer. As we have seen above, having structural (or ties to the “right” others), may be advantaged.
holes in one’s neighborhood may confer advan- Degree-based approaches to centrality are closely
tage; being in a position to act as a broker between connected to the notion of “social capital.” A
substructures may also provide a structurally second approach, based on closeness, argues that
favorable position. egos who can “reach” more alters with less effort
The most widely used approach to understanding have an advantaged position. A third major
the structural sources of individuals’ advantage approach suggests that egos who bridge gaps
and disadvantage relative to their neighbors is that between alters have an advantage.

E E
D
D

C
C
F A
F

B
B
G
A G

G F E D C B A

Figure 24.24 Circle, star, and line networks

5605-Scott-Chap24.indd 363 4/6/2011 11:56:14 AM


364 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Degree centrality: Connectedness Other organizations might share information with


In undirected data, egos differ from one another these three in an effort to exert influence. This
only in how many connections they have. With could be seen as an act of deference, or a recogni-
directed data, however, it can be important to tion that the positions of actors 5, 2, and 7 might
distinguish centrality based on in-degree from be worth trying to influence. If we were interested
centrality based on out-degree. If an actor receives in comparing influence in networks of different
many ties, they are often said to be prominent, or sizes or densities, it might be useful to “standard-
to have high prestige. That is, many other actors ize” the measures of in- and out-degrees. In the
seek direct ties to them, and this may indicate their last two columns of the first panel, all the degree
importance. Actors who have unusually high out- counts have been expressed as percentages of the
degrees are actors who are able to exchange with number of actors in the network, less one (ego).
many others or to make many others aware of If we are analyzing the egos in a complete net-
their views. Actors who display high out-degree work (as we are here) instead of separate ego
centrality are often said to be influential actors. neighborhoods (as we would if we had collected
Linton Freeman (1979) developed basic meas- information about the ego network of a sample of
ures of the centrality of actors based on their individuals from some population) we can also
degree. Figure 24.25 shows the out-degree and examine the distribution of ego centralities to
in-degree centrality of each of the egos in the learn more about the population as a whole. In
Knoke information network. Figure 24.22, we see that, on average, actors have
Actors 5 and 2 have the greatest out-degrees a degree of 4.9, which is quite high given that
and might be regarded as the most influential there are only nine other actors. The range of in-
(though it might matter to whom they are sending degree is slightly larger (minimum and maximum)
information; this measure does not take that than that of out-degree, and there is more variabil-
into account). Actors 5 and 2 are joined by 7 ity across the actors in in-degree than out-degree
(the newspaper) when we examine in-degree. (based on their standard deviations and variances).

Figure 24.25 Degree centrality of egos in the Knoke information network

5605-Scott-Chap24.indd 364 4/6/2011 11:56:14 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 365

The range and variability of degree (and other


network properties) can be quite important,
because they describe whether the population is
homogeneous or heterogeneous in structural posi-
tions. Finally, Freeman’s graph centralization
measures describe the population as a whole, the
macro level. The graph centralization measure
expresses the degree of inequality or variance in
our network as a percentage of that of a perfect
star network of the same size. In the current case,
the out-degree graph centralization is 51% and the
in-degree graph centralization is 38% of these
theoretical maximums. We would arrive at the
conclusion that there is a substantial amount of
concentration or centralization in this whole net-
work. That is, the power of individual actors
varies rather substantially, and this means that,
overall, positional advantages are rather unequally
distributed in this network.

Degree centrality: Influence and power


Phillip Bonacich (1987) proposed a modification
of the degree centrality approach. Suppose that
Bill and Fred each have five close friends. Bill’s
friends, however, happen to be pretty isolated
folks and don’t have many other friends, save Bill.
In contrast, Fred’s friends each have lots of
friends, who have lots of friends, and so on. Who
is more central? One argument would be that Fred
is likely to be more influential because he can
Figure 24.26 Bonacich influence in the
quickly reach a lot of other actors, but if the actors
that one is connected to are themselves well con- Knoke network (beta = + .50)
nected, they are not highly dependent on you.
Bonacich argued that being connected to others
who are connected makes an actor influential but other actors with high degree. Actors 8 and 10
not powerful. Somewhat ironically, being con- don’t have extraordinary numbers of connections,
nected to others that are not well connected makes but they have “the right connections.”
one powerful, because these other actors are Let’s take a look at the power side of the index,
dependent on you, whereas well-connected actors which is calculated by the same algorithm, but
are not. gives negative weights to connections with well-
Let’s examine the Bonacich influence and connected others and positive weights for connec-
power positions of the egos in our information tions to weakly connected others.
exchange data. The Bonacich influence or power Not surprisingly, these results are very different
indexes are calculated by using an attenuation from many of the others we’ve examined. Egos 2
factor (beta) or weight to show whether the index and 6 are distinguished because their ties are
increases with the degree of those to whom ego is mostly ties to alters with high degree, making
connected (influence) or decreases with the degree actors 2 and 6 “weak” by having powerful neigh-
of those to whom ego is connected (power). The bors. Egos 3, 7, and 9 have more ties to alters who
results for our information exchange network are have few ties, making them “strong” by virtue of
shown in Figures 24.26 and 24.27. having weak neighbors.
If we look at the absolute value of the index
scores, we see a familiar story. Actors 5 and 2 are
clearly the most central. This is because they have Closeness centrality
high degree, and because they are connected to Degree centrality measures might be criticized
each other and to other actors with high degree. because they take into account only an actor’s
Actors 8 and 10 also appear to have high centrality immediate ties, or the ties of the actor’s neighbors,
by this measure; this is a new result. In this case, rather than indirect ties to all others. One actor
it is because the actors are connected to all of the might be tied to a large number of others, but

5605-Scott-Chap24.indd 365 4/6/2011 11:56:14 AM


366 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

however, my dependency on any one intermediary


is reduced (Cook et al., 1983).
The extent to which connections between alters
in a neighborhood depend on ego can vary. In a
star network, ego mediates all connections; in a
clique, each alter can reach each other without
ego’s help. The extent of ego’s “betweenness” can
be an important dimension of relative power.
For networks with binary relations, Freeman
(1979) created some measures of the centrality
of individual actors based on their geodesic
path betweenness, as well as overall graph
centralization. Freeman et al. (1991) extended the
basic approach to deal with all paths between
actors.
With binary data, betweenness centrality views
an actor as being in a favored position to the
extent that the actor falls on the geodesic paths
between other pairs of actors in the network. That
is, the more people depend on me to make connec-
tions with other people, the more power I have. If,
however, two actors are connected by more than
one geodesic path, and I am not on all of them, I
lose some power. If we add up, for each actor, the
proportion of times that they are “between” alters
we get a measure of ego “betweenness” centrality.
We can norm this measure by expressing it as a
percentage of the maximum possible betweenness
that an actor could have. The results for the Knoke
information network are shown in Figure 24.28.
Figure 24.27 Bonacich power in the Knoke These results in Figure 24.28 are based on
information network (beta = − .50) treating the whole network as the neighborhood
of each actor. Betweenness, though, could be
calculated on each ego’s n-step neighborhood. We
those others might be relatively disconnected from see here that ego 5 is most central and that there is
the network as a whole. In a case like this, the a clear “inner circle” (egos 5, 2, and 3). There is
actor could be quite central but only in a local considerable variation in the betweenness of
neighborhood. Of course, if the only data we have the egos (mean of 4.8, with a standard deviation
available are for the one- or two-step neighbor- of 6.2, which yields a coefficient of variation
hoods of egos, this is the best we can do. If we have of 130).
full network data, however, there are a number of Another way to think about betweenness is to
influence centrality measures available that are ask which relations are most central, rather than
based on overall closeness of each ego to all others which actors. Freeman’s definition can be easily
in the graph (see Hanneman and Riddle, 2005, applied: a relation is between to the extent that it
Chapter 10). Closeness measures such as the geo- is part of the geodesic path between pairs of
desic path distance, eigenvector centrality, reach actors. Using this idea, we can calculate a measure
centrality, Hubbell, Katz, Taylor, and Stephenson of the extent to which each relation in a binary
and Zelen all extend the influence centrality idea graph is between.
to larger networks (or the full graph). Suppose that two actors want to have a relation-
ship, but the geodesic path between them is
blocked by a reluctant broker. If there exists
Betweenness centrality another pathway, the two actors are likely to use
Suppose that I want to influence you by sending it, even if it is longer and “less efficient.” In gen-
you information, or I want to make a deal to eral, actors may use all of the pathways connect-
exchange some resources, but in order to talk to ing them, rather than just geodesic paths. The flow
you, I must go through one or more intermediar- betweenness (Freeman et al., 1991) approach to
ies. This gives the people who lie “between” me centrality expands the notion of betweenness cen-
and others power with respect to me. To the extent trality. It assumes that actors will use all pathways
that I can use multiple pathways to reach others, that connect them, in proportion to the length of

5605-Scott-Chap24.indd 366 4/6/2011 11:56:15 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 367

Figure 24.28 Freeman betweenness for Knoke information network

those pathways. Betweenness is measured by the give us a somewhat different impression of who is
proportion of the entire flow between two actors most central in this network.
(that is, through all of the pathways connecting
them) that occurs on paths of which a given actor
is a part. For each actor, then, the measure adds up
how involved an actor is in all of the flows
between all other pairs of actors (the amount of CONCLUSION
computation with more than a couple actors can
be pretty intimidating!). Because the magnitude of The social network analysis approach to social
this index number would be expected to increase science emphasizes the relations between actors
with the sheer size of the network and with as being equally important (or perhaps more
network density, it is useful to standardize it important) than the attributes of actors. The social
by calculating the flow betweenness of each actor network analysis approach also strongly empha-
in ratio to the total flow betweenness that does sizes the interactions between individuals and
not involve the actor. Figure 24.29 shows the their social context. Individuals make and enact
flow betweenness of each ego in the information social structure by their agency, but the choices
network. they make are strongly conditioned by their loca-
By this more complete measure of betweenness tions in the texture of the larger social fabric in
centrality, actors 2 and 5 are clearly the most which they are embedded.
important mediators. Actor 3, who was fairly In this chapter, we’ve examined some of the
important when we considered only geodesic most widely used concepts and measures found in
flows, appears to be rather less important. While quantitative approaches to basic social network
the overall picture does not change a great deal, analysis. At the core of the often bewildering com-
the elaborated definition of betweenness does plexity of specific approaches are a few basic

5605-Scott-Chap24.indd 367 4/6/2011 11:56:15 AM


368 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 24.29 Flow betweenness centrality for Knoke information network

ideas about social structures. Size, density, con- Burris, V. (2005) ‘Interlocking directorates and political
nection, distance, substructures (including groups cohesion among corporate elites’, American Journal of
and equivalence classes), and their interconnec- Sociology 111: 249–83.
tions are the common themes that emerge as Burt, R.S. (1992) Structural Holes: The Social Structure of
major structural properties of social structures, Competition. Cambridge: Harvard University Press.
whether global or local. As social network ana- Clark, R. (2008) ‘Dependency, network integration, and devel-
lysts have demonstrated again and again, these opment’, Sociological Perspectives 51: 629–48.
ideas, though simple, are powerful, and they help Cook, K.S., Emerson, R.M., Gillmore, M.R. and Yamagishi, T.
to provide insight into the behavior of both whole (1983) ‘The distribution of power in exchange networks:
social structures and the individuals that form and Theory and experimental results’, American Journal of
enact them. Sociology 89: 275–305.
Crossley, N. (2008) ‘Small-world networks, complex systems
and sociology’, Sociology 42: 261–77.
Field, S., Frank, K.A., Schiller, K., Riegle-Crumb, C. and
Muller, C. (2006) ‘Identifying positions from affiliation
REFERENCES networks: Preserving the duality of people and events’,
Social Networks 28: 97–123.
Bonacich, P. (1987) ‘Power and centrality: A family of Finsveen, E. and Wim van Oorschot. (2008) ‘Access to
measures’, American Journal of Sociology 92: 1170–82. resources in networks: A theoretical and empirical critique
Borgatti, S.P., Everett, M.G. and Freeman, L.C. (2002) UCINET of networks as a proxy for social capital’, Acta Sociologica
for Windows: Software for Social Network Analysis. 51: 293–307.
Harvard, MA: Analytic Technologies. Fominaya, C.F. (2007) ‘The role of humour in the process of
Boyd, J.P., Fitzgerald, W.J. and Beck, R.J. (2006) ‘Computing collective identity formation in autonomous social move-
core/periphery structures and permutation tests for social ment groups in contemporary Madrid’, International Review
relations data’, Social Networks 28: 165–78. of Social History 52: 243–58.

5605-Scott-Chap24.indd 368 4/6/2011 11:56:15 AM


CONCEPTS AND MEASURES FOR BASIC NETWORK ANALYSIS 369

Frank, K.A. (1996) ‘Mapping interactions within and between Lai, G. and Wong, O. (2002) ‘The tie effect on information
cohesive subgroups’, Social Networks 18: 93–119. dissemination: The spread of a commercial rumor
Freeman L.C. (1979) ‘Centrality in social networks: Conceptual in Hong Kong’, Social Networks 24: 49–75.
clarification’, Social Networks 1: 215–39. Moody, J. and White, D.R. (2003) ‘Structural cohesion and
Freeman L.C., Borgatti S.P. and White, D.R. (1991) ‘Centrality embeddedness: A hierarchical concept of social groups’,
in valued graphs: A measure of betweenness based on American Sociological Review 68: 103–27.
network flow’, Social Networks 13: 141–54. Newman, M.E.J. (2006) ‘Modularity and community structure
Gallie, E.-P. (2009) ‘Is geographical proximity necessary for in networks’, Proceedings of the National Academy of
knowledge spillovers within a cooperative technological Sciences [PNAS] 103(23): 8577–82. www.pnas.org/cgi/
network? The case of the French biotechnology sector’, doi/10.1073/pnas.0601602103.
Regional Studies 43: 33–42. Raval, V.V. and Kral, M.J. (2004) ‘Core versus periphery:
Gould, J., and Fernandez, J. (1989) ‘Structures of mediation: Dynamics of personhood over the life-course for a
A formal approach to brokerage in transaction networks’, Gujarati Hindu woman’, Culture & Psychology 10:
Sociological Methodology: 89–126. 162–94.
Granovetter, M.S. (1982) ‘Alienation reconsidered: The Rycroft, R.W. (2007) ‘Does cooperation absorb complexity?
strength of weak ties’, Connections 5: 4–16. Innovation networks and the speed and spread of complex
Gurrieri, A. Rosa. (2008) ‘Knowledge network dissemination technological innovation’, Technological Forecasting and
in a family-firm sector’, The Journal of Socio-Economics Social Change 74: 565–78.
37: 2380–89. Sanders, K. and Nauta, A. (2004) ‘Social cohesiveness and
Hampton, K.N. and Wellman, B. (1999) ‘Netville online and absenteeism: The relationship between characteristics
offline: Observing and surveying a wired suburb’, American of employees and short-term absenteeism within an
Behavioral Scientist 43: 475–92. organization’, Small Group Research 35: 724–41.
Hanneman, R. and Riddle, M. (2005) Introduction to Social Schnegg, M. (2007) ‘Blurred edges, open boundaries:
Network Methods. Riverside, CA: University of California. The long-term development of a peasant community in
Haythornthwaite, C. (2005) ‘Social networks and Internet rural Mexico’, Journal of Anthropological Research 63:
connectivity effects’, Information, Communication & Society 5–32.
8: 125–47. Scott, J. (2000) Social Network Analysis: A Handbook. 2nd ed.
Hermann, R.J. (2008) ‘National security challenges and com- Thousand Oaks, CA: Sage.
petition: US defense and space R&D in a strategic context’, Totterdell, P., Holman, D. and Hukin, A. (2008) ‘Social
Technology in Society 30: 371–81. networkers: Measuring and examining individual differ-
Knoke, D. and Yang, S. (2008) Network Analysis. 2nd ed. ences in propensity to connect with others’, Social Networks
Thousand Oaks, CA: Sage. 30: 283–96.
Knoke, D. and Wood, J. (1981) Organized for Action: Urry, J. (2006) ‘Complexity’, Theory, Culture & Society
Commitment in Voluntary Associations. New Brunswick, 23: 111–15.
NJ: Rutgers University Press. Wasserman, S. and Faust, K. (1994) Social Network Analysis:
Kien, G. (2008) ‘Beijing, 2006: International connectivity Methods and Applications. Cambridge: Cambridge
the way it is supposed to be’, Qualitative Inquiry 14: University Press.
1264–71. Watts, D.J. (1999) Small Worlds: The Dynamics of Networks
Krackhardt, D. and Stern, R.N. (1988) ‘Informal networks and between Order and Randomness. Princeton, N.J.: Princeton
organizational crises: An experimental simulation’, Social University Press.
Psychology Quarterly 51(2): 123–40. Watts, D.J. (2003) Six Degrees: The Science of a Connected
Kratke, S. and Brandt, A. (2009) ‘Knowledge networks as a Age. New York: W.W. Norton.
regional development resource: A network analysis of the Wellman, B., Carrington, P.J. and Hall, A. (1988) ‘Networks as
interlinks between Scientific Institutions and regional firms personal communities’, in Barry Wellman and S.D.
in the metropolitan region of Hanover, Germany’, European Berkowitz (eds), Social Structures: A Network Approach.
Planning Studies 17: 43–63. Cambridge: Cambridge University Press.

5605-Scott-Chap24.indd 369 4/6/2011 11:56:15 AM


25
Survey Methods for
Network Data
Peter V. Marsden

INTRODUCTION TEMPLATES FOR NETWORK DATA

Surveys and questionnaires are widely used to Two principal types of network surveys focus on
assemble data on connections among persons or different, though related, objects of measurement:
other social actors. Such methods have a long “whole” and “egocentric” networks. Whole-
heritage: researchers used them to study interper- network studies seek to measure the structure of
sonal relationships among children as early as the some bounded social group by collecting data on
1920s (Freeman, 2004). In the twenty-first one or more types of relationships that link the
century, archival measures of linkages and units or actors within the group. Egocentric
transactions based on administrative records or network studies have the more limited objective of
computer-mediated communication systems have describing local social environments by measur-
become much more abundant and accessible. ing the relationships in the vicinity of one or more
Surveys nonetheless remain a vital source of focal units or actors. Whole-network studies
network data for the many situations in which subsume egocentric ones, in a sense: whole-
such records do not exist or do not include infor- network data include an egocentric network for
mation about the relationships of interest, or in each actor.1
which direct observation, diaries, and other meth- Most often, surveys to measure whole networks
ods of collecting network data are impractical. collect one-mode network data on relationships
This chapter reviews basic issues in conducting among elements of a single set of units or
network surveys, beginning with the common actors – such as friendships among students in a
forms that survey network data take, approaches school, or collaborative ties linking employees
to defining the boundaries of the study population, in an organization. Sometimes, however, they
and methods of selecting subjects/respondents. It measure two-mode networks based on relation-
then discusses instruments for data collection in ships among elements in two distinct sets;
both whole-network and egocentric designs, examples include school networks consisting of
illustrating different approaches with empirical student memberships in groups such as extracur-
studies. Next, it reviews some cognitive consider- ricular clubs or athletic teams, and organizational
ations to keep in mind when developing and networks defined by employee assignments to
administering network surveys. The chapter closes committees or project teams.
by reviewing some research into the quality of Many design variations arise within these broad
network data obtained using survey methods study templates. The minimal design measures
and by highlighting special issues of human only a single type of relationship, such as friend-
subject protection that can arise in the course of ship or advising, on a single occasion. Extensions
conducting network surveys. include designs that measure relationships among

5605-Scott-Chap25.indd 370 4/6/2011 7:21:13 PM


SURVEY METHODS FOR NETWORK DATA 371

a set of actors on multiple occasions and designs Springs study of persons engaged in high-risk
that measure multiple types of ties (e.g., friend- behaviors (Klovdahl et al., 1994) enrolled partners
ship, advising, and collaboration) at a single time of prostitutes and injecting drug users in its study
point. Most studies supplement network data with population. Studies of service delivery systems
information on attributes of units/actors, attributes could begin with some core agencies, later adding
of dyadic ties, or both. Studies that measure others to which they refer clients (Doreian and
networks for two or more groups may also include Woodard, 1992). Relational criteria are often used
group-level attributes. to add actors to the study population during the
course of fieldwork, on the basis of ties to or
nominations made by early respondents. Positional,
event-based, reputational and relational criteria
DEFINING AND SAMPLING can be used together to identify populations for
network studies; a study might begin with a list of
THE STUDY POPULATION actors included on a positional basis, and then
supplement it using event-based or reputational
Defining the target population to be described and criteria before fieldwork begins.
constructing a sampling frame that enumerates The process of boundary specification often
(or otherwise provides access to) it are early deci- results in a complete listing or roster of the
sions in conducting social surveys. For network study population. This can be an important aid to
studies, these decisions about the population whole-network data collection.
of elements and linkages to be measured are
known as the “boundary specification problem”
(Laumann et al., 1989).
Egocentric network studies
When egocentric network studies are conducted
Whole-network studies as part of representative sample surveys (e.g.,
Marsden, 1987), boundary specification follows
For some whole-network studies, formal or
the definition of the target population for those
positional criteria offer relatively self-evident
surveys. A second boundary-determination
definitions of inclusion within the group of
problem for egocentric studies has to do with
interest. Examples include employment by a
delimiting the set of “alter” actors within
physician practice (Keating et al., 2007), assign-
any given respondent’s egocentric network. In
ment to a school classroom (Hansell, 1984), and
practice, “name generators” used in eliciting
residence in a district (Kirke, 1996).
egocentric network data (see below) often serve
Delineating boundaries can be more challeng-
this purpose.
ing for groups that are not formally defined, such
as “regulars” at a beach (Freeman and Webster,
1994), policy domains (Laumann and Knoke,
1987), or social services delivery systems (Doriean Network sampling
and Woodard, 1992). Positional criteria can help
to identify some actors in such populations. In contrast to many social science surveys,
Observing (or referring to records documenting) network surveys only sometimes draw samples.
participation in some set of relevant events also Whole-network studies very often attempt to
can be useful. For example, Laumann and Knoke’s collect data on relationships among all actors in
(1987) study identified some organizational a population, for example, because they seek
participants in the U.S. health and energy policy measures of relational properties (Lazarsfeld
domains based on appearances before relevant and Menzel, 1980) for all elements. When data
congressional committees, filing of amicus curiae collection uses survey methods, this is realistic
briefs with appellate courts, and registration only for populations of small to moderate size.
of lobbyists, among other criteria. Asking knowl- Egocentric network data are often obtained within
edgeable informants to nominate participants on a sample surveys, relying on their sampling
reputational basis (prior to data collection) can methods to select a representative set of focal
supplement positional and event-based approaches actors.
to boundary specification. Some structural properties of whole networks
Social relationships themselves can also may be estimated by sampling from networks.
indicate inclusion in a population, while their Samples may be drawn by selecting units or
absence can signal group boundaries; Laumann et actors, or by selecting relationships. Sampling
al. (1989) term this a “relational” strategy for actors is usually a practical choice for surveys,
boundary specification. For example, a Colorado since they assemble data by contacting actors.

5605-Scott-Chap25.indd 371 4/6/2011 7:21:13 PM


372 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Frank (1981) describes several network sampling “non-choice” of j. Originally developed to meas-
schemes. One approach draws a probability ure preferences to associate with (or to avoid)
sample of actors (e.g., by using a simple-random others, the sociometric test generalizes to measur-
or Bernoulli scheme), and then observes only ing “actually existing” relationships (e.g., com-
those relationships within the subset of sampled munication, friendship, support). Likewise, it can
actors. Another draws a probability sample of be readily adapted to measuring two-mode net-
actors and then observes all relationships incident works by asking respondents to report group
to those actors.2 Networks may also be sampled memberships or other affiliations of interest.
by link-tracing methods that begin with a proba- Sociometric items have been administered in most
bility sample of actors, elicit their contacts, and survey modes, especially in-person interviews and
subsequently sample the contacts (e.g., Liebow et self-administered questionnaires. Many contem-
al., 1995). Such link-tracing may then be repeated porary applications use computer-assisted modes,
one or more times to yield sampled “random which can simplify presentation of questions and
walks” containing three or more linked actors.3 data processing.
Different inferences about network properties Studies use varying criteria – guided by the
are available from different sampling designs, so substantive questions they pose – to elicit socio-
one must consider carefully what properties of a metric choices. Some examples of such questions
network are to be estimated when designing appear in Table 25.1. Keating et al. (2007)
a network sampling scheme. The literature on surveyed primary care physicians about their
network sampling (Frank, this volume) should be influential conversations about women’s health
consulted at this stage. issues. Singleton and Asher (1977) questioned
third-grade students about who they like to play
with and (separately) who they like to work with.
Espelage et al. (2007) asked seventh-graders to
INSTRUMENTS FOR MEASURING name others whom they “hang out with most
often” at school. Laumann and Knoke (1987)
NETWORKS
asked informants representing organizations in the
U.S. energy policy domain to indicate other
This section introduces approaches commonly organizations in the domain with which their
used in standardized questionnaires and interviews organization “regularly and routinely discusses
to obtain data on social relationships, beginning national energy policy matters.” Many studies
with methods for measuring whole networks. It elicit two or more types of contact; Brass (1985),
then turns to techniques for measuring egocentric for example, asked employees at a newspaper
networks, concentrating on “name generator” publishing company about workflow ties, work-
instruments that yield the most extensive network related communication, and close friendships.
data. Last, the section introduces some shorter Many surveys that administer sociometric items
instruments: global survey items and multiple-item supply a roster of possible alters in the network
instruments that measure one or more specific ego- for respondents to consult when naming
centric network properties but do not elicit reports associates. Examples of studies that use such
about specific actor-to-actor relationships. recognition techniques include Hansell’s (1984)
study of fifth- and sixth-grade classrooms,
Lazega’s (2001) study of attorneys in a law firm,
Instruments for whole-network data and Provan et al.’s (2009) study of agencies
serving the severely mentally ill in an Arizona
Measuring whole networks requires information county. Other versions ask respondents to freely
sufficient to assign a value to the relationship recall their ties from memory, as in Coleman’s
aij between each (ordered) pair of actors i and j, (1961) study of networks within high schools,
i ≠ j, within a network. We concentrate here on Brass’s (1985) study of a newspaper publishing
instruments for one-mode networks. company, or Burt’s (2004) study of supply chain
managers.
Rosters simplify the reporting task by remind-
The sociometric test ing respondents of the eligible alters within the
Surveys to assess whole networks usually admin- network. Using rosters limits measurement error
ister some variant of the sociometric test devel- due to the forgetting of associates documented by
oped by Moreno (1953). The basic technique Brewer (2000). Sudman’s (1985) experiments
asks each person i within a network to identify the demonstrated that recognition methods yield
“alters” ( j) with whom he or she has – or larger networks (see also Hlebec and Ferligoj,
would like to have – a given type of relationship, 2002). Reviewing and considering all names on a
yielding a value of aij based on i’s “choice” or large roster can be a cumbersome, tedious task for

5605-Scott-Chap25.indd 372 4/6/2011 7:21:13 PM


SURVEY METHODS FOR NETWORK DATA 373

Table 25.1 Examples of whole-network measurement tasks

A. Single-criterion recognition question (Keating et al., 2007)


Please circle the number of conversations that you have had with each of the following [clinic name] primary
care physicians in the last six months that have influenced your thinking about women’s health issues.
[followed by alphabetized list of physicians and response categories ‘0’, ‘1–3’ and ‘≥4’]
B. Multiple-criterion recognition questions (Singleton and Asher, 1977)
How much do you like to play with this person at school?
How much do you like to work with this person at school?
[presented within roster listing students in a class alphabetically; responses were numbers 1–5 accompanied
by faces ranging from frowning to smiling]
C. Free-recall question (Coleman, 1961)
What fellows here in school do you go around with most often? (Give both first and last names)
[from boys’ version of questionnaire; girls received a questionnaire with slightly different wording]
D. Cognitive social structure task (Casciaro et al., 1999)
By putting an X in the cells of the following matrix, please indicate whether you think the people listed in
each row consider the people listed in each column as personal friends. For example, if you think that
Ms. J (row 9) considers Mr. N (column N) as a friend, place an ‘X’ in the corresponding cell ‘9N.’
[followed by square matrix listing persons, with solid shading in diagonal (self-relation) cells]
E. Social-cognitive mapping task [free recall] (Cairns et al., 1985)
Now tell me about your class: Are there some people who hang around together a lot? Who are they?
Are there some people who don’t hang around with a particular group? Who are they?

respondents, however. Care with names of alters is marking them on a roster or checklist, or making
warranted, using either approach: recall methods a separate “yes/no” response about each one. The
must ensure that citations of alters known by latter “forced-choice” format is more time-
different names (e.g., nicknames, titles, spelling consuming but may encourage deeper processing
variations) are correctly matched, while rosters and more thoughtful answers (Smyth et al., 2006).
used to aid recognition must use the names by Many studies request ordinal assessments: Keating
which persons are actually known. et al.’s (2007) study of physicians used a three-
Some early guidelines for sociometric meas- category frequency scale (0, 1–3, or 4+ conversa-
urement recommended that respondents be tions); Fernandez (1991) measured respect
permitted to make an unlimited number of choices relationships in a public finance agency using a
(Lindzey and Borgatta, 1954), but others sug- five-point scale (“very little” to “very much”); and
gested a limit of three or four citations (Northway, Johnson and Orbach (2002) asked political actors
1952). Network surveys using such limits include to rate their interactions with one another on an
Coleman et al.’s (1966) study of physicians and 11-point scale. In some studies of elementary
Laumann and Pappi’s (1976) study of community school students or adolescents (Singleton and
leaders. Limits have practical advantages in survey Asher, 1977; Hansell, 1984), icons supplement
administration: they simplify and specify a socio- ordinal response categories: a face with a broad
metric task for respondents, thereby reducing smile indicates that the respondent likes an alter
burden. Measurement error considerations also “a lot,” for example.
arise, however. Imposing limits can induce both
false negatives (if a respondent’s actual number of
associates exceeds the limit) and false positives (if Cognitive social structure task
respondents are encouraged to cite additional Typical sociometric items ask respondents to
alters in order to reach the limit). Bias is thereby report only on relationships in which they are
produced in many basic network structure statis- directly involved. A cognitive social structure
tics including the degree distribution(s), network (CSS) design (Krackhardt, 1987) measures
summaries such as the dyad and triad censuses respondent perceptions of a whole network, by
(Holland and Leinhardt, 1973), and others. using respondents as informants about social ties
Sociometric items measure relationships using between alters as well as their own relationships.
diverse sets of response categories and formats. Such data may be collected via separate questions
Binary measurement is very common: respond- about the outgoing ties of each actor (e.g., “Who
ents may indicate those alters with whom would X go to for advice at work?”) as in
they have a given type of contact by listing them, Krackhardt (1987), or by asking informant actors

5605-Scott-Chap25.indd 373 4/6/2011 7:21:13 PM


374 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

to fill out a matrix grid (Casciaro et al., 1999; see such instruments begin by administering one or
Table 25.1D). Either way, a CSS task poses sub- more name generator questions that elicit a roster
stantial demands on respondent time and memory, of the alters within a respondent’s egocentric
especially for networks of even moderate size. network, thereby establishing its boundaries.
A CSS task yields multiple assessments { ij( k )} Name generators are much like sociometric items,
of each directed tie, where aij( k ) is the perception of but they almost always depend on respondent
ordered pair (i, j) by the kth informant. Krackhardt recall, because rosters of eligible alters are
(1987) suggests several ways of combining these typically not available in egocentric network
assessments to obtain a single measure for each studies. Surveys that use name generator instru-
relationship aij in a whole network. Setting ments ordinarily treat respondents as informants
aij = aij( i ) – that is, treating each informant as the who provide data about the entire egocentric
authority on her or his outgoing ties – yields a network surrounding them; they generally do not
“locally aggregated structure” essentially equiva- survey or interview the alters themselves. Name
lent to the data obtained via a typical sociometric interpreter questions follow the name generator(s),
item. An alternative “consensus structure” uses asking about attributes of particular alters or
the average assessment 1 ∑ aij( k ) (where K is the relationships. Such instruments can require
K k considerable administration time when alters or
total number of assessments), or a binary measure name interpreters are numerous. Analysts later
of aij based on whether the average assessment combine responses to name generators and name
exceeds some threshold. interpreters to measure a wide variety of egocen-
tric network properties.
Like sociometric items, name generator
Socio-cognitive mapping and pile sorts questions must specify a particular type of rela-
A procedure known as socio-cognitive mapping tionship. Common criteria are role relations (e.g.,
(SCM; Cairns et al., 1985) produces a form of friends, neighbors), aspects of relational form
cognitive social structure data that entails much (e.g., closeness or frequency of contact), or
lower respondent burden. It elicits respondent specific types of resource transfer or exchange.
perceptions of cliques or clusters. Primarily used Criteria of the latter type, which elicit alters using
in measuring networks among children and a specific relational content, are especially
adolescents, the SCM task asks respondents to common. Among these is the widely used
report sets of people who “hang around together a “discuss important matters” name generator
lot” via free recall (see Table 25.1E). The pile-sort (Panel A, Table 25.2) first administered in the
task used by Freeman and Webster (1994) to 1985 General Social Survey (GSS) to elicit alters
measure perceived networks resembles the SCM in a respondent’s “core” network (Marsden, 1987).
procedure but uses recognition methods. It Other studies use name generators tailored to their
provides each respondent with a randomized deck topical content; for example, Huckfeldt and
of cards containing the names of the actors in a Sprague (1995) asked respondents for names of
network, asking that the respondent sort them into alters whom they “talked with most about the
mutually exclusive piles including subsets events of the past election year.”
of actors who are close to one another or who To facilitate the subsequent administration of
interact frequently. name interpreters, name generators usually ask
Using either the SCM instrument or the respondents to identify alters by first name only;
pile-sort method, each respondent’s reports yield a egocentric designs do not need to match alter and
binary matrix with entries indicating whether the respondent names. A name generator may be
informant placed a given person in a certain followed by one or more probes that prompt a
subgroup. These matrices may be combined into a respondent for additional alters. Marin (2004)
consensus perception of relationships in the whole demonstrates that using several such probes can
network. Values can then be assigned to aij as a increase egocentric network size substantially, as
function of the number of informants who placed respondents add previously forgotten alters.
two actors together in a subgroup. Probes should be used judiciously, however,
especially with behaviorally nonspecific name
generators that respondents must define for
Name generator instruments for themselves. Respondents may understand exten-
egocentric networks sive probing as an indication that they are expected
to cite more alters than they have already named,
Suites of survey questions called “name genera- leading them to alter their definition of the name
tor” instruments elicit data on the individual generator’s relational content.
dyadic relationships and “alter” actors in a focal Some name generator instruments incorporate
actor’s neighborhood. They are so-called because visual interfaces to assist respondents. Kahn and

5605-Scott-Chap25.indd 374 4/6/2011 7:21:13 PM


SURVEY METHODS FOR NETWORK DATA 375

Table 25.2 Examples of name generators


A Single Name Generator (from 1985 and 2004 General Social Surveys [GSSs]; Davis et al., 2007)
From time to time, most people discuss important matters with other people. Looking back over the last six
months, who are the people with whom you discussed matters important to you? Just tell me their first
names or initials.
IF LESS THAN FIVE NAMES MENTIONED, PROBE: Anyone else?
B Multiple Name Generator (Kogovšek et al., 2002: 14)
1 From time to time, people borrow something from other people, for instance, a piece of equipment,or ask for
help with small jobs in or around the house. Who are the people you usually ask for this kind of help?
2 From time to time, people ask other people for advice when a major change occurs in their life, for instance, a
job change or a serious accident. Who are the people you usually ask for advice when such a major change
occurs in your life?
3 From time to time, people socialize with other people, for instance, they visit each other, go together on a trip or
to a dinner. Who are the people with whom you usually do these things?
4 From time to time, people discuss important personal matters with other people, for instance if they quarrel with
someone close to them, when they have problems at work, or other similar situations. Who are the people with
whom you discuss personal matters that are important to you?
5 Suppose you find yourself in a situation, when you would need a large sum of money, but do not have it yourself
at the moment, for instance, five average monthly wages (approximately 500,000 tolars). Whom would you ask
to lend you the money (a person, not an institution such as a bank)?

Antonucci (1980), for example, elicited social After name generators ascertain the boundaries
support networks by asking respondents to of a respondent’s egocentric network, follow-up
place alters within concentric circles surrounding name interpreter questions ask for information
them. McCarty and Govindaramanujam (2006) about its form and content. Because of the name
propose a dynamic visual interface in which interpreters, egocentric network data collection
respondents place alters in relation to one another, poses more demands on respondents than do
thereby simplifying the collection of name whole-network instruments.
interpreter data. Three common types of name interpreter items
Two or more name generators may be used to are exemplified in Table 25.3. The first section
delimit an egocentric network. Fischer (1982a), contains questions requesting proxy reports about
for example, elicited social support networks attributes of the alters in a network, such as race/
using nine name generators; van der Poel (1993) ethnicity or age. The second section has questions
recommends sets of three and five name genera- about properties of ego-alter ties such as emo-
tors for measuring personal support networks. The tional closeness, conflict/discomfort, duration of
multiple-generator social support instrument in acquaintance, or frequency of contact. Such name
section B of Table 25.2 includes name generators interpreters may ask whether a tie includes a par-
for minor instrumental aid, advice, socializing, ticular strand of content of special interest to a
confiding about personal matters and major instru- study. For example, the National Social Life,
mental aid. Studies using multiple name genera- Health and Aging Project (NSHAP) asked about
tors should be mindful of possible order effects on the likelihood that respondents would discuss
the number of alters given in response to particular health with each alter (Cornwell et al., 2009),
questions (Pustejovsky and Spillane, 2009). while a 1984 South Bend, Indiana, election study
As in whole-network measurement, some name asked about the frequency of discussing politics
generator instruments ask respondents to name a with alters (Huckfeldt and Sprague, 1995). Finally,
specific number of alters. Laumann (1973) asked name interpreters may ask about relationships
for three “best friends,” for example, while among the alters themselves (the third section
Huckfeldt and Sprague (1995) asked for three of Table 25.3), in order to measure egocentric
political discussants, and Wellman (1979) elicited network density and other aspects of egocentric
six persons to whom a respondent felt closest. The network structure.
“important matters” name generator (Table 25.2) Instruments may organize name interpreter
does not limit the number of alters but probes for questions in “alter-wise” blocks consisting of all
more only when a respondent names fewer than questions about each alter, or “question-wise”
five. Many other studies (e.g., Fischer, 1982a) blocks that ask a given item about all alters
impose no limitations on the number of alters. (Vehovar et al., 2008). Question-wise blocking

5605-Scott-Chap25.indd 375 4/6/2011 7:21:15 PM


376 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Table 25.3 Examples of name interpreters


A Name Interpreters for Alter Characteristics (from 1985 and 2004 GSSs; Davis et al., 2007)
1 Is (NAME) Asian, Black, Hispanic, White, or something else?
ASK FOR EACH NAME
2 How old is (NAME)?
PROBE: Your best guess.
ASK FOR EACH NAME
B Name Interpreters for Properties of Ego-Alter Ties (Kogovšek et al., 2002: 14–15)
1 How close do you feel to this person? Please describe how close you feel on a scale from 1 to 5, where 1 means
not close and 5 means very close.
2 How often does this person upset you?
[Responses are often, sometimes, rarely, never]
C Name Interpreters for Egocentric Network Structure (from 1985 and 2004 GSSs; Davis et al., 2007)
Please think about the relations between the people you just mentioned. Some of them may be total strangers
in that they wouldn’t recognize one another if they bumped into each other on the street. Others may be
especially close, as close or closer to each other as they are to you.
First, think about (NAME 1) and (NAME 2).
A Are (NAME 1) and (NAME 2) total strangers?
IF YES, PROCEED TO NEXT PAIR
B Are they especially close?
PROBE: As close or closer to each other as they are to you
REPEAT FOR EACH PAIR OF NAMES

(e.g., the first section of Table 25.3) asks respond- only up to four alters with whom respondents
ents to answer several consecutive questions “chatted” because their respondents found
having identical response alternatives, a “battery” the name interpreters tedious. The GSS name
format shown to elicit less reliable survey data generator instrument (Burt, 1984) asks name
(Alwin, 2007). Vehovar et al. (2008), however, interpreters about only the first five alters cited
found question-wise presentation to be superior (few respondents name more than five, however).
on several data-quality grounds, with notably Fischer (1982a) asked some name interpreter
lower dropout and item nonresponse rates. Because questions about a subset of alters, those named
respondents know the number of alters they cited first in response to five different name generators.
but not the number of name interpreters in a Because respondents tend to name their closer ties
questionnaire, the alter-wise format allows them sooner (Burt, 1986), selecting alters based on
to better anticipate the length of the name- citation order is apt to measure name interpreter
interpreter task. Alter-wise presentation (e.g., data for stronger ties. McCarty et al. (2007) and
the second section of Table 25.3) took less admin- Marin and Hampton (2007) suggest sampling
istration time in the Vehovar et al. (2008) study, alters at random. The number of alters required to
perhaps because respondents can access different measure a given egocentric network property with
pieces of information about a given alter more adequate reliability depends on the homogeneity
rapidly in this format (Kogovšek et al., 2002). of alter characteristics within respondents
Whether administered alter-wise or question- (Marsden, 1993; McCarty et al., 2007).
wise, answering name interpreter items is Name generator instruments have been admin-
repetitive and time-consuming, especially if istered as part of face-to-face interviews as in the
respondents have large egocentric networks. Some GSS (Marsden, 1987), telephone interviews (e.g.,
studies therefore ask name interpreters about Kogovšek, 2006), mail questionnaires (e.g., Marin
subsets of the alters elicited. Data for a subset of and Hampton, 2007), and Web-based instruments
alters may be sufficient if a study seeks to measure (e.g., Vehovar et al., 2008). Name generator
properties of a respondent’s egocentric network, instruments entail some complexity: at a mini-
as opposed to individual respondent-alter dyads. mum, names of alters must be inventoried and
For example, White and Watkins (2000) elicited organized appropriately for the administration of

5605-Scott-Chap25.indd 376 4/6/2011 7:21:15 PM


SURVEY METHODS FOR NETWORK DATA 377

name interpreters. Instruments that use more than variability of alter characteristics, for example,
one name generator must eliminate redundant ni

names before presenting name interpreters, and the standard deviation ∑ (x


j =1
(i )
j ci )2
or
those that administer name interpreters for a si =
subset of alters must use a consistent protocol to ni − 1
select the subset. Well-trained interviewers can alternatives suitable for categorical measurements.
assist respondents in avoiding organizational Versions of indices in Burt’s (1992) “structural
and navigation errors in these processes, but hole” suite and many other egocentric network
computer-assisted instruments – either self- or measures also can be constructed using data from
interviewer-administered – have special appeal in name generator instruments.
this setting (Gerich and Lehner, 2006).
To the extent that respondents view the survey
content as sensitive, self-administration of name
generator instruments can enhance data quality, if Global questions about egocentric
it promotes higher levels of disclosure (Gerich and network properties
Lerner, 2006). Self-administration also avoids
the interviewer differences in responses to name Numerous single-item survey measures ask
generators documented by van Tilburg (1998) and respondents to provide summary assessments of
Marsden (2003). Respondents may, however, err some egocentric network property – most often
when answering self-administered instruments, their level or volume of informal social contact.
for example, by entering references to plural alters They do not yield data on specific actor-to-actor
or groups (e.g., “my parents”) or other replies that ties. Table 25.4 provides some examples. The first
do not name specific alters (e.g., “don’t want to item there asks about the frequency with which a
respond”) in response to name generators (Lozar respondent socializes with a particular type of
Manfreda et al., 2004). Moreover, interviewer alter (friends outside the neighborhood), while the
presence may provide motivation and encourage second asks about the size of the respondent’s
respondents to be attentive. Matzat and Snijders network of “close friends.” The third item asks
(2010) report mode comparisons that raise that a respondent estimate his or her total daily
concern that respondents may be prone to satisfic- number of direct social contacts, while the fourth
ing when answering Web-based name generator asks for an ordinal assessment of friendship
instruments in private. In any event, the visual network density. The fifth item measures the
design of self-administered instruments warrants presence of a confidant.
care: respondents may take the amount of Global items like these are simple to administer
space left after a name generator question as an within sample surveys. Their formats resemble
indication of the number of alters they are expected those of other common survey questions. They are
to name, for example (Lozar Manfreda et al., efficient, requiring comparatively little interview
2004; Vehovar et al., 2008). time. Some display construct validity in that they
Analysts use data from name generator have robust statistical associations with measures
instruments to construct indices that measure of other phenomena of interest, such as individual
many different egocentric network properties well-being.
(e.g., Marsden, 1987). For respondent i, the most
basic of these is egocentric network size (ni), the
number of alters elicited by the name generator(s). Multiple-item instruments
Name interpreter data on relationships among
alters can be used to construct measures of local Position generator
n j −1 A position generator instrument (Lin et al., 2001)
2∑ ∑ rjk(i )
i

j = 2 k =1 (i )
measures a respondent’s relationships to particu-
density, for example, di = , where r lar types of alters. It does not elicit ties to particu-
ni (ni − 1)
jk

measures the strength of the tie between alters j lar individuals. Developed within a social capital
and k in respondent i’s egocentric network. framework, this instrument usually assesses ties to
Measures of network composition can be based on occupational positions that vary in socioeconomic
name interpreter data about alters, nfor example, standing, presuming that alters that have more
prestigious occupations offer access to more
∑x
i
(i )

j =1
j
valuable social resources. This measurement
the mean level of an attribute ci = (where strategy also could be used to assess ties to other
ni
types of social locations, such as ethnic or
x (ji ) is an attribute value for alter j in i’s network) religious groups.
or the proportion of alters in i’s network who have The position generator illustrated in Table 25.5
a given value of an attribute. Likewise, network asks respondents to indicate whether or not they
heterogeneity measures can be based on the have a specified type of contact (here, kinship,

5605-Scott-Chap25.indd 377 4/6/2011 7:21:15 PM


378 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Table 25.4 Examples of single-item measures of egocentric social network properties


A. Frequency of Socializing with Friends (from 1974-2008 GSSs; Davis et al., 2007)
Would you use this card and tell me which answer comes closest to how often you do the following things . . .
Spend a social evening with friends who live outside the neighborhood
[Responses on card: Almost every day, Once or twice a week, Several times a month, About once a month,
Several times a year, About once a year, Never]
B. Friendship Network Size (from 1998 GSS; Davis et al., 2007)
Do you have any good friends that you feel close to?
IF YES: About how many good friends do you have?
C. Typical Daily Social Contact (Fu, 2005: 173)
On an average, about how many people do you have contact with in a typical day, including all those who you
say hello, chat, talk, or discuss matters with, whether you do it face-to-face, by telephone, by mail or on
the internet and whether you personally know the person or not? Please give your estimate and select one
from the following categories that best matches your estimate: (1) 0–4 persons, (2) 5–9 persons, (3) 10–19
persons, (4) 20–49 persons, (5) 50–99 persons, (6) over 100 persons
D. Friendship Network Density (from 1985 GSS; Davis et al., 2007)
Some people have friends who mostly know one another. Other people have friends who don’t know one
another. Would you say that all of your friends know one another, most of your friends know one another,
only a few of your friends know one another, or none of your friends know one another?
F. Availability of a Confidant (Lowenthal and Haven, 1968)
Is there anyone in particular you confide in or talk to about yourself or your problems?

Table 25.5 Example of position generator


Among your relatives, friends, or acquaintances, are there people who have the following jobs?
a. High school teacher
b. Electrician
c. Owner of small factory/firm
d. Nurse
(etc.)
FOR EACH JOB FOR WHICH RESPONDENT ANSWERS ‘YES’, ASK:

What is his/her relationship to you?


1. Relative
2. Friend
3. Acquaintance
[IF RESPONDENT KNOWS MORE THAN ONE CONTACT WHO HOLDS A GIVEN JOB, ASK ABOUT THE FIRST CONTACT
WHO COMES TO MIND]

Source: Lin et al. (2001: 77)

friendship, or acquaintance) with anyone in a network. Three widely used summary measures
particular socioeconomic location. Follow-up are extensity, upper reachability, and range (Lin
questions ask respondents who have contact with et al., 2001). Let xij be an indicator variable telling
particular locations to indicate whether the whether respondent i has contact with position j,
relationship is strong (kinship, friendship) or and pj be the prestige of position j. Then the exten-
weak (acquaintanceship). Other follow-ups can sity of respondent i’s network – the numberJ of
locations contacted – can be measured as ∑
be added. xij
Responses to a position generator are usually j =1
,
combined into summary measures of the composi- where J is the total number of positions included
tion and range of the respondent’s egocentric in the instrument. The upper reachability of

5605-Scott-Chap25.indd 378 4/6/2011 7:21:16 PM


SURVEY METHODS FOR NETWORK DATA 379

i’s network is defined as the highest-prestige Resource generator


location accessed, max( j
xij p j ) . Finally, the range The resource generator (Van der Gaag and
of a respondent’s network is the difference Snijders, 2005) assesses access to social resources
between the highest-prestige and lowest-prestige directly by asking respondents if they have
positions found in the respondent’s network, personal contact with anyone who possesses
max( xij p j ) − min( ij p j ) . Other summary meas- certain assets or capabilities. Like position gener-
j j | xij =1
ures for position-generator data can be developed ators, resource generators do not measure
via sophisticated multivariate methods (van der individual ties. Table 25.6 presents some example
Gaag et al., 2008). resource generator items. If a respondent has at
The position generator is a relatively efficient least one contact who controls a given resource,
instrument, requiring less interview time than the the instrument probes for the strength of the
name generator instruments described above. strongest linkage to it.
A major decision in developing a position genera- Like the position generator, the resource
tor concerns the set of positions presented to generator does not enumerate alters individually
respondents. Positions presented should cover the or measure network structure: it focuses on
range of variation along dimensions underlying resource-related network composition. It requires
the locations of interest in a study (e.g., prestige or less administration time than a typical name
socioeconomic standing, in the case of occupa- generator instrument. Van der Gaag and Snijders
tional locations) and should be relatively common (2005) use latent trait analysis to develop
positions within the population of interest. Position measures of aspects of social capital based on
generator instruments require that respondents resource generator data.
be able to inventory their contacts of a given
type, to assess whether one or more of them is
with someone who occupies a specific position Social support scales
(e.g., bank teller). Such instruments become A vast literature on social support includes numer-
more demanding of respondents as the number ous instruments that elicit reports about the
of positions and the number of follow-up ques- support perceived to be available or the support
tions per position increase. In 19 surveys actually received (Wills and Shinar, 2000). Some
including position generators reported in Lin and measures take the form of name generator
Erickson (2008), the number of positions ranged instruments that associate support with individual
from 6 to 40 with a median of 17. These applica- alters (e.g., the second section of Table 25.2).
tions involved face-to-face, telephone, and mail Others ask about whether a respondent has access
administration. to anyone who could provide a given type of

Table 25.6 Example of resource generator


Do you know anyone who . . .
a. Can repair a car, bike, etc.?
b. Is handy repairing household equipment?
c. Knows a lot about governmental regulations?
d. Can give a good reference when you are applying for a job?
(etc.)

[Note: the definition of ‘knowing’ a person is that the respondent would know the person’s name if he or she were to
encounter the person by accident on the street and that both parties could initiate conversation with the other.]
FOR EACH ITEM TO WHICH RESPONDENT ANSWERS ‘YES’, ASK:

What is his/her relationship to you?


1. Family member
2. Friend
3. Acquaintance
[IF RESPONDENT KNOWS MORE THAN ONE CONTACT FOR A GIVEN ITEM, CODE STRONGEST RELATIONSHIP ONLY, I.E.,
FAMILY MEMBER IN PREFERENCE TO FRIEND, FRIEND IN PREFERENCE TO ACQUAINTANCE]

Source: Van der Gaag and Snijders (2005: 12)

5605-Scott-Chap25.indd 379 4/6/2011 7:21:16 PM


380 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

support, a format like that of the resource genera- “Friend” is among the more common role-
tor; see, for example, Cohen and Hoberman’s relation criteria used in sociometric questions.
(1983) Interpersonal Support Evaluation List. Still Studies using a variety of methods document wide
other social support instruments pose separate contextual variability – notably by gender and
questions about forms of support available from class – in definitions and behaviors associated
classes of alters, such as family, friends, and with “friendship,” however (Adams and Allan,
coworkers (e.g., Turner and Marino, 1994). 1998). Fischer (1982b) explored how a sample
of Californians identified “friends,” finding
considerable ambiguity: they used it rather unspe-
cifically to cover ties having no other label – often
long-duration, same-age, nonfamily contacts with
COGNITIVE CONSIDERATIONS whom they socialize.
FOR NETWORK SURVEYS Sociometric questions relying on free recall
call attention to the way in which respondents
Recent thinking about how respondents answer organize their memories for persons, which shapes
survey questions stresses a four-stage cognitive the accessibility of information at the retrieval
model: comprehending a question, retrieving rele- stage. Studies of person memory may also suggest
vant information from memory, integrating the ways of wording questions or probing answers to
information retrieved (perhaps adding other consid- encourage accurate reporting of associates. Brewer
erations) to develop a judgment about an answer, (1995) conducted several studies revealing that
and providing a response within the format given in social structural factors organize memories for
the survey instrument (Tourangeau et al., 2000). persons. Subjects recalling those enrolled in their
This section discusses some research that bears on graduate program, for example, tended to give
these processes for questions about other persons names in clusters corresponding to entering
and a respondent’s relationships to them. cohorts. More generally, recall of persons corre-
Sociometric questions may be misunder- sponds to their perceived social proximity (Brewer
stood – or understood in varying ways – when et al., 2005): alters perceived to interact frequently
they ask about diffuse, behaviorally nonspecific tend to be remembered close together.
relationships. One ground cited by advocates of Other research by Brewer (2000) documents
using “specific exchanges” (e.g., confiding, social- pervasive forgetting of associates in free recall
izing) rather than affective (e.g., closeness) or tasks; this appears to be more severe for weaker
role-relation (e.g., friends, neighbors) criteria to ties. Bell et al. (2007) reported greater forgetting
word name generators is that respondents are apt for less specific relationships (“friends” compared
to answer exchange questions more consistently with sex or drug use partners), for less salient
(McAllister and Fischer, 1978). Some research ties (drug use versus sexual partners), and longer
nonetheless examines variations in interpretation reference periods. The above-mentioned
assigned to the widely used “important matters” research on memory organization suggests that
name generator. Bailey and Marsden (1999) administering probes and reminders to call a
debriefed respondents using cognitive interview- respondent’s attention to relevant contexts, or to
ing, finding that some took it to be asking for contacts proximate to those already named, may
close or frequent contacts and that most regarded reduce forgetting. Brewer (2000) also suggests
“important matters” as those having to do that instruments should include several name
with family or personal life. They suggested that generators to provide respondents with additional
interview context might influence a respondent’s opportunities to name alters.
definition of important matters: politics was more When developing name interpreter items that
apt to be part of this when a series of survey ask respondents to make proxy reports about
items with political content preceded the name characteristics of alters, researchers should be
generator; see also Bearman and Parigi (2004). mindful of differences between memories for
Cornwell et al. (2009) placed their name generator self and others (Sudman et al., 1994). People
instrument at the beginning of the NSHAP learn data about others via observation or
interview to avoid such context effects. Bearman communication rather than experience. Memories
and Parigi (2004) asked respondents to report about others may be less elaborate and accessible
the important matter they had most recently and less organized into summary judgments than
discussed, finding that matters involving money those about oneself. Respondents may need to
and household finance were mentioned most estimate rather than retrieve data about others, and
frequently. A fifth of their respondents were they often do so by anchoring a proxy report
“silent,” claiming that they had not discussed on their own attitude or behavior (Sudman et al.,
anything important with anyone during the pre- 1996). An advantage of proxy reports is that
ceding six months. social desirability pressures may be weaker for

5605-Scott-Chap25.indd 380 4/6/2011 7:21:17 PM


SURVEY METHODS FOR NETWORK DATA 381

reports about others than those about respondents DATA QUALITY


themselves.
Apart from memory structures for persons Numerous sources can produce errors of measure-
are memories for relationships among them. ment in survey data about social networks. For
Freeman (1992) shows that people tend to impose example, errors in self-reported data about
transitivity on relationships, recalling that others relationships can arise because of respondent
are connected when in fact they are not. This is memory limitations, or because respondents
consistent with Brewer’s conclusion that group seek to present themselves favorably when
affiliations organize person memories; nuances of answering – incorrectly claiming ties to certain
within-group dyadic relationships may not be alters, while omitting contacts with others.
encoded precisely, however. Researchers may pose questions that correspond
It is not difficult to develop social network imperfectly with the concepts they seek to
items that make considerable demands on respond- measure, or respondents may interpret them
ent cognitive capacity. Consider global items like differently than intended. Different interviewers
those shown in Table 25.4. The second item on may administer survey items (such as name gen-
“close friends” requires that respondents first erators) in varying ways that contribute errors.
define both “friend” and “close,” and then enumer- Some therefore view survey network data with
ate or estimate their number of such contacts. skepticism. Survey designs lend themselves,
Perhaps as a result, some comparisons between however, to obtaining the repeated measures that
responses to global items and network data assem- systematic investigations of measurement quality
bled using other instruments suggest that global require. Numerous studies examine aspects of
questions have limited reliability. Sudman (1985) data quality for survey-based social network
showed that global estimates of network size measures. Many of these offer convincing
exhibit considerable response variance by evidence that survey responses can reliably and
comparison to more time-consuming network validly reflect underlying social network phenom-
measurements based on recognition or free recall. ena. Such studies, however, assess quality using
The “ersatz” network density item (section D in different standards (e.g., validity, reliability,
Table 25.4) makes, if anything, even stronger item nonresponse), focus on different objects of
demands on memory and judgment. Burt (1987) measurement (e.g., dyadic ties, characteristics of
shows that answers to it are only weakly associ- alters, egocentric network properties), examine
ated with a local density measure constructed substantively different network ties, and measure
using data from a name generator instrument. quality using different indices and metrics. As for
The judgment tasks involved in answering name survey data more generally (Alwin, 2007), quality
interpreter questions about individual alters and assessments for network data are population-
relationships are simpler than those posed by global specific, and the findings of any given investigation
items, though much more numerous. Judgment are therefore suggestive rather than definitive.
tasks involved in answering items like those posed Available data quality studies do not yield a
in position generator or resource generator instru- single or unambiguous verdict about the quality of
ments can be simplified by asking – as the examples survey measures of networks. Some measure-
in Tables 25.5 and 25.6 do – whether anyone in an ments appear highly valid and reliable, while
egocentric network has the attribute or resource in others are less so. We call attention here to some
question, rather than how many alters have it. influential lines of work in this area but do
Once a respondent reaches a judgment, she or not attempt either to exhaustively cover or to
he must format it to conform with the response synthesize all relevant methodological research;
categories offered by a survey question. When pos- for further discussion, see Marsden (1990, 2005).
sible, instruments should avoid presenting response We first discuss studies that assess data quality
categories involving “vague quantifiers” (Bradburn for measures of respondent-alter relationships
and Miles, 1979), such as “rarely,” “often,” or (sociometric items and name generators).
“some,” in favor of numerical reports or responses Subsequently, we cover research that examines
that involve widely understood units of measure- name interpreter items and measures of network
ment (e.g., “daily” or “at least monthly”). While composition.
respondents may experience difficulty in reaching
precise judgments within the latter frameworks,
using such categories reduces measurement errors
stemming from variation across respondents in Accuracy and validity studies for
classifying judgments into vaguely quantified cat- relational items
egories. Alwin (2007) concludes that the reliability
of reports about past behavior is lower when items Important and influential “informant accuracy”
use vague quantifiers. studies summarized in Bernard et al. (BKS; 1981)

5605-Scott-Chap25.indd 381 4/6/2011 7:21:17 PM


382 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

examined the accuracy or validity of reported with more general findings about the cognitive
communication ties in whole networks. These challenges respondents face when answering
studies compared reports about relationships survey questions asking them to report event dates
based on sociometric items with “gold standard” (Tourangeau et al., 2000: Chapter 4).
measurements of behavior obtained using diaries
or logs or systematic observation. Across several
small populations surveyed using varying Reliability of relational items
measurement methods (e.g., rankings versus
ratings), the survey reports and the “behavioral” Many other studies compare two or more survey
measurements of communication exhibited measurements of the same datum, thereby assess-
moderate agreement, at most. These findings ing the reliability of instruments. One approach
posed serious questions about the quality of examines the reciprocation of citations, reasoning
“cognitive” reports on social ties obtained using that a conceptually undirected relationship should
surveys, although we note in passing that diaries be reported by both actors involved in it. Marsden
and observations of behavior also may include (1990) inventoried several studies of reciprocation,
measurement errors. A similarly designed finding rates that ranged widely, with some indica-
classroom study (Gest et al., 2003) drew more tion that reciprocity is higher for closer ties. In
encouraging conclusions about the quality of some more recent studies, Feld and Carter (2002)
survey data obtained using the SCM. reported a reciprocation rate of about 58 percent for
The BKS studies stimulated numerous college students who were questioned about who
reanalyses and follow-up studies. Kashy and they spent time with, while White and Watkins
Kenny (1990) dissected the overall correspond- (2000) reported reciprocation of only 20 percent for
ence between survey reports and behavioral data reports about informal family planning discussions
into two “individual” components involving (“chats”) by rural Kenyan women. For a high-risk
actor-level tendencies to communicate with others population (sex workers, intravenous drug users,
and a “dyadic” component involving their tenden- and their sexual partners) adams and Moody (2007)
cies to communicate with particular others. Their reported much higher reciprocation levels:
data analyses revealed a relatively close actor- 85 percent for sexual relationships, 72 percent for
level correspondence between survey citations drug-sharing, and 79 percent for “social” ties.
received and overall observed interaction levels, These rates fell only slightly when calculations
and moderate dyadic-level correlations. Survey took timing into account, counting reported
citations made and observed interaction levels citations as reciprocated only when they referred to
corresponded quite poorly, however, a conclusion overlapping time intervals. Gest et al. (2003) indi-
later echoed by Feld and Carter’s (2002) finding cate that observed interaction is higher in recipro-
of “expansiveness bias” – wide actor-level varia- cated dyads, thereby offering some evidence that
tion in reports about outgoing relationships – in reciprocated citations may have higher validity.
survey network data. These studies indicate In the data studied by adams and Moody
that survey data may measure some network (2007), respondents also made CSS-like reports
properties more validly than others. about contacts of their contacts. Reports about
A separate line of work by Freeman and relationships among contacts of contacts were
Romney (1987; see also Freeman et al., 1987) corroborated relatively often by self-reports from
argued that measurement errors in survey reports participants in those relationships, though at rates
of past social interactions are not random but lower than the above-cited reciprocation levels.
instead tend to be biased toward long-term In particular, observer reports were less often
patterns. These studies obtained two-mode survey consistent with self-reports about sexual relation-
data in which respondents reported whether ships, which ordinarily take place in settings not
others had been present at a recent meeting. open to observation by others.
Analyses then compared those reports to attend- Test-retest studies compare two or more meas-
ance records – both for the particular meeting in urements made using the same instrument on dif-
question and for a series of meetings held over a ferent occasions. Test-retest correlations reflect
longer period of time. They found that persons some combination of stability in the phenomenon
falsely reported as being present at the meeting in under study and reliability in a measuring instru-
question were apt to attend most meetings; those ment, so they are not unambiguous indicators of
incorrectly reported as missing the recent meeting data quality. For survey network data, test-retest
tended to be infrequent attenders over the longer assessments can be made at different levels. Some
run. These findings suggest that survey respond- studies examine the percentage of stability/turno-
ents can report stable patterns of social interaction ver in citations of individual alters. For example,
validly, but are less capable of recalling time- Morgan et al. (1997) showed that about 55 percent
specific episodes with precision. This resonates of the alters elicited by a name generator were

5605-Scott-Chap25.indd 382 4/6/2011 7:21:17 PM


SURVEY METHODS FOR NETWORK DATA 383

named again after two-month periods. In White constructed using data elicited by name generator
and Watkins’s (2000) study covering a two-year instruments. Relevant data quality studies exam-
interval, respondents re-named only 18 percent ine responses to name interpreters at the alter
of the partners with whom they first reported level, and they assess indices and scales based on
“chatting” about family planning. Bignami-Van those data.
Assche (2005) gives an even lower figure (about
10 percent) for similar reports in Malawi that were
separated by a three-year interval. Less than Proxy reporting
30 percent of alters were elicited on both of two When they answer name interpreters about alter
occasions separated by a much shorter period characteristics, survey respondents make “proxy”
(about 10 days). Alters having close ties to a reports about alters. The survey research literature
respondent appear much more apt to be reported includes numerous studies examining the quality
repeatedly across occasions than those having weaker of such reports (e.g., Moore, 1988), mostly for
relationships. For reviews of other evidence on the respondents reporting about their spouses or
repeated citation of alters across waves of panel stud- other household members. Alwin (2007) assessed
ies, see Marsden (1990) and Brewer (2000). the reliability of spousal proxy reports about
Instruments may measure properties of res- socioeconomic status, finding them to be rela-
pondents’ egocentric networks reliably across tively reliable – though less so than self-reports.
occasions of measurement despite substantial Sudman et al. (1994) reason that the quality of
turnover in the individual alters that respondents proxy reports should rise with respondent-alter
name, if actor-level measures of network form and interaction.
composition remain stable. In one study, Morgan Many studies of proxy reports obtain self-
et al. (1997) obtained repeated measures of reports directly from alters, and then compare
egocentric network size and the percent of family them with an original respondent’s proxy report.
members in a respondent’s egocentric network If we regard the alter as the authority on his or her
over two-month intervals, reporting between- characteristics, such a design estimates the valid-
wave correlations above 0.6. In another, Bignami- ity of the proxy measure. Some social network
Van Assche’s (2005) name generators elicited studies use such designs to assess the quality of
similar numbers of alters when readministered proxy reports about friends or other nonhousehold
after a short time interval, though respondents alters. A common finding is that respondents can
often did not name the same specific alters. report observable data about alters – age, sex,
Several data quality studies estimate the household possessions, number of children –
reliability of survey network measures using a reasonably well; proxy answers about less observ-
multitrait-multimethod (MTMM) approach. Such able features such as political party affiliation or
studies repeatedly measure several relationships contraceptive use are of lower quality (Laumann,
using different methods and are thereby able to 1969; White and Watkins, 2000), and often biased
assess both the reliability of measurements and toward the proxy respondent’s own value on
the extent to which reliable variance is attributable such measures. See Marsden (1990) for further
to differences in methods. For eight whole- discussion.
network classroom studies, Ferligoj and Hlebec
(1999) reported relatively high reliability levels
(above 0.85) for four social support measures. Reliability of network composition
Their measures of emotional and informational measures
support were somewhat more reliable than those As noted earlier, many measures that describe
of informational support and companionship. egocentric networks are within-respondent means
While measures using binary response scales of data obtained via name interpreter items; for
appeared somewhat less reliable than those example, egocentric network density can be
involving ordinal scales, method-related variance expressed as the mean strength of tie between
in true scores was only modest (see also Hlebec pairs of alters in a respondent’s network. Marsden
and Ferligoj, 2002). (1993) assesses the reliability of such measures
using methods from generalizability theory. Their
reliability rises with the number and homogeneity
of measures on different alters. Many – but not
Name interpreter data: all – such properties can be reliably measured
proxy reporting and network using name generator instruments that elicit five
composition measures or fewer alters.
Some other studies estimate the reliability of
Responses to name interpreters provide the such measures using MTMM designs. Kogovšek
content for most egocentric network measures and Ferligoj (2005), for example, report reliability

5605-Scott-Chap25.indd 383 4/6/2011 7:21:17 PM


384 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

coefficients above 0.8 for average frequency of though this view is debated (see Klovdahl, 2005;
contact with, and average closeness to, alters in an Morris, 2004: 3). Without question, however,
egocentric network. They found that measures researchers are obligated to protect secondary
with behavioral rather than emotional content are subjects against harms arising from disclosure of
more reliable. In interviewer-administered modes, research data and to ensure that any risks to them
“alter-wise” presentation of name interpreters are minimal and outweighed by potential research
yielded more reliable measures than did “question- benefits. Woodhouse et al. (1995) suggest that
wise” presentation (Kogovšek et al., 2002; investigators may have more extensive responsi-
Kogovšek and Ferligoj, 2005). The question-wise bilities to such third parties, should the research
approach appears to be more reliable in the discover that they are at risk because of the
Internet mode, however (Coromina and Coenders, behavior of primary subjects.
2006; Vehovar et al., 2008). Kogovšek and Ferligoj
(2002) find that the reliability of composition
measures is higher for “core” networks composed
of strong ties than for “extended” ones that also
include weaker relationships.
CONCLUSION
Another set of MTMM studies exploits the
hierarchical structure of data from name generator Survey methods are, and seem apt to remain, a
instruments, in which observations on alters are leading approach to collecting social network
nested within respondents. This allows estimation data. Like other research methods, they have
of reliability coefficients for alters within respond- drawbacks. Assembling survey data can be both
ents and for between-respondent differences. expensive and time-consuming, especially for
Coromina and Coenders (2006) report reliability large samples or populations. Much methodologi-
coefficients above 0.8 at both levels for advice, cal research examines possible measurement
collaboration, information exchange, and social- errors in survey network data, but they can
izing among members of research groups. Reports also include error attributable to factors such as
about collaboration were most reliable, those nonresponse or interviewer differences.
about socializing least so. Coromina et al. (2004) All research data include errors, however, and
report similar findings for common measures of such legitimate concerns about the survey approach
tie strength, such as closeness and frequency of should not blind us to its strengths, many of which
contact. have to do with its flexibility. Researchers control
the definition of network boundaries when they
conduct surveys. Survey methods can elicit all
strands of relationships, not only those recorded
within a specific medium such as electronic mail.
HUMAN SUBJECT PROTECTIONS Survey researchers can measure the aspects of
AND NETWORK SURVEYS relationships that are of conceptual interest in a
study – rather than (for example) relying on those
Surveys that collect data on social networks tracked by a record-keeping system – thereby
must comply with all laws, regulations, and improving validity. Survey data are collected
norms that govern the conduct of survey research. under relatively standardized conditions. Surveys
Among these are obtaining voluntary, informed often require only modest time commitments from
consent from respondents, minimizing risks to participants, by comparison with the demands
them, and protecting their confidentiality after made by some alternative methods such as
data are assembled (see Citro, 2010) when diaries.
disseminating research reports or archiving data Looking forward, we can anticipate continued
sets. Special vigilance is warranted when attention to assessing and reducing different
such surveys ask respondents for information forms of error in survey data. As well, investiga-
about their relationships involving sensitive tions that seek to develop more efficient
behaviors such as sexual activity or drug use. instruments and innovations in modes of
See Klovdahl (2005) and Woodhouse et al. (1995) collecting survey data seem likely. Internet
for discussion of steps that may be taken under surveys offer many prospective gains – including
such circumstances. substantial cost and time savings, respondent
Network surveys often collect information convenience, and the possibility of using new
about third parties – the alters or associates and different visual interfaces. These innovative
connected to respondents. Some regard such third methods may, however, hold consequences
parties as research participants, contending that for data quality, investigation of which
researchers must locate and seek informed has only begun for survey data about social
consent from them as “secondary subjects,” networks.

5605-Scott-Chap25.indd 384 4/6/2011 7:21:17 PM


SURVEY METHODS FOR NETWORK DATA 385

ACKNOWLEDGMENTS Brass, D.J. (1985) ‘Men’s and women’s networks: A study of


interaction patterns and influence in an organization’,
For helpful comments, I am grateful to Peter Academy of Management Journal, 28(2): 327–43.
Carrington, Anuška Ferligoj, and Sameer Srivastava. Brewer, D.D. (1995) ‘The social structural basis of the
organization of persons in memory’, Human Nature, 6(4):
379–403.
Brewer, D.D. (2000) ‘Forgetting in the recall-based elicitation
NOTES of personal and social networks’, Social Networks, 22(1):
29–43.
Brewer, D.D., Rinaldi, G., Mogoutov, A. and Valente, T.W.
1 This view of the relationship between whole-
(2005) ‘A Quantitative review of associative patterns in
network and egocentric data assumes, however, that
the recall of persons’, Journal of Social Structure 6. http://
the egocentric networks for all focal actors of interest
www.cmu.edu/joss/.
lie within whatever boundary is established for the
Burt, R.S. (1984) ‘Network items and the General Social
corresponding whole network. In practice, many
Survey’, Social Networks, 6(4): 293–339.
egocentric studies are conducted in large,
Burt, R.S. (1986) ‘A note on sociometric order in the General
open populations where this assumption may be
Social Survey network data’, Social Networks, 8(2): 149–74.
untenable.
Burt, R.S. (1987) ‘A note on the General Social Survey’s ersatz
2 Obtaining egocentric network data on respond-
network density item’, Social Networks, 9(1): 75–85.
ents in conventional sample surveys resembles this
Burt, R.S. (1992) Structural Holes: The Social Structure of
design.
Competition. Cambridge, MA: Harvard University Press.
3 We omit discussion of network sampling
Burt, R.S. (2004) ‘Structural holes and good ideas’, American
methods such as respondent-driven sampling
Journal of Sociology, 110(2): 349–99.
(Heckathorn, 1997), which use social connections
Cairns, R.B., Perrin, J.E. and Cairns, B.D. (1985) ‘Social struc-
among elements of rare or hidden populations to
ture and social cognition in early adolescence: Affiliative
draw samples of actors in those populations, rather
patterns’, Journal of Early Adolescence, 5(3): 339–55.
than to sample whole or partial networks per se.
Casciaro, T., Carley, K.M. and Krackhardt, D. (1999) ‘Positive
affectivity and accuracy in social network perception’,
Motivation and Emotion, 23(4): 285–306.
Citro, C.F. (2010) ‘Legal and human subjects considerations in
REFERENCES surveys’, in Peter V. Marsden and James D. Wright (eds.),
Handbook of Survey Research. 2nd ed. Bingley, UK:
Adams, J. and Moody, J. (2007) ‘To tell the truth: Measuring Emerald Group Publishing. pp. 59–79.
concordance in multiply reported network data’, Social Cohen, S. and Hoberman, H.M. (1983) ‘Positive events and
Networks, 29 (1): 44–58. social supports as buffers of life change stress’, Journal of
Adams, R.G. and Allan, G. (eds) (1998) Placing Friendship in Applied Social Psychology, 13(2): 99–125.
Context. New York: Cambridge University Press. Coleman, J.S. (1961) The Adolescent Society: The Social Life
Alwin, D.F. (2007) Margins of Error: A Study in the of the Teenager and Its Impact on Education. New York:
Reliability of Survey Measurement. Hoboken, NJ: Wiley Free Press.
Interscience. Coleman, J.S., Katz, E. and Menzel, H. (1966) Medical
Bailey, S. and Marsden, P.V. (1999) ‘Interpretation and inter- Innovation: A Diffusion Study. Indianapolis: Bobbs-Merrill.
view context: Examining the General Social Survey name Cornwell, B.L., Schumm, P., Laumann, E.O. and Graber, J.
generator using cognitive methods’, Social Networks, (2009) ‘Social networks in the NSHAP study: Rationale,
21(3): 287–309. measurement, and preliminary findings’, Journal of
Bearman, P. and Parigi, P. (2004) ‘Cloning headless frogs and Gerontology: Social Sciences, 64B (S1): i47–i55.
other important matters: Conversation topics and network Coromina, L. and Coenders, G. (2006) ‘Reliability and
structure’, Social Forces, 83(2): 535–57. validity of egocentered network data collected via Web:
Bell, D.C., Belli-McQueen, B. and Haider, A. (2007) ‘Partner A meta-analysis of multilevel multitrait multimethod
naming and forgetting: Recall of network members’, Social studies’, Social Networks, 28(3): 209–31.
Networks, 29(2): 279–99. Coromina, L., Coenders, G. and Kogovšek, T. (2004)
Bernard, H.R., Killworth, P.D. and Sailer, L. (1981) ‘Summary ‘Multilevel multitrait multimethod model: Application to
of research on informant accuracy in social network data, the measurement of egocentered social networks’,
and on the reverse small world problem’, Connections, Metodološki zvezki, 1(2): 323–49.
4(summer): 11–25. Davis, J.A., Smith, T.W. and Marsden, P.V. (2007) General
Bignami-Van Assche, S. (2005) ‘Network stability in longitudi- Social Surveys: Cumulative Codebook: 1972–2006.
nal data: A case study from rural Malawi’, Social Networks, Chicago: NORC.
27(3): 231–47. Doreian, P. and Woodard, K.L. (1992) ‘Fixed-list versus
Bradburn, N.M. and Miles, C. (1979) ‘Vague quantifiers’, snowball selection of social networks’, Social Science
Public Opinion Quarterly, 43(1): 92–101. Research, 21(2): 216–33.

5605-Scott-Chap25.indd 385 4/6/2011 7:21:17 PM


386 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Espelage, D.L., Green, H.D.Jr. and Wasserman, S. (2007) Huckfeldt, R. and Sprague, J. (1995) Citizens, Politics, and
‘Statistical analysis of friendship patterns and bullying Social Communication: Information and Influence in an
behaviors among youth’, in Philip C. Rodkin and Laura D. Election Campaign. New York: Cambridge University Press.
Hanish (eds), Social Network Analysis and Children’s Peer Johnson, J.C. and Orbach, M.K. (2002) ‘Perceiving the political
Relationships. San Francisco: Jossey-Bass. pp. 61–75. landscape: Ego biases in cognitive political networks’,
Feld, S.L. and Carter, W.C. (2002) ‘Detecting measurement Social Networks, 24(3): 291–310.
bias in respondent reports of personal networks’, Social Kahn, R.L. and Antonucci, T.C. (1980) ‘Convoys over the life
Networks, 24(4): 365–83. course: Attachment, roles and social support’, in Paul B.
Ferligoj, A. and Hlebec, V. (1999) ‘Evaluation of social Baltes and Orville G. Brim (eds), Life Span Development
network measurement instruments’, Social Networks, and Behavior, vol. 3. San Diego: Academic Press.
21(2): 111–30. pp. 253–86.
Fernandez, R.M. (1991) ‘Structural bases of leadership in Kashy, D.A. and Kenny, D.A. (1990) ‘Do you know whom you
intraorganizational networks’, Social Psychology Quarterly, were with a week ago Friday? A re-analysis of the Bernard,
54(1): 36–52. Killworth, and Sailer studies’, Social Psychology, Quarterly,
Fischer, C.S. (1982a) To Dwell Among Friends: Personal 53(1): 55–61.
Networks in Town and City. Chicago: University of Chicago Keating, N.L., Ayanian, J.Z., Cleary, P.D. and Marsden, P.V.
Press. (2007) ‘Factors affecting influential discussions among physi-
Fischer, C.S. (1982b) ‘What do we mean by “friend”: An cians: A social network analysis of a primary care practice’,
inductive study’, Social Networks, 3(4): 287–306. Journal of General Internal Medicine, 22(6): 794–98.
Frank, O. (1981) ‘A survey of statistical methods for Kirke, D.M. (1996) ‘Collecting peer data and delineating peer
graph analysis’, in Samuel Leinhardt (ed.), Sociological networks in a complete network’, Social Networks, 18(4):
Methodology 1981. San Francisco: Jossey-Bass. pp. 110–55. 333–46.
Freeman, L.C. (1992) ‘Filling in the blanks: A theory of Klovdahl, A.S. (2005) ‘Social network research and human
cognitive categories and the structure of social affiliation’, subjects protection: Towards more effective infectious
Social Psychology Quarterly, 55(2): 118–27. disease control’, Social Networks, 27(2): 119–37.
Freeman, L.C. (2004) The Development of Social Network Klovdahl, A.S., Potterat, J.J., Woodhouse, D.E., Muth, J.B.,
Analysis: A Study in the Sociology of Science. Vancouver, Muth, S.Q. and Darrow, W.W. (1994) ‘Social networks and
BC: Empirical Press. infectious disease: The Colorado Springs study’, Social
Freeman, L.C., Romney, A.K. and Freeman, S.C. (1987) Science and Medicine, 38(1): 79–88.
‘Cognitive structure and informant accuracy’, American Kogovšek, T. (2006) ‘Reliability and validity of measuring
Anthropologist, 89(2): 311–25. social support networks by Web and telephone’,
Freeman, L.C. and Romney, A.K. (1987) ‘Words, deeds and Metodološki zvezki, 3(2): 239–52.
social structure: A preliminary study of the reliability of Kogovšek, T. and Ferligoj, A. (2002) ‘The quality of measure-
informants’, Human Organization, 46(4): 330–34. ment of personal support networks’, Quality and Quantity,
Freeman, L.C. and Webster, C.M. (1994) ‘Interpersonal 38(5): 517–32.
proximity in social and cognitive space’, Social Cognition, Kogovšek, T. and Ferligoj, A. (2005) ‘Effects on reliability and
12(3): 223–47. validity of egocentered network measurements’, Social
Fu, Y.-C. (2005) ‘Measuring personal networks with daily Networks, 27(3): 205–29.
contacts: A single-item survey question and the contact Kogovšek, T. Ferligoj, A., Coenders, G. and Saris, W.E.
diary’, Social Networks, 27(3): 169–86. (2002) ‘Estimating the reliability and validity of
Gerich, J. and Lerner, R. (2006) ‘Collection of ego-centered personal support measures: Full information ML estimation
network data with computer-assisted interviews’, with planned incomplete data’, Social Networks,
Methodology, 2(1): 7–15. 24(1): 1–20.
Gest, S.D., Farmer, T.W., Cairns, B.D. and Xie, H. (2003) Krackhardt, D. (1987) ‘Cognitive social structures’, Social
‘Identifying children’s peer social networks in school Networks, 9(2): 109–34.
classrooms: Links between peer reports and observed Laumann, E.O. (1969) ‘Friends of urban men: An assessment
interactions’, Social Development, 12(4): 513–529. of accuracy in reporting their socioeconomic attributes,
Hansell, S. (1984) ‘Cooperative groups, weak ties, and mutual choice, and attitude agreement’, Sociometry,
the integration of peer friendships’, Social Psychology 32(1): 54–69.
Quarterly, 47(4): 316–28. Laumann, E.O. (1973) Bonds of Pluralism: The Form and
Heckathorn, D.D. (1997) ‘Respondent-driven sampling: A new Substance of Urban Social Networks. New York: Wiley
approach to the study of hidden populations’, Social Interscience.
Problems, 44(2): 174–99. Laumann, E.O. and Knoke, D. (1987) The Organizational
Hlebec, V. and Ferligoj, A. (2002) ‘Reliability of social State: Social Choice in National Policy Domains. Madison:
network measurement instruments’, Field Methods, 14(3): University of Wisconsin Press.
288–306. Laumann, E.O., Marsden, P.V. and Prensky, D. (1989) ‘The
Holland, P.W. and Leinhardt, S. (1973) ‘The structural boundary specification problem in network analysis’, in
implications of measurement error in sociometry’, Journal Linton C. Freeman, Douglas R. White, and A. Kimball
of Mathematical Sociology, 3(1): 85–111. Romney (eds), Research Methods in Social Network

5605-Scott-Chap25.indd 386 4/6/2011 7:21:17 PM


SURVEY METHODS FOR NETWORK DATA 387

Analysis. Fairfax, VA: George Mason University Press. McAllister, L. and Fischer, C.S. (1978) ‘A procedure for
pp. 61–87. surveying personal networks’, Sociological Methods and
Laumann, E.O. and Pappi, F.U. (1976) Networks of Collective Research, 7(2): 131–48.
Action: A Perspective on Community Influence Systems. McCarty, C. and Govindaramanujam, S. (2006) ‘A modified
New York: Academic Press. elicitation of personal networks using dynamic visualiza-
Lazarsfeld, P.F. and Menzel, H. (1980) ‘On the relation tion’, Connections, 26(2): 61–69.
between individual and collective properties’, in Amitai McCarty, C., Killworth, P.D. and Rennell, J. (2007) ‘Impact
Etzioni and Edward W. Lehman (eds), A Sociological of methods for reducing respondent burden on personal
Reader on Complex Organizations. 3rd ed. New York: network structural measures’, Social Networks, 29(2):
Holt, Rinehart and Winston. pp. 508–21. 300–315.
Lazega, E. (2001) The Collegial Phenomenon: The Social Moore, J.C. (1988) ‘Self-proxy response status and survey
Mechanisms of Cooperation Among Peers in a Corporate response quality: A review of the literature’, Journal of
Law Partnership. New York: Oxford University Press. Official Statistics, 4(2): 155–72.
Liebow, E., McGrady, G., Branch, K., Vera, M., Klovdahl, A., Moreno, J.L. (1953) Who Shall Survive? Foundations of
Lovely, R., Mueller, C. and Mann, E. (1995) ‘Eliciting social Sociometry, Group Psychotherapy, and Sociodrama.
network data and ecological model-building: Focus on Beacon, NY: Beacon House.
choice of name generators and administration of random- Morgan, D.L., Neal, M.B. and Carder, P. (1997) ‘The stability
walk study procedures’, Social Networks, 17(3–4): 257–72. of core and peripheral networks over time’, Social Networks,
Lin, N. and Erickson, B.H. (2008) Social Capital: An 19(1): 9–25.
International Research Program. New York: Oxford Morris, M. (ed.) (2004) Network Epidemiology: A Handbook
University Press. for Survey Design and Data Collection. New York: Oxford
Lin, N., Fu, Y.-C. and Hsung, R.-M. (2001) ‘The position University Press.
generator: Measurement techniques for investigations of Northway, M.L. (1952) A Primer of Sociometry. Toronto:
social capital’, in Nan Lin, Karen Cook, and Ronald S. Burt University of Toronto Press.
(eds), Social Capital: Theory and Research. New York: Provan, K.G., Huang, K. and Milward, H.B. (2009) ‘The
Aldine de Gruyter. pp. 57–81. evolution of structural embeddedness and organizational
Lindzey, G. and Borgatta, E.F. (1954) ‘Sociometric measure- social outcomes in a centrally governed health and
ment’, in Gardner Lindzey (ed.), Handbook of Social sychol- human services network’, Journal of Public Administration
ogy. Vol. 1. Reading, MA: Addison Wesley. pp. 405–48. Research and Theory, 19(4): 873–93.
Lowenthal, M.F. and Haven, C. (1968) ‘Interaction and Pustejovsky, J.E. and Spillane, J.P. (2009) ‘Question-order
adaptation: Intimacy as a critical variable’, American effects in social network name generators’, Social Networks,
Sociological Review, 33(1): 20–30. 31(4): 221–29.
Lozar Manfreda, K., Vehovar, V. and Hlebec, V. (2004) Singleton, L.C. and Asher, S.R. (1977) ‘Peer preferences
‘Collecting ego-centred network data via the Web’, and social interaction among third-grade children in an
Metodološki zvezki, 1(2): 295–321. integrated school district’, Journal of Educational
Marin, A. (2004) ‘Are respondents more likely to list Psychology, 69(4): 330–36.
alters with certain characteristics? Implications for name Smyth, J.D., Dillman, D.A., Christian, L.M. and Stern, M.J.
generator data’, Social Networks, 26(4): 289–307. (2006) ‘Comparing check-all and forced-choice formats
Marin, A. and Hampton, K.N. (2007) ‘Simplifying the personal in Web surveys’, Public Opinion Quarterly, 70(1): 66–77.
network name generator: Alternatives to traditional Sudman, S. (1985) ‘Experiments in the measurement of the
multiple and single name generators’, Field Methods, size of social networks’, Social Networks, 7(2): 127–51.
19(2): 163–93. Sudman, S., Bickart, B., Blair, J. and Menon, G. (1994) ‘The
Marsden, P.V. (1987) ‘Core discussion networks of effect of participation level on reports of behavior and
Americans’, American Sociological Review, 52(1): 122–31. attitudes by proxy reporters’, in Norbert Schwarz and
Marsden, P.V. (1990) ‘Network data and measurement’, Seymour Sudman (eds), Autobiographical Memory and the
Annual Review of Sociology, 16: 435–63. Validity of Retrospective Reports. New York: Springer-
Marsden, P.V. (1993) ‘The reliability of network density and Verlag. pp. 251–65.
composition measures’, Social Networks’, 15(4): 399–421. Sudman, S., Bradburn, N.M. and Schwarz, N. (1996) Thinking
Marsden, P.V. (2003) ‘Interviewer effects in measuring About Answers: The Application of Cognitive Processes to
network size using a single name generator’, Social Survey Methodology. San Francisco: Jossey-Bass.
Networks, 25(1): 1–16. Tourangeau, R., Rips, L.J. and Rasinski, K. (2000) The
Marsden, P.V. (2005) ‘Recent developments in network Psychology of Survey Response. New York: Cambridge
measurement’, in Peter J. Carrington, John Scott, and University Press.
Stanley Wasserman (eds), Models and Methods in Social Turner, R.J. and Marino, F. (1994) ‘Social support and social
Network Analysis. New York: Cambridge University Press. structure: A descriptive epidemiology’, Journal of Health
pp. 8–30. and Social Behavior, 35(3): 193–212.
Matzat, U. and Snijders, C. (2010) ‘Does the online collection Van der Gaag, M. and Snijders, T.A.B. (2005) ‘The resource
of ego-centered network data reduce data quality?’ Social generator: Social capital quantification with concrete
Networks, 32(2): 105–11. items’, Social Networks, 27(1): 1–29.

5605-Scott-Chap25.indd 387 4/6/2011 7:21:17 PM


388 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Van der Gaag, M., Snijders, T.A.B. and Flap, H. (2008) White, K. and Watkins, S.C. (2000) ‘Accuracy, stability, and
‘Position generator measures and their relationship to reciprocity in informal conversational networks in rural
other social capital measures’, in Nan Lin and Bonnie H. Kenya’, Social Networks, 22(4): 337–55.
Erickson (eds), Social Capital: An International Research Wills, T.A. and Shinar, O. (2000) ‘Measuring perceived and
Program. New York: Oxford University Press. pp. 28–48. received social support’, in Sheldon Cohen, Lynn G.
Van der Poel, M.G.M. (1993) ‘Delineating personal support Underwood, and Benjamin H. Gottlieb (eds), Social Support
networks’, Social Networks, 15(1): 49–70. Measurement and Intervention. New York: Oxford
Van Tilburg, T. (1998) ‘Interviewer effects in the measurement University Press. pp. 86–135.
of personal network size’, Sociological Methods and Woodhouse, D.E., Potterat, J.J., Rothenberg, R.B.,
Research, 26(3): 300–328. Darrow, W.W., Klovdahl, A.S. and Muth, S.Q. (1995)
Vehovar, V., Lozar Manfreda, K., Koren, G. and Hlebec, V. ‘Ethical and legal issues in social network research:
(2008) ‘Measuring ego-centered social networks on the The real and the ideal’, in Richard H. Needle, Susan L.
Web’, Social Networks, 30(3): 213–22. Coyle, Sander G. Genser, and Robert T. Trotter (eds),
Wellman, B. (1979) ‘The community question: The intimate Social Networks, Drug Abuse, and HIV Transmission.
networks of East Yorkers’, American Journal of Sociology, Rockville, MD: National Institute on Drug Abuse.
84(5): 1201–31. pp. 131–43.

5605-Scott-Chap25.indd 388 4/6/2011 7:21:17 PM


26
Survey Sampling
in Networks
Ove Frank

INTRODUCTION Interest in surveys of populations with a


relational structure started in the 1960s when
Network structures appear in many different areas: social scientists could combine mathematical tools
social relations between individuals, economic from graph theory with efficient numerical
transactions, spread of infections, behavioural algorithms and new calculation possibilities made
patterns among children, co-offending activities available by the rapid development of computer
of offenders, links between Internet sites and technology. Sampling in graphs was independ-
so forth. Data collected in an investigation of a ently studied in early articles by Goodman (1961),
particular network are normally confined to only Proctor (1967), Stephan (1969), Frank (1969),
partial information about the network. Special Capobianco (1970) and Sirken (1970) and in two
statistical methodology is being developed monographs by Bloemena (1964) and Frank
both for modelling networks, for planning (1971). Later Granovetter (1976) and Morgan
and designing network investigations, and for and Rytina (1977) also saw the need for network
analysing network data and drawing appropriate sampling, and many methodological results on
conclusions. The role of survey sampling in this network surveys and estimation were published in
connection is the topic of the present chapter. the 1970s. Further references are given in Frank
Survey sampling in ordinary populations (1977, 1980, 1981, 1987) and Proctor (1979).
developed largely in the 1930s from a need to Graph theory is an old combinatorial branch
improve the quality of opinion polls and make of mathematics. The theory of random graphs
more reliable predictions of election results. By is an expanding vivid area of modern graph
using probabilistic sampling designs the sampling theory, which was initiated by Erdös and Renyi
variation could be quantified and a technical (1959, 1960). There are many books on graphs
meaning could be given to such concepts as and random graphs. Some advanced mathematical
likelihood of different values on an unknown books are by Bollobas (2001), Diestel (2005)
population quantity and confidence attached to and Janson et al. (2000). The literature on
error estimates of sample quantities. It became random graphs is mainly devoted to asymptotic
possible to calculate the effects of larger sample results for large graphs. The simple structure of
sizes and weight desired levels of confidence a Bernoulli graph on n vertices with an edge
against sampling costs. The investigator should probability p = p(n) depending on n exhibits
stratify the population according to factors surprisingly many intrinsic asymptotic results.
of importance and implement a controlled proba- Random graphs with a specified degree distribu-
bilistic sampling design. Modern methods of tion are the objects of much contemporary
survey design in ordinary populations are described research. The World Wide Web as described by
by Särndal et al. (1992), Cassel et al. (1993), Bonato (2008) contributes to an interest in models
Thompson (1997) and Mukhopadhyay (2001). for very large graphs.

5605-Scott-Chap26.indd 389 4/7/2011 4:55:16 PM


390 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The next two sections define basic concepts in Sampling designs in finite
survey sampling and introduce network structures populations
of attributive and relational data. In particular, the
distinction between local and global network Let U be a finite population of N observational
properties is pointed out because it is fundamental units, and let x be a variable defined on U with
for the possibility to draw inference from network values in R. The subset of units with x(u) = r is
sample data. Inference for global properties denoted by Ur and its size by Nr for values r in R.
requires that sample data are supplemented by a The relative frequencies Pr = Nr/N of different
network model. A review of some statistical values among the population units define the
network models serves the purpose of introducing population distribution (Pr)R = (Pr : rER).
various statistics that are useful in network Sample units u1, . . . , un selected with equal
analysis. This rather comprehensive preparation is probabilities and with replacement from U pro-
followed by presentations of various network vide sample values x1, . . . , xn that are i.i.d. obser-
sampling designs and demonstrations of statistical vations on a random variable with probability
estimation based on available sample data. The distribution equal to the population distribution.
focus is on principles for constructing estimators If nr is the number of observations with xi =
with different kinds of data. Special emphasis is x(ui) = r for i = 1, . . . , n, then (nr)R = (nr : rER) is
given to snowball and walk sampling designs, multinomially distributed with parameters n and
which are discussed in separate sections. (Pr)R. It follows that nr /n is an unbiased estimator
of Pr for r in R.
If the sample units are selected with equal
probabilities and without replacement, (nr)R is
hypergeometrically distributed with parameters n
SURVEY SAMPLING and (Nr)R. Again nr /n is an unbiased estimator
of Pr for r in R.
If the sample units are selected with probabili-
Data and samples ties ( pu)U and with replacement, then (nr)R is
A common data structure consists of n independ- multinomially distributed with parameters n and
ent observations x1, . . . , xn on a univariate or (p(Ur))R where p(Ur) is the sum of the probabili-
multivariate variable that takes values in some ties pu for u in Ur. Now nr/n is an unbiased estima-
range space R. The space R can be finite or tor of p(Ur), and this probability is generally
infinite. The standard model assumption is to not equal to the population frequency Pr. In fact,
consider the observations as realisations of n p(Ur) = Pr if and only if the average selection
independent identically distributed (i.i.d.) random probability among the Nr units in Ur is 1/N. Such
variables. The relative frequencies of observations a case is the uniform selection distribution consid-
in different regions of R or at different values ered above, which has pu = 1/N for all u in U.
in R can be used as estimates of probabilities Other selection distributions with p(Ur) = Pr
assigned to regions or values in R. However, the cannot be designed when Nr is unknown.
interpretation of these probabilities might be If we assume that the range space R consists of
problematic if the observations are selected with positive real numbers and that units are selected
different probabilities at different population units. with probabilities that are proportional to their
Such selection would imply that the observed values on the x-variable, say pu = cr for some
relative frequencies are not reflecting the relative constant c and for u in Ur, then p(Ur) = crNr. Since
frequencies in the population of values from these probabilities sum to 1 it follows that c =
which the observations are sampled. This is 1/ΣrrNr. Now the ratio between the expected values
the concern of survey sampling theory, and it is
of special importance in network surveys in E(nr /r) = ncNr
which there might be compelling reasons to
believe that selection probabilities vary for the and
units sampled.
Survey sampling is often designed so that the E Σr(nr /r) = ncN
selection probabilities vary in convenient ways.
Sometimes the design is not controlled by is equal to the relative population frequency Pr so
the investigator but is rather an effect of the that the ratio
observation process. In such cases, probabilistic
modelling of the observation process might be (nr /r)/Σr(nr /r)
appropriate. Network surveys can benefit from
both controlled and modelled sampling designs as can be used for estimating Pr for r in R. This
will be illustrated in this chapter. estimator is asymptotically unbiased for

5605-Scott-Chap26.indd 390 4/7/2011 4:55:16 PM


SURVEY SAMPLING IN NETWORKS 391

large populations. The estimator can also be Using the sample multiplicities and the
expressed as sample inclusion indicators, two unbiased
estimators of the population frequency Nr are
(nr /r)/Σr(nr /r) = hnr /rn given by

where Nr’ = Σu [mu I(uEUr)/Emu]


= Σu [mu I(uEUr)/npu]
h = n/Σr(nr /r) = n/Σi(1/xi)
and
is the harmonic mean of the observations. This
illustrates that when the sampling design is not
simple uniform random sampling, the relative Nr’’ = Σu [Su I(uEUr)/ESu]
sample frequencies nr /n have to be adjusted = Σu [Su I(uEUr)/(1–(1–pu)n)]
to provide estimators of the relative population
frequencies. The adjustment factor in this case Even if N is known it might be preferable to use
is h/r. We also notice that the population mean N’ = Σr Nr’ and N’’ = Σr Nr’’ to estimate Pr
value by Nr’/N’ and Nr’’/N’’. In particular, uniform
sampling with pu = 1/N for u in U implies that
Σux(u)/N = ΣrrPr Nr’ = Nnr/n and

is estimated by Nr’’ = dr /[1–(1–1/N)n].

Σr(rhnr /rn) = h, Therefore Nr’/N = nr /n and Nr’’/N can be used as


unbiased estimators and Nr’’/N’’ = dr /d as an
which is just the harmonic mean value of the asymptotically unbiased estimator of the relative
sample observations. This value is generally population frequency Pr for r in R. Generally
smaller than the arithmetic mean value Σixi /n of estimators based on distinct units are preferable
the observations. By using the harmonic mean we to those involving multiplicities.
compensate for selection that is biased towards
large values of the variable.
When the sample units are selected with
probabilities (pu)U and with replacement, the Super-populations
same unit u can be drawn several times. Let (mu)U
be the multiplicities When the population values x(u) for u in U are
considered as fixed and appropriately summarized
mu = Σi I(ui = u) by the population distribution (Pr)R, inference
uncertainty is entirely due to sampling variation.
for u in U. It follows that (mu)U is multinomially Measurement errors, nonresponse, and other
distributed with parameters n and ( pu)U. The sources of uncertainty have to be modelled. In the
sample frequencies survey sampling literature the so-called super-
population modelling is a tool that allows for
nr = Σu mu I(uEUr) uncertainty in the population values. The popula-
tion values x(u) are modelled as realisations of
for r in R are also multinomially distributed with i.i.d. random variables over data range space R
parameters n and p(Ur) for r in R as noted above. with a theoretical probability distribution that
If we let Su = I(mu > 0) indicate whether unit u is is specified by some unknown multivariate
included in the sample, the numbers of distinct parameter q. The focus for inference could then be
sample units in Ur and U are given by shifted from the realized population distribution to
the super-population described by q, which is
dr = Σu Su I(uEUr) assumed to have generated the population values.
There is also an intermediate approach that is
and d = Σrdr. The indicators Su are dependent called model-assisted inference. Without actually
Bernoulli variables with assuming more than that the super-population is a
rough model of the population and without focus-
ESu = 1– (1–pu)n ing on q, the model is only used for deducing
presumptively interesting summary measures of
and the population. Design-based inference on
such measures could then contribute to improved
Cov(Su,Sv) = (1–pu–pv)n – (1–pu)n(1–pv)n for u ≠ v. population knowledge.

5605-Scott-Chap26.indd 391 4/7/2011 4:55:16 PM


392 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

NETWORKS Global properties like connectivity, distance, and


clustering are not captured by counts of local
properties. Therefore, a probabilistic modelling
Graphs and networks complement to a probabilistic sampling design is
Graphs used in social network analysis may have often indispensable in order to gain information
variables defined on vertices or edges. The values about special global network properties.
can be categorical or numerical. Vertex variables Generally, the population network can be seen
can specify properties of the individuals, as in as a data point in the range space
conventional social data analysis. A graph with a
categorical vertex variable is sometimes described R = R1NR2N(N–1)
by a vertex-coloured graph. A graph with varia-
bles defined on the edges is called a valued graph. and a general random network corresponds to a
For instance, edge variables can specify strength probability distribution over R. A meaningful
or intensity of contacts between individuals. specification has to substantially reduce the
When there are several variables defined on the dimensionality or the degrees of freedom of that
vertices and edges of a graph, and the focus distribution. Needless to say, such modelling must
of interest is on interrelationships between the contain a multivariate parameter q, capturing
variables, one often speaks of the valued graph as properties of interest. The network model
a network. Large networks with many vertices and specified by q generates the vertex and edge
complicated structure are of interest in numerous values of the network as realisations of random
applications. Statistical inference on various variables. Thus, a super-population network is a
properties of the network is then normally based random network with dependence between its
on partial knowledge obtained from sample vertex and edge values reflecting as much as
information collected in the network. The network possible of what is known about the population
provides possibilities to vary sampling designs by network. This is in contrast to the super-
selecting sample units and observation units in population approach in ordinary survey sampling
many different ways. Structural and composi- where population values are generated by i.i.d.
tional properties of the network might also imply random variables. Network modelling can be
that observations made in the network are obtained considered as an extension of time series model-
by selection procedures that are not controlled by ling that could apply to a network consisting of a
the investigator. The tools of survey sampling single chain or path. Stochastic lattices and
theory with controlled sampling designs and random fields are examples of random structures
model-based or model-assisted estimators can be that are of interest in network modelling.
adapted to network surveys.

Network models
Local versus global network
properties The combination of probabilistic sampling designs
with probabilistic population models is sometimes
Consider a finite population network with N units useful even if the model is rather coarse and does
taken as the vertices in the network. There are N not capture more than some rough structural
vertex values x(u) in a range space R1, and tendencies in the network. The benefit of the
N(N –1) edge values y(u,v) in a range space R2 for model is that it might suggest essential network
u ≠ v. The frequency distributions of the vertex statistics that could serve as important population
and edge values describe the composition of the parameters and be estimated by design-based
network but are not sufficient to give an appropri- methods. The models might also be useful as
ate description of its structural properties. Various “base-line” models for testing specific properties
summary measures of structural properties of the network.
are given by the dyad counts specifying how the Random directed graphs with independent
N(N–1)/2 unordered pairs of vertices are distrib- dyads and categorical vertex and edge variables
uted in R12R22, and by the triad counts specifying are used as models for different kinds of social
how the N(N–1)(N–2)/6 unordered triples of structure. Holland and Leinhardt (1970, 1975,
vertices are distributed in R13R26. Counts of higher 1981) and Frank (1981) are early methodological
order include star counts specifying how the papers. The textbook by Wasserman and Faust
k-stars are distributed in R1R22k or in R1k+1R22k for (1994) provides many references. Wellman et al.
k = 1, 2, . . . . Such counts describe local properties (1991) is an application of survey sampling with a
of the network that are informative of part of its latent categorical vertex variable. Applications
structure like symmetry, transitivity, and isolation. often need exploratory variable selection methods

5605-Scott-Chap26.indd 392 4/7/2011 4:55:17 PM


SURVEY SAMPLING IN NETWORKS 393

to choose appropriate vertex and edge variables K-categorical blockmodel with independent
for the dyad statistics. A cluster analysis technique dyads has (2K + 1)K nonisomorphic dyads and
for dyad selection is used by Frank et al. (1985b) (3K + 1)K/2 degrees of freedom. Sufficient
and Frank et al. (1985a). General formulae for statistics are given by the corresponding dyad
nonisomorphic dyads and triads when there are counts.
categorical vertex and edge variables are given by Dyad independence in blockmodels has been
Frank (1988). Blockmodels are investigated by studied in many different varieties. The vertex
Snijders and Nowicki (1997) and Nowicki and variable could be treated as having known or
Snijders (2001). unknown fixed values. The values could also
Markov graphs were introduced by Frank and be considered as the outcomes of i.i.d. vertex
Strauss (1986). Further work on Markov graphs is variables specified by a common probability
given by Robins (1998) and Robins and Pattison distribution on the K categories, thereby adding
(2005). Generalisations to exponential models K–1 degrees of freedom to the model. The
with arbitrary structural statistics are treated in K-categorical blockmodel has
many recent papers. Some references are
Wasserman and Pattison (1996), Pattison and 4K(8K2 + 3K + 1)/3
Wasserman (1998), Wasserman and Robins
(2005), and Snijders et al. (2006). An important triad counts that can be compared with their
estimation technique for exponential models is estimated expected counts obtained by using the
described by Snijders (2002). Further references dyad counts. Goodness of fit can be judged
on current trends in statistical network surveys can after agglomeration of counts corresponding to
also be found in theses by Corander (2000), expected frequencies that are too small.
Hagberg (2003), Jansson (1997), Karlberg (1997), An alternative nonhomogeneous dyad inde-
Koskinen (2004), Schweinberger (2007), Spreen pendence model reflecting local network structure
(1999), Tallberg (2003), and in several contribu- assumes that the dyad probabilities depend
tions to the edited volumes by Brandes and on effects for in-degree, out-degree, and local
Erlebach (2005), Carrington et al. (2005), Hagberg mutuality at its incident vertices. This leads to a
(2002), and Meyers (2009). structural dyad independence model with 3N – 1
degrees of freedom and sufficient statistics given
by the in-degrees, out-degrees, and number of
two-cycles at each vertex. This is the same number
Network statistics of degrees of freedom as in the blockmodel with
K around (2N)1/2. The classic Holland-Leinhardt
The classical Bernoulli graph is a model that model is a further simplification of this structural
captures only the edge density of the graph by its dyad independence model that assumes that
single parameter p. A blockmodel variant that uses the local mutuality effects are the same for all
different edge probabilities within and between K vertices. This leads to a model with 2N degrees of
blocks of vertices assumes that there is a freedom and sufficient statistics given by the total
K-categorical vertex variable affecting the occur- number of two-cycles (mutual edges) and the
rence of edges. This leads to a model with in-degree and out-degree at each vertex. The
K(K + 1)/2 parameters conditional on the vertex Holland-Leinhardt model has the same number of
variables. If the vertex values are generated as degrees of freedom as a blockmodel with K
independent outcomes of a K-categorical random around (4N/3)1/2.
variable, K – 1 more parameters are added to the Markov models for undirected graphs have
model. The Bernoulli blockmodel has K(K + 1) sufficient statistics given by the number of edges,
sufficient statistics given by the dyad counts. The the numbers of m-stars for m = 2, . . . , N – 1, and
appropriateness of the Bernoulli blockmodel can the number of triangles. An equivalent set of
be judged by comparing the 2K(K + 1)(2K + 1)/3 sufficient statistics is obtained by replacing the
triad counts with their estimated expected values edge and star counts by the degree distribution.
according to the dyad counts. Thus, the degree distribution and the triangle
For a directed graph a simple model has i.i.d. count are sufficient statistics under homogeneity
dyads, and the dyad probabilities are estimated and Markov dependence. It is interesting to
by the relative dyad counts. Using these estimates note that if we confine the statistics for the
we can compare the triad counts with their degree distribution to its mean and variance, this
estimated expected values and judge the useful- is equivalent to keeping the counts of edges,
ness of the homogeneous dyad independence two-stars, and triangles only and putting all the
model. If the fit is poor, an alternative might be a parameters for three-stars and larger stars equal
nonhomogeneous dyad independence model, to zero. Equivalently, the four triad counts are
which allows vertex-specific parameters. A directed sufficient statistics in this case.

5605-Scott-Chap26.indd 393 4/7/2011 4:55:17 PM


394 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Markov models for homogeneous directed illustrated with examples. Various estimation
graphs have sufficient statistics given by counts of principles that could be convenient for long walks
edges, mutual edges and various types of triangles and multiwave snowballs are also discussed. It
and stars. An equivalent set of sufficient statistics should be noted that the estimation methods for
is the triangle counts and the trivariate degree general vertex sampling designs discussed in this
distribution that counts vertices according to their section also apply to walk sampling and snowball
numbers of in-edges, out-edges, and mutual edges. sampling.
A natural simplification restricts the statistics to
means, variances and covariances of the trivariate
degree distribution. These nine statistics together
with the seven triangle counts yield a model with Vertex sampling
16 degrees of freedom that seems not to have
received the attention it deserves. The triangle Let V be a finite vertex set of N vertices, and
counts and the moments of the trivariate degree let (u1, . . . , un) be a sample sequence of vertices
distribution are all population totals that are selected from V according to a specified probabil-
easily estimated from sample data by design- istic design. Let S be the set of distinct vertices
based estimators as demonstrated in the following contained in the sample sequence. Inclusion
section. probabilities according to the sampling design are
In general exponential models the sufficient denoted by
statistics are chosen to reflect those structural
properties in the network that seem important to P(vES) = π(v), P(uES & vES) = π(u, v), . . .
control. Thus the properties are not derived from a
specified dependence structure in the adjacency and so forth for vertices u, v, . . . in V. In particular,
matrix. Therefore the sufficient statistics can be π(v, v) = π(v). If the sequence (u1, . . . , un) is drawn
adjusted to any available structural statistics. uniformly at random without replacement
Much research has been devoted to numerical
methods for handling estimation and testing for π(v) = n/N and π(u, v) = n(n – 1)/N(N – 1)
general exponential models.
for u ≠ v. If the sequence is drawn with replace-
ment and with probability pv for vEV, where
Σvpv = 1, the inclusion probabilities are
NETWORK SAMPLING DESIGNS
AND DATA π(u) = 1 – (1 – pu)n and π(u, v) = 1 – (1 – pu)n
– (1 – pv)n + (1 – pu – pv)n

General overview for u ≠ v. In particular, uniform random sampling


with replacement has inclusion probabilities
There are many different designs for data collec-
tion in a network. The sampling units can be
π(u) = 1 – (1 – 1/N )n and π(u, v)
vertices, pairs of vertices, edges, walks, stars or
other subgraphs, and the data observed can be = 1 – 2 (1 – 1/N )n + (1 – 2/N)n
vertex and edge values related to the sampling
units in different ways. for u ≠ v. The two uniform sampling designs are
If we take the sampling units to be vertices, examples of homogeneous designs that have
then a common data set consists of observations inclusion probabilities of any k distinct vertices
on vertex values and edge values in the subgraph v1, . . . , vk depending on their number k only,
induced by the vertex sample. Another data
structure consists of edge values for all edges that π(v1, . . . , vk) = πk
are incident to any of the sampled vertices. Such
data on an induced subgraph and on incident stars for k = 1, 2, . . . . A third example of a homogene-
generated by a vertex sample are considered in ous design is Bernoulli( p) sampling. According to
this section. Different vertex sampling designs this design the units in V are independently
and estimation methods are treated. Other designs selected for S with a common probability p. The
using several sampling stages in the network three homogeneous designs mentioned have
are walk sampling and snowball sampling.
Such designs and data collected from them are πk = n(k)/N(k) (without replacement)
considered in separate sections later in this πk = Σj = 0, . . . ,k (–1) j (k( j)/j!)(1 – j/N)n
chapter. Specific design possibilities are encoun- (with replacement)
tered for walks and snowballs, and they are πk = pk (Bernoulli)

5605-Scott-Chap26.indd 394 4/7/2011 4:55:17 PM


SURVEY SAMPLING IN NETWORKS 395

for K = 1, 2, . . . . A general Bernoulli design is Unbiased estimators of T1 and T2 are given by


also of interest. For each vertex v it is independ-
ently decided whether v is selected for S with T1’ = Σv [xvSv /π(v)]
a specified probability π(v) strictly between 0
and 1. Thus and

π(u, v) = π(u)π(v) T2’ = ΣΣu ≠ v[yuvSuSv/π(u,v)],

for u ≠ v, and so forth for several distinct where Sv = I(vES) are indicator variables. Define
vertices.
zuv = yuvSuSv/π(u,v)

for u ≠ v and
Data on an induced subgraph
and estimation of totals zvv = xvSv/π(v).
Assume that the data obtained from the vertex It follows that
sample S consist of the vertex and edge values in
the subgraph induced by S. Thus, xu for u in S and Z = T1’ + T2’
yuv for distinct u and v in S are observed. The
population has vertex value total and
T1 = Σuxu VarZ = VarT1’ + VarT2’ + 2Cov(T1’, T2’),
and edge value total where VarZ is a sum of 15 sub-sums correspond-
ing to the classes Ck and their subclasses. Writing
T2 = ΣΣu ≠ v yuv. out all sub-sums we get
In order to estimate these population totals it is VarT1’ = Σvxv2[1 – π(v)]/π(v) + ΣΣu ≠ v xuxv
convenient to consider a general total [π(u,v)–π(u)π(v)]/π(u)π(v),
Z = ΣuΣvzuv VarT2’ = ΣΣu ≠ v yuv(yuv + yvu)[1 – π(u,v)]/π(u,v) +
ΣΣΣ ≠ (yuv + yvu)(yuw + ywu)[π(u,v,w)
where the N2 terms are random variables with – π(u,v)π(u,w)]/π(u,v)π(u,w) +
expected values ΣΣΣΣ ≠ yuvyu’v’[π(u,v,u’,v’) – π(u,v)
π(u’,v’)]/π(u,v)π(u’,v’),
Ezuv = µuv Cov(T1’,T2’) = ΣΣu ≠ v xu(yuv + yvu)[1 – π(u)]/π(u) +
ΣΣΣ ≠ xuyvw[π(u,v,w) – π(u)
and covariances π(v,w)]/π(u) π(v,w).

Cov(zuv, zu’v’) = σuvu’v’. In particular, for homogenous sampling designs


the formulae simplify to
To handle the N4 terms in
VarT1’ = Σvxv2(1 – π1)/π1 + ΣΣu ≠ v xuxv(π2–π12)/π12,
VarZ = ΣΣΣΣσuvu’v’ VarT2’ = ΣΣu ≠ v yuv(yuv + yvu)(1 – π2)/π2 +
ΣΣΣ ≠ (yuv + yvu)(yuw + ywu)(π3 – π22)/π22
the sequences in V4 are separated into four classes + ΣΣΣΣ ≠ yuvyu’v’(π4–π22)/π22,
C1, . . . , C4 where Ck consists of sequences Cov(T1’,T2’) = ΣΣu ≠ v xu(yuv + yvu)(1 – π1)/π1
(u, v, u’, v’) with k distinct vertices for k = 1, . . . , 4. + ΣΣΣ ≠ xuyvw(π3 – π1π2)/π1π2.
The sequences in C2 are further separated into
seven classes corresponding to (u,u,u,v), (u,u,v,u), Both for a general sampling design and for a
(u,v,u,u), (v,u,u,u), (u,u,v,v), (u,v,u,v), (u,v,v,u) homogeneous design the variances and covari-
for distinct u and v, and the sequences in C3 ances depend on further population quantities than
are further separated into six classes correspond- just T1 and T2. In order to estimate those we notice
ing to (u,u,v,w), (u,v,u,w), (u,v,w,u), (v,u,u,w), that they are all totals over V, V(2), V(3) or V(4) and
(v,u,w,u), (v,w,u,u) for distinct u, v, and w. It can therefore be estimated in a similar way as
follows that C1 has N sequences, C2 has 7N(2) the totals T1 and T2. In general, totals over V(k)
sequences, C3 has 6N(3) sequences, and C4 has N(4) are estimated by totals over S(k) with the terms
sequences. modified by dividing them with the appropriate

5605-Scott-Chap26.indd 395 4/7/2011 4:55:17 PM


396 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

inclusion probabilities. In the homogeneous case vertex u in S is given by ΣvyuvSv and the degree
this is simply πk. For instance, Cov(T1’,T2’) has an distribution within S is given by
unbiased estimator
nk = Σu Su I(Σv yuvSv = k)
[Cov(T1’,T2’)]’ =
ΣΣu ≠ v xu(yuv + yvu)SuSv[1 – π(u)]/π(u)π(u,v) + for k = 0, . . . , n – 1, where n = ΣuSu is the size
ΣΣΣ ≠ xuyvwSuSvSw[π(u,v,w) – π(u)π(v,w)]/ of S. Let
π(u) π(v,w)π(u,v,w),
mk = Σj jknj = ΣuSu(ΣvyuvSv)k
which in the homogeneous case simplifies to

[Cov(T1’, T2’)]’ = ΣΣu ≠ v xu(yuv + yvu)SuSv(1 – π1)/ be the kth moment of the degree distribution
π1π2 + ΣΣΣ ≠ xuyvwSuSvSw (π3 – π1π2)/π1π2π3. within S. In particular, the first two sample
moments are
Arbitrary population counts, like dyad counts,
triad counts, as well as more general totals of m1 = ΣuSu(ΣvyuvSv) = ΣuΣvyuvSuSv
subgraph values, can be handled by this estima-
tion technique. and

m2 = ΣuSu(ΣvyuvSv)2 = ΣuΣvΣwyuvyuwSuSvSw.
Estimation of degree distributions
In order to estimate the population moments
An undirected graph on the population V = {1, . . . ,N}
is given by its adjacency matrix y = (yuv) with
yuv = yvu and yvv = 0 for u and v in V. The degrees are M1 = Σuyu = ΣΣ yuv
yu = Σvyuv and the degree distribution is given by
and
Nk = ΣuI(yu = k)
M2 = Σuyu2 = ΣΣΣ yuvyuw = M1 + ΣΣΣv ≠ wyuvyuw,
for k = 0, . . . , N – 1. Let
the general technique for estimating totals yields
Mk = Σj = 0, . . . ,N – 1 jkNj = Σuyuk the unbiased estimators

be the kth moment of the degree distribution M1’ = ΣΣ yuvSuSv/π(u,v)


for k = 1, 2, . . . . In particular, the first two
moments are and
M1 = Σuyu = ΣΣ yuv M2’ = ΣΣΣ yuvyuwSuSvSw /π(u,v,w)
= M1’ + ΣΣΣv ≠ wyuvyuwSuSvSw /π(u,v,w).
and
For homogeneous sampling designs the estimators
M2 = Σuyu2 = ΣΣΣ yuvyuw,
simplify to
and the mean and variance of the degree
distribution are given by M1’ = ΣΣ yuvSuSv /π2 = m1/π2

µ = M1/N and

and M2’ = M1’ + ΣΣΣv ≠ wyuvyuwSuSvSw/π3


= m1/π2 + (m2 – m1)/π3
σ2 = M2/N – M12/N2
The same technique provides unbiased or
Consider a probabilistic sampling design with asymptotically unbiased estimators of M12, µ,
vertex sample S and sample inclusion indicators and σ2, as well as unbiased or asymptotically
Su = I(uES). The inclusion probabilities are unbiased estimators of their variances. For
instance, with homogeneous sampling designs,
E Su = π(u), E SuSv = π(u,v), etc. the mean and variance of the degree distribution
are estimated by
Assume that data obtained consist of the
subgraph induced by S. The degree within S of a µ’ = m1/Nπ2

5605-Scott-Chap26.indd 396 4/7/2011 4:55:17 PM


SURVEY SAMPLING IN NETWORKS 397

and By assuming Nk = 0 for k ≥ n a triangular equation


system is obtained that can be solved for Nk in terms
(σ2)’ = [m1/π2 + (m2 – m1)/π3]/N – [2m1/π2 of E nj for j = k, . . . , n – 1 and k = 0, . . . , n – 1.
+ 4(m2 – m1)/π3 + (m12 + 2m1 – 4m2)/π4]/N2. Substituting nj for E nj, the estimators of Nk are
formally given by
An unbiased estimator of N is given by N’ = n/π1,
and an unbiased estimator of N2 is given by Nk’ = Σj = k, . . . , n – 1 (nj/p) b(k; j, 1/p)
(N2)’ = n(n – 1)/π2 + n/π1.
Let us now consider the estimation of the for k = 0, . . . , n – 1.
different population frequencies Nk of vertices of
degree k for k = 0, . . . , N – 1. The degree distribu-
tion within the sample is available to estimate the
degree distribution in the population. Consider a Data on stars obtained from
sample obtained by uniform random sampling a vertex sample
without replacement. The sample degree ΣvyuvSv
has a conditional hypergeometric distribution with Assume that the data obtained from the vertex
parameters (n – 1, k, N – 1) if Su = 1 and yu = k. sample S consist of the vertex values xu for u in S
The hypergeometric probabilities are defined by and the edge values yuv for u in S and v in V. As
before yvv = 0. Thus, the edge values of the stars
centred at the sampled vertices are observed
⎛ k⎞ ⎛ N − 1 − k⎞ ⎛ N − 1⎞ together with the vertex values at the star centres
h( j; n – 1, k, N – 1) = ⎜ ⎟ ⎜
⎝ j ⎠ ⎝ n − 1 − j ⎠⎟ ⎝⎜ n − 1 ⎠⎟ only. The vertex value total T1 of the population
can be estimated exactly as in the case with
induced subgraph data treated before. For the edge
and they satisfy value total T2 of the population, better estimates
can now be obtained because more edge data are
h( j; n – 1, k, N – 1) = h( j; k, n – 1, N – 1) available.
Let yu = Σvyuv so that T2 = Σuyu. Thus, the
for j = 0, . . . , min(k, n – 1). It follows that the formulae for estimators, variances, and variance
frequency nj of sample vertices with sample estimators can be copied from those for T1 with
degree j has the expected value vertex values xu replaced by vertex degrees yu. The
covariance between the two estimators T1’ and T2’
E nj = Σk=j, . . . , N – 1 (n /N)Nkh( j; n – 1, k, N – 1) can be handled by the same technique. We find
that
for j = 0, . . . , k. This is a linear equation system
that is underdetermined unless we impose further Cov(T1’, T2’) = ΣΣ xuyv[π(u, v) – π(u)π(v)]/π(u)
restrictions. It should be natural to assume that π(v) = Σvxvyv[1 – π(v)]/π(v) + ΣΣ ≠ xuyv
Nk = 0 for k ≥ n, which means that the sample [π(u, v) – π(u)π(v)]/π(u)π(v),
size is larger than the maximum degree in the
population. This leads to a triangular equation and an unbiased covariance estimator is given by
system, which can be solved to give Nk/N as
linear functions of E nj/n for j = k, . . . , n – 1 and [Cov(T1’, T2’)]’ = Σv xvyvSv[1 – π(v)]/π(v)2
k = 0, . . . , n – 1. By substituting nj for E nj in these + ΣΣ ≠ xuyvSuSv[π(u,v) – π(u)π(v)]/π(u)π(v)
solutions we get unbiased estimators Nk’ for Nk. π(u, v).
They can be formally expressed as
For a homogeneous sampling design the
Nk’/N = Σj = k, . . . , n – 1 (nj/n) h(k; j, N – 1, n – 1) formulae simplify to

for k = 0, . . . , n – 1. Cov(T1’, T2’) = Σvxvyv(1 – π1)/π1 + ΣΣ ≠


Now assume that the sample S is selected xuyv(π2 – π12)/π12
according to a Bernoulli( p) design. Conditional
on Su = 1 and yu = k, the sample degree is for the covariance and
binomial(k, p), and it follows that
[Cov(T1’, T2’)]’ = ΣvxvyvSv(1 – π1)/π12 + ΣΣ ≠
E nj = Σk = j, . . . , n – 1 pNk b( j; k, p) xuyvSuSv(π2 – π12)/π12π2
for j = 0, . . . , n – 1, where for the covariance estimator.
Degree distributions can be estimated from star
( j) j k–j
b( j; k, p) = (k / j!)p (1 – p) . data simply by summing inverted inclusion

5605-Scott-Chap26.indd 397 4/7/2011 4:55:17 PM


398 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

probabilities for all star centres of degree k to get in V and k = 1, 2, . . . . The k-wave snowball is
an unbiased estimator of Nk: given by the union Sk = Sk – 1 UWk for k = 1, 2,. . . .
The waves are disjoint and satisfy
Nk’ = Σu Su I(yu = k)/π(u).
Wk = Sk – Sk – 1,

and
SNOWBALL SAMPLING
Sk = W0 U . . . U Wk
Background
for k = 1, 2,. . . . If all vertices adjacent after Wk
Statistical problems for snowball sampling are have already been sampled in earlier waves, the
considered by Frank (1977, 1979) and Thompson snowballing stops at stage k and Sk is called a
and Frank (2000). Frank and Snijders (1994) use saturated snowball. The snowballing process is
snowball sampling to estimate the size of a hidden then said to have reached an absorbing state. The
population. Sudman and Kalton (1986) and snowballing process (Sk: k = 0, 1, . . .) evolves as
Salganik and Heckathorn (2004) discuss hidden a stochastic process with a two-step memory.
population surveys and respondent-driven sam- The probability distribution of Sk conditional
pling. Thompson (2006) treats walk sampling. on (S0, . . . , Sk – 1) depends on Sk – 1 and Wk – 1 =
Network surveys might lack a clear distinction Sk – 1 – Sk –2 , that is on Sk – 1 and Sk – 2 only, for
between design-based and model-based statistical k = 2, 3, . . . . Because any two among the three
inference. However, inclusion probabilities and sets Sk, Wk + 1, Sk + 1 suffice to determine all three,
other tools from survey sampling can be useful an alternative and equivalent way to look at the
even though they need to be estimated. An illus- snowballing process is to consider the kth state of
tration of this is given by Frank and Carrington the process to consist of the pair (Sk, Wk) of the
(2007) in a study of criminal co-offenders, which current snowball and its last wave. The snowball-
shows the power of network survey methods for ing process [(Sk, Wk): k = 1,2, . . .] is a Markov
handling dark figures in statistics on offenders and chain with transition probabilities
offences.
P(Sk + 1, Wk + 1 | Sk, Wk) = P(Wk + 1 | Sk, Wk)

Basic definitions and results for Sk + 1 = Sk U Wk + 1. The Markov chain is


assumed to be time-homogeneous so that the tran-
Snowball sampling proceeds by successively sition probabilities do not depend on the stage
joining so-called sample waves to the current parameter k. This means that the wave Wk + 1 is
snowball sample. An initial sample S0 of vertices selected according to a design that conditional on
is first selected from V = {1, . . . , N} according to (Sk, Wk) depends on yuv for u in Wk and v in V – Sk
an arbitrary sampling design. The first wave W1 is but not on k. If we denote the set of relevant
selected according to a probability sampling adjacency indicators by
design over the class of subsets of the nonsampled
vertices that are adjacent after the initial sample. yk = y(Wk , V – Sk) =
Thus, W1 is a subset of {(u, v, yuv) : uEWk & vEV – Sk}

(V – S0) ∩ A(S0) = it follows that the transition probabilities can be


{vEV: S0v = 0 & maxuS0uyuv = 1} written

where S0v = I(vES0) for v in V. The union of the P(Wk + 1 | Sk, Wk) = P(Wk + 1 | yk)
initial sample and the first wave is the one-wave
snowball S1 = S0UW1. Generally, the kth wave Wk and the marginal distribution of the k-wave
is selected according to a probability sampling snowball equals
design over the class of subsets of the nonsampled
vertices that are adjacent after the last wave. Thus, P(Sk) =
Wk is a subset of Σ . . . Σ P(W0)P(W1 | y0) . . . P(Wk | yk – 1)

(V – Sk – 1) ∩ A(Wk – 1) = where the summation is over all disjoint waves


{vEV: Sk – 1, v = 0 & maxuWk – 1, uyuv = 1} W0, . . . ,Wk with union Sk. The initial sample
S0 = W0 and each new wave needs to contain at
for k = 1, 2, . . . with S0 = W0. Indicator variables least one vertex so that Sk contains at least k + 1
are denoted Skv = I(vESk) and Wkv = I(vEWk) for v vertices. If Sk contains more vertices, the sum

5605-Scott-Chap26.indd 398 4/7/2011 4:55:17 PM


SURVEY SAMPLING IN NETWORKS 399

contains one term for each possible distribution of recruitment parameters that could be specified by
these vertices among the waves. Usually we do at most K1K2 basic parameters as above.
not need to determine the selection probabilities In order to determine the selection probabilities
for the snowballs but only their low-order of the k-wave snowball Sk extensive numerical
inclusion probabilities. The probability of inclu- calculation is required. However, usually it is
sion of vertex v in Sk equals sufficient to determine inclusion probabilities of
low order to set up estimators and their variance
E Skv = E W0v + . . . + E Wkv estimators. The inclusion probabilities of the
initial sample and of the first and second waves
since the waves are disjoint, and inclusions in can suffice to set up simple estimators, which can
different waves are mutually exclusive events. We be extended by Rao-Blackwellisation to new
shall return to the determination of inclusion estimators based on all available snowball data.
probabilities for snowball samples after the Rao-Blackwellisation, however, is also a compu-
introduction of a convenient snowballing process ter-intensive endeavour.
in the next section.

Inclusion probabilities
Designing recruitments
Assume that the initial sample S0 has inclusion
A convenient model for snowball sampling is a probabilities π0v > 0 for v in V and that the recruit-
general Bernoulli design for independent recruit- ments are made by general Bernoulli designs for
ments of new vertices. At each new sampled the waves as described above. Let sample, wave,
vertex u the vertices v adjacent after u are inde- and recruitment indicators be denoted by
pendently recruited for the next wave with a
probability puv, where 0 < puv < 1 if yuv = 1, and Skv = I(vESk), Wkv = I(vEWk)
puv = 0 of yuv = 0. A simple example is puv = pyuv and zuv = I(u recruits v)
with 0 < p < 1, but these basic recruitment proba-
bilities should preferably be modelled as some To find the inclusion probabilities
function of latent or observable vertex properties.
For instance, it might be possible to set up E Skv = πkv, E Wkv = πkv – πk – 1, v
puv = f(au , bv) where au and bv are categorical and E SkvSkw = πkvw
vertex variables with K1 recruitment activity levels
and K2 recruitment attraction levels, respectively. for k = 1, 2, . . . consider the following relation,
Thus, each vertex belongs to one of at most K1K2 which explains that v is included in Sk + 1 if it is
categories and the activity of u and the attraction either included in Sk or recruited by at least one
of v determines the recruitment probability if vertex in the last wave Wk:
yuv = 1. With such a model there are at most K1K2
basic recruitment parameters. Sk + 1, v = Skv + (1 – Skv) maxu Wku zuv
According to a general Bernoulli design for
the recruitments, it follows that the transition Conditionally on (Sk, Wk), the indicators Sk + 1, v are
probabilities for the snowballing process are independent for different v in V and their expected
given by values are equal to

P(Wk + 1 | Sk, Wk) = P(Wk + 1 | yk) = p(Wk, Wk + 1) E(Sk + 1, v | Sk, Wk) = Skv + (1 – Skv)p(Wk, v)
q(Wk, V – Sk + 1)
where, as before,
where
p(Wk, v) = 1 – q(Wk, v) = 1 – ∏u(1 – Wkupuv)
p(A, B) = ∏vEB p(A, v) = ∏vEB [1 – q(A, v)]
It follows that the first and second order
is the probability that every vertex in B is recruited inclusion probabilities are given by
by at least one vertex in A, and
πk + 1, v = 1 – E[(1 – Skv)q(Wk, v)]
q(A, B) = ∏vEB q(A, v) = ∏uEA, vEBquv
and, for distinct v and w,
is the probability that no vertex in B is recruited by
any vertex in A, for arbitrary subsets A πk + 1, vw = πk + 1, v + πk + 1, w – 1 + E[(1 – Skv)
and B of V. Here quv = 1 – yuvpuv and puv are the (1 – Skw)q(Wk, v)q(Wk, w)].

5605-Scott-Chap26.indd 399 4/7/2011 4:55:17 PM


400 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Using a first order approximation select it according to the stationary distribution


( pv)V that satisfies pv = Σu puPuv for v in V and
(1 – Skv)q(Wk, v) = 1 – Skv – ΣuWkupuv Σv pv = 1.
The Markov chain should be irreducible and
in these equations leads to the following aperiodic. This means for undirected graphs that
approximations for the inclusion probabilities the graph should be connected and contain at least
one cycle of length one or three. For directed
πk + 1, v = πkv + Σu(πku – πk – 1, u)puv graphs, strong connectedness is required and all
cycles must not have lengths that are multiples of
and a common factor two or larger. An irreducible and
aperiodic time-homogeneous Markov chain has a
πk + 1, vw = πk + 1, v – πkv + πk + 1, w – πkw unique limiting distribution
+ πkvw – Σu(πku – πk – 1, u)(1 – quvquw)
P(un = v | u1 = u)
for k = 1, 2, . . . and distinct v and w. The initial
values needed for these recursions are given by for increasing n that is independent of u and
the inclusion probabilities π0v and π0vw = π0v π0w positive for all v in V. The limiting distribution
of the initial sample and the exact values of the is equal to the stationary distribution ( pv)V.
inclusion probabilities If the graph is undirected and transitions
are made with equal probabilities to all adjacent
π1v = 1 – ∏u(1 – π0u puv) vertices, then

and Puv = yuv /yu

π1vw = π1v + π1w – 1 + ∏u[1 – π0u(1 – quvquw)] where yu = Σvyuv is the degree of vertex u. It
follows that the stationary distribution is equal to
of the one-wave snowball. Here, pvv = 1 for
v in V. pv = yv / Σuyu

for v = 1, . . . , N. Thus, a uniform distribution


for the transitions implies that the limiting distri-
bution is proportional to the degrees.
WALK SAMPLING If the first sampled vertex u1 is selected accord-
ing to the stationary distribution, it follows that
Basic definitions and results the marginal distribution of any vertex uk in
the sample sequence also equals the stationary
A special case of snowball sampling that selects distribution. With an arbitrary fixed initial vertex
only one further vertex at each selection stage is u1 or an initial vertex selected according to a
called walk sampling. It is convenient if many distribution different from the stationary distribu-
one-unit waves can be selected instead of a few tion, the distribution of un asymptotically
larger waves. Walk sampling provides benefits in approaches the stationary distribution as the
terms of simplified analysis and more versatile sample size n increases. According to ergodic
design possibilities. Recent investigations of the theory, it also follows that the empirical distribu-
World Wide Web and in particular its page ranks tion of the sample sequence (u1, . . . , un) converges
have used walk sampling. Walk sampling seems to to the stationary distribution as n tends to infinity.
have potential for social network analysis carried More precisely, if
out in large data banks or on the Internet.
Consider a random walk sampling on vertex set mv = ΣiI(ui = v)
V = {1, . . . , N} in a graph with adjacency matrix
( yuv). The sample sequence (u1, u2, . . .) is succes- is the multiplicity of vertex v in the sample
sively selected according to a time-homogeneous sequence, then (m1/n, . . . , mN/n) converges
Markov chain with transition probabilities in distribution to the limiting distribution
( p1, . . . , pN) given by the stationary distribution.
P(uk + 1 = v | uk = u) = Puv, The stationary distribution is useful for the
scaling of estimators of vertex value totals and
where Puv is independent of the stage parameter k, edge value totals. For instance, a vertex value total
ΣvPuv = 1 for u in V, and Puv = 0 if and only if T1 = Σvxv has an estimator
yuv = 0. The initial vertex u1 can be arbitrarily
selected but if it is possible it is preferable to T1’ = ΣiΣv (xv /pv) I(ui = v)

5605-Scott-Chap26.indd 400 4/7/2011 4:55:17 PM


SURVEY SAMPLING IN NETWORKS 401

that is unbiased if the initial vertex is selected for v in V. If Q is defined by


according to the stationary distribution. Otherwise
it is asymptotically unbiased. Similarly, an edge Quv = min(Puv, qvPvu/qu)
value total T2 = ΣΣ ≠ yuv has an estimator
for u ≠ v, and
T2’ = Σi = 1, . . . , n – 1 ΣΣ ≠ (yuv/puPuv) I(ui = u & ui + 1 = v).
Quu = 1–Σv ≠ u Quv,
The sample sequence (u1, . . . , un) obtained from
a random walk sample can sometimes be reduced it follows that Q satisfies the reversibility
to the set S of distinct vertices in the sequence. condition. In fact,
It is required that repeated vertices in the
sample sequence can be identified. For instance, quQuv = min(quPuv, qvPvu) = qvQvu
data collected for ui = v should comprise the
identity of v. An estimator of T1 based on S can for u ≠ v.
be given as If the walk at stage k is in position uk = u, the
next transition is determined in two steps. First, a
T1’’ = ΣvES [xv /π(v)], transition trial according to P is made. It would be
to v with probability Puv but in a second step it is
where the inclusion probability π(v) = P(mv > 0) accepted with a probability Quv /Puv and rejected
is the probability that vertex v is included in with a probability 1 – Quv /Puv. Thus, after the
the sample sequence. To estimate an edge value second step the transition either goes to v with
total T2 from data based on S, we need inclusion probability Quv or is forced to stay at u for another
probabilities transition trial according to P. The investigator has
to be able to decide whether to accept or reject a
π(u,v) = P(mu > 0 & mv > 0). transition. Therefore, the acceptance probability

Unless the walk sample sequence is very short, Quv /Puv = min(1, qvPvu /quPuv)
it might be difficult to calculate the inclusion
probabilities. For long walk sample sequences, it must be known, and it must be judged whether
is preferable to keep the sample sequence with the probability Pvu of a return to u from the next
multiplicities and use the limiting stationary suggested position v is smaller than quPuv/qv.
distribution to adjust sample data. As an illustration of this procedure, we
consider a directed graph with out-degrees
au = Σvyuv and equal transition probabilities

Designing the limiting distribution Puv = yuv /au


The stationary limiting distribution is fundamental
for all vertices adjacent after u. It might be
for drawing inference from random walk samples.
difficult to find the stationary distribution. Assume
Therefore, it is important that it is possible to
that it is desired to adjust the transition probabili-
design the walk sampling to obtain any preas-
ties so that its stationary distribution has probabil-
signed limiting distribution. This is achieved by
ities proportional to the out-degrees:
modifying the transition probabilities P = (Puv)
determined by the population graph.
qu = au/(a1 + . . . + aN).
In order to obtain an arbitrary specified limiting
distribution q = (q1, . . . , qN), the transitions
According to the formula above, the modified
according to P cannot be applied without a special
transition probabilities should be equal to
checking by the investigator. Trial transitions
according to P should be accepted or rejected.
Quv = min( yuv/au, qvyvu /avqu) = yuvyvu/au
To specify a rule for accepting a transition from
u to v, we consider new transition probabilities
for u ≠ v. This means that a transition from u to v
Q = (Quv), satisfying a reversibility condition
is accepted if and only if there are mutual edges
between u and v. The investigator must be able to
quQuv = qvQvu verify mutuality.
As another example, assume that the desired
for all u and v in V. The stationary distribution stationary distribution should have probabilities
according to Q is given by q since by reversibility proportional to in-degrees bu = Σvyvu. With

ΣuquQuv = ΣuqvQvu = qv qu = bu/(b1 + . . . + bN)

5605-Scott-Chap26.indd 401 4/7/2011 4:55:17 PM


402 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

it follows that the transition probabilities should Erdös, P. and Renyi, A. (1960) ‘On the evolution of random
be modified for u ≠ v to graphs’, Publ. Math. Inst. Hungar. Acad. Sci., 5: 17–61.
Frank, O. (1969) ‘Structure inference and stochastic graphs’,
Quv = min(yuv/au, qvyvu/avqu) = (yuvyvu/au) Swedish Research Institute of National Defence FOA-
min(1, rv /ru), Reports, 3(6): 1–10.
Frank, O. (1971) ‘Statistical inference in graphs’, PhD disserta-
where ru = bu/au is the in-degree to out-degree tion, Stockholm University, Stockholm.
ratio of vertex u in V. This means that a transition Frank, O. (1977) ’Survey sampling in graphs’, Journal of
from u to v is accepted to mutual contacts with a Statistical Planning and Inference, 1: 235–64.
probability min(1, rv/ru). A vertex v with mutual Frank, O. (1979) ‘Estimation of population totals by use of
edges to u is always accepted if it has rv ≥ ru; snowball samples’, in P. Holland and S. Leinhardt (eds),
otherwise, it is accepted with probability rv/ru. Perspectives on Social Network Research. New York:
Now the investigator needs to be able to verify Academic Press. pp. 319–47.
mutuality and to calculate the ratio ru at the Frank, O. (1980) ‘Estimation of the number of vertices of
sampled vertices. For instance, the investigator different degrees in a graph’, Journal of Statistical Planning
might observe both in- and out-degrees at the and Inference, 4: 45–50.
sampled vertices. Frank, O. (1981) ‘A survey of statistical methods for graph
Finally, consider how a uniform limiting analysis’, in S. Leinhardt (ed.), Sociological Methodology –
distribution qv = 1/N for v in V can be obtained. 1981. San Francisco: Jossey-Bass. pp. 110–55.
The transition probabilities should be equal to Frank, O. (1987) ‘Random sampling and social networks – a
survey of various approaches’, Mathematique, Informatique
et Sciences Humaines, 26(104): 19–33.
Quv = min(Puv, Pvu) = (yuvyvu /au) min(1, au/av)
Frank, O. (1988) ‘Triad count statistics’, Discrete Mathematics,
72: 141–49.
for u ≠ v. Again only transitions to mutual contacts Frank, O. and Carrington, P.C. (2007) ’Estimation of offending
are allowed. Those v with an out-degree smaller and co-offending using available data with model support’,
than that of u are always accepted. Others are Journal of Mathematical Sociology, 31: 1–46.
accepted with probability au/av. The investigator Frank, O., Hallinan, M. and Nowicki, K. (1985a) ‘Clustering
should be able to verify mutuality and observe of dyad distributions as a tool in network modelling’,
out-degrees at the sampled vertices. Journal of Mathematical Sociology, 11: 47–64.
Frank, O., Komanska, H. and Widaman, K. (1985b) ‘Cluster
analysis of dyad distributions in networks’, Journal of
Classification, 2: 219–38.
REFERENCES Frank, O. and Snijders, T. (1994) ‘Estimating the size of hidden
populations using snowball sampling’, Journal of Official
Bloemena, A.R. (1964) Sampling from a Graph. Amsterdam: Statistics, 10: 53–67.
Mathematical Centre Tracts. Frank, O. and Strauss, D. (1986) ‘Markov graphs’, Journal of
Bollobas, B. (2001) Random Graphs. Cambridge: Cambridge the American Statistical Association, 81: 832–42.
University Press. Goodman, L.A. (1961) ‘Snowball sampling’, Annals of
Bonato, A. (2008) A Course on the Web Graph. Providence, Mathematical Statistics, 32: 148–70.
RI: American Mathematical Society. Granovetter, M. (1976) ‘Network sampling: Some first steps’,
Brandes, U. and Erlebach, T. (eds) (2005) Network Analysis. American Journal of Sociology, 81: 1287–303.
Berlin: Springer Verlag. Hagberg, J. (ed.) (2002) Contributions to Social Network
Capobianco, M. (1970) ‘Statistical inference in finite popula- Analysis, Information Theory and Other Topics in Statistics.
tions having structure’, Transactions of the New York A Festschrift in Honour of Ove Frank on the Occasion of His
Academy of Science, 32: 401–13. 65th Birthday. Stockholm: Dept. of Statistics, Stockholm
Carrington, P.J., Scott, J. and Wasserman, S. (eds) (2005) University.
Models and Methods in Social Network Analysis. Hagberg, J. (2003) ‘On degree variance in random graphs’,
Cambridge: Cambridge University Press. PhD dissertation, Stockholm University, Stockholm.
Cassel, C.M., Särndal, C.E. and Wretman, J. (1993) Foundations Holland, P.W. and Leinhardt, S. (1970) ‘A method for detect-
of Inference in Survey Sampling. Malabar, FL: Krieger ing structure in sociometric data’, American Journal of
Publ. Comp. Sociology, 76: 492–513.
Corander, J. (2000) ‘On Bayesian graphical model Holland, P.W. and Leinhardt, S. (1975) ‘Local structure in
determination’. PhD dissertation, Stockholm University, social networks’, in D. Heise (ed.), Sociological Methodology.
Stockholm. San Francisco: Jossey-Bass. pp. 1–45.
Diestel, R. (2005) Graph Theory. New York: Springer Verlag. Holland, P.W. and Leinhardt, S. (1981) ‘An exponential family
Erdös, P. and Renyi, A. (1959) ‘On random graphs. I’, of probability distributions for directed graphs’, Journal of
Publicationes Mathematicae Debrecen, 6: 290–97. the American Statistical Association, 76: 33–65.

5605-Scott-Chap26.indd 402 4/7/2011 4:55:18 PM


SURVEY SAMPLING IN NETWORKS 403

Janson, S., Luczak, T. and Rucinski, A. (2000) Random Schweinberger, M. (2007) ‘Statistical methods for studying the
Graphs. New York: Wiley. evolution of networks and behaviour’, PhD dissertation,
Jansson, I. (1997) ‘On statistical modelling of social networks’, University of Groningen, Groningen.
PhD dissertation, Stockholm University, Stockholm. Sirken, M.G. (1970) ‘Household surveys with multiplicity’,
Karlberg, M. (1997) ‘Triad count estimation and transitivity Journal of the American Statistical Association, 63:
testing in graphs and digraphs’, PhD dissertation, Stockholm 257–66.
University, Stockholm. Snijders, T.A.B. (2002) ‘Markov chain Monte Carlo estimation
Koskinen, J. (2004) ‘Essays on Bayesian inference for social of exponential random graph models’, Journal of Social
networks’, PhD dissertation, Stockholm University, Structure, 3(2).
Stockholm. Snijders, T.A.B. and Nowicki, K. (1997) ‘Estimation and pre-
Meyers, R. (ed.) (2009) Encyclopaedia of Complexity and diction of stochastic blockmodels for graphs with latent
Systems Science. New York: Springer Verlag. block structure’, Journal of Classification, 14: 75–100.
Morgan, D.L. and Rytina, S. (1977) ‘Comment on “Network Snijders, T.A.B., Pattison, P., Robins, G.L. and Handcock, M.
sampling: Some first steps, by M Granovetter”’, American (2006) ‘New specifications for exponential random graph
Journal of Sociology, 83: 722–27. models’, Sociological Methodology, 36(1): 99–153.
Mukhopadhyay, P. (2001) Topics in Survey Sampling. Spreen, M. (1999) ‘Sampling personal network structures:
New York: Springer Verlag. Statistical inference in Ego-graphs’, PhD dissertation,
Nowicki, K. and Snijders, T.A.B. (2001) ‘Estimation and University of Groningen, Groningen.
prediction for stochastic blockstructures’, Journal of the Stephan, F.F. (1969) ‘Three extensions of sample survey
American Statistical Association, 96: 1077–87. technique’, in N.L. Johnson and H. Smith Jr. (eds), New
Pattison, P. and Wasserman, S. (1998) ‘Logit models and Developments in Survey Sampling. New York: Wiley.
logistic regressions for social networks. II: Multivariate Sudman, S. and Kalton, G. (1986) ‘New developments in the
relations’, British Journal of Mathematical and Statistical sampling of special populations’, Annual Review of
Psychology, 52: 169–93. Sociology, 12: 401–29.
Proctor, C.H. (1967) ‘The variance of an estimate of linkage Tallberg, C. (2003) ‘Bayesian and other statistical approaches
density from a simple random sample of graph nodes’, for analyzing network block-structures’, PhD dissertation,
Proceedings of the Social Statistics Section of the American Stockholm University, Stockholm.
Statistical Association, 342–43. Thompson, M.E. (1997) Theory of Sample Surveys. London:
Proctor, C.H. (1979) ‘Graph sampling compared to Chapman & Hall.
conventional sampling’, in P.W. Holland and S. Leinhardt Thompson, S.K. (2006) ‘Targeted random walk designs’,
(eds), Perspective on Social Network Research. New York: Survey Methodology, 32: 11–24.
Academic Press. pp. 301–18. Thompson, S. and Frank, O. (2000) ‘Model-based estimation
Robins, G.L. (1998) ‘Personal attitudes in inter-personal with link-tracing sampling designs’, Survey Methodology,
contexts: Statistical models for individual characteristics 26: 87–98.
and social relationships’, PhD dissertation, University of Wasserman, S. and Faust, K. (1994) Social Network Analysis.
Melbourne, Melbourne. Cambridge: Cambridge University Press.
Robins, G.L. and Pattison, P. (2005) ‘Interdependencies and Wasserman, S. and Pattison, P. (1996) ‘Logit models and logistic
social processes: Dependence graphs and generalized regressions for social networks. I: An introduction to Markov
dependence structures’, in P.J. Carrington, J. Scott and random graphs and p*’, Psychometrika, 60: 401–26.
S. Wasserman (eds), Models and Methods in Social Wasserman, S. and Robins, G.L. (2005) ‘An introduction
Network Analysis. Cambridge: Cambridge University Press. to random graphs, dependence graphs, and p*’, in
pp. 192–214. P.J. Carrington, J. Scott and S. Wasserman (eds), Models
Salganik, M.J. and Heckathorn, D.D. (2004) ‘Sampling and and Methods in Social Network Analysis. Cambridge:
estimation in hidden populations using respondent-driven Cambridge University Press. pp 148–61.
sampling’, Sociological Methodology, 34: 193–239. Wellman, B., Frank, O., Espinoza, V., Lundquist, S. and
Särndal, C.E., Swensson, B. and Wretman, J. (1992) Model Wilson, C. (1991) ‘Integrating individual, relational and
Assisted Survey Sampling. New York: Springer Verlag. structural analysis’, Social Networks, 13: 223–49.

5605-Scott-Chap26.indd 403 4/7/2011 4:55:18 PM


27
Qualitative Approaches
Betina Hollstein

INTRODUCTION explicate the problem of agency, linkages between


network structure and network actors, as well as
From the outset, network research has made use of questions relating to the constitution and dynam-
qualitative data, less structured approaches to data ics of social networks. The most fruitful results
collection, and interpretive methods in describing are achieved when qualitative methods, more
and analyzing social networks. In the 1950s and standardized methods used to describe network
1960s, British social anthropologists conducted structures, as well as quantitative methods are
ethnographic community studies on class struc- employed in concert.
tures in small Norwegian island parishes (Barnes, The following chapter gives an overview
1954), networks in Central African towns of qualitative approaches and methods used in
(Mitchell, 1969), and also personal networks in studying social networks. It gives a systematic
their own country (Bott, 1957). Roethlisberger account of the contributions of qualitative
and Dickson’s (1939) seminal study of the Western methods to social network research, illustrating
Electric Company, a pathbreaking contribution to them with empirical studies from a variety of
organization research, adopted an explorative, research fields.
interpretive, and inductive approach geared toward First, however, we must determine more
openness and responsiveness for what was precisely what we mean when speaking of qualita-
happening in the work teams under study. Besides tive research and qualitative data.
experiments, they mostly relied on participant
observation at the workplace and nondirective
interviewing. The concepts developed in these
studies became important points of reference in QUALITATIVE APPROACHES
network research, for instance, density (Mitchell,
1969), cliques and clusters (Barnes, 1969), or the TO SOCIAL REALITY: THE SEARCH
distinction between formal and informal organiza- FOR MEANING
tion (Roethlisberger and Dickson, 1939).
The potential benefits of a qualitative approach When we speak of qualitative methods, we are
in network research, however, are not just limited referring to a heterogeneous research landscape,
to the opportunities for exploring and developing which, due to this variety, is difficult to compre-
new concepts. Qualitative approaches to data hensively account for. Among them are different
collection and analysis are powerful tools, which forms of observation, interviewing techniques
can enrich the study of social networks in substan- with low levels of standardization (such as
tial ways. Among other things, qualitative research open-ended, unstructured interviews, partially or
methods offer special tools for addressing semistructured interviews, guided or narrative
challenges faced in network research, namely to interviews), and the collection of documents or

5605-Scott-Chap27.indd 404 4/13/2011 2:38:01 PM


QUALITATIVE APPROACHES 405

archival data. At the same time, a host of methods (unconscious) meaning and the inner logic of
are used for analysis, which rest on various interaction systems (Oevermann et al., 1979;
theoretical assumptions and methodological cf. Titscher et al., 2000). Finally, ethnomethodol-
positions. Among them are symbolic interaction- ogy is not interested in the thematic content of
ism, sociology of knowledge, phenomenology, meaning (instead, it focuses on the “how” of
ethnomethodology, and constructivism to name action, actors’ sense-making practices, and the
but a few major approaches. Yet, in spite of their formal rules of communication).
differences, those approaches all share some Given the objective of understanding meaning,
common ground, as advocates of the “interpretive the two most important aspects for analysis can be
paradigm” agree on certain ideas about the nature derived: first of all, if something has a “meaning,”
of social reality (Hollstein and Ullrich, 2003). it is understood that such meaning does not exist
First, social reality is not simply given but apart from a context, that is, from a specific frame
constructed. Recall the well-known Thomas of reference. This is the basic idea of contextuality:
theorem, “If men define situations as real, they are one can only understand the meaning of an action
real in their consequences.” Second, social reality and/or an act of expression with reference to the
is shaped by social meaning. Social reality is context of this action or expression. For example, in
always a meaningful reality and, by representing a biographical interview the frame of reference
meaning, refers to a context of action in which (context) would be the entire life history. Second,
actors (deliberately) organize action. Third, social an approach along the lines of a methodically
reality always depends on a certain point of controlled understanding of the other demands the
view or perspective and is therefore tied to social researcher be open to the subject matter and
location. And last, since social reality is negoti- acknowledge that any previous understanding of
ated, it is always dynamic: social reality is a the topic in question is only preliminary: that which
process. In these aspects, one can recognize a is not yet recognized, cannot yet be defined. This
common basis of such different methodological does not suggest handling preconceptions about the
positions as symbolic interactionism, ethnometh- subject matter in a naïve fashion, for instance, by
odology, or phenomenology.1 simply denying the preconceptions’ existence.
Interpretive approaches view these aspects of Rather, an explorative and inductive approach
social reality to be of such key importance that systematically geared toward maintaining openness
they make up an area of social research in its own must start with an explication of one’s own precon-
right that also requires an appropriate methodol- ceptions and commonsense knowledge on the
ogy of its own. The defining feature of qualitative matter of concern. This should occur while at the
methods is the pivotal role assigned the under- same time remaining responsive to the new and
standing of meaning (Sinn-Verstehen). Qualitative unexpected – that is, open toward the object of
research aims to systematically reconstruct such research (Hopf, 1979).
meaning or, in other words, involves what in Certain methodological principles for data col-
German has been coined a methodically control- lection and analysis follow from the objective of
led understanding of the other. Qualitative understanding meaning.2 Open procedures are
approaches emphasize that making sense of action required in collecting data (i.e., in particular, less
and meaning (verbal utterances are also speech structured interviews and observation methods or
acts) always involves understanding the other. In use of documents already available), and data
this respect, they adopt a stance akin to everyday analysis calls for use of interpretive methods.
communication, which also fundamentally relies Applying openness in data collection, above all
on interpretation and understanding ( first-order else, means to design the instrument employed for
constructs) and in this regard is not categorically this purpose in a way that it can cover as broad a
different from the process of understanding data stream as possible. We must take care not to
as applied by the researcher (second-order con- exclude certain data beforehand by the design
structs). As opposed to the objects of research, of our research instruments (i.e., by phrasing
however, the researcher has the privilege of being questions in very general terms, thus avoiding
in a position to reflect upon and reconstruct the suggestive questions, and allowing interviewees to
situation without facing demands to act and being elaborate their own frame of relevance and symbol
forced to do so under the time constraints imposed systems when giving answers). The context of
by the situation. Differences between qualitative meaning should thus be allowed to unfold in as
approaches emerge depending on the conception undistorted a form as possible. Accordingly, any
of “meaning” one adopts and/or the kind of act of expression (be it action, a verbal utterance,
“meaning” that is supposed to be analyzed. For or a written text) that allows inferences about the
example, phenomenology is concerned with context of action, system of meaning, and frame
actors’ subjective perspectives. In contrast, objec- of reference related to the instance of expression
tive hermeneutics aims at reconstructing latent in question is considered qualitative data.

5605-Scott-Chap27.indd 405 4/13/2011 2:38:01 PM


406 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Overall, as one zeroes in on the object of about because they are either entirely new or have
research, a qualitative approach does so in an open yet to be studied. In such cases, qualitative studies
mindset and gradually, inductive and by way are employed to explore new or yet unexplored
of iteration. There are different ways to ensure forms of networks, integration patterns, and
validity and methodically control the fact that network practices, which are then followed up
researchers are bound by their perspectives. For by quantitative, hypothesis-testing forms of inves-
example, theoretical sampling and comparative tigation at a later time. This can involve exploring
analyses, like in grounded theory (Glaser and egocentric networks of certain people or groups of
Strauss, 1967), interpretation and discussion of people, for instance, networks of “corner boys”
the material in groups of researchers, as well as in slums (Whyte, 1955), networks of migrants
the explication and representation of the steps of (Wong and Salaff, 1998; Schütze, 2006), or junior
analyses. Of course, such a stepwise, gradual researchers commuting between continents in
approach to the subject matter does not allow pursuit of their academic careers (Scheibelhofer,
raising claims of representativity. Instead, when 2009). Networks of organizations can be the
making statements that go beyond the sample, objects of such exploration as well, for instance,
detailed theoretical justification has to be provided the effectiveness of community mental health
on the basis of the concrete results and procedure. networks (Provan and Milward, 1995) or the net-
This implies careful consideration of the selectiv- works in which firms are embedded (Uzzi, 1997).
ity of the cases investigated as well as the Finally, entire networks are also explored: net-
sampling criteria applied. works in small villages (Barnes, 1954), in towns
The discussion so far has sought to argue the (Mitchell, 1969), social movements (Broadbent,
case that qualitative methods are especially well 2003; Mische, 2003, 2008), or transnational issue
suited for certain kinds of research questions and networks, their actors, their knowledge practices,
objects of research (Hopf, 1979). In formal respect, and networking activities (Riles, 2000).
new or marginal phenomena fall into this category In many cases, such exploration is only the
or are phenomena that have not yet been studied. first – preparatory – stage leading up to the main
In terms of content, we must distinguish between study, which then follows a quantitative design,
interpretations, relevances, and complex interpre- for instance, when policy networks or networks of
tation systems as well as between structured social research collaborators are initially assessed
entities and interaction systems. The latter are for important topics, events, actors, and types of
made of loose systems of interaction (such as collaboration (Franke and Wald, 2006; Baumgarten
conversations or consultations), group and clique and Lahusen, 2006). The methods of choice
relationships, as well as industrial, state, and other in those cases are typically document research
types of organizations (Hopf, 1979). and expert interviews. Thorough preliminary
studies of a qualitative nature and pretests are in
order especially in quantitative, standardized
research on entire networks. Since such studies
CONTRIBUTIONS OF QUALITATIVE typically require expending huge efforts on
APPROACHES TO NETWORK STUDIES data collection, detailed knowledge of the field
under study is an important precondition for
research to yield rich results (Baumgarten and
Now that we have determined the nature of
Lahusen, 2006).
qualitative methodology let us turn to possible
applications in network research. There are
essentially six areas most suitable for qualitative
research: exploration of networks, network
practices, network orientations and assessments, Network practices
network effects, network dynamics, and the vali-
The concrete acts, practices, interactions, and
dation of network data. These are the areas where
communication patterns in light of the respective
a qualitative approach can hence be expected to
contexts in which they occur – thus what actors
yield the most promising results. They will be
actually do and how they network are other ways
exemplified drawing on empirical case studies
to apply qualitative approaches. What kinds of
from different fields of network research.
exchange patterns characterize the network ties of
immigrants (Menjivar, 2000; Dominguez and
Watkins, 2003) or the ties between entrepreneurial
Exploration of networks firms (Uzzi, 1997)? What do cooperation and
interaction patterns in innovation networks (Franke
First of all, there is the classical field for applying and Wald, 2006; Gluesing et al., forthcoming)
qualitative procedures: issues that one knows little look like? What cultural practices are involved in

5605-Scott-Chap27.indd 406 4/13/2011 2:38:01 PM


QUALITATIVE APPROACHES 407

the “art of networking” among the nobility during Network orientations and
the time of the Italian Renaissance (McLean, assessments
1998), or what are the main conversational
mechanisms in Brazilian youth organizations Qualitative procedures are particularly suitable for
(Mische, 2003, 2008)? collecting data on actor interpretations, individual
In investigating network practices, traditional systems of relevance, and orientations of action.
social anthropological methods are most valuable. This aspect gains relevance in network research
The methods used are mostly observational concerned with actors’ perceptions and assess-
techniques and in-depth interviewing, for ments of the relationships and networks of which
instance, for the study of class structures in small they are a part. Research falling into this category
Norwegian island parishes (Barnes, 1954) or in may address, for instance, how people locate
investigating gossip in Central African social themselves in their social networks, people’s
networks (Epstein, 1969). The Chicago School sense of belonging, or feelings of loneliness, as in
and the Birmingham Centre for Contemporary studies on patterns of integration and network
Cultural Studies applied ethnographic approaches strategies of migrants (Wong and Salaff, 1998;
in research on their own society, especially in Schütze, 2006), commuters (Scheibelhofer, 2009),
studies on the cultural practices of fringe groups members of social movements (Höfer et al.,
and subcultures, for instance, as in William 2006), or the elderly (Schütze and Lang, 1996;
Foote Whyte’s (1955) classic study of the Street Hollstein, 2002). These studies are preoccupied
Corner Society in an Italian slum. Furthermore, with individual perceptions, meanings, orienta-
ethnographic approaches, observation techniques, tions, and strategies involved in personal
and open-ended interviews are also used in networks. Sometimes only certain relationships
research on collaboration and innovation are subjected to qualitative analysis, for instance,
networks, new patterns of work, newly emerging different meanings of friendship (Pahl and
roles, and new meaning within global networking Spencer, 2004). Other studies specifically exam-
organizations (Gluesing et al., forthcoming). ine certain aspects of relationships, for instance,
Ethnographic research also played a key role which ties play a role in parenthood decisions
in observing the modes of discourse, communica- (Keim et al., forthcoming), the significance of
tion patterns, and conversational dynamics emotional closeness (Hollstein, 2002), or what
that Ann Mische, an advocate of relational people mean when they state in the U.S. General
sociology, studied in Brazilian social movements Social Survey that they consult others in
(2003, 2008). “important matters” (Bearman and Parigi, 2004).
Sometimes documents are the main source of Individual perceptions and assessments, however,
information in uncovering cultural practices of not only play a role in personal, egocentric
networking: for instance, in his study on the art networks but also in networks within and between
of networking in the Italian Renaissance, Paul organizations. Research concerned with the
McLean (1998) analyzed several hundreds of functioning and evaluation of research and inno-
private letters through which Florentines sought vation networks (Franke and Wald, 2006) or the
favors from one another. Based on an interaction- assessment of the effectiveness of mental health
ist approach to the presentation of self and systems (Provan and Milward, 1995) belongs in
political culture, he analyzed the strategies this category. In these cases, the respondents are
reflected in these writings that members of this approached as experts of their field of action.
society employed in constructing network ties Their perception of their environment (context of
with patrons and in building their own careers. action) is shaped by their specific social position.
“Network work” can also be approached by They define problems and objectives, assign
reconstructing types of actors. This, for example, relevance, and pursue strategies accordingly.
is how Engelbrecht (2006) examined the dynam- Typically, unstructured or semistructured
ics of knowledge in religious networks in a interviews and open-ended questions are used for
phenomenological analysis. Based on in-depth data collection, allowing interviewees to freely
interviews with key members of religious respond in accordance with their own systems of
communities, he differentiates two forms of con- relevance to the greatest possible extent. Of
tact (bridges) among religious networks, the type course, perceptions, systems of relevance, and
he coins “diplomat” and the type referred to as attributions of meaning can also be assessed by
“traveler.” While the diplomat mainly acts as a employing standardized methods of data collec-
mediator, translator, and innovator in the dialogue tion and formal methods of analysis (Krackhardt,
of the religions, the traveler is characterized by 1987; Carley, 1984, 1997). Nevertheless, an open,
spiritual learning that transcends the traditional inductive approach is in order in any research of a
demarcation lines drawn by religious groups and more exploratory nature as well as in cases where
traditions. individual meanings or systems of relevance can

5605-Scott-Chap27.indd 407 4/13/2011 2:38:01 PM


408 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

be expected to vary considerably among respond- problems (e.g., why cooperation between research
ents or where there is reason to suspect teams failed) and about specific contexts and
considerable disparity between respondents’ strategies of action (e.g., framework conditions
perspectives and the system of relevance assumed and patterns of interpretation in the fields of nan-
by the researcher (Hollstein, 2001; Franke and otechnology, astrophysics, and microeconomics;
Wald, 2006). Franke and Wald, 2006). Drawing on ethnographic
Whereas the previous uses are primarily of a fieldwork in entrepreneurial firms, Brian Uzzi
descriptive nature, qualitative approaches can also (1997) identifies characteristics of embedded
be of explanatory value: they can help to uncover interfirm relationships (trust, fine-grained infor-
how networks actually matter (i.e., the effects of mation transfer, and joint problem-solving
networks) and how networks evolve and change arrangements) and explicates the mechanisms by
over time. Here, open, less structured procedures which embeddedness shapes organizational and
of data collection and interpretive approaches in economic outcomes. It is worth noting that the
data analysis are in order in cases where we studies that go beyond thick descriptions (Geertz,
expect context and actor strategies to play a 1973) to explain the impact of networks in terms
crucial role in determining network impact or of Verstehen are always comparative studies.
network composition and network dynamics Generalization of findings and the formulation of
(Provan and Milward, 1995; Mische, 2003; Franke theoretical models that are grounded in data
and Wald, 2006). (Glaser and Strauss, 1967) are achieved by
systematically comparing cases and taking differ-
ent contexts of action into consideration (e.g.,
Provan and Milward, 1995; Franke and Wald,
How networks matter 2006), as well as by careful analysis of (on first
glance) contradictory observations (e.g., Provan
Qualitative approaches not only give insight into and Milward, 1995; Mische, 2003).
how networks work (i.e., the practices of network-
ing), but they can also contribute to a better under-
standing of how networks matter and – in
combination with quantitative approaches – of Understanding network dynamics
what mechanisms and conditions figure in when
producing certain network outcomes. Sandra Apart from the question of how networks
Susan Smith (2005), for instance, examined function, issues related to the formative condi-
job-finding assistance and strategies of activating tions, dynamic processes, and change of networks
social capital among the black urban poor. The pose the greatest theoretical and methodological
in-depth interviews show that people who have challenges for network research (cf. Jansen, 1999;
job-relevant information and some leverage in this Snijders, this volume). This concerns not only
respect are very reluctant to provide job-finding fluctuation or change in networks over time
assistance for the time and emotional energy it but also fluctuation and change in networks in
involves and, in some cases, the risk it may pose physical space (e.g., migrant networks). Qualitative
to one’s own reputation. Other research has social research provides unique means for under-
employed qualitative interviews and participant standing (in the sense of Verstehen) network
observation in the study of assistance practices change: since so far little is still known about the
among poor immigrants (Menjivar, 2000; emergence and change of networks, qualitative
Dominguez and Watkins, 2003), the impact of research frequently serves for purposes of
personal networks on decisions to emigrate (Wong network exploration. Actor orientations and
and Salaff, 1998), and on decisions affecting strategies are a first source of important insights
fertility (Bernardi, 2003; Bernardi et al., 2007), as into network formation and change. However,
well as for the analysis of connections between since network dynamics always involve at least
network position and conversion (Smilde, 2005). two actors, analysis of concrete interaction and
Qualitative interviewing and participant observa- network practices are key to understanding
tion are also used in organization research, for the dynamic side of network development. For
instance, to account for success or failure of example, Uzzi’s (1997) in-depth interviews with
research or innovation networks (Franke and managers of entrepreneurial firms reveal how
Wald, 2006) or to identify conditions for the effec- embedded ties are formed. Embedded ties are
tiveness of mental health systems (Provan and distinct from so-called arm’s-length ties in that
Milward, 1995). The members of organizations the former are defined by special bonds of trust
are considered as experts on the networks of entailing specific competitive advantages.
which they are part. Accordingly, they are inter- Embedded ties are products of third-party referral
viewed about their perceptions and assessments of networks and already existing personal networks;

5605-Scott-Chap27.indd 408 4/13/2011 2:38:01 PM


QUALITATIVE APPROACHES 409

in forging such ties, so-called go-betweens discuss findings with organization members
(persons acting as links between previously uncon- (“reality check”) to ensure that major conclusions
nected actors) play an important mediating role were consistent with members’ understandings of
(Uzzi, 1997). In cases where research on network system operations (Provan and Milward, 1995).
dynamics also seeks to understand connections Second, a systematic, standardized survey to
between network orientations and actual network identify alters and the content of relationships,
changes, longitudinal data on concrete networks, designed to enable comparison, involves consider-
changes in those networks, actor orientations, and able time and effort (Marsden, this volume). For
shifts in such orientations are most suited. The this reason, standardized studies on whole
studies on migrant acculturation by Menjivar networks mostly limit themselves to assessing
(2000) and Schütze (2006) or on socialization and only a few contact and relationship variables and
social integration of young adults by Bidart and asking only about more general relationship
Lavenu (2005) are examples for such research. An patterns. Thus, in research on heterogeneous
interpretive analysis of network change can also groups of actors (such as in policy networks) or
be based on document analysis, as in Crossley’s multiplex relationships, use of open-ended, less
study (2008) of the changing music scene in structured methods of collecting data on certain
Manchester. If the inquiry is concerned with the aspects of network structures can prove to be more
influence of concrete social interaction and actor effective than sole reliance on standardized proce-
practices on network dynamics, observation over dures. In such cases, open-ended questions aiming
lengthy periods of time can be expected to deliver at respondents’ systems of relevance and meaning
the best data basis for this purpose. Gluesing may be more appropriate for capturing the multi-
et al.’s study (forthcoming) of innovation net- dimensional nature of these networks (Baumgarten
works in global teams or Ann Mische’s studies and Lahusen, 2006; Franke and Wald, 2006).
(2003, 2008) of Brazilian youth movements are Third, the “soft” approach employed in qualitative
cases in point. Based on participant observation interviewing sometimes may be the best (or only)
and semistructured interviews, Mische recon- way of obtaining information from certain popula-
structs different conversational mechanisms tions. The advantage of less structured interviews
(identity qualifying, temporal cuing, generality is that in contrast to standardized questionnaires
shifting, and multiple targeting), each of which they to a greater extent resemble “normal
has a different impact on network building and communication.” Moreover, they can easily be
network mobilization depending on institutional adapted to the respective interviewee and the
setting (Mische, 2003, 2008). demands of the situation at hand. This can be cru-
cial for being able to obtain network information
from some populations at all, for instance, because
they are greatly pressed for time (e.g., politicians),
Validation of network data their activities are illegal (e.g., the mafia, drug
and field access addicts), or they are in danger (e.g., human rights
activists under authoritarian regimes). Network
Besides the applications just mentioned, it can be data involve sensitive and sometimes even deli-
worthwhile to complement data from standardized cate data. This is more likely to be the case when
surveys with qualitative data even in studies that such data concern not only ego’s networks but
rely exclusively on the formal procedures of social also relationships among alters.
network analysis in analyzing network data. There
are several advantages in doing so. First of all,
combining data in this way can serve as a strategy
for validating network data. For instance, in their QUALITATIVE STRATEGIES
study of network effectiveness of community
mental health systems, Provan and Milward (1995) FOR DATA COLLECTION AND
employed three qualitative strategies to enhance DATA ANALYSIS
validity of the data and validity of the results:
in-depth meetings with members of the organiza- As demonstrated above, research on social
tions in focus to review questionnaire items networks uses different kinds of qualitative data
and responses to ensure that respondents were and a range of different modes of data collection:
interpreting them as the researcher had intended; observation techniques, various forms of inter-
follow-up by telephone and additional interview- viewing and open-ended questions, as well as
ing to collect missing data and to check data collecting all kinds of documents and archival
that appeared to be inaccurate after comparing material. Different interpretive methods are used
questionnaire responses with field notes; and, in data analysis. Theoretical and methodological
finally, after data were initially analyzed, to points of reference are symbolic interactionism

5605-Scott-Chap27.indd 409 4/13/2011 2:38:01 PM


410 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

(Fine and Kleinman, 1983; Lazega, 1997; McLean, in which all available data are compiled and
1998) and pragmatism (Franke and Wald, 2006), significant actors, relationships, and modes of
relational sociology (Mische, 2008), phenomenol- communication are identified. This is especially
ogy, sociology of knowledge (Engelbrecht, 2006), pertinent in studies concerned with whole net-
and actor-network theory (cf. Mützel, 2009; Knox works in order to be able to determine network
et al., 2006). Because the qualitative methods boundaries (cf. Marsden, 2005), which is a
employed for data collection and data analysis in particularly challenging task in the case of flux
network research are essentially the same as the networks, such as social movements (Diani and
methodology otherwise used in qualitative social McAdam, 2003) or transnational NGO networks
research, the following section will be limited to (Riles, 2000). Initially approaching the field in
providing a cursory overview of qualitative this holistic, ethnographic manner is generally
research strategies as they are put to use in social useful when network research is concerned with
network analysis. For details on individual unfamiliar social worlds (e.g., other cultures) that
methods, the reader may consult the respective the researcher has to first become acquainted with,
literature (e.g., Miles and Huberman, 1984; for instance, in case of organizations (Provan and
Denzin and Lincoln, 2005; Bryman and Burgess, Milward, 1995; Uzzi, 1997; Gluesing et al.,
1999; Bernard 1994, 2000). forthcoming), migrant communities (Menjivar,
2000; Dominguez and Watkins, 2003), or com-
parative cultural analyses (Lonkila and Salmi,
Data collection 2005). Furthermore, such a multisource approach,
drawing on different types and sources of data
Several aspects need to be considered in choosing (e.g., combining participant observation and
the method of data collection. First of all, it needs interviewing), represents a strategy for validating
to be clarified what aspects of social relations will data (e.g., Provan and Milward, 1995; Uzzi, 1997;
be studied and how relations and networks are to Gluesing et al., forthcoming).
be theoretically conceptualized (Marsden, 1990). Of course, the choice of method also involves
A key question in this respect is whether the pragmatic considerations, particularly concerning
research will be concerned with actually existing available time and funding: observation, for
relations (e.g., network practices) or with actors’ instance, is very time-consuming. Archival data,
perceptions of such relations (e.g., network orien- on the other hand, often have the advantage of
tations and assessments). This distinction is being easily accessible and thus economical. And
consequential, inter alia, for issues concerning sometimes there is actually little scope for choice
network effects: “Accurate knowledge of actually of method because only certain data are available,
existing ties is arguably important to the study, for as in McLean’s study of favor-seeking letters from
example, of certain diffusion processes . . . while Florentine nobility during the Renaissance (1998).
perceived ties might be more appropriate for This situation forces the researcher to carefully
studying social influence on attitudes or opinions” consider what kinds of questions and what
(Marsden, 1990: 437). The focus can also be aspects of networks can be tackled in view of the
directed at concrete interaction between actors available data. Accordingly, McLean (1998) in his
when network dynamics are being studied. analysis of letters concentrates on strategies
Besides, such an approach also lends itself to of self-presentation and how actors sought to
research aimed at describing strategies and mobilize social capital through writing letters. In
network orientations at the level of individual general, utmost attention must be paid to the
actors (e.g., McLean, 1998). The decision to use conditions under which data originated. The
observation data or to rely on actor self-reports conditions of origin are the ultimate measure in
(in interviews or in written ego documents) will gauging whether certain data lend themselves to
depend on whether actual behavior or strategies of answering a specific question and thus can be
action and perceptions of relations are at the considered valid (cf. Marsden, 2005).
center of attention.
Explorative research often adopts a holistic,
ethnographic approach marked by utmost open- Observations
ness toward its subject matter and aimed at Observation methods belong to the ethnographer’s
achieving as comprehensive as possible an under- traditional toolkit. In the early days of network
standing of the phenomenon in question. Here, as research, they found most prominent use in social
much data as possible are collected from multiple anthropological studies (e.g., Mitchell, 1969;
sources to shed light on the phenomenon from Epstein, 1969). Today, observation methods
different angles: observation data, documents, are employed in research on social movements
interviews, diaries, and questionnaires. Some (Mische, 2008; Broadbent, 2003), organizations
network studies begin with an exploratory phase (Provan and Milward, 1995; Uzzi, 1997;

5605-Scott-Chap27.indd 410 4/13/2011 2:38:01 PM


QUALITATIVE APPROACHES 411

Gibson, 2005; Häussling, 2006; Gluesing et al., open-ended questions as part of standardized sur-
forthcoming), and ethnic communities (Dominguez veys (e.g., Bearman and Parigi, 2004). Qualitative
and Watkins, 2003; Menjivar, 2000; Smilde, interviews are typically used to complement other
2005). Only rarely does observation data serve as data, particularly observation data, in research on
a main data source, as in Gibson’s (2005) investi- actual behavior (network practices; see above,
gation of the conversation practices of managers e.g., Uzzi, 1997; Gluesing et al., forthcoming).
or Häussling’s study of interaction and network They are the first choice in studying actors’
formation in school classes (2010). For the most networking strategies, network orientations, and
part, observation is used to complement other assessments (thus, the individual significance
data. On the one hand, it serves to access the field attached to and perception of relationships and
(actors, content of relationships, forms of interac- networks). This includes studies of integration
tion). For instance, in social movement research, into personal networks (Höfer et al., 2006;
meetings and gatherings of various groups Schütze, 2006), the impact of networks on life
are attended in order to identify conversation prac- course decisions (Lonkila and Salmi, 2005;
tices, topics, and significant actors (Broadbent, Bernardi et al., 2007), or the assessment of
2003; Mische, 2008). Some researchers shadow networking strategies and network success among
actors, as did Gluesing et al. (forthcoming), who and between networks of organizations (Provan
escorted the members of the innovation team and Milward, 1995; Uzzi, 1997; Franke and Wald,
under study over a number of days to find out who 2006). In addition, open-ended interviews are a
they met, how often, for how long, and useful way of becoming familiar with the field
what topics they talked about. On the other hand, under study (exploration) and for accessing
observation data play an important role in comple- certain populations (politicians, criminals; see
menting and checking data from other sources above). An open-ended approach in inquiring
(e.g., Provan and Milward, 1995; Uzzi, 1997). about significant relationships and relationship
In this vein, Gluesing et al. (forthcoming) content can also be in order for economical
analyzed thousands of emails (documents) and reasons, for instance, when a standardized survey
also face-to-face encounters (observed) in their would be too time-consuming due to the multi-
study, revealing national differences in email plexity of relationships or contents (Franke and
usage. Observation data are considered to be par- Wald, 2006; Baumgarten and Lahusen, 2006).
ticularly reliable3 when actual behavior (that is, Franke and Wald (2006) argue that, as a rule
the content of relationships and modes of of thumb, questions should be designed as open-
communication) is the main concern (cf. Marsden, ended: the more open-ended that questions are,
1990, 2005). Of course, there can be great the less one knows about a phenomenon, and the
variation in the quality of observation data. For more important individual actors’ strategies and
instance, much depends on the window of systems of relevance are, and the greater impact
observation selected (time-sampling; Kashy and context factors can be assumed to have.
Kenny, 1990; cf. Marsden, 2005). To be sure, In case of self-reports, we must bear in mind
repeated observation over extended periods of that utterances (as a matter of perspective) are
time is an appropriate strategy for ensuring good always bound to social location. This can be the
data quality (e.g., Menjivar, 2000; Dominguez and particular focus of research, as is the case in
Watkins, 2003; Mische, 2008; Gluesing et al., research concerned with the individual perception
forthcoming). Yet it is also very time-consuming. of integration into personal networks. However,
Careful attention must further be paid to the in cases when actors are approached as experts on
number and training of research staff involved in specific behavior (e.g., routines, other actors, or
observation, the choice of recording devices relations in organizations), the socially biased
(video, audio), placement of recording devices, as nature of individual perception must be reckoned
well as the mode of transcription. with in the choice of interview partners and the
interpretation of statements. For example, persons
who occupy central positions in networks are more
Interviews knowledgeable about network events compared to
Open-ended interviewing of some kind is persons on the fringes (Krackhardt, 1990). The
employed in almost all of the qualitative studies greater the proximity between persons the more
discussed in this overview: in-depth-interviews accurate are their statements concerning the other
(e.g., Wong and Salaff, 1998; Menjivar, 2000; (Bondonio, 1998). Research has produced an array
Broadbent, 2003; Smith, 2005; Gluesing et al., of findings on factors affecting the accuracy of
forthcoming), narrative interviews (e.g., Hollstein, self-reports; the work in the wake of studies by
2002), focused, thematic, or problem-centered Bernard et al. (1981) are especially noteworthy in
interviews (e.g., Lonkila and Salmi, 2005; Bernardi this respect (cf. the overviews provided in Johnson,
et al., 2007; Scheibelhofer, 2008), but also single, 1994; Marsden, 2005; this volume).

5605-Scott-Chap27.indd 411 4/13/2011 2:38:01 PM


412 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Finally, it must be noted that even the most documents are the key source of data in historical
open and unstructured interviews are typically studies. Examples for network research of this
combined with some form of standardized inquiry, type are McLean’s work on network practices of
especially for obtaining information via name Florentine nobility based on analysis of favor-
generators and name interpreters (Hanneman and seeking letters (1998) or Crossley’s (2008) study
Riddle, Marsden, this volume; e.g., Franke and of the changing music scene in 1970s Manchester
Wald, 2006; Bernardi et al., 2007). Such method based on musicians’ biographies and autobiogra-
triangulation ensures the comparability of data phies, as well as on online resources. Documents
(across cases as well as between certain aspects of represent data “not created expressly for social
an individual case). At the same time, it allows research” (Marsden, 2005: 24). This to an even
making substantive statements about the structure greater extent demands giving close thought to the
of networks that go beyond a merely metaphorical conditions under which the data originated with
reference to the term “network” (cf. Johnson, an eye to the respective research question (see
1994). Network charts are another useful tool above). Data interpretation requires giving consid-
for collecting qualitative data, for instance, on eration to such aspects as motives, purpose, and
egocentric networks (cf. Straus, 2002; McCarty mode of data production, the specific demands
et al., 2007; Hogan et al., 2007). Kahn and posed by the medium, and initiating parties and
Antonucci’s concentric circles (1980) are a good the intended audience.
example of such an instrument. Due to its semi-
standardized design, the instrument also supports
the comparability of cases. Furthermore, the
graphical representation of networks functions as Data analysis
a cognitive aid in describing relationships. It
keeps track of the relationships discussed in In principle, qualitative data can be analyzed
the interview. In qualitative interviews, geared using interpretive as well as formal (quantitative)
toward approaching as close as possible the methods of analysis. The majority of qualitative
systems of relevance and action orientations of studies referred to in this chapter employ grounded
interviewees, mapping networks is a well-suited theory as the method of choice (e.g., Lonkila and
means of facilitating the discussion of relation- Salmi, 2005; Bernardi et al., 2007), often in
ships while it provides a strong stimulus for the conjunction with ethnographic descriptions (e.g.,
production of narratives (e.g., Hollstein, 2002; Provan and Milward, 1995; Uzzi, 1997; Menjivar,
Bernardi et al., 2007). 2000, Broadbent, 2003; Dominguez and Watkins,
2003, Gluesing et al., forthcoming). Yet it needs
to be emphasized that, depending on research
Documents and archival data focus and methodological orientation4 (interac-
In addition to qualitative data obtained through tionist, structuralist, pragmatic, or oriented by
observation and interviewing, various kinds of sociology of knowledge), a range of interpretive
documents can also be put to use in network- methods may qualify as candidates well suited
related inquiry: archival data, newspaper articles, for the analysis of network practices, network
biographies, letters, emails, blogs, etc. The main orientations, and network assessments. Methods
advantage of this type of data is that it is mostly of analysis are frame analysis (e.g., McLean,
easily accessible and available at low cost. In 1998), conversation analysis (e.g., Mische, 2003),
recent years, data offered by computer-mediated various types of interaction analyses (e.g.,
systems have gained increasing importance in Häussling, 2006), narrative analysis (e.g., Uzzi,
network research. Because of the large volume, 1997; Hollstein, 2002), as well as analytical
such data are usually subjected to computerized, procedures based on sociology of knowledge or
more strongly standardized, and formalized phenomenology (e.g., Engelbrecht, 2006).
methods of data mining (see below; on archival However, qualitative data can also be analyzed
records, see Batagelj et al., this volume). In these using quantitative or other methods of a more
cases, documents are mostly the primary data formal nature. Methods of this type applied to
sources. Studies based on interpretive methods of qualitative data are, for instance, methods designed
analysis, on the other hand, generally draw on to analyze texts (transcripts, documents) for
documents only for complementary information. formal structures, such as quantitative content
For instance, newspaper articles, books, archival analysis (Franzosi, 2008), semantic network
material are used in research on political parties analysis (Carley, 1984, 1997), network analysis
and social movements (e.g., Broadbent, 2003; of narratives (e.g., Bearman and Stovel, 2000;
Mische, 2008) or company documents and Smith, 2007), or Galois lattice analysis (e.g.,
company portrayals in company case studies Yeung, 2005; Mische, 2008). Those methods of
(e.g. Gluesing et al., forthcoming). Of course, analysis are to a greater degree standardized, are

5605-Scott-Chap27.indd 412 4/13/2011 2:38:01 PM


QUALITATIVE APPROACHES 413

less interpretive, and in this sense can reduce data composition and the selection of cases (cf. Frank,
complexity. For this reason, they have clear this volume).
advantages when the task is handling large
volumes of data (cf. Bagatelj et al., this volume),
as increasingly is the case in the wake of easier The surplus of mixed method designs
access to large quantities of data via the Internet Mixed method designs open an array of opportu-
as well as ongoing advances in software develop- nities for data analysis (cf. Tashakkori and Teddlie,
ment (cf. Huisman and van Duijn, this volume). 2003; Axinn and Pearce, 2006; Bryman, 2006;
This is not the place to discuss the various Creswell and Plano, 2007). In network research,
methods in detail. Instead, some final considera- this refers, first, to research designs that employ
tions will be devoted to the general strategies both qualitative data as well as standardized
pursued in analyzing qualitative data as observed data used to describe formal properties of
in the qualitative studies touched upon so far. They networks, such as network size, measures of
can be distinguished by the generalizability of their density, centrality, and so on. This specific mode
findings and the claims they can make as to the of data triangulation (Denzin, 1970) is a key
scope of explanation. There is some agreement element in network research in order to make
that systematically combining qualitative with substantive statements about actual networks that
quantitative data and data on network structures range beyond using the term “network” merely in
(so-called mixed method designs) enhances the a metaphorical sense (Johnson, 1994). Relating
explanatory power of analysis. data in this way also has theoretical implications:
since qualitative data comes closer to individual
actors, their systems of relevance (compared
Thick descriptions and typologies to relational data on relationship and network
A common strategy of analyzing qualitative data structures), incorporating qualitative and struc-
is to give a detailed account of individual cases by tural data provides a way of linking theoretical
way of “thick descriptions” (Geertz, 1973) that are perspectives that either focus on structure or
geared toward tracing how actions or events agency (Hollstein, 2001; Häussling, 2006).
unfold and the impact they have in order to make Advocates of a relational sociology have been
them comprehensible (Verstehen) and in this way arguing to that effect since the early 1990s (White,
to explain them. Understanding the individual 1992; Emirbayer and Goodwin, 1994; Mizruchi,
case is the objective and, as such, an “end in 1994). We can thus expect empirical studies along
itself,” as exemplified by Riles’s study on knowl- such lines to also yield theoretically inspiring
edge practices and networking activities in tran- insights.
snational issue networks (2000). In another Moreover, mixed method designs can enhance
strategy, analysis proceeds by systematic com- the explanatory power and generalizability of
parison and abstraction aimed at developing statements. This is the case if, secondly, qualita-
typologies that capture the range of possible vari- tive and quantitative strategies of analysis are
ation that can be expected in a certain field of combined as well (“method-triangulation”;
action. An example is the typology of “traveler” Denzin, 1970). Combining qualitative and quanti-
and “diplomat” developed by Engelbrecht (2006) tative analyses can take very different shapes
to account for the different modes of bridging the depending on the research in question. Quantitative
gap between different religious communities. analyses can provide a general framework for
selecting specific cases for qualitative analysis
(e.g., typical cases, outlier) and for determining
Developing models and theories their significance (in terms of quantity, distribu-
Typologies based on descriptions leave questions tion, relevance, etc.) (mapping; e.g., White, 1961;
unanswered pertaining to the conditions under McLean, 1998; Wong and Salaff, 1998; Hollstein,
which the respective types emerge and the impact 2002). In this way, McLean (1998) maps network-
they have. Generalization of findings and formu- ing strategies of Florentine nobility by using
lation of theoretical models grounded in data multidimensional scaling techniques. Quantitative
(Glaser and Strauss, 1967) require using the analyses not only allow more precisely assessing
respective data for systematically comparing the extent to which certain patterns of action are
cases and contrasting patterns of action and the spread among a certain population. They also help
conditions surrounding them (e.g., Provan and gaining a more complete picture of the conditions
Milward, 1995; Franke and Wald, 2006) as well (institutional settings) under which such patterns
as systematic and careful analysis of (on first have effects (Mische, 2003, 2008). By means of
glance) contradictory findings and outliers (e.g., in-depth interviews about assistance practices
Provan and Milward, 1995; Mische, 2003). This among the black urban poor, Smith (2005), for
also involves careful consideration of sample example, brings to the fore why people having

5605-Scott-Chap27.indd 413 4/13/2011 2:38:01 PM


414 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

job-relevant information are reluctant to pass which focuses on the latent, unconscious aspects of
such knowledge on to others. She then employs meaning and the logic of action; Oevermann et al.,
quantitative survey data to check for circum- 1979, cf. Titscher et al., 2000) are employed.
stances (strength of ties, socioeconomic status of
neighborhood) that make providing assistance
more or less likely. In other research, quantitative
and qualitative approaches are used simultane- REFERENCES
ously and are more strongly integrated (e.g.,
Häussling, 2006; Bernardi et al., 2007; Gluesing Axinn, W.G. and Pearce, L.D. (2006) Mixed Method Data
et al., forthcoming), for instance, by applying Collection. Cambridge: Cambridge University Press.
formal procedures like cross-site display (Miles Barnes, J.A. (1954) ‘Class and committees in a Norwegian
and Huberman, 1984; adopted for network island parish’, Human Relations, 7: 39–58.
research by Uzzi, 1997) or qualitative comparative Barnes, J.A. (1969) ‘Networks and political process’, in
analysis (Ragin, 1987; applied in network research J. Clyde Mitchell (ed.), Social Networks in Urban Situations.
by Smilde, 2005). Analyses of Personal Relationships in Central African Towns.
I believe to have demonstrated that qualitative Manchester: Manchester University Press. pp. 51–77.
approaches have important contributions to Baumgarten, B. and Lahusen, C. (2006) ‘Politiknetzwerke –
make to social network research. Their definite Vorteile und Grundzüge einer qualitativen Analysestrategie’,
strengths lie with exploring networks, validating in Betina Hollstein and Straus, Florian (eds), Qualitative
network data, describing network practices, Netzwerkanalyse. Konzepte, Methoden, Anwendungen.
performing network orientations and assessments, Wiesbaden: VS Verlag für Sozialwissenschaften. pp. 177–199.
and providing insight into network impacts and Bearman, P.S. and Parigi, P. (2004) ‘Cloning headless frogs
dynamics. Combining qualitative and quantitative and other important matters: Conversation topics and
data and analyses promises to yield the most network structure’, Social Forces, 83(2): 535–57.
fruitful results. Bearman, P.S. and Stovel, K. (2000) ‘Becoming a Nazi: A
model for narrative networks’, Poetics, 27(2–3): 69–90.
Bernard, H.R. (1994) Research Methods in Anthropology:
Qualitative and Quantitative Approaches. Thousand Oaks,
NOTES CA: Sage.
Bernard, H.R. (2000) Social Research Methods: Qualitative
For helpful comments on an earlier draft, I am and Quantitative Approaches. 2nd ed. Thousand Oaks,
grateful to Janet Salaff, Stephan Elkins, Laura CA: Sage.
Bernardi, and Werner Rammert. Bernard, H.R., Killworth, P. and Sailer, L. (1981) ‘Summary of
1 Although these approaches share the same research on informant accuracy in network data and on the
basic assumptions, they focus on different aspects reverse small world problem’, Connections, 4(2): 11–25.
in detail. For example, some focus more on the Bernardi, L. (2003) ‘Channels of social influence on
process of action and the construction of reality (like reproduction’, Population Research and Policy Review, 22:
ethnomethodology). Other approaches are more 527–55.
concerned with the results of the construction Bernardi, L., Keim, S. and von der Lippe, H. (2007) ‘Social
processes, that is, the “structures of meaning” (like influence on fertility. A comparative mixed methods study
objective hermeneutics; cf. Titscher et al., 2000). in Eastern and Western Germany’, Journal of Mixed
2 For details on qualitative approaches and Methods Research, 1(1): 23–47.
individual methods, see, for example, the overviews Bidart, C. and Lavenu, P. (2005) ‘Evolutions of personal net-
in Miles and Huberman (1984), Denzin and Lincoln works and life events’, Social Networks, 27(4): 359–376.
(2005), Bryman and Burgess (1999), and Bernard Bondonio, D. (1998) ‘Predictors of accuracy in perceiving
(1994, 2000). informal social networks’, Social Networks, 20: 301–30.
3 In particular, see the seminal studies by Bernard Bott, E. (1957) Family and Social Network. London:
et al. on informant accuracy (1981). For details Tavistock.
about the important debates initiated by these Broadbent, J. (2003) ‘Movement in context: Thick networks
studies, see Johnson (1994); Marsden (1990, 2005, and Japanese environmental protest’, in Mario Diani and
this volume). McAdam, Doug (eds), Social Movements and Networks.
4 Acts of expression can be analyzed for differ- Relational Approaches to Collective Action. Oxford: Oxford
ent layers of meaning, for instance, with regard to an University Press. pp. 204–29.
intended or deliberate meaning but also for latent Bryman, A. (ed.) (2006) Mixed Methods Set. 4 vols. London:
meaning. Depending on the level of meaning tar- Sage.
geted by an analysis, either more phenomenological Bryman, A. and Burgess, R.G. (eds) (1999) Qualitative
approaches (which focus on actor perspectives) or Research. 4 vols. London: Sage.
methods relying on a more in-depth, structural Carley, K. (1984) ‘Extracting culture through textual analysis’,
hermeneutical analysis (like objective hermeneutics, Poetics, 22(4): 291–312.

5605-Scott-Chap27.indd 414 4/13/2011 2:38:01 PM


QUALITATIVE APPROACHES 415

Carley, K. (1997) ‘Network text analysis: The network position network practices and dynamics by mixing ethnography
of concepts’, in Carl W. Roberts (ed.), Text Analysis for the and information technology data’, in Silvia Dominguez and
Social Sciences: Methods for Drawing Statistical Inferences Betina Hollstein (eds), Mixed-Methods in Studying Social
from Texts and Transcripts. Mahwah, NJ: Lawrence Networks.
Erlbaum. pp. 79–100. Häussling, R. (2006) ‘Interaktionen in Organisationen. Ein
Creswell, J.W. and Plano, V.L. (2007) Designing and Conducting Vierebenenkonzept des Methodologischen Relationalismus
Mixed Methods Research. Thousand Oaks: Sage. und dessen empirische Anwendung’. Karlsruhe: Universität
Crossley, N. (2008) ‘The man whose web expanded: Network Karlsruhe.
dynamics in Manchester’s post/punk music scene Häussling, R. (2010) ‘Allocation to Social Positions in
1976–1980’, Poetics, 37(1): 24–49. Class: Interactions and Relationships in First Grade School
Denzin, N.K. and Lincoln, Y.S. (eds) (2005) The SAGE Classes and Their Consequences’, Current Sociology, 58(1):
Handbook of Qualitative Research. 3rd ed. Thousand 119–138.
Oaks, CA: Sage. Höfer, R., Keupp, H. and Straus, F. (2006) ‘Prozesse sozialer
Denzin, N.K. (1970) The Research Act. Chicago: Aldine. Verortung in Szenen und Organisationen – Ein netzwerko-
Diani, M. and McAdam, D. (eds) (2003) Social Movements and rientierter Blick auf traditionale und reflexiv moderne
Networks. Relational Approaches to Collective Action. Engagementformen‘, in Betina Hollstein and Florian
Oxford: Oxford University Press. Straus (eds), Qualitative Netzwerkanalyse. Konzepte,
Dominguez, S. and Watkins, C. (2003) ‘Creating networks for Methoden, Anwendungen. Wiesbaden: VS Verlag für
survival and mobility: Social capital among African- Sozialwissenschaften. pp. 267–95.
American and Latin American low-income mothers’, Social Hogan, B., Carrasco, J.A. and Wellman, B. (2007) ‘Visualizing
Problems, 50(1): 111–35. personal networks: Working with participant-aided socio-
Emirbayer, M. and Goodwin, J. (1994) ‘Network analysis, grams’, Field Methods, 19(2): 116–44.
culture, and the problem of agency’, American Journal of Hollstein, B. (2001) Grenzen sozialer Integration. Zur
Sociology, 99(6), 1411–54. Konzeption informeller Beziehungen und Netzwerke.
Engelbrecht, M. (2006) ‘Netzwerke religiöser Menschen – Opladen: Leske + Budrich.
Die Dynamik von Wissensbeständen und Netzwerken Hollstein, B. (2002) Soziale Netzwerke nach der Verwitwung.
religiöser Traditionen zwischen kollektiver Selbstabgrenzung Eine Rekonstruktion der Veränderungen informeller
und individueller Wahl‘, in Betina Hollstein and Florian Beziehungen. Opladen: Leske + Budrich.
Straus (eds), Qualitative Netzwerkanalyse. Konzepte, Hollstein, B. and Ullrich, C.G. (2003) ‘Einheit trotz Vielfalt?
Methoden, Anwendungen. Wiesbaden: VS Verlag für Zum konstitutiven Kern qualitativer Sozialforschung’,
Sozialwissenschaften. pp. 243–67. Soziologie. Forum der Deutschen Gesellschaft für Soziologie.
Epstein, A.L. (1969) ‘Gossip, norms and social network‘, in pp. 29–44.
J. Clyde Mitchell (ed.), Social Networks in Urban Situations. Hopf, C. (1979) ‘Soziologie und qualitative Sozialforschung‘,
Analyses of Personal Relationships in Central African Towns. in Christel Hopf and Elmar Weingarten (eds), Qualitative
Manchester: Manchester University Press. pp. 117–28. Sozialforschung. Stuttgart: Klett-Cotta. pp. 11–41.
Fine, G.A., and Kleinman, S. (1983) ‘Network and meaning: Jansen, D. (1999) Einführung in die Netzwerkanalyse. Opladen:
An interactionist approach to structure’, Symbolic Leske + Budrich.
Interaction, 6: 97–110. Johnson, J.C. (1994) ‘Anthropological contributions to the
Foote Whyte, W. (1955) Street Corner Society The Social study of social networks: A review’, in Stanley Wasserman
Structure of an Italian Slum. Chicago: University of Chicago and Joseph Galaskiewicz (eds), Advances in Social Network
Press. Analysis. Thousand Oaks: Sage. pp. 113–51.
Franke, K. and Wald, A. (2006) ‘Möglichkeiten der Kahn, R.L. and Antonucci, T.C. (1980) ‘Convoys over the life
Triangulation quantitativer und qualitativer Methoden in course: Attachment, roles, and social support’, in Paul B.
der Netzwerkanalyse‘, in Betina Hollstein and Straus, Baltes and Olim G. Brim (eds), Life-span Development and
Florian (eds), Qualitative Netzwerkanalyse. Konzepte, Behavior. New York: Academic Press. pp. 383–405.
Methoden, Anwendungen. Wiesbaden: VS Verlag für Kashy, D.A. and Kenny, D.A. (1990) ‘Do you know whom you
Sozialwissenschaften. pp. 153–77. were with a week ago Friday? A re-analysis of the Bernard,
Franzosi, R. (ed.) (2008) Content Analysis. 4 vols. Beverly Hills, Killworth, and Sailer Studies’, in Social Psychology Quarterly,
CA: Sage. 53: 55–61.
Geertz, C. (1973) The Interpretation of Cultures. New York: Keim, S., Klärner, A. and Bernardi, L. (forthcoming) ‘Qualifying
Basic Books. social influence on fertility intentions: Composition,
Gibson, D.R. (2005) ‘Taking turns and talking ties. Network structure, and meaning of fertility-relevant social networks
structure and conversational sequences’, American Journal in western Germany’, Current Sociology.
of Sociology, 110(6): 1561–97. Knox, H., Savage, M. and Harvey, P. (2006) ‘Social
Glaser, B.G. and Strauss, A.L. (1967) The Discovery of networks and the study of social relations: Networks as
Grounded Theory. Strategies for Qualitative Research. method, metaphor and form’, Economy and Society, 35(1):
Chicago: Aldine. 113–40.
Gluesing, J., Riopelle, K. and Danowski, J.A. (forthcoming) Krackhardt, D. (1987) ‘Cognitive social structure’, Social
‘Innovation networks in global organizations: Understanding Networks, 9(2): 109–34.

5605-Scott-Chap27.indd 415 4/13/2011 2:38:01 PM


416 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Krackhardt, D. (1990) ‘Assessing the political landscape: A comparative study of four mental health systems’,
Structure, cognition, and power in organizations’, in Administrative Science Quarterly, 40(1): 1–33.
Administrative Science Quarterly, 35: 432–69. Ragin, C.C. (1987) The Comparative Method. Moving beyond
Lazega, E. (1997) ‘Network analysis and qualitative research: Qualitative and Quantitative Strategies. Berkeley: University
A method of contextualisation’, in Gale Miller and Dingwall, of California Press.
Robert (eds), Context and Method in Qualitative Research. Riles, A. (2000) The Network Inside Out. Ann Arbor: University
London: Sage. pp. 119–38. of Michigan Press.
Lonkila, M. and Salmi, A.-M. (2005) ‘The Russian work Roethlisberger, F.J. and Dickson, W.J. (1939) Management
collective and migration’, European-Asia Studies, 57(5): and the Worker. Cambridge, MA: Harvard University
681–703. Press.
Marsden, P.V. (1990) ‘Network data and measurement’, Scheibelhofer, E. (2008) ‘Combining narration-based inter-
Annual Review of Sociology, 16: 433–63. views with topical interviews: Methodological reflections
Marsden, P.V. (2005) ‘Recent developments in network on research practices’, International Journal of Social
measurements’, in Peter J. Carrington, John Scott, and Research Methodology, 11(5): 403–16.
Stanley Wasserman (eds), Models and Methods in Social Scheibelhofer, E. (2009) ‘Understanding European Emigration
Network Analysis. Cambridge: Cambridge University Press. in the Context of Modernization Processes: Contemporary
pp. 8–31. Migration Biographies and Reflexive Modernity’, Current
McCarty, C., Molina, J.L., Aguilar, C. and Roth, L. (2007) Sociology, 57 (1): 5–25.
‘A comparison of social network mapping and Schütze, Y. (2006) ‘Quantitative und Qualitative Veränderungen
personal network visualization’, Field Methods, 19(2): in den sozialen Netzwerken junger Migranten – Eine
145–62. Langzeitstudie’, in Betina Hollstein and Florian Straus
McLean, P.D. (1998) ‘A frame analysis of favour seeking in the (eds), Qualitative Netzwerkanalyse. Konzepte, Methoden,
Renaissance: Agency, networks, and political culture’, Anwendungen. Wiesbaden: VS Verlag für Sozial-
American Journal of Sociology, 104(1): 51–91. wissenschaften. pp. 295–311.
Menjivar, C. (2000) Fragmented Ties: Salvadoran Immigrant Schütze, Y. and Lang, F.R. (1996) ‘Integration in family,
Networks in America. Berkeley: University of California kinship and friendship networks’, in Heidrun Mollenkopf
Press. (ed.), Elderly People in Industrialized Societies. Berlin:
Miles, M. and Huberman, M. (1984) Qualitative Data Analysis. Sigma. pp. 25–40.
Newbury Park, CA: Sage. Smilde, D. (2005) ‘A qualitative comparative analysis of
Mische, A. (2003) ‘Cross-talk in movements: Rethinking the conversion to Venezuelan evangelicalism: How networks
culture-network link’, in Mario Diani and Doug McAdam matter’, American Journal of Sociology, 111(3): 757–796.
(eds), Social Movements and Networks: Relational Smith, S.S. (2005) ‘“Don’t put my name on it”: Social capital
Approaches to Collective Action. New York: Oxford activation and job-finding assistance among the black
University Press. pp. 258–80. urban poor’, American Journal of Sociology, 111(1): 1–57.
Mische, A. (2008) Partisan Publics. Communication and Smith, T. (2007) ‘Narrative boundaries and the dynamics of
Contention across Brazilian Youth Activist Networks. ethnic conflict and conciliation’, Poetics, 35: 22–46.
Princeton: Princeton University Press. Straus, F. (2002) Netzwerkanalysen. Wiesbaden:
Mitchell, J.C. (ed) (1969) Social Networks in Urban Situations. Dt. Univ.-Verlag.
Analyses of Personal Relationships in Central African Tashakkori, A. and Teddlie, C. (eds) (2003) Handbook of
Towns. Manchester: Manchester University Press. Mixed Methods in Social and Behavioral Research.
Mizruchi, M.S. (1994) ‘Social network analysis: Recent Thousand Oaks, CA: Sage.
achievements and current controversies’, Acta Sociologica, Titscher, S., Meyer, M., Wodak, R. and Vetter, E. (2000)
37: 329–43. Methods of Text and Discourse Analysis, in Search of
Mützel, S. (2009) ‘Networks as culturally constituted Meaning. London: Sage.
processes: A comparison of relational sociology and Uzzi, B. (1997) ‘Social structure and competition in interfirm
actor-network-theory’, Current Sociology, 57 (6): 871–887. networks: The paradox of embeddedness’, Administrative
Oevermann, U., Allert, T., Konau, E. and Krambeck, J. (1979) Science Quarterly, 42(1): 35–67.
‘Die Methodologie einer “objektiven Hermeneutik” und White, H.C. (1961) ‘Management conflict and sociometric
ihre allgemeine forschungslogische Bedeutung in structure’, American Journal of Sociology, 67(2): 185–99.
den Sozialwissenschaften‘, in Hans-Georg Soeffner White, H.C. (1992) Identity and Control. Princeton: Princeton
(ed.), Interpretative Verfahren in den Sozial- und University Press.
Textwissenschaften. Stuttgart: Enke. pp. 352–434. Wong, S.-L. and Salaff, J.W. (1998) ‘Network capital:
Pahl, R. and Spencer, L. (2004) ‘Personal communities: Not Emigration from Hong Kong’, British Journal of Sociology,
simply families of “fate” or “choice”’, Current Sociology, 49(3): 358–74.
52(2): 192–221. Yeung, K.-T. (2005) ‘What does love mean? Exploring
Provan, K.G. and Milward, H.B. (1995) ‘A preliminary network culture in two network settings’, Social Forces,
theory of interorganizational network effectiveness: 84(1): 391–420.

5605-Scott-Chap27.indd 416 4/13/2011 2:38:01 PM


28
Analyzing Affiliation
Networks
Stephen P. Borgatti and Daniel S. Halgin

In social network analysis, the term “affiliations” BASIC CONCEPTS AND TERMINOLOGY
usually refers to membership or participation data,
such as when we have data on which actors Affiliation data consist of a set of binary relation-
have participated in which events. Often, the ships between members of two sets of items. For
assumption is that co-membership in groups or example, the well-known dataset collected by
events is an indicator of an underlying social tie. Davis et al. (1941) recorded which women
For example, Davis et al. (1941) used data attended which social events in a small southern
provided by the society pages of a local newspa- town. Thus, there are two sets of items, women
per to uncover distinct social circles among a set and events, and there is a binary relation that con-
of society women. Similarly, Domhoff (1967) and nects them, namely the “attended” relation. Figure
others have used co-membership in corporate 28.1 gives the Davis et al. (henceforth, DGG) data
boards to search for social elites (e.g., Allen, matrix in its original form. The rows correspond
1974; Carroll et al., 1982; Galaskiewicz, 1985; to the women and the columns are the events they
Westphal and Khanna 2003). Alternatively, we attended.
can see co-participation as providing opportuni- In general, the kinds of binary relations we
ties for social ties to develop, which in turn consider affiliations are limited to part/whole
provide opportunities for things like ideas to relations such as “is a member of” or “is a partici-
flow between actors. For example, Davis (1991; pant in” or “has” (in the sense of having a trait).
Davis and Greve, 1997) studied the diffusion of Examples of affiliation data that have found their
corporate practices such as poison pills and golden way into the social science literature include cor-
parachutes. He found evidence that poison porate board memberships (e.g., Mizruchi, 1983,
pills diffuse through chains of interlocking 1992, 1996; Carroll et al., 1982; Davis, 1991;
directorates, where board members who sit on Lester and Canella, 2006; Robins and Alexander,
multiple boards serve as conduits of strategic 2004; Westphal, 1998), attendance at events (e.g.,
information between the different firms. An Davis et al., 1941; Faust et al., 2002), membership
important advantage of affiliation data, especially in clubs (e.g., McPherson, 1982; McPherson and
in the case studying elites, is that affiliations are Smith-Lovin, 1986, 1987), participation in online
often observable from a distance (e.g., govern- groups (Allatta, 2003, 2005), authorship of arti-
ment records, newspaper reports), without requir- cles (e.g., Gmür, 2006; Lazer et al., 2009; Newman
ing access to the actors. et al., 2001), membership in production teams
In this chapter, we focus on issues involving (Uzzi and Spiro, 2005), and even course-taking
the analysis of affiliation data, as opposed to the patterns of high school students (e.g., Field et al.,
collection or the theoretical interpretation of 2006). In addition, affiliation data are
affiliation data. well known outside the social sciences, as in the

5605-Scott-Chap28.indd 417 4/6/2011 12:02:09 PM


418 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

E1 E2 E3 E4 E5 E6 E7 E8 E9 E10 E11 E12 E13 E14


EVELYN 1 1 1 1 1 1 0 1 1 0 0 0 0 0
LAURA 1 1 1 0 1 1 1 1 0 0 0 0 0 0
THERESA 0 1 1 1 1 1 1 1 1 0 0 0 0 0
BRENDA 1 0 1 1 1 1 1 1 0 0 0 0 0 0
CHARLOTTE 0 0 1 1 1 0 1 0 0 0 0 0 0 0
FRANCES 0 0 1 0 1 1 0 1 0 0 0 0 0 0
ELEANOR 0 0 0 0 1 1 1 1 0 0 0 0 0 0
PEARL 0 0 0 0 0 1 0 1 1 0 0 0 0 0
RUTH 0 0 0 0 1 0 1 1 1 0 0 0 0 0
VERNE 0 0 0 0 0 0 1 1 1 0 0 1 0 0
MYRNA 0 0 0 0 0 0 0 1 1 1 0 1 0 0
KATHERINE 0 0 0 0 0 0 0 1 1 1 0 1 1 1
SYLVIA 0 0 0 0 0 0 1 1 1 1 0 1 1 1
NORA 0 0 0 0 0 1 1 0 1 1 1 1 1 1
HELEN 0 0 0 0 0 0 1 1 0 1 1 1 0 0
DOROTHY 0 0 0 0 0 0 0 1 1 0 0 0 0 0
OLIVIA 0 0 0 0 0 0 0 0 1 0 1 0 0 0
FLORA 0 0 0 0 0 0 0 0 1 0 1 0 0 0

Figure 28.1 DGG women-by-events matrix

species-by-trait matrices of numerical taxonomy Affiliation graphs or networks are often called
(Sokal and Sneath, 1973). “two-mode graphs.” The terminology of “modes”
We can represent affiliations as mathematical refers to the number of different kinds of entities
graphs (Harary, 1969) in which nodes correspond referenced in the rows and columns of a matrix.
to entities (such as women and events) and lines A one-mode matrix is square, and its rows and
correspond to ties of affiliation among the entities. columns refer to the same set of entities—a single
Figure 28.2 provides a representation of the DGG mode. An example, drawn from the famous
data. Affiliation graphs are distinctive in having Hawthorne studies (Roethlisberger and Dickson,
the property of bipartiteness, which means that the 1939), is shown in Figure 28.3.1
graph’s nodes can be partitioned into two classes, In contrast, a two-mode matrix is rectangular,
so that all ties occur only between classes and and the rows and columns refer to two different
never within classes. We see in Figure 28.2 that sets of entities—two modes. For example, Figure
there are only lines between women and the 28.4 shows a two-mode, n-by-m person-by-group
events that they attended. While all affiliation incidence matrix that is also based on the
graphs are bipartite, in our view the reverse is not Hawthorne data. An incidence matrix has rows
necessarily true. In empirical network data, graphs corresponding to nodes and columns correspond-
can be bipartite by chance alone, perhaps because ing to n-ary edges (also called hyperedges) that
of sampling error. What makes affiliation graphs connect sets of nodes. In this case, the matrix
different is that the two node sets are different indicates each individual’s membership in each
kinds of entities, and the lack of ties within sets is of five different groups.2 The matrix clearly repre-
by design, not happenstance. Formally, we define sents affiliations, and indeed all affiliation graphs
an affiliation graph as a bipartite graph G(V1,V2,E), can be represented as two-mode matrices, where
in which V1 and V2 are sets of nodes correspond- the two modes correspond to the affiliation graph’s
ing to different classes of entities, and E is an two node sets.
affiliation relation that maps the elements of V1 to It is important to note that while affiliation
V2. The relation is typically conceived as a set of graphs can be represented by two-mode matrices,
unordered pairs in which one element of each not all two-mode matrices are considered affiliation
pair belongs to V1 and the other belongs to V2. graphs. For example, a standard sociological
In contexts where we discuss multiple graphs, case-by-variables matrix (e.g., person-by-demo-
we use the notation V1(G) to indicate the V1 node graphics) might be seen as two-mode but would
set in graph G, and E(H) to refer to the ties not normally be called an affiliation. “Affiliation”
in graph H. is reserved for the case when the data consist of

5605-Scott-Chap28.indd 418 4/6/2011 12:02:09 PM


ANALYZING AFFILIATION NETWORKS 419

Olivia
Flora
Dorothy

E2
Pearl
E11

Myrna E1
E9 Ruth
Evelyn

Helen Theresa
E10 Laura
E8
Katherine E4
Nora E6 Brenda
E12
E3
Sylvia E7 E5
Verne

E14 Frances
Eleanor
E13 Charlotte

Figure 28.2 DGG women-by-events graph

I1 I3 W1 W2 W3 W4 W5 W6 W7 W8 W9 S1 S2 S4
I1 0 0 0 0 1 0 0 0 0 0 0 0 0 0
I3 0 0 0 0 0 0 0 0 0 0 0 0 0 0
W1 0 0 0 0 1 1 0 0 0 0 0 1 0 0
W2 0 0 0 0 0 0 0 0 0 0 0 0 0 0
W3 1 0 1 0 0 1 0 0 0 0 0 1 0 0
W4 0 0 1 0 1 0 0 0 0 0 0 1 0 0
W5 0 0 0 0 0 0 0 0 0 0 0 0 0 0
W6 0 0 0 0 0 0 0 0 0 0 0 0 0 0
W7 0 0 0 0 0 0 0 0 0 1 1 1 0 0
W8 0 0 0 0 0 0 0 0 1 0 1 0 0 1
W9 0 0 0 0 0 0 0 0 1 1 0 0 0 1
S1 0 0 1 0 1 1 0 0 1 0 0 0 0 0
S2 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S4 0 0 0 0 0 0 0 0 0 1 1 0 0 0

Figure 28.3 One-mode person-by-person positive relationship matrix

5605-Scott-Chap28.indd 419 4/6/2011 12:02:09 PM


420 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Gr1 Gr 2 Gr 3 Gr4 Gr 5 of ties within one of the sets. It would seem per-
I1 1 0 0 0 0 verse, in that case, to collect affiliation data, since
I3 0 0 0 0 0
by definition affiliation data do not include ties
among members of either set. However, given
W1 1 1 1 0 0
affiliation data, we can in fact construct some kind
W2 1 1 0 0 0 of tie among members of a node set simply by
W3 1 1 1 0 0 defining co-affiliation (e.g., attendance at the
W4 1 1 1 0 0 same events, membership on the same corporate
W5 0 0 1 0 0 board) as a tie. For example, for the DGG dataset,
W6 0 0 0 1 0 we can construct a woman-by-woman matrix S
W7 0 0 0 1 1 in which sij gives the number of events that woman
i and woman j attended together (see Figure 28.5).
W8 0 0 0 1 1
If we like, we can then dichotomize so that
W9 0 0 0 1 1
there is a tie between two women if and only if
S1 0 1 1 0 0 they co-attended at least some number of events.
S2 0 0 0 0 0 Thus, affiliation data give rise to co-affiliation
S4 0 0 0 0 1 data, which constitute a kind of tie among nodes
within a set.
One justification for relying on co-affiliation is
Figure 28.4 Two-mode person-by-group
the idea that co-affiliation provides the conditions
matrix for the development of social ties of various kinds.
For example, the more often people attend the
same events, the more likely it is they will interact
some kind of participation or membership, as in and develop some kind of relationship. Feld
people in events, projects, or groups.3 In this (1981) suggests that individuals whose activities
chapter we focus on affiliation data, but the are organized around the same focus (e.g., volun-
techniques we discuss apply to two-mode data in tary organization, workplaces, hangouts, family,
general. etc.) frequently become interpersonally connected
over time. Physical proximity (which is simply
co-affiliation with respect to spatial coordinates)
is also clearly a major factor in enabling and, in
CO-AFFILIATION the breach, preventing interaction (Allen, 1977).
Another justification is almost the reverse of the
In some cases, the purpose of collecting affiliation first, namely that common affiliations can be
data is not to understand the pattern of ties the consequence of having a tie. For example,
between the two sets but to understand the pattern married couples attend a great number of events

Figure 28.5 DGG woman-by-woman matrix of overlaps across events

5605-Scott-Chap28.indd 420 4/6/2011 12:02:10 PM


ANALYZING AFFILIATION NETWORKS 421

together and belong to a great number of groups The quantity a gives the number of times that
together, and indeed they may come to share a the pair of women co-attended an event. The
great number of activities, interests, and beliefs. quantity a + b gives the total number of events
Thus, co-affiliation can be viewed as an observa- that woman i attended, and a + c gives the corre-
ble manifestation of a social relation that is per- sponding value for woman j. The quantity n is
haps unobservable directly (such as feelings). simply the number of events—the number of col-
If either of these justifications is valid, then we umns in matrix X. A simple way to bound a
may collect affiliation data simply because it is between 0 and 1 and promote comparability
more convenient than collecting direct ties among across datasets is to simply divide a by n, as
a set of nodes. For example, if we are interested in shown in Equation 28.1.
studying relationships among celebrities, we could
try to interview them about their ties with other
celebrities, but this could be quite difficult to * a
(28.1)
arrange. It would be easier to simply read celeb- n
rity news and record who has attended what
Hollywood social event or who has worked on Bounding a by the maximum possible score
what project. introduces the notion of other normalizations that
In deciding whether to use affiliation data as a take into account characteristics of the women,
proxy for social relations, it is useful to think such as the number of events they attended. For
about the conditions under which any of example, if woman i and woman j attend three
these justifications is likely to prove valid. One events in common, and woman k and woman l do
consideration is the size of affiliation events. For as well, we would likely regard the two pairs as
example, suppose we have a person-by-club equally close. But if we knew that i and j each
matrix indicating who is a member of which club. only attended 3 events, whereas k and l each
If the clubs are small (like a board of directors), attended 14 events, we would be more likely to
then our justifications seem, well, justifiable. But conclude that the 100 percent overlap between i
if the clubs are large (on the order of thousands of and j signals greater closeness than the 21 percent
members), co-membership may indicate very overlap between k and l.
little about the social tie between a given pair of Therefore, if we wanted to normalize the quan-
members. Two people can be members of all the tity a for the number of events that each woman
same (large) clubs or attend all the same (large) attended, we might divide a by the minimum of
events, and yet they may not even be aware of a + b and a + c, as shown in Equation 28.2. The
each other’s existence and never even meet. resulting coefficient runs between 0 and 1,
It should also be noted that in adopting co- where 1 indicates the maximum possible overlap
affiliations as a proxy for social ties, we confound given the number of events attended by i and j.
the concept of social proximity with that of social This approach takes into account that the number
similarity, which in other contexts are treated of overlaps between two women cannot exceed
as competing alternatives (Burt, 1987; Friedkin, the number of events that either attended.
1984). To see that co-affiliations are similarity
data, consider the woman-by-woman co-affilia- a
tion network in Figure 28.5, constructed from the aij* = (28.2)
original two-mode woman-by-event attendance Min(a b , a + c )
data. For each pair of women, we look at their
respective rows in X, and count the number of
times that they have 1s in the same places. This is Another well-known approach to normalizing a
simply an unnormalized measure of similarity of is provided by the Jaccard coefficient, which is
rows. In effect, for any pair of women we con- described in Equation 28.3. It gives the number of
struct a simple 2-by-2 contingency table as shown events attended in common as a proportion of
in Figure 28.6 that shows the relationship between events that are “attendable,” as determined by the
their pair of rows. fact that at least one of the two women attended
the event.
Woman j a
1 0 aij* = (28.3)
a b +c
1 a b a+b
Woman i
0 c d c+d
a+c b+d n Alternatively, we could take a + d as a raw
measure of social closeness. By including d, we
Figure 28.6 Contingency table effectively argue that choosing not to attend a

5605-Scott-Chap28.indd 421 4/6/2011 12:02:10 PM


422 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

given event is as much of a statement of social are the appropriate indices for measuring co-
allegiance as attending an event. A well-known affiliation. In contrast, if the reason for studying
normalization of a + d is given by Equation 28.4, affiliations is that co-affiliations reveal otherwise
which is equal to the simple Pearson correlation unseen relationships between people (e.g., socio-
between rows i and j of matrix X. metric preferences), the normalized measures are
the most appropriate, as they essentially give us
the tendency or preference for a pair of actors to
1
∑ x ik x jk − uiu j
m k (28.4)
co-occur while controlling for nuisance variables
such as the number of times an actor was observed.
rij =
si s j The normalized measures tell us how often two
actors are co-attending relative to the number of
times they could have.
Another approach, devised specifically for Consider the following hypothetical research
affiliation data, is provided by Bonacich (1972), project. Say that we are interested in analyzing
who proposes normalizing the co-occurrence connections between a group of 13 individuals
matrix according to Equation 28.5. Effectively, based on their memberships in different social
this measure gives the extent to which the overlap clubs (16 of them). Because we are interested in
observed between i and j exceeds the amount of understanding relationships between the 13 individ-
overlap we would expect by chance, given the uals we convert the affiliation data (person-by-social
number of events that i and j each attended. club) into co-affiliations (person-by-person). We
construct both a raw unnormalized co-affiliation
matrix and a normalized co-affiliation matrix.
a aadbc
aij* = , for ad ≠ bc (28.5) Figure 28.7 is a graphical representation of the
ad − bc raw co-affiliation network using a standard graph
layout algorithm. Individuals are labeled a
through m. A line connecting two individuals indi-
All of these normalizations essentially shift the cates that they are members of at least two of the
nature of co-affiliation data from frequencies same social clubs. Node size varies by the number
of co-occurrences to tendencies or revealed pref- of social clubs that each individual is a member
erences to co-occur. If we interpret frequencies of of; thus the larger the node, the more socially
co-occurrences as giving the number of opportu- active the individual. Figure 28.8 is a depiction of
nities for interaction or flow of information or Jaccard coefficients for each pair of individuals,
goods, then the raw, unnormalized measures such that a line connecting two individuals

k
l g

f c
i h

m
j e

Figure 28.7 Co-membership in two or more social clubs. Node size is based on the number
of social clubs that each individual is a member of

5605-Scott-Chap28.indd 422 4/6/2011 12:02:11 PM


ANALYZING AFFILIATION NETWORKS 423

d
b
c
l
a
m
f
e
k
j
h g

Figure 28.8 Spring embedding of Jaccard coefficients. An edge is shown if cij > 0.38. Node
size is based on the number of social clubs that each individual is a member of

indicates that their social club membership pro- their size. Thus, referring back to Figure 28.6, the
files are correlated at greater than 0.38. quantity n becomes the sum of weights of all
The raw co-affiliation network (presented in events, and the quantity a is the sum of weights of
Figure 28.7) can be described as a core-periphery the events that were co-attended by i and j. The
structure in that there is a set of core individuals measures described by Equations 28.1 to 28.4 can
who are members of multiple social clubs then be computed without modification.
(persons e, f, g, h, i) and are surrounded by a Table 28.1 summarizes which normalization
collection of less connected individuals. We see approaches are appropriate given one’s attitude
that there are opportunities for interaction between toward the nature of the co-affiliation data. For
many of the 13 individuals. However, the high convenience, it is assumed that the two-mode
social activity of the core individuals places affiliation data are actor-by-event and that we are
them in the middle of the graph, which tends interested in constructing the actor-by-actor
to obscure any subgrouping structure. Now co-affiliation matrix. As such, we refer to the
consider the Jaccard similarity network (presented actors/rows as “variables” and the events/columns
in Figure 28.8). This graph effectively highlights as “cases.” Therefore, the first kind of normaliza-
that there are two groupings of individuals with tion discussed above can be referred to as
different membership profiles. The graph also “variable normalization” and the second as “case
effectively reveals the bridging role of individual normalization.”
i, which was not at all discernable when visualiz-
ing unnormalized co-occurrences among the
individuals (see Figure 28.7).
Another kind of normalization worth mention- Analysis of co-affiliation
ing has to do with the size of the events (or social Having constructed a co-affiliation matrix, we
clubs) that the individuals are affiliated with. If, in would typically want to analyze the data using all
analyzing co-affiliation data, we are taking the the tools of social network analysis—as with any
point of view that greater co-affiliation creates other kind of tie. For the most part, this is unprob-
more opportunities for social ties to develop, then lematic, aside from the caveats already voiced.
when measuring person-to-person co-affiliations, The main issue we typically encounter is that the
we would probably want to take into account the
relative sizes of different events. In the DGG data,
for example, if two women co-attend an event that
Table 28.1 Appropriate normalizations by
included just five people in total, it would seem
view of data
that the likelihood of being aware of each other, of
meeting, and indeed of changing their relationship Co-affiliation as opportunity Co-affiliation as indicator
is reasonably high. We would want to give that
event a lot of weight. On the other hand if the • No normalization • Variable
same women co-attend an event in which thou- (simple overlap counts) normalization (e.g.,
sands are present (such as a concert), we might • Case normalization (e.g., Jaccard or Pearson
want to weight that very little. An obvious weighting inversely by correlations)
approach, then, is to weight events inversely by event sizes)

5605-Scott-Chap28.indd 423 4/6/2011 12:02:12 PM


424 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

co-affiliation matrix is valued and many network- algorithms place nodes in space such that dis-
analytic techniques assume binary data – particu- tances between them are loosely proportional to
larly those techniques with graph-theoretic roots. the path distances that separate them. Since nodes
In those cases, the data will need to be dichot- belonging to the same node set are necessarily a
omized. Since the level of dichotomization is minimum of two links apart, we might expect
arbitrary, the normal procedure is to dichotomize some difficulty in detecting grouping in bipartite
at different levels and obtain measures for net- graphs. In practice, however, this is not a problem
works constructed with different thresholds for and ordinary graph layout algorithms work well
what is considered a tie. In other cases, there will on bipartite graphs.
be no need for dichotomization. For example, The only adjustment that we typically have to
eigenvector centrality (Bonacich, 1972) and beta make for affiliation data is to visually distinguish
centrality (Bonacich, 1987, 2007) are quite happy the two node sets, such as by using different
to accept valued data, particularly when the values colors and shapes for node symbols of different
are “positive” in the sense that larger values can be sets. For example, Figure 28.2 shows a visualiza-
interpreted as enhancing flows or coordination. tion of the DGG dataset using the spring embed-
Other centrality measures need to be modified to ding procedure in NetDraw (Borgatti, 2002).
work with valued data. In general, measures based Women are represented by circles, and events are
on lengths of paths, such as betweenness and represented by squares. In the figure, we can see a
closeness centrality, can easily be modified group of women on the far right together with a
to handle valued data, provided the data can be group of events (E1 through E5) that only they
sensibly transformed into distances or costs attend. On the left, one can see another group
(Brandes, 2001). For example, the number of women who also have their exclusive events
of events co-attended by two women can be sub- (E10 through E14). In the middle of the figure are
tracted from the number of events in total and then four events (E6 through E9) that are attended by
submitted to a valued betweenness analysis. both groups of women. The figure also makes
Another possible difficulty with co-affiliation clear that Olivia and Flora are a bit separate from
data is that, being similarity metrics, they tend to the rest of the network and are structurally similar
have certain mathematical properties that social because they attended exactly the same events.
network data may not. For example, most similar- Another approach is to use a two-mode multi-
ity metrics are symmetric so that s(u,v) = s(v,u). variate analysis technique such as correspondence
We can construct nonsymmetric similarity meas- analysis to locate nodes. Correspondence analysis
ures, but these are rarely used and none of the delivers a map in which points corresponding
ones we consider above are nonsymmetric. to both the n rows and m columns of an n-by-m
Similarity matrices such as Pearson correlation two-mode matrix are represented in a joint space.
matrices have numerous other properties as Computationally, correspondence analysis con-
well, such as being positive semi-definite (e.g., sists of a double-normalization of the data matrix
all eigenvalues are nonnegative). The main to reduce the influence of variation in the row and
consequence is that the norms or baseline expecta- column sums, followed by a singular value decom-
tions for network measures on co-affiliation data position. The result is that, in the case of a
should not be based on norms or expectations woman-by-event matrix, two women will be
developed for sociometric data in general placed near each other to the extent that they have
(cf. Wang et al., 2009). similar event profiles, controlling for the sizes of
At this point, we leave the discussion of co- the events, and two events will be near each other
affiliation data and focus entirely on visualizing if they tend to have similar attendee profiles,
and analyzing affiliation graphs directly without controlling for the overall participation rates of
converting to co-affiliations. the attendees. In the case of the DGG dataset,
correspondence analysis gives the diagram shown
in Figure 28.9. As a general rule, the advantage of
correspondence representations is that, in princi-
ple, the map distances are meaningful and can be
DIRECT VISUALIZATION OF related precisely back to the input data. This is not
AFFILIATION GRAPHS the case with most graph layout algorithms, as
they respond to multiple criteria such as avoiding
Affiliation graphs are typically visualized using the placement of nodes directly on top of each
the same graph layout algorithms used for ordi- other or keeping line lengths approximately equal.
nary graphs. In principle, certain algorithms, such The disadvantage of correspondence analysis
as spring embedders or multidimensional scaling layouts is that they can be less readable. For
of path distances, should be less than optimal example, in Figure 28.9, Olivia is obscured by
when applied to bipartite graphs because these Flora, and the (accurate) portrayal of exactly how

5605-Scott-Chap28.indd 424 4/6/2011 12:02:12 PM


ANALYZING AFFILIATION NETWORKS 425

E14
KATHERINE E13
SYLVIA

E10
FRANCES MYRNA E12
BRENDA
LAURA E8
ELEANOR E7
E6
E3CHARLOTTE NORA
RUTH VERNE
E1 E5 PEARL
E4 E2 EVELYN THERESA DOROTHY
HELEN
E9

E11
OLIVIA
FLORA

Figure 28.9 Correspondence analysis of two-mode DGG matrix

different Flora, Olivia, and Event 11 are from just bipartite by happenstance but is by design –
the rest makes the majority of the display very similar to the concept of structural zeros in log-
hard to read. linear modeling. This sounds like a great deal
more work, but in practice it is often possible to
adjust metrics designed for general graphs
by simply applying an appropriate post hoc nor-
Direct analysis of affiliation graphs malization. This is the strategy we shall take in
applying centrality metrics to affiliation data. In
There are several different approaches to analyz-
other cases, a wholly different approach must be
ing affiliation data without converting to co-affili-
constructed. For example, for the case of measur-
ations. Because affiliation graphs are graphs, an
ing transitivity, we might redefine transitivity in
obvious approach is to simply use all the standard
terms of quadruples, such that a quad is called
algorithms and techniques in the network analysis
transitive if a → b, b → c, c → d, and a → d.
toolkit that apply to graphs in general. In doing
this, we either effectively assume that the special
nature of affiliation graphs will not affect the tech-
niques, or we can pretend that ties within node sets Centrality
could have occurred and just didn’t. This approach
works for a small class of methods, but by no As discussed elsewhere in this book (cf. Hanneman
means for all. A case where it does not work is and Riddle’s chapter), centrality refers to a family
measuring transitivity: calculating transitivity fails of properties of node positions. A number of cen-
because transitive triples are impossible in bipar- trality concepts have been developed, together with
tite graphs (all ties are between node sets, which their associated measures (Borgatti and Everett,
means that if a → b and b → c then a and c must 2006). In this section, we consider the measure-
be members of the same class, and therefore ment of four well-known centrality concepts.
cannot be tied, making transitivity impossible).
An alternative approach is to develop new
metrics and algorithms specifically designed for Degree
the bipartite case (affiliation graphs), taking into In ordinary graphs, degree centrality, di, is defined
account the fact that the observed network is not as the number of ties incident upon a node i. In the

5605-Scott-Chap28.indd 425 4/6/2011 12:02:12 PM


426 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

affiliation case, of course, the degree of a node is when the affiliations result from some kind of
the number of ties it has with members of the bilateral matching process, such as speed dating.
other node set. So in the DGG data, for women, it
is the number of events they attended, and for
events, it is the number of women who attended. Closeness
If we represent affiliations as a bipartite graph, we In ordinary graphs, closeness centrality, ci, refers
can compute degree centrality as usual and obtain to the sum of geodesic distances from node i to all
perfectly interpretable values, at least with respect n – 1 others in the network. As such, it is an
to the raw counts. However, it is usual to normal- inverse measure of centrality in which greater
ize centrality measures by dividing by the maxi- centrality is indicated by a lower score. The lowest
mum value possible in a graph of that size. For score possible occurs when the node has a tie to
ordinary graphs, this value is n – 1, where n is the every other node, in which case the sum of dis-
number of nodes in the graph. However, for affili- tances to all others is n – 1. To normalize closeness
ation graphs, this is not quite right because a node centrality, we usually divide the raw score into
cannot have ties to its own node set, and so the n – 1, which simultaneously reverses the measure
value of n – 1 cannot be attained.4 The maximum so that high scores indicate greater centrality.5
degree is always the size of the other node set. In As with degree centrality, raw closeness can be
the DGG dataset, the maximum possible degree calculated in affiliation graphs using the same
for a woman is the number of events (14), and the algorithms we use for any graph. But, also like
maximum possible degree for an event is the total degree centrality, we must do something different
number of women (18). Therefore, to normalize to normalize closeness in the affiliation case. In
degree centrality in the case of affiliation data, we affiliation graphs, the closest that a node can be
must apply two separate normalizations depend- to all others is n2 + 2(n1 – 1), which is distance 1
ing on which node set a node belongs to, as shown from all nodes in the other node set and distance 2
in Equation 28.6. from all other nodes in its own set. Therefore, to
normalize (and simultaneously reverse) closeness
di in the bipartite case, we divide the raw closeness
*
i = , for i V1 of a node in V1 into n2 + 2(n1 – 1) and the raw
n2
(28.6) closeness of a node in V2 into n1 + 2(n2 – 1), as
dj shown in Equation 28.7 in which ci represents raw
d *j = , for j V2
n1 closeness centrality, and n1 and n2 represent the
number of nodes in each node set.

The key benefit of normalizing degree central- n2 + 2(((nn1 )


ity in this way is that we can not only assess the ci* = , for i V1
relative centrality of two women or two events but ci
(28.7)
also whether a given woman is more central than n1 + 2(((nn2 )
a given event. Without such normalization, nodes c*j = , for j ∈V2
cj
with equal propensities to have ties could only
have equal degrees if the node sets were the same
sizes. However, while normalization handles the Using the DGG dataset for illustration, we can
mathematical issues of comparability, the substan- see that the maximum number of nodes that can
tive interpretation of a woman’s centrality relative be distance 1 from a woman is 14 (since there are
to an event’s is still an issue, and depends on the 14 events), and the maximum number of nodes
details of the research setting. For example, it may that can be distance 2 from any of the 18 women
be that the events are open to all, and ties in the is 17 (since there are 18 women). Thus, the theo-
affiliation graph reflect only a woman’s agency in retical minimum value of closeness centrality for
choosing which events to attend. In this case, if a a woman is 14 + 2* (18 – 1), and the theoretical
woman has greater degree than a given event, we minimum value for an event is 18 + 2* (14 – 1).
might say that her gregariousness is greater than
the event’s attractiveness, although this implies
that the degree centrality measurement does not Betweenness
measure the same thing for women as for events, In any graph, betweenness centrality, bi, refers to
which runs counter to the basic idea in the direct the “share” of shortest paths in a network that pass
analysis of affiliation graphs. On the other hand, through a node i, as given by Equation 28.8.
the events might be by invitation only, in which
case both women and events have a kind of 1 n n gikjk
agency. In general, centrality measures in this con- bk = ∑∑
2 i ≠ k j k ,i gij
(28.8)
text have the most straightforward interpretations

5605-Scott-Chap28.indd 426 4/6/2011 12:02:12 PM


ANALYZING AFFILIATION NETWORKS 427

b centralities of the women who attend it. As a


h result, eigenvector centrality applied to the adja-
g cency matrix of an affiliation graph is conceptu-
ally and mathematically identical to singular value
decomposition (Eckhardt and Young, 1936) of the
two-mode incidence matrix.6 In addition, both of
these are equivalent to an eigenvector analysis of
f
a the simple co-affiliation matrix.
c
ei l ∑ aij e j (28.10)
j

where λ is the principal eigenvalue of A.


i
d
e Empirical illustration of centrality measures
As an illustration, Figure 28.11 presents normal-
ized centrality scores for all four types of centrality
Figure 28.10 Star-shaped network discussed above for the DGG bipartite graph
presented in Figure 28.2. Note that three events
(E8, E9, and E7) are more central than any of the
To normalize betweenness, we divide by the women on all of the measures except for normal-
maximum possible value, which in the case of an ized degree centrality. It is also worth highlighting
ordinary graph is achieved by the center of a that E7 has 10 ties while Nora has only 8,
star-shaped network, as shown in Figure 28.10. but Nora has a slightly higher normalized degree
In the bipartite case, unless one node set centrality because there are fewer events than
contains just one node, an affiliation graph cannot women, so here 8 represents a greater percentage
attain that level of centralization. As a result, the of the possible ties.
maximum possible betweenness for any node in a
bipartite graph is limited by the relative size of the
two node sets, as given by Equation 28.9. To nor-
malize betweenness, we simply divide bi by either COHESIVE SUBGROUPS
bv1max or bv2max (see Equation 28.9), depending on
whether node i belongs to node set V1 or V2. Cohesive subgroups refer to dense areas in a net-
work that typically have more ties within a group
1 2 than with the rest of the network. Affiliation data
bV1 max [ n2 (s + 1) 2 n2 (s 1)(2t s 1)
2 pose special problems for cohesive subgroup analy-
− t (2 s t 3)] sis because the area around any given node can
never be very dense since none of a node’s “friends”
s (n1 1) div n2 (n1 − 1) mod n2 can be friends with each other. As a result, some
1 2 traditional graph-theoretic methods of finding sub-
bV2 max [ n1 ( p + 1)
1 2 n1 ( p 1)(2r p 1)
2 groups need to be modified for the bipartite case.
− r (2 p − r + 3)] One of the most fundamental subgroup
concepts is that of a clique (Luce and Perry,
p = (n2 − 1 di 1 , = (n1 − 1)1) mod n2 1949). A clique is defined as a maximally com-
plete subgraph, which means that every member
(28.9) of the clique has a tie to every other (a property
known as completeness), and there is no other
Eigenvector node that could be added to the subgraph’s set of
Eigenvector centrality, ei, is defined as the vertices without violating the completeness
principal eigenvector of the adjacency matrix of a requirement (this is the property of maximality).
graph (Bonacich, 1972), as defined by Equation Cliques of large size are rare in ordinary graphs,
28.10. In eigenvector centrality, a node’s score is and they are impossible in bipartite graphs. As a
proportional to the sum of the scores of its neigh- result, applying ordinary clique algorithms to
bors. In a bipartite graph such as the one created affiliation graphs is not useful.
by DGG, this means a woman’s centrality will be One solution is to use the N-clique concept,
proportional to the sum of centralities of the which is a relaxation of the clique idea. In an
events she attends, and similarly the centrality N-clique, we do not require each member of the
of an event will be proportional to the sum of clique to have a direct tie with every other, but

5605-Scott-Chap28.indd 427 4/6/2011 12:02:13 PM


428 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Node No. of ties Normalized Normalized Normalized Normalized


degree closeness betweenness eigenvector
E8 14 0.78 0.85 0.24 0.51
E9 12 0.67 0.79 0.23 0.38
E7 10 0.56 0.73 0.13 0.38
Nora 8 0.57 0.80 0.11 0.26
Evelyn 8 0.57 0.80 0.10 0.33
Theresa 8 0.57 0.80 0.09 0.37
E6 8 0.44 0.69 0.07 0.33
Sylvia 7 0.50 0.77 0.07 0.28
Laura 7 0.50 0.73 0.05 0.31
Brenda 7 0.50 0.73 0.05 0.31
Katherine 6 0.43 0.73 0.05 0.22
E5 8 0.44 0.59 0.04 0.32
Helen 5 0.36 0.73 0.04 0.20
E3 6 0.33 0.56 0.02 0.25
Ruth 4 0.29 0.71 0.02 0.24
Verne 4 0.29 0.71 0.02 0.22
E12 6 0.33 0.56 0.02 0.20
Myrna 4 0.29 0.69 0.02 0.19
E11 4 0.22 0.54 0.02 0.09
Eleanor 4 0.29 0.67 0.01 0.23
Frances 4 0.29 0.67 0.01 0.21
Pearl 3 0.21 0.67 0.01 0.18
E4 4 0.22 0.54 0.01 0.18
Charlotte 4 0.29 0.60 0.01 0.17
E10 5 0.28 0.55 0.01 0.17
Olivia 2 0.14 0.59 0.01 0.07
Flora 2 0.14 0.59 0.01 0.07
E2 3 0.17 0.52 0.00 0.15
E1 3 0.17 0.52 0.00 0.14
Dorothy 2 0.14 0.65 0.00 0.13
E13 3 0.17 0.52 0.00 0.11
E14 3 0.17 0.52 0.00 0.11

Figure 28.11 Normalized centrality scores for the DGG affiliation graph

instead that the member be no more than distance bi-cliques so that nodes that are members of many
n from every other. Choosing n = 2 gives us sub- of the same bi-cliques will be given a high correla-
groups in which all pairs of members are within tion. This correlation matrix can then be treated as
two links of each other. Applied to an ordinary a valued adjacency matrix and visualized using
graph, this yields subgroups that are “looser” than standard graph layout algorithms. Figure 28.12
ordinary cliques, meaning that they are less than shows the result of such an analysis. The results
100 percent dense. However, when applied to an are striking in the way they differentiate between
affiliation graph, a two-clique can be regarded as two groups of women tied to two distinct groups
complete, since all possible ties are present, due to of events. In addition, the diagram clearly shows
the constraints of bipartite graphs. For this reason, the separation of Flora and Olivia, and the bridg-
Borgatti and Everett (1997) give two-cliques in ing position of Ruth.
affiliation graphs a name of their own, the bi-
clique. Effectively, a bi-clique is to affiliation
graphs what a clique is to ordinary graphs.
Because bi-cliques can be numerous and over-
Structural equivalence
lapping, it is often useful to perform a secondary Structural equivalence refers to the extent that
analysis by constructing a node-by-clique matrix pairs of nodes have ties to the same third parties.
and by correlating the profiles of each node across In affiliation graphs such as the DGG dataset,

5605-Scott-Chap28.indd 428 4/6/2011 12:02:14 PM


ANALYZING AFFILIATION NETWORKS 429

E11

E13
E14
E10

E9

E12
Sylvia

Nora
E7
Helen
Katherine
Verne
E6
Laura
Myrna E4
Evelyn E8
Ruth
Brenda E3
Dorothy Eleanor E2
Pearl
Theresa
E5
Frances Charlotte E1

Flora

Olivia

Figure 28.12 A tie indicates that the correlation between two nodes is greater than 0.60

actors are structurally equivalent to the extent that equivalent nodes to be placed in the same classes,
they attend the same events, and events are struc- as shown in Figure 28.13. Partitioning the rows
turally equivalent to the extent that they are and columns based on structural equivalence has
attended by the same actors. Strictly speaking, in the effect of partitioning the cells of the adjacency
affiliation graphs there can be no equivalence matrix into matrix blocks that have a characteris-
between nodes of different node sets, because they tic pattern of homogeneity: either all of the cells
cannot have any nodes in common. As a result, in the block are 1s (called 1-blocks), or they all 0s
structural equivalence analyses of affiliation (called 0-blocks). The job of a blockmodeling
graphs are virtually identical to analyses of the algorithm is to find a partitioning of the rows and
actor-by-actor and event-by-event co-affiliation columns that makes each matrix block as homoge-
matrices. For example, a standard approach to neous as possible (Borgatti and Everett, 1992).
measuring structural equivalence in ordinary
graphs is to correlate the rows (and columns) of
the adjacency matrix, and then do a hierarchical
cluster analysis of the correlation matrix to iden-
tify blocks of approximately equivalent nodes. If
we take this approach to the (n + m) by (n + m)
adjacency matrix of an affiliation graph, we are
virtually guaranteed to find the two modes of the
affiliations dataset as the dominant partition in the
hierarchical clustering. The next partition will
then split one of the two node sets, and so on. In
the end, the results are essentially the same as if
we had simply clustered each of the co-affiliation
matrices separately.
An alternative approach to structural equiva-
lence is blockmodeling (White et al., 1976).
In ordinary graphs, blockmodeling refers to parti- Figure 28.13 Structural equivalence
tioning the rows and columns of the adjacency blockmodeling in an ordinary adjacency
matrix in order for those corresponding to nearly matrix

5605-Scott-Chap28.indd 429 4/6/2011 12:02:14 PM


430 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Applying this approach directly to affiliation perfectly regularly equivalent, then if u has a
graphs would mean partitioning the rows and friend p, we can expect v to have a friend q who
columns of the (n + m)-by-(n + m) bipartite is equivalent to p. In blockmodeling terms,
adjacency matrix B. This can be done, but the this translates to a partitioning of the rows and
bipartite structure imposes certain constraints. For columns of the adjacency matrix such that the
example, matrix blocks involving within-mode resulting matrix blocks are either 0-blocks, or a
ties (e.g., woman-to-woman, event-to-event) special kind of 1-block in which every row and
are necessarily 0-blocks. In addition, the best two- column in the matrix block has at least one 1.
class partition will almost certainly be the mode In the case of structural equivalence, it was
partition (except in trivial cases), and in general, possible to apply the concept to the adjacency
all other partitions will be refinements of the matrix of an affiliation graph, making it possible
mode partition (i.e., they will be nested hierarchi- to use existing algorithms/programs to compute it.
cally within the mode partition). In the case of regular equivalence, there is a com-
A more elegant (and computationally efficient) plication. Regular equivalence defines a lattice of
approach is to work directly from the two-mode partitions that all have the regularity property
incidence matrix X (Borgatti and Everett, 1992). (Borgatti, 1989; Borgattiand Everett, 1989). Most
To do this, we redefine the concept of a standard regular equivalence algorithms deliver
blockmodel to refer to not one but two independ- the maximum regular equivalence. Unfortunately,
ent partitions: one for the rows and one for the in undirected data, which is normally the case
columns. We then apply an algorithm to find with affiliation graphs, the maximum regular
the pair of partitions that yields the most homoge- equivalence is always trivial, placing all nodes in
neous matrix blocks. In other words, a structural the same class. There are ways of handling this,
equivalence blockmodeling of the two-mode inci- but a better approach is to redefine regular equiva-
dence matrix is one in which row nodes are in the lence for two-mode incidence matrices, as devel-
same class if they have similar rows, and column oped by Borgatti and Everett (1992). As they did
nodes are in the same class if they have similar with structural equivalence, Borgatti and Everett
columns. An example involving four classes of (1992) redefine the concept of a blockmodel to
rows and three classes of columns is shown in refer to not one but two independent partitions:
Figure 28.14. one for the rows and one for the columns. Regular
equivalence implies that we can section the matrix
into rectangular blocks such that each block is a
0-block or a regular 1-block. For example, if the
REGULAR EQUIVALENCE affiliation graph indicates which consumers
visit which restaurants, the two-mode regular
In ordinary graphs, the idea of regular equivalence blockmodel shown in Figure 28.15 identifies four
is that a pair of equivalent nodes is connected not different types of consumers that visit three kinds
necessarily to the same nodes (as in structural of restaurants. Consumers of the same type do not
equivalence) but to equivalent nodes (White and necessarily visit the same restaurants, but they
Reitz, 1983). In other words if nodes u and v are do visit the same kinds of restaurants. Thus all

R1 R2 R3 R4 R5 R6 R7 R8 R9 R10
C1 1 0 1 0 1 1 0 0 0 0
C2 0 0 1 0 0 1 0 0 0 0
C3 0 1 0 1 1 0 1 0 0 0
C4 1 0 0 0 0 0 0 0 1 1
C5 1 0 1 0 0 0 0 1 1 0
C6 0 1 0 0 0 0 0 0 1 1
C7 0 1 1 0 0 0 0 1 0 1
C8 0 0 0 0 1 1 0 0 0 0
C9 0 0 0 0 0 1 0 0 0 0
C10 0 0 0 1 1 0 1 0 0 0
C11 1 0 1 1 0 1 0 0 1 1
C12 0 1 0 0 1 0 1 1 0 1

Figure 28.14 Two-mode structural Figure 28.15 A two-mode regular


equivalence blockmodel equivalence blockmodel

5605-Scott-Chap28.indd 430 4/6/2011 12:02:15 PM


ANALYZING AFFILIATION NETWORKS 431

consumers in the first class visit the first two model, which relates persons, tasks, and resources
kinds of restaurants, while all consumers in the to each other, including person-to-person com-
second class visit only the first and third kinds of munications and task-to-task dependencies. For
restaurants. example if matrix A indicates which person is
assigned to which task, and matrix P indicates
which task precedes another, then the product AP
relates each person u to each task v, indicating
TWO-MODE RELATIONAL ALGEBRAS whether person u has a task that precedes task v.
The triple product APA’ relates each person u to
In social network analysis, the term “relational each person v, indicating whether person u has a
algebra” is typically used very loosely to refer to task that precedes a task that person v does—that
the composition of relations. For example, if we is, it indicates whether person v is dependent on
measure both friendship and “teacher of” relations person u to get work done.
among a set of nodes, we can construct new, com-
pound relations that link the actors, such as
“friend of a teacher of” or “teacher of a friend of,”
as well as “friend of a friend” and “teacher of a
teacher of.” If the relations are represented as CONCLUSION
adjacency matrices, the composition relation can
be equated to Boolean matrix multiplication7 of In this chapter we provide an introduction to the
the adjacency matrices, so that if F represents the analysis of affiliation data. Two basic approaches
friendship relation and T represents the teacher of are discussed: a conversion approach and a direct
relation, then the Boolean matrix product FT rep- approach. The conversion approach consists of
resents the “friend of a teacher of” relation. Since analyzing co-affiliations or similarities among
the result of a composition is just another relation, elements of one node set with respect to their
we can construct compositions of compositions, profiles across the other node set. The similarities
yielding a long string of Boolean matrix products. are then treated as ties among the nodes.
For example, the string FTT’F’ gives a relation in Co-affiliations are frequently analyzed to identify
which, if u is tied to v via this relation, it indicates opportunities for interaction (e.g., the flow of
that v is liked by a student of someone who is the goods or information) or unseen relationships
teacher of a friend of u. (Note that the transpose between people (e.g., sociometric preferences).
T’is used to represent the inverse relation “is The direct approach consists of analyzing both
taught by.”) node sets simultaneously, treating the elements of
Relational composition is also possible with each on an equal footing. As discussed, the direct
affiliation data, provided the incidence matrices approach often requires the use of new metrics
are conformable. For example, suppose we have and algorithms specifically designed for bipartite
a binary person-by-organization matrix M, graphs.
indicating which persons are members of Our survey has focused on analysis, and within
which organizations. Suppose we also have an that, measurement of network concepts such as
organization-by-event matrix S, which indicates centrality, cohesive subgroups, structural equiva-
which organizations were sponsors of which lence, and regular equivalence. In doing so,
events. Finally, suppose we have a person-by- we have ignored statistical modeling, such as the
event matrix (A), indicating which person attended nascent field of exponential random graph models
which event. The product MS is a new matrix in for affiliation data (see Robins’s chapter in this
which MS(u,v) > 0 indicates that person u belongs volume for a more detailed discussion).
to at least one organization that sponsored event v. We close with suggestions for future analyses
In a given research setting, we might use MS to of affiliation data. One element that is underex-
explain matrix A—that is, test the hypothesis that plored in affiliation work is the temporal dimen-
people are more likely to attend events that are sion. There are two important ways in which time
sponsored by their organizations. can be brought into affiliation analysis. First, there
Relational algebras can incorporate a mix of is the case of affiliation graphs changing over
affiliation and ordinary networks. For example, time. We can conceptualize this as a series
if we also had a matrix F, indicating which of person-by-organization matrices representing
persons were friends with which others, we could different slices of time, or a single three-mode
generate compositions such as FMS, in which affiliation network in which each tie links together
FMS(u,v) > 0 indicates that a person u has a a person, an organization, and a time period.
friend who is a member of an organization that Many of the direct analysis techniques discussed
sponsors an event v. Krackhardt and Carley (1998) in this chapter can be generalized to this three-
use compositions of this type in their PCANS mode case (Borgatti and Everett, 1992).

5605-Scott-Chap28.indd 431 4/6/2011 12:02:15 PM


432 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The other important case is in the analysis of dichotomized so that any value greater than 0 is
two-mode person-by-event data, where the events assigned a 1.
are ordered by time. For example, if we study
Hollywood film projects, we typically have a data
matrix that is actor by film, and the films are
ordered by release date (or start date, etc.). If we REFERENCES
are interested in how actors’ previous collabora-
tion ties affect the quality of a film project they Allatta, J.T. (2003) ‘Structural analysis of communities of
are jointly engaged in, we need to construct the practice: An investigation of job title, location, and man-
collaboration network continuously over time, agement intention’, in M. Huysman, E. Wenger, and
since we would not want to predict film success V. Wulf (eds), Communities and Technologies. Amsterdam:
based on collaborations that occur after the film Kluwer Academic Publishers. pp. 23–42.
was produced. Social network analysis programs Allatta, J.T. (2005) Worker Collaboration and Communities of
such as UCINET (Borgatti et al., 2002) are just Practice. Ph.D. dissertation, University of Pennsylvania.
beginning to include tools for these kinds of Allen, M. (1974) ‘The structure of interorganizational elite
analyses. cooptation: Interlocking corporate directorates’, American
Another example of time-ordered affiliation Sociological Review, 39(3): 393–406.
data occurs in the study of career trajectories. Allen, T. (1977) Managing the Flow of Technology. Cambridge,
Taking the three-mode approach we can examine MA: MIT Press.
how actors’ co-location (in terms of both organi- Bonacich, P. (1972) ‘Factoring and weighting approaches to
zation and time) ties affect their future careers. status scores and clique identification’, Journal of
Or we can look at how individuals flow from Mathematical Sociology, 2: 112–20.
organization to organization along directed paths. Bonacich, P. (1987) ‘Power and centrality: A family of meas-
Here, the organizations can be ordered in time ures’, American Journal of Sociology, 92: 1170–82.
differently for each individual, although a key Bonacich, P. (2007) ‘Some unique properties of eigenvector
research question is whether an underlying order- centrality’, Social Networks, 29(4): 555–64.
ing of the organizations (such as status) creates Borgatti, S.P. (1989) Regular Equivalence in Graphs,
consistency in individual career moves. Hypergraphs, and Matrices. University of California, Irvine.
Borgatti, S.P. (2002) NetDraw: Graph Visualization Software.
Harvard: Analytic Technologies
Borgatti, S.P. and Everett, M.G. (1989) ‘The class of all
regular equivalences: Algebraic structure and computation’,
NOTES Social Networks, 11: 65–88.
Borgatti, S.P. and Everett, M.G. (1992) ‘Regular blockmodels of
1 The node labels indicate whether the individual multiway, multimode matrices’, Social Networks, 14: 91–120.
is an inspector (I), a worker (W), or a supervisor (S). Borgatti, S.P. and Everett, M.G. (1997) ‘Network analysis of
2 The groups were constructed by the present 2-mode data’, Social Networks, 19(3): 243–69.
authors for illustrative purposes, based on a clique Borgatti, S.P. and Everett, M.G. (2006) ‘A graph-theoretic
analysis. framework for classifying centrality measures’, Social
3 This is not to imply that the data must be Networks, 28(4): 466–84.
binary as we could have data in which persons have Borgatti, S.P., Everett, M.G. and Freeman, L.C. (2002) UCINET
a degree of membership or participation in various for Windows: Software for Social Network Analysis.
groups or events. Harvard, MA: Analytic Technologies.
4 Except for nodes that are in the only members Brandes, U. (2001) ‘A faster algorithm for betweenness
of their special case where one vertex set contains centrality’, Journal of Mathematical Sociology, 25(2):
just one node set. 163–77.
5 Of course, this is a nonlinear transformation, Burt, R. (1987) ‘Social contagion and Innovation: Cohesion
unlike all other centrality normalizations. To maintain versus structural equivalence’, American Journal of
consistency we could instead divide raw closeness by Sociology, 92(6): 1287–335.
its maximum and simply remember that it is a reverse Carroll, W.K., Fox, J. and Ornstein, M.D. (1982) ‘The network
measure. of directorate interlocks among the largest Canadian
6 In addition, singular value decomposition firms’, Canadian Review of Sociology and Anthropology,
yields the measures of hubs and authorities proposed pp. 245–68.
by Kleinberg (1999). Therefore, in affiliation data, Davis, G. (1991) ‘Agents without principles? The spread of the
eigenvector centrality and hubs and authorities are poison pill through the intercorporate network’,
identical concepts, which is not true in ordinary Administrative Science Quarterly, 36(4): 583–613.
graphs. Davis, G. and Greve, H. (1997) ‘Corporate elite networks and
7 Boolean multiplication is simply ordinary governance changes in the 1980s’, American Journal of
matrix multiplication in which the resulting matrix is Sociology, 103(1): 1–37.

5605-Scott-Chap28.indd 432 4/6/2011 12:02:15 PM


ANALYZING AFFILIATION NETWORKS 433

Davis, A., Gardner, B. and Gardner, R. (1941) Deep South. McPherson, J.M. and Smith-Lovin, L. (1986) ‘Sex segregation
Chicago: University of Chicago Press. in voluntary associations’, American Sociological Review,
Domhoff, W. (1967) Who Rules America? Englewood Cliffs, 51(1): 61–79.
NJ: Prentice-Hall. McPherson, J.M. and Smith-Lovin, L. (1987) ‘Homophily in
Eckhardt, C. and Young, G. (1936) ‘The approximation voluntary organizations: Status distance and the composi-
of one matrix by another of lower rank’, Psychometrika, tion of face-to-face groups’, American Sociological Review,
1: 211–18. 52(3): 370–79.
Faust, K. Willber, K, Rowlee, D. and Skvoretz, J. (2002) Mizruchi M. (1983) ‘Who controls whom? An examination of
‘Scaling and statistical models for affiliation networks: the relation between management and boards of directors
Patterns of participation among Soviet politicians during in large American corporations’, Academy of Management
the Brezhnev era’, Social Networks, 24: 231–59. Review, 8: 426–35.
Feld, S. (1981) ‘The focused organization of social ties’, Mizruchi, M. (1992) The Structure of Corporate Political
American Journal of Sociology, 86: 1015–35. Action: Interfirm Relations and Their Consequences.
Field, S., Frank, K., Schiller, K., Riegle-Crumb, C. and Cambridge, MA: Harvard University Press.
Muller, C. (2006) ‘Identifying positions from affiliation Mizruchi, M. (1996) ‘What do interlocks do? An analysis,
networks: Preserving the duality of people and events’, critique, and assessment of research on interlocking
Social Networks, 28(2): 97–186. directorates’, Annual Review of Sociology, 22: 217–98.
Friedkin, N. (1984) ‘Structural cohesion and equivalence Newman, M. Strogatz, H. and Watts, D. (2001) ‘Random
explanations of social homogeneity’, Sociological Methods graphs with arbitrary degree distributions and their
and Research, 12: 235–61. applications’, Physical Review E., 64: 1–17.
Galaskiewicz, J. (1985) Social Organization of an Urban Robins, G. and Alexander, M. (2004) ‘Small worlds among
Grants Economy. New York: Academic Press. interlocking directors: Network structure and distance in
Gmür, M. (2006) ‘Co-citation analysis and the search for invis- bipartite graphs’, Computational & Mathematical
ible colleges: A methodological evaluation’, Scientometrics, Organization Theory, 10(1): 69–94.
57(1): 27–57. Roethlisberger F. and Dickson, W. (1939) Management and
Harary, F. (1969) Graph Theory. Reading, MA: Addison- the Worker. Cambridge: Cambridge University Press.
Wesley. Sokal, R. and Sneath, P. (1973) Numerical Taxonomy. San
Kleinberg, J. (1999) ‘Authoritative sources in a hyperlinked Francisco: W.H. Freeman.
environment’, Journal of the ACM, 46(5): 604–32. Uzzi, B. and Spiro, J. (2005) ‘Collaboration and creativity: The
Krackhardt, D. and Carley, K.M. (1998) ‘A PCANS model small world problem’, American Journal of Sociology,
of structure in organization’, in Proceedings of the 111(2): 447–504.
1998 International Symposium on Command and Wang, P., Sharpe, K., Robins, G. and Pattison, P. (2009)
Control Research and Technology. Monterey, CA. ‘Exponential random graph (p*) models for affiliation
pp. 113–19. networks’, Social Networks, 31(1): 12–25.
Lazer, D., Mergel, I. and Friedman, A. (2009) ‘Co-Citation of Westphal J.D. and Khanna, P. (2003) ‘Keeping directors in line:
Prominent Social Network Articles in Sociology Journals: Social distancing as a control mechanism in the corporate
The Evolving Canon’, Connections, 29(1): 43–64. elite’, Administrative Science Quarterly, 48(3): 361–98.
Lester, R. and Cannella, A. (2006) ‘Interorganizational Westphal, J.D. (1998) ‘Board games: How CEOs adapt
familiness: How family firms use interlocking directorates to to increases in structural board independence from man-
build community-level social capital’, Entrepreneurship: agement’, Administrative Science Quarterly, 43: 511–37.
Theory & Practice, 30(6): 755–75. White, H.C., Boorman, S.A. and Breiger, R.L. (1976) ‘Social
Luce, R. and Perry, A. (1949) ‘A method of matrix analysis of structure from multiple networks, I: Blockmodels of roles
group structure’, Psychometrika, 14(2): 95–116. and positions’, American Journal of Sociology, 81: 730–80.
McPherson, J.M. (1982) ‘Hypernetwork sampling: Duality and White, D. and Reitz, K. (1983) ‘Graph and semigroup homo-
differentiation among voluntary organizations’, Social morphisms on networks of relations’, Social Networks,
Networks, 3: 225–49. 5: 193–224.

5605-Scott-Chap28.indd 433 4/6/2011 12:02:15 PM


29
Positions and Roles
Anuška Ferligoj, Patrick Doreian, and
Vladimir Batagelj

We start our chapter with a discussion of social idealized form for which there can be many varia-
systems composed of positions and roles. This is tions. Key empirical issues involve delineating
followed by a set of methods for identifying posi- positions in social systems, identifying roles that
tions and roles and for delineating social network correspond to these positions, the nature of, and
structures. We finish by listing some important extent to which, these roles exist, and examining
open problems that require solutions, so that we how both role systems and social structures
can better understand the structure and operation change over time.
of role systems. Social network analysis provides a set of tools
that includes ways of mapping social structures in
ways that help identify positions and roles. When
used for studying social structures over time, these
tools help analysts understand how social
INTRODUCTION structures and role systems change over time. If
there are only simple descriptions of networks
The paired concepts of positions and roles are over time, this activity can be called studying
staples among social science terms. Intuitively, network dynamics. However, if we are able to
the idea of a position is a location in some social identify process rules that generate the observed
structure and a role has a set of expected behaviors changes over time, then we are examining the
corresponding to the location (e.g., Faust and evolution of social structures over time. While
Wasserman, 1992). Given a family as a social both network dynamics and network evolution
system, a parent is a location and the parental have their place in studying positions and
role includes appropriate behaviors for rearing roles, characterizing evolution is both more
children. The child is another position that carries demanding and more important for constructing
age-graded expectations of appropriate conduct cumulative knowledge and understanding of roles
by children toward their parents. Expectations of and positions.
parents and children are coupled into a system
of roles. Similarly, in an organization there are
locations in some structure – stereotypically, a
hierarchy – and roles are coupled to these Social networks
locations. Expectations include rules for how
superiors and subordinates behave in relation to A simple social network consists of a set of units,
each other inside their organization. Roles called social actors, with a single relation defined
are defined for all levels and positions in the hier- over them. For example, the units could be
archy and form a coupled system of expectations. children and the relation defined as “plays with.”
Of course, this simple description identifies an For a family, the units are parents and children,

5605-Scott-Chap29.indd 434 4/6/2011 12:04:12 PM


POSITIONS AND ROLES 435

and one relationship is “controls” for parents delineating social structures in a very general way.
acting toward their children. A more complex For the ease of exposition, most of our discussion
network has multiple relations. For the children on is focused on simple networks but the tools can be
a playground, the relations studied could be used for any degree of network complexity.
“plays with” and “likes.” An even more compli-
cated network has multiple relations and multiple
levels. For a family, the levels are for parents and
for children and the relationships studied could BLOCKMODELING
include “controls,” “loves (and/or hates),”
“respects,” and “confides.” Additional levels
One publication changed dramatically the way
could include multiple generations. In formal
network analysts viewed the delineation and
organizations with hierarchies, units can be
examination of social structure (as network
individuals occupying locations at multiple levels
structure). Lorrain and White (1971) introduced
with the relations “reports,” “seeks work-related
the concept of structural equivalence (defined
help,” “provides work-related help,” and “social-
below) as a way of operationalizing both position
izes at breaks.”
and role. In doing so, they set the foundations for
Units in a social network can also include
studying rigorously empirical social structure and
groups, organizations, and nations as well as the
examining role systems. This led to the creation of
individuals in these larger and more extensive
blockmodeling. Based on their insights, Breiger
units. If the groups are gangs, the relations
et al. (1975) presented a practical algorithm for
between them include alliance ties and enemy
establishing positions in a network. It was based
ties. For organizations, relations can include
on a particular way of operationalizing structural
sending goods or people between organizations,
equivalence. Burt (1976) provided an alternative
sharing information, or forming alliances. For
operationalization and with it a different algo-
nations, the relations can include exports, imports,
rithm. Sailer (1978) provided another way of
providing aid, belonging to military alliances, and
thinking about blockmodeling. This was later
waging war. Networks can also be made up of
formalized by White and Reitz (1983) with the
objects that have no obvious action identity
introduction of regular equivalence as a formal
as actors in the sense of individuals, groups,
generalization of structural equivalence. In 1992,
organizations, or nations. An example is the set of
the flagship journal of the field, Social Networks,
scientific documents for one or more scientific
devoted a special issue to blockmodeling featur-
fields. These units include books, articles, and
ing a variety of approaches that had been created
research reports. One relation defined over these
since the early statements that helped define the
objects is citation. Each scientific document
field. This helped create the conditions for the
contains references to earlier relevant work and
emergence of generalized blockmodeling as a
the relational ties are citations of earlier docu-
systematic statement of the approach and secured
ments by later documents. Patents form a similar
the foundations of blockmodeling (Doreian et al.,
set of units where the citations are governed by
2005). In the following, we do not discuss the
legal requirements to acknowledge prior inven-
details of the various algorithms used for estab-
tions and their patents. For scientific articles,
lishing blockmodels. Instead, we focus attention
depending on the field, there are differing
on the core ideas. Our discussion of blockmode-
volumes of solo authored publications and joint
ling distinguishes classic blockmodeling and
productions by two or more scientists. For the
generalized blockmodeling. In doing so, we put
latter, co-authorship is a relation defined over
the formal/mathematical foundations to one side.
authors of documents and this can be coupled to
The cited documents informing our discussion
citation networks to create a network database
provide the technical and formal details behind
with networks involving quite different units. Ties
the nonmathematical statement provided here.
in networks often have values capturing dimen-
sion such as intensity, frequency, or volume
depending on the relation considered. In general,
data sets can be created with both very large Classic blockmodeling
networks and multiple types of units. Regardless
of the complexity of a network, the notions of Some terms are used to provide a way of
positions and roles can be considered for them. describing networks precisely. Actors are repre-
Obviously, the way this is done depends on the sented by vertices and social ties between them
size and complexity of the networks considered. are represented by lines. A shorthand way of
But it can be done, and the approach known as labeling a network is N = (V, R), where V repre-
generalized blockmodeling provides the tools sents the set of vertices and R is a label for the
for establishing positions and roles and thereby relation. Networks with one relation can be viewed

5605-Scott-Chap29.indd 435 4/6/2011 12:04:12 PM


436 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

as simple networks. For representing networks Most empirical networks are not described
with multiple relations, this notation extends perfectly by the blockmodel just described. Pairs
naturally to N = (V, R1, R2, . . ., Rr) for a set of r of actors are more likely to be “almost structurally
relations. The ideas discussed below apply to all equivalent” in the sense that their ties are with
networks and, for ease of exposition, we use almost the same other actors. These differences, if
simple networks. small in number, are assumed to not matter that
Some relations are inherently symmetric, for much empirically, which permits the retention of
example, co-authoring a scientific paper. For such the idea of representing an observed network as a
relations, a line representing a symmetric tie is blockmodel. This raises the issue of empirically
called an edge. Other social relations are inherently determining the positions and blocks. While there
asymmetric. For example, “parent of ” is a relation are many ways of doing this we confine our atten-
represented by a line that goes from the parent to a tion to those used most frequently. Two of these
child. A child can never be a parent of their methods hinge on ways of representing the extent
parent(s). For networks with only asymmetric ties, to which pairs of actors are structurally equiva-
the lines are called arcs. Some relations are defined lent. Breiger et al. (1975) provided an algorithm
with an inherent direction but contain symmetric based on having correlations represent the notion
edges. Liking provides an example with an obvi- of “almost structurally equivalent.” The location
ous direction, but if one person likes another and of an actor in a network is the vector of ties (both
the sentiment is reciprocated then, for such a pair, present and absent) involving an actor. For
there is a symmetric tie (edge) between them. an undirected graph, the row (or column) is the
Other liking ties need not be reciprocated and there location. For a directed graph, both the row and
is an arc from one person to another. Such net- the column of ties for an actor represent the
works contain both arcs and edges. The distinction actor’s location. If two actors are structurally
between arcs and edges needs to be included when equivalent, the correlation of their locations
thinking about positions and roles. will be 1. Two actors are “almost structurally
When two actors are structurally equivalent equivalent” if the correlation of their positions is
they are connected in exactly the same way to “close enough to 1.” The algorithm proposed by
other actors in the network. A formal definition Breiger et al. (1975) iteratively uses correlations
can be found in Doreian et al. (2005: 172). In of locations to identify positions and, therefore,
essence, they are structurally identical. A set of blocks.
structurally equivalent actors is called a position. Burt (1976) proposed an alternative way of
If the network has only sets of structurally equiva- operationalizing “almost structurally equivalent”
lent actors then it is fully consistent with structural by using the Euclidean distances between
equivalence. This means the set of vertices, V, can locations. If two actors are structurally equivalent,
be partitioned into a set of k clusters, {C1, C2, ..., Ck} then the Euclidean distance between their
so that the vertices in a cluster Ci are structurally locations is 0. “Almost structurally equivalent”
identical. In this sense, given this definition of became “the Euclidean distance is close enough
equivalence, there are k positions in the network to 0.” The matrix of locations is turned into a
(representing a social structure). This provides a matrix of distances, which is then subjected to a
precise definition and operationalization of the standard clustering method. Doreian et al. (2005)
term “position” as a cluster. Given two positions, describe algorithms of the sort suggested by Burt
Ci and Cj, the set of ties from all actors in Ci to and Breiger et al. as “indirect methods” because
all actors in Cj forms a block. Given k positions the network data are converted into (dis)similari-
there are k2 blocks and the whole structure is ties that are then clustered. There are three broad
represented by these blocks. There are k blocks problems with these approaches: (i) there are
where the ties are within positions and these many ways of constructing dis(similarities) and
are called diagonal blocks. There are k(k–1) off- not all of them are compatible with structural
diagonal blocks containing ties between positions. equivalence; (ii) there are thousands of clustering
If there are n actors in the network and if n is algorithms and choosing one of them seems
much larger than k, then the large network is arbitrary, and (iii) the methods can be used only in
represented by the blockmodel image where there an inductive fashion. The third is due to the fact
are only positions and blocks. Put differently, the that clustering diagrams or dendrograms are
original network is modeled by the sets of posi- examined in order to discern the clusters that are
tions and blocks – hence, the term blockmodel. then labeled positions. There is no upfront
White et al. (1976) argue that the representation of conceptualization beyond the idea of structural
a network as a blockmodel image describes a role equivalence being applicable and analysts tend
structure precisely with a clear formulation of to accept what is returned by the joining of a clus-
positions and roles. This also allows the study of tering algorithm with a measure of (dis)similarity.
these role structures as relational algebras. These problems led Batagelj et al. (1992a) to

5605-Scott-Chap29.indd 436 4/6/2011 12:04:12 PM


POSITIONS AND ROLES 437

pursue an approach they called a “direct approach” following one: in the set of all possible partitions
to blockmodeling. This was formalized further into k clusters we search for the best partition
into “generalized blockmodeling” (Doreian et al., according to the selected criterion function. The
1994, 2005) as a general method for partitioning two types of inconsistencies can be weighted
networks into positions and blocks. Their analyses differently if one type of inconsistency is deemed
suggest that the direct approach produces better more important than the other. If null blocks are
fitting partitions based on equivalence concepts thought to be important parts of a network
than the indirect approach. Even so, the indirect structure then the presence of 1s in them can be
approach remains useful and can be used more penalized heavily so that blocks identified as null
effectively for larger networks than the direct blocks contain no 1s.
approach (described below) can handle. Solving the clustering problem is not easy.
While it sounds useful to compare all possible
ideal blocks with all possible empirical blocks this
Generalized blockmodeling can be done only for very small networks. So
some heuristic is needed. The one used in solving
Generalized blockmodeling (Batagelj, 1997; the generalized blockmodeling problem is a
Batagelj et al., 1992a, 1992b; Doreian et al., 1994, relocation algorithm that makes local comparisons
2005), as a direct approach to network data, rests of possible ideal and empirical partitions. Some
on some simple ideas. First, rather than think number (k) of partitions is chosen and the network
about structural equivalence as being approxi- is partitioned randomly into k provisional
mated by a measure of (dis)similarity, it is more positions. The neighborhood for such a partition
useful to think about what are the kinds of blocks is made up of other partitions that can be reached
that are consistent with structural equivalence. by either of the two types of changes. One is
They are few in number: (i) diagonal blocks can simply to move a vertex from one provisional
have only two forms and (ii) off-diagonal blocks position to another position. The second is
also have just two forms consistent with structural to exchange a pair of vertices between two provi-
equivalence. The off-diagonal ideal or permitted sional positions. For each change, the criterion
blocks have only 0s in them or only 1s in them. function can be calculated before and after the
They are, respectively, called complete blocks and change. If the criterion function does not decline,
null blocks. This captures exactly the idea of pairs then the new partition is discarded. But if it does
of actors in different positions being connected decline then we move to the new partition and
in the same way to other actors. The same logic repeat the changes (moving a vertex or exchang-
applies to diagonal blocks but the diagonal ing a pair of vertices between positions) from the
permitted blocks look slightly different. One new partition. If a change lowers the criterion
permitted diagonal block has 1s everywhere function, we move again to the new partition and
except on the diagonal, which has only 0s. The continue until no further reduction is possible.
other permitted form has 0s everywhere and 1s on Because this is a local optimization method, this is
the diagonal. The second block type of these two repeated many times to maximize the likelihood
is rare empirically. We use the terms “complete of reaching a globally best (optimal) partition
blocks” and “null blocks” to describe both rather than only a locally best (local) partition.
diagonal and off-diagonal blocks. White and Reitz (1983) generalized the idea of
The direct approach sets up comparisons of an structural equivalence to regular equivalence. Two
ideal blockmodel based on structural equivalence actors are regularly equivalent if they are con-
(which can have complete and null blocks any- nected in equivalent ways to equivalent others.
where) and an empirical blockmodel with the (A formal definition can be found in Doreian
same number of positions and blocks. In general, et al., 2005: 173.) This somewhat mysterious defi-
the empirical blockmodel approximates an ideal nition is best illustrated by a formal hierarchy with
blockmodel. Differences between ideal and empir- multiple levels that reach down to the same extent
ical blockmodels are easy to construct conceptu- in each division. A partition based on regular
ally. Wherever a 1 appears in a null block there is equivalence will identify each of the levels as a
one type of inconsistency, and wherever there is a position and captures the idea of position roles
0 in a complete block there is another type of nicely. Subordinates (in a position) are expected to
inconsistency. All we have to do is count the behave in the same way with their superordinates
inconsistencies and seek an empirical partition (bosses) while bosses are expected to behave in
that makes the number of inconsistencies as small the same way toward their subordinates. Structural
as possible. To do this, a clustering problem is equivalence does not lead to this kind of partition.
formulated with a criterion function that repre- White and Reitz (1983) proved that regular equiv-
sents the sum of all of the inconsistencies from all alence is a proper generalization of structural
of the blocks. The clustering problem is the equivalence. This equivalence was included in

5605-Scott-Chap29.indd 437 4/6/2011 12:04:12 PM


438 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

generalized blockmodeling through a theorem to formulate models and then fit them to the data
that regular equivalence permits only two block by using an appropriate criterion function that
types: null blocks and blocks that have at least one is compatible with the blockmodel type. Each
1 in every row and column of the block. Such blockmodel stands or falls on its own to fit the
blocks are called 1-covered blocks. (The proper data. Brusco and Steinley (2006, 2007) present
generalization is shown with the complete block results based on different optimization approaches
of structural equivalence being a very special case that suggest the (relocation) heuristic used in
of a 1-covered block.) Again, a criterion function generalized blockmodeling usually does return
expressing inconsistencies between ideal and optimal partitions for small networks.
empirical blocks for regular equivalence can be Second, much can be done within the rubric of
constructed and the local optimization method “formulating models and fitting them.” Thus
described above can be used. far, we have described an inductive approach to
The underlying strategy of the generalized blockmodeling: all that matters is the statement of
blockmodel is simple to describe and involves equivalence, usually structural or regular. Then
turning a definition of a type of equivalence into a some clustering algorithm is used to find positions
set of permitted block types. Structural equiva- and blocks. The notions of null, complete, and
lence permits only null and complete blocks. 1-covered blocks are all left implicit and can
Regular equivalence permits only null blocks and appear anywhere in the blockmodel returned by
1-covered blocks. The link between a type of an algorithm. Yet, we often know more about a
equivalence and its permitted blocks is driven by network than the applicability of a particular type
theorems establishing the permitted blocks for an of equivalence. The more we know, or think
equivalence type. A natural avenue for expanding we know, about a network, the more we can
the types of equivalences for establishing new “prespecify” a blockmodel. We may know not
types of blockmodels is to expand the permitted only the permitted block types but also where
block types. One set of expanded block types can some of them are in a blockmodel. (Indeed,
be found in Doreian et al. (2005: Chapter 7). we might know where all of them appear in a
These new types included row-regular blocks blockmodel.) If we have some knowledge – which
(each row is 1-covered) and column-regular blocks can be simply empirical or it could have a
(each column is 1-covered). These were used to theoretical foundation – it is useful to prespecify a
partition baboon-grooming networks at two points blockmodel that uses this knowledge. When this
in time where neither structural equivalence nor is done, generalized blockmodeling is used
regular equivalence were useful. This general deductively.
strategy of expanding block types, and hence A theoretical driven example of deductive
types of blockmodels, permits an indefinite expan- blockmodeling is found with structural balance
sion of blockmodeling into different substantive theory (Heider, 1946; as formalized by Cartwright
domains where the new block types can be more and Harary, 1956). If a signed network is
general and more useful than relying only on balanced, then the partition structure is known
structural or regular equivalence. Davis and from a pair of structure theorems that state,
Leinhardt (1972) explored the structure of small- depending exactly on how balance is defined, that
group networks and suggested there was a the actors in the network can be partitioned into
tendency toward the formation of ranked-cluster two positions (Cartwright and Harary, 1956) or
systems. Based on these ideas, Doreian et al. into two or more positions (Davis, 1967) such that
(2000, 2005: Chapter 11) present a “ranked- all of the positive ties are within positions and all
cluster” blockmodel to study the structure of of the negative ties are between positions. Doreian
children’s networks and the marriage system for and Mrvar (1996) noted that this implies a particu-
nobility in Ragusa (now known as Dubrovnik) in lar blockmodel structure with two types of blocks.
the eighteenth and nineteenth centuries. Positive blocks contain only positive or null ties
There are some important and useful results and negative blocks contain only negative or
from using generalized blockmodeling. First, by null ties. The implied blockmodel has positive
setting up a clustering problem with a criterion blocks on the diagonal and negative blocks off the
function that is fully compatible with a type of diagonal. Doreian and Mrvar proposed a way of
blockmodel, the criterion function becomes an partitioning signed networks that are as close as
explicit measure of fit for the blockmodel. Of possible to a partition expected for exact structural
course, different criterion functions are defined balance. The criterion function they proposed
for different types of blockmodels and each is counts two types of inconsistencies: positive ties
tailored to the type of blockmodel used. This in negative blocks and negative ties in positive
implies that the values of the criterion function blocks. These inconsistencies can be weighted
cannot be used to compare the fits of different differently if desired. The relocation algorithm
types of blockmodels. The logic of the approach is described earlier is used to solve this clustering

5605-Scott-Chap29.indd 438 4/6/2011 12:04:12 PM


POSITIONS AND ROLES 439

problem and is now an integral part of the general- Krackhardt’s (1987) office data were used to illus-
ized blockmodeling approach. trate the approach. Each of the 22 actors in the
Another element of knowledge is that some network provided their image of the one-mode
actors belong together in a position or that some relational data for the office. When these 22 per-
pairs of actors will belong to different positions. ceptions are coupled, a full three-way array is
This kind of knowledge is expressed in the form created. Even this special case poses severe com-
of constraints on which positions actors can be putational problems for the direct approach that
placed within. The extreme level of knowledge is have not been solved. Instead, Batagelj et al.
that we know the structure of the blockmodel (2007) proposed a dissimilarity measure for struc-
image and the positions to which all actors belong tural equivalence for all three cases and adopted
and this would be expressed in a completely an indirect approach. To do this they expressed
prespecified blockmodel. More likely, prespecifi- structural equivalence as an interchangeability
cation, if possible, will be partial. Examples of condition across modes for three-way networks.
some prespecified blockmodels are found in This allowed the construction of a compatible dis-
Doreian et al. (2005: 233–46). Of course, without similarity measure. Ward’s clustering method was
the knowledge for prespecifying a blockmodel, used to obtain the three-dimensional partitioning
the inductive use of blockmodeling is the via hierarchical clustering.
preferred option. Roffilli and Lomi (2006) proposed a quite
Nuskesser and Sawitzki (2005) also present a different approach to blockmodeling two-mode
formal overview of blockmodeling based on the networks. It is based on a family of learning algo-
conception of a position and link blockmodeling rithms called Support Vector Machines (SVM).
to a wider variety of network representations and The analytical framework provided by SVM
methods. provides a flexible statistical environment for
solving many classification tasks while reframing
regression and density estimation problems. They
also used the Deep South data and compared
SOME RECENT EXTENSIONS TO their results with other partitions of these data
GENERALIZED BLOCKMODELING obtained by employing different methods. Their
method acts as a data-independent preprocessing
We provide here some examples of ideas and step and they were able to reduce the complexity
analyses that can be viewed as extending general- of clustering problems. This reduction in com-
ized blockmodeling ideas in different ways that plexity enabled the use of simpler clustering
hold promise. methods.

Valued networks
Two-mode and three-mode
network arrays Doreian et al. (2005) confined their attention to
binary networks where the ties are simply present
Borgatti and Everett (1992), in a special double or absent. Given the increased collection of valued
issue of Social Networks devoted to blockmode- network data, this is a clear limitation. This makes
ling approaches, suggested applying blockmode- extending generalized blockmodeling to a valued
ling ideas to multinetwork arrays and provided a network a necessary and important development.
way of doing so. This moved the approach beyond This task was picked up initially by Batagelj and
analyzing one-mode networks. This extension can Ferligoj (2000) and later by Žiberna (2007).
also be formulated as a generalized blockmode- Žiberna proposed three approaches to generalized
ling problem where the network is defined by blockmodeling for valued network data by assum-
several sets of units and ties between them. ing that the values of the ties are measured on at
Doreian et al. (2004, 2005) did this for blockmod- least an interval scale.
eling two-mode networks. The examples they The first approach proposed by Žiberna (2007)
used included the classic Deep South data set and is straightforward generalized blockmodeling of
Supreme Court voting for a single term. More binary networks to valued blockmodeling. He
recently, Batagelj et al. (2006) applied these ideas uses a threshold parameter, and ties are assessed
to three-way network data. In addition to in relation to the value of the threshold (without
analyzing network data with three distinct types of binarizing the network). Patterns within blocks, as
social objects, they considered two special cases. signatures of block types, are still examined to
One allowed that the two of the modes were identify block types. One problem that emerges is
the same in a three-way array and the second that two blocks with the same pattern of ties but
always has the same mode in the three-way array. with different values for the ties that are present

5605-Scott-Chap29.indd 439 4/6/2011 12:04:12 PM


440 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

cannot be distinguished. This implies that such Žiberna suggests binarization is a poor first step of
differences in tie values cannot be used to locate a general strategy because the established
optimal partitions. This problem led Žiberna partitions can be unstable and produce different
(2008) to consider a second approach that he blockmodels depending on the threshold selected.
called homogeneity blockmodeling. In this It follows that using one of the three types of
approach the inconsistency of an empirical block, generalized blockmodeling of valued networks
compared with a corresponding ideal block, is proposed by Žiberna is preferable to using binary
measured by variability of values within a block. blockmodeling whenever we have networks
Ideally, all of the values inside a block are the measured on an interval scale. Generalized
same. This is fully consistent with the founding blockmodeling of valued networks produces better
idea of blocks being composed of identical ties. partitions and fewer equally well-fitting partitions
(Instead of seeing if ties are present with a value because it measures the block inconsistencies
of 1, the homogeneity partitioning establishes more precisely. The problems encountered reflect
blocks with minimum variation in the values of the brute fact that moving from binary networks to
the ties within the blocks.) While this approach valued networks moves us to a difficult set of
helps identify blocks with values that are as partitioning problems.
homogeneous as possible where ties need to be We note that for structural equivalence, the
present, it runs into another problem. For binary indirect approach is available because similarities
blockmodeling there is a clear distinction between like correlations and dissimilarities like Euclidean
null blocks and other block types. Yet a null block distances can be computed for valued network
is homogeneous (with a value of 0) and cannot be data as long as they are compatible with structural
readily distinguished as a special distinctive block equivalence. This is not the case for regular
type under homogeneity blockmodeling. As a equivalence where we still do not have a widely
result, while homogeneity blockmodeling is well accepted way of computing the extent to which
suited for distinguishing empirical blocks based vertices in networks are regularly equivalent.
on tie values and finding partitions based on such Nordlund (2007) also tackled the problem of
differences, it is less suited for distinguishing partitioning valued networks in terms of regular
empirical blocks based on block types and finding equivalence and his argument is consistent with
partitions based on such distinctions. This led Žiberna: applying techniques appropriate for
Žiberna to consider implicit blockmodeling of binary networks directly to valued networks is
valued networks. problematic. He proposed a formal heuristic for
Implicit blockmodeling can distinguish viewing ties as regular based on their linkages
empirical blocks based on tie values and block given the role set of actors. He combined this idea
types. However, it is heavily influenced by the with measures for block criteria fulfillment to
values of block maxima and often classifies establish reduced graphs where methods were
blocks differently than would be desired. As more sensitive to patterns of ties rather than their
a result, the partitions that it finds are heavily strengths.
influenced by the classification of blocks and can Weber and Denk (2007) proposed an approach
lead to unsatisfactory partitions. This is especially for valued blockmodeling for input-output
problematic if block maximum normalization relations viewed as networks. Flows between
is also used. The partitions that it produces can industrial or economic sectors, as an aggregation
be improved, but this improvement comes at of flows between businesses, are clearly valued.
the price of one of the main advantages of And the flows that go into national input-output
implicit blockmodeling, which is its ability to tables can be analyzed also at a “lower” level with
distinguish between the null block type and other businesses as the units. Regardless of whether
block types. data for these flows express the volume of goods
While the three approaches to blockmodeling and services flowing or their monetary values, it is
valued relations proposed by Žiberna, all have foolish to even think of these data as being binary.
problems that are best viewed as important first So if blockmodeling is contemplated, it has to
steps toward establishing better solutions to this deal with valued data whose values can vary
class of network partitioning problems. They were greatly. Given that goods and services flow
proposed, in part, as a response to some results between units, it is natural to think of these data as
Žiberna obtained while examining an obvious two-mode data with the rows as transmitters
strategy for blockmodeling a valued network. This (exporters) and the columns as receivers
is to select some threshold and use it to binarize (importers). Doreian et al. (2005: 265–69) did
the network: ties at, or above, the threshold are exactly this for journal-to-journal citation
coded 1 while ties below the threshold are set to 0. networks. For business-to-business transaction
The binarized networks were then treated with the patterns, businesses can remain a part of a trading
approach advocated by Doreian et al. (2005). network or leave while other businesses can join

5605-Scott-Chap29.indd 440 4/6/2011 12:04:13 PM


POSITIONS AND ROLES 441

the trading flows. Studying such economic net- two units depends on the distance between them
works includes evaluating businesses, character- in an unobserved Euclidean “social space,” and
izing the overall structure of these networks, and the locations of units in the latent social space
clustering both units and relations. It is possible to arise from a mixture of distributions, each corre-
identify gaps, both in the form of missing actors sponding to a cluster. Handcock et al. proposed
and missing ties, in these networks. Additionally, two estimation methods: a two-stage maximum
the flows are not simply between pairs of units likelihood method and a fully Bayesian method
because indirect flows are important and merit that uses MCMC sampling. They also proposed a
attention. While indirect paths of varying length Bayesian way of determining the number of clus-
have been considered by network analysts think- ters that are present by using approximate condi-
ing of what flows from one unit to another and tional Bayes factors.
then on to a third unit in social networks is much
harder to conceptualize than for economic flow
networks.
Generalized blockmodeling
of signed networks
Stochastic blockmodeling
As noted above, structural balance theory implies
The generalized blockmodeling approach, as a distinctive blockmodel structure for signed
described above, is explicitly deterministic. social networks. Yet structural balance as a proc-
A criterion function expressing the core of a ess, or a set of processes, is not the only force
clustering problem is minimized to determine the creating signed social relations between human
“best” partition(s) given the criterion function. An actors. It is quite possible that there are some
alternative strategy is to adopt a probabilistic actors that are universally liked (or liked by most
approach and treat the underlying processes in members of a group), despite the presence of the
a stochastic fashion. Mirroring structural equiva- kind of divisions predicted by structural balance
lence as an underlying conception, two actors are theory. If this is present then, there will be positive
stochastically equivalent if they have the same blocks off the main diagonal of an image matrix.
probability distribution of their ties to other units From the perspective of conflict resolution, when
(Holland et al., 1983; Wasserman and Anderson, social groups are completely split into mutually
1987, Anderson et al., 1992). Using probabilities hostile subgroups, with positive ties only within
for ties established from the data, positions are these groups, this is not a good situation because
populated with stochastically equivalent units. there are no actors in locations to mediate
Nowicki and Snijders (2001) developed a conflicts between these subgroups. Mediators
Bayesian approach for stochastic blockmodeling would have positive ties to members of at least
where the units are dyads. The ties can have two of the mutually hostile subgroups. But were
categorical values and the parameters of their there to be one or more mediators between a pair
model are estimated by a Markov chain Monte of opposed subgroups this would also imply
Carlo (“MCMC”) procedure. Two features of positive blocks off the image matrix’s main diago-
their approach are noteworthy for this discussion: nal. Finally, there are groups where there are some
(1) missing data can be handled and (2) given the mutually hostile individuals and their presence
network data, some vertices may be unclassifiable would imply a negative block on the main
into a position. Most discussions of blockmode- diagonal of the image matrix. Structural balance,
ling quietly ignore the problems of missing data, with its signature blockmodel structure, would
which can have serious implications (see below). bury all of these features into inconsistencies with
The idea of there being some units not belonging structural balance. If these other processes left
to positions was first noted by Burt (1976) in the traces in the structure of a group, they could not be
form of a “residual cluster” and this, too, has been identified using structural balance.
ignored in generalized blockmodeling. To deal with these problems, Doreian and
Airoldi et al. (2007a, 2007b) introduced a Mrvar (2009) relaxed the specification of
family of stochastic blockmodels that combine structural balance by allowing positive and nega-
features of mixed-membership models and block- tive blocks to appear anywhere in a blockmodel.
models for relational data in a hierarchical They retained the same criterion function as used
Bayesian framework. They proposed a nested for structural balance and called this relaxed struc-
variance inference scheme for this class of models, tural balance. They proved that this is a proper
which is necessary to successfully perform fast generalization of structural balance and applied
approximate posterior inference. Handcock et al. this revised version of balance to some of the
(2007) proposed a new model with latent posi- classical signed social network data sets and
tions under which the probability of a tie between obtained blockmodels with better fits to the data.

5605-Scott-Chap29.indd 441 4/6/2011 12:04:13 PM


442 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The original Heiderian balance theory had two that is applicable to a network with any degree
types of relations. One type was social relations distribution for the vertices in the network. The
between people and the other took the form of language of “finding communities” in a network
“unit formation” relations between people can be seen as a variant of identifying positions in
and social objects (like values and beliefs). The networks but with some differences. In general,
generalization provided by Cartwright and Harary clusters of similar components are not necessarily
(1956) buried this distinction and used only identical with the communities in a community
signed relations. In effect, the unit formation network; thus partitioning a network into clusters
relations were discarded. While the formalization of similar components provides additional infor-
changed dramatically the study of signed social mation of the network structure. Their proposed
relations in groups and permitted great progress, algorithm can be used for community detection
something was lost. Mrvar and Doreian (2009) when the clusters and the communities overlap.
formalized the idea of unit relations as signed By introducing a parameter that controls the
two-mode networks and extended the relaxed involved effects of the heterogeneity, they investi-
balance partitioning algorithm to partition-signed gated how the cluster structure can be coupled
two-mode data. The primary empirical example with the heterogeneity characteristics. They
featured the voting patterns of Supreme Court show how a group partition can evolve into a
justices for one term. community partition in some situations when the
involved heterogeneity effects are tuned. Their
algorithm can be extended to valued networks.
Recently, two approaches were proposed for
Partitioning large or complex blending blockmodeling with graph theoretical
networks constraints. At the Dagstuhl Seminar 08191 in
May 2008, a group of participants (Batagelj et al.,
A complementary way to generalized blockmod- 2008) started developing a general framework for
eling for large networks was proposed by Hsieh graph decompositions. Kemp and Tenenbaum
and Magee (2008), who presented another (2008) also proposed an approach based on graph
algorithm for decomposing a social network into grammars.
an optimal number of structurally equivalent
classes. The k-means method is used to determine
the best decomposition of the social network for
various numbers of positions. This best number OPEN GENERALIZED
of positions is determined by minimizing the BLOCKMODELING PROBLEMS
intra-position variance of similarity subject to
the constraint that the improvement in going There are a wide variety of open problems to merit
to more subgroups is better than partitioning attention. Some of them are general in the sense
a random network would achieve. They also that they are relevant for all generalized block-
describe a decomposability metric that assesses how modeling problems. Doreian (2006) provided a
closely the derived decomposition approaches an partial characterization of these general problems.
ideal network having only structurally equivalent Other open problems pertain to specific applica-
classes. tions. To some extent, this classification is arbi-
Reichardt and White (2007) presented a frame- trary and we do not imply that the general
work for blockmodeling the functional classes of problems are more important for the future of
agents within a complex network. They derived a generalized blockmodeling. Both contain prob-
different measure for the fit compared to one used lems where their solutions will constitute advances
by Batagelj, Doreian, and Ferligoj of a network to for using generalized blockmodeling to identify
any given blockmodel. Their method can handle positions and roles. We first discuss some specific
both two-mode and one-mode data, and directed open problems before moving on to consider
and undirected as well as valued networks, and some general open problems.
allows for different types of links to be dealt with
simultaneously. They applied their approach to a
world trading network and were able to establish
the roles played by countries as occupants of posi- Open specific generalized
tions in world trading. blockmodeling problems
Wang and Lai (2008) picked up the problem of
detecting positions and hence blockmodels in a Regular equivalence
complex network. Using the mixture models and One of the vexing problems with regular
the exploratory analysis presented by Newman equivalence is that while it has a conceptual supe-
and Leicht (2007), they developed an algorithm riority to structural equivalence as a definition

5605-Scott-Chap29.indd 442 4/6/2011 12:04:13 PM


POSITIONS AND ROLES 443

of role, it seems to be less successful empirically. networks. Potential applications of two-mode


As noted earlier, there is no compatible measure signed partitioning of two-mode networks include,
of the extent to which two locations are regularly in addition to Supreme Court voting patterns, U.S.
equivalent, and this handicaps the indirect congressional voting, voting in other deliberative
approach to blockmodeling networks in terms of bodies, and voting at the United Nations. For all
regular equivalence. From the vantage point of of these potential examples, the networks are
generalized blockmodeling, there are two large large and very dense. There is a clear need for
issues. One is that so many blocks are consistent establishing sound ways of partitioning these
with the permitted 1-covered block type. They large networks.
range from the one block of structural equivalence The general method proposed for partitioning
to blocks with just one 1 in each row and column. signed networks (Doreian and Mrvar, 1996, 2009;
This is a wide range of variation to include within Mrvar and Doreian, 2009) allows for the differen-
a single definition of regular equivalence. One tial weighting of positive inconsistencies in
consequence is that many equally well-fitting negative blocks and negative inconsistencies in
blockmodels for a given number of positions can positive blocks. However, the differential weight-
be identified in a given network under regular ing has not been explored in any detail and the
equivalence without nonarbitrary ways of select- implications of using this differential weighting
ing one of them. The second stems from the deep needs to be mapped for empirical networks. When
result of Borgatti and Everett (1989) that one sign predominates, it may be necessary
each network has a lattice of regularly equivalent to weight the two types of inconsistencies
partitions. Sometimes these lattices are trivial but differentially. The best ways of doing this are
in most cases they are not. This raises an obvious not known. It seems that potential null blocks
question for generalized blockmodeling. Given in signed networks also have relevance and
multiple exact partitions of a network that are need to be specified. General ways of doing this
consistent with regular equivalence, which is the in a principled fashion are not known and
most appropriate for an ideal blockmodel when establishing such methods forms another open
trying to establish an empirical blockmodel based problem.
on regular equivalence? A formal approach to
role structures based on regular equivalence is
provided by Lerner (2005).
Open General Problems for
Blockmodeling
Partitioning signed networks
A general criticism of the use of the relocation Boundary problems
algorithm in the direct blockmodeling approach is The blockmodeling approach is avowedly
that there is no guarantee that the use of the positional because the location of an actor is
method provides the optimal solutions or yields defined as the pattern of ties to and from all
all of the equally well-fitting partitions for a other locations in the network. This implies that
particular network. Brusco et al. (2010) provide identifying the boundary of a network correctly is
convincing evidence that for “small problems” very important. Laumann et al. (1983) pointed
(where the number of vertices is less than 30 to “the boundary problem” as important for
to 35) the relocation method does return all of the network analysis in general. However, its impor-
optimal partitions of a signed one-mode network. tance for positional approaches to the analysis
This was done through the comparison of the of network structure is particularly acute. We
performance of the relocation method with a simply do not know the implications of an
branch and bound algorithm that is guaranteed to incorrect identification of a network boundary for
return all of the optimal partitions. However, generalized blockmodeling beyond the intuition
while the relocation algorithm can handle much that the approach is highly vulnerable to identify-
larger signed networks, the branch and bound ing the boundary incorrectly. Establishing some
method cannot. So the guarantee cannot be bounds of the sensitivity to identified blockmod-
extended to larger networks. Also, the two algo- els (as positions and roles) is an important open
rithms are not identical in terms of the difficulties problem.
they encounter with different network features
such as size, density of ties, and the relative
proportions of positive and negative ties. Brusco Measurement errors
et al. (2010) advocate using both algorithms, We also have a limited understanding of the
rather than relying on only one, whenever this is vulnerability of both generalized and classic
possible. And the idea of a guarantee, at this time, blockmodeling to measurement errors. This
has not been extended to signed two-mode problem takes two forms. One is that data can be

5605-Scott-Chap29.indd 443 4/6/2011 12:04:13 PM


444 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

missing and that often, perhaps too often, a tie that empirical networks. There is no obvious guarantee
is recorded as a null tie is really a case of missing that, with a “high” value of the criterion function
data. The other is that, while some value for a tie a delineated partition “really” is consistent with
is recorded, the actual value recorded may be of the idea of structural equivalence. Establishing
the wrong magnitude. The presence of the first better bounds is an important open problem and
type of measurement error can affect seriously insights may well come from fitting blockmodels
the blockmodeling of both binary and valued net- based on stochastic equivalence of the sort
works and the presence of the second is most suggested by Nowicki and Snijders (2001). An
acute for blockmodeling valued networks. impression about the nature and quality of obtained
Obtaining a better understanding of the vulnera- partitions can be gained also from where the value
bility of establishing blockmodels to errors of of their criterion functions lie in the distribution of
measurement is an important open problem. There values of criterion function obtained using the
are proposals for imputing values for missing Monte Carlo method.
data (e.g., Huisman, 2009) and we may need
to assess the impact of imputation methods for
missing data on delineated blockmodels or roles Blockmodeling large networks
and positions. There are two broad ways of For generalized blockmodeling, using the direct
making these assessments. One is through con- approach, the predominant methods are based
trolled simulations where variations in (fictitious) on local optimization algorithms. However, the
recorded data are generated and the impacts on current versions of the algorithms can handle
blockmodeling results are assessed. The other is to networks having some hundreds of units. Even for
start with real data and introduce controlled networks of this limited size we do not know if
amounts of measurement error and examine the they will return all of the optimal partitions. And
results (Doreian, 2006). their use is impossible for larger networks. To
make progress we need to formulate blockmodels
that can be fitted for large networks and develop
Assessing fits of blockmodels faster algorithms, or we need more effective
In making comparisons between partitions, based heuristics. Indirect approaches appear to be much
on either structural or regular equivalence, using more useful for large networks, yet their
direct and indirect blockmodeling approaches, applicability is for a very restricted range of
Doreian et al. (1994) showed that the minimized equivalence types. In the main, structural
values of the criterion functions for the indirect equivalence – while very restricted – is the only
approach were never lower than those obtained viable option for partitioning large networks as a
via the direct approach. And, in many cases, the whole. However, various forms of preprocessing
values of the criterion functions for partitions of large networks generates reduced networks
obtained when using the indirect approach were that can be analyzed further with regard to
much higher than for the direct approach. However, positions and roles. Those based on different
their argument is partially circular as their connectivity decompositions – for example,
methods are designed to minimize criterion func- weak components, strong components, graph
tions that are defined for a particular equivalence. condensation, symmetric-acyclic decomposition,
There may be alternative and better criterion bi-connected components – can be determined
functions than the ones they considered. The very efficiently.
analyses of Reichardt and White (2007) reopen
this issue, for they use a different criterion
function for a particular definition of equivalence Numbers of positions
than the corresponding one used by Doreian et al. Determining the number of positions is a difficult
(1994, 2005). Establishing better criterion problem for generalized blockmodeling even
functions for many types of blockmodels remains when the networks are not large. The methods
an important open issue. proposed by Handcock et al. (2007) and by
The value of the minimized criterion function Reichardt and White (2007) both include a way of
for structural equivalence for empirical networks establishing the number of positions empirically
can be quite large. When the value of the mini- from the data. This seems important as a general
mized criterion function is zero, or close to zero, feature to be included in blockmodeling. Yet the
it is clear that the delineated blockmodel fits. most useful way of establishing the number
While the criterion function has been minimized, of positions for a blockmodel may rest on a
a high value of the criterion function often stems sound understanding of the substantive processes
from the stringency of it counting all discrepan- driving network tie formation and the generated
cies with null blocks or complete blocks in network structures in given empirical contexts.

5605-Scott-Chap29.indd 444 4/6/2011 12:04:13 PM


POSITIONS AND ROLES 445

For example, friendship formation in a school REFERENCES


system seems most constrained or driven by the
classes and levels into which students are distrib- Airoldi, E.M., Blei, D.M., Fienberg, S.E. and Xing E.P. (2007a)
uted. The best guess for the number of positions, ‘Combining stochastic block models and mixed member-
most likely, is the number of grades in the school ship for statistical network analysis’, in Lecture Notes in
system. Computer Science. Heidelberg: Springer. pp. 57–74.
Airoldi, E.M., Blei, D.M., Fienberg, S.E. and Xing, E.P. (2007b)
Mixed Membership Stochastic Blockmodels. Department of
Dynamic blockmodels Statistics, Carnegie Mellon University.
The origins of blockmodeling are located in Anderson, C.J., Wasserman, S. and Faust, K. (1992) ‘Building
attempts to analyze and understand the operation stochastic blockmodels’, Social Networks, 14: 137–61.
of role systems. Blockmodeling was established Batagelj, V. (1997) ‘Notes on blockmodeling’, Social Networks,
as an effective way of doing this because of its 19: 143–55.
ability to identify positions and roles. As such, it Batagelj, V., Brandenburg, F.J., Didimo W., Liotta, G. and
became a useful empirical method for partitioning Patrignani, M. (2008) ‘Working group report – X-graphs of
social networks. Over time, this meant that it Y-graphs and their representations’. Dagstuhl seminar
could be used for partitioning any network, even 08191, May 4–9, 2008. http://drops.dagstuhl.de/portals/
networks where there appeared to be no obvious index.php?semnr=08191.
connection to role systems. Yet the notions of Batagelj, V. and Ferligoj, A. (2000) ‘Clustering relational
positions and roles acquired a generalized form data’, in W. Gaul, O. Opitz, and M. Schader (eds), Data
that led to establishing well-defined positions, Analysis. Heidelberg: Springer. pp. 3–15.
roles, and role structures in many networks. If Batagelj, V., Doreian, P. and Ferligoj, A. (1992b) ‘An optimiza-
there is an attempt to understand how networks, as tion approach to regular equivalence’, Social Networks, 14:
role structures, form and change, there is a deep 63–90.
problem requiring a solution. Batagelj, V., Ferligoj, A. and Doreian, P. (1992a) ‘Direct and
The presumption underlying most attempts indirect methods for structural equivalence’, Social
to delineate network structures using blockmode- Networks, 14: 121–35.
ling ideas is that the “surface networks” we Batagelj, V., Ferligoj, A. and Doreian, P. (2007) ‘Blockmodeling
observe are the manifestation, or indicators, of of 3-way networks’, in P. Brito, G. Cucumel, P. Bertrand,
an underlying “more fundamental structure” of and F. de Carvalho (eds), Selected Contributions in Data
the network. Blockmodeling, regardless of the Analysis and Classification. Heidelberg: Springer. 151–59.
specific forms used, allow us to identify this fun- Borgatti, S.P. and Everett, M.G. (1989) ‘The class of all regular
damental structure. And we can do this at various equivalences: Algebraic structure and computation’, Social
points over time. If the structure remains the Networks, 21: 183–88.
same over the observation period this is useful Borgatti, S.P. and Everett, M.G. (1992) ‘Regular blockmodels of
knowledge. And if it changes over time then it is multiway multimode matrices’, Social Network, 14: 91–120.
possible to create a sequence of blockmodels Breiger, R.L., Boorman, S.A. and Arabie, P. (1975) ‘An
that capture the fundamental structure as it algorithm for clustering relational data with applications
changes. This, too, will be useful knowledge but for social network analysis and comparison to multidimen-
the sequence of blockmodels fitted at successive sional scaling’, Journal of Mathematical Psychology, 12:
time points is only a sequence of descriptions. 328–83.
If a social structure as a network really is chang- Brusco, M. J. and Steinley, D. (2006) ‘Inducing a blockmodel
ing then it is the fundamental structure that is structure on two-mode data using seriation procedures’,
changing, with the observed changes being Journal of Mathematical Psychology, 50: 468–77.
indicators of the underlying fundamental change. Brusco, M. J. and Steinley, D. (2007) ‘An evaluation of a vari-
If these changes are not just random events, then able-neighborhood search method for blockmodeling of
we need to account for them. When a system is two-mode binary matrices based on structural equiva-
evolving over time, most likely, there will be lence’, Journal of Mathematical Psychology, 51: 325–38.
coherent process rules driving these changes. Brusco, M., Doreian, P., Mrvar, A. and Steinley, D. (2011)
Mere descriptions of the changes involved, even ‘Two algorithms for relaxed structural balance partitioning:
if couched in terms of blockmodels, seem insuf- Linking theory, models and data to understand social
ficient. We need to understand the processes network phenomena’, Sociological Methods and Research,
generating structural change and this implies 40: 57–87.
understanding how blockmodels, as representa- Burt, R.S. (1976) ‘Positions in networks’, Social Forces,
tions of positions and role systems, evolve. This 93–122.
is the biggest open problem for generalized block- Cartwright, D. and Harary, F. (1956) ‘Structural balance: A
modeling and understanding the operation of role generalization of Heider’s theory’, Psychological Review,
systems. 63: 277–92.

5605-Scott-Chap29.indd 445 4/6/2011 12:04:13 PM


446 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Davis, J.A. (1967) ‘Clustering and structural balance in Lorrain, F., and White, H.C. (1971) ‘Structural equivalence of
graphs’, Human Relations, 20: 181–87. individuals in social networks’, Journal of Mathematical
Davis, J.A. and Leinhardt, S. (1972) ‘The structure of positive Sociology, 1: 49–80.
interpersonal relations in small groups’, in J. Berger, M. Mrvar, A. and Doreian, P. (2009) ‘Partitioning signed two-mode
Zelditch Jr. and B. Anderson (eds), Sociological Theories in data’, Journal of Mathematical Sociology, 33: 196–221.
Progress, Volume 2. Boston: Houghton Mifflin. pp. 218–51. Newman, M.E.J. and Leicht, E.A. (2007) ‘Mixture models and
Doreian, P. (2006) ‘Some open problems sets for generalized exploratory data analysis in networks’, Proceedings of the
blockmodeling’, in H.-H. Bock, V. Batagelj, A. Ferligoj and National Academy of Sciences USA, 104: 9564–69.
A. Žiberna (eds), Data Science and Classification. Nordlund, C. (2007) ‘Identifying regular blocks in valued
Heidelberg: Springer. pp. 119–30. networks: A heuristic applied to the St. Marks carbon flow
Doreian, P., Batagelj, V. and Ferligoj, A. (1994) ‘Partitioning data, and international trade in cereal products’, Social
networks based on generalized concepts of equivalence’, Networks, 29: 59–69.
Journal of Mathematical Sociology, 19: 1–27. Nowicki, K. and Snijders, T.A.B. (2001) ‘Estimation and
Doreian, P., Batagelj, V. and Ferligoj, A. (2000) ‘Symmetric- prediction for stochastic block structures’, Journal of the
acyclic decomposition of networks’, Journal of Classification, American Statistical Association, 96: 1077–87.
17: 3–28. Nuskesser, M. and Sawitzki, D. (2005) ‘Blockmodels’, in
Doreian, P., Batagelj, V. and Ferligoj, A. (2004) ‘Generalized U. Brandes and Erlebach (eds), Network Analysis:
blockmodeling of two-mode network data’, Social Methodological Foundations. Heidelberg: Springer.
Networks, 26: 29–53. pp. 253–92.
Doreian, P., Batagelj, V. and Ferligoj, A. (2005) Generalized Reichardt, J. and White, D.R. (2007) ‘Role models for complex
Blockmodeling. New York: Cambridge University Press. networks’, The European Physical Journal B – Condensed
Doreian, P. and Mrvar, A. (1996) ‘A partitioning approach to Matter and Complex Systems, 60: 217–24.
structural balance’, Social Networks, 18: 149–168. Roffilli, M. and Lomi, A. (2006) ‘Identifying and classifying
Doreian, P. and Mrvar, A. (2009) ‘Partitioning signed social groups: A machine learning blockmodeling’, in
networks’, Social Networks, 18: 149–68. H.-H. Bock V. Batagelj, A. Ferligoj, and A. Žiberna (eds),
Faust, K. and Wasserman, S. (1992) ‘Blockmodels: Data Science and Classification. Heidelberg: Springer.
Interpretation and evaluation’, Social Networks 14: 5–61. pp. 149–57.
Handcock, M.S., Raftery, A.E. and Tantrum, J.M. (2007) Sailer, L.D. (1978) ‘Structural equivalence: Meaning and
‘Model-based clustering for social networks’, Journal of the definition, computation and application’, Social Networks,
Royal Statistical Society: Series A, 170: 301–54. 1: 73–90.
Heider, F. (1946) ‘Attitudes and cognitive organization,’ Wang, J. and Lai, C.-H. (2008) ‘Detecting groups of similar
Journal of Psychology, 21: 107–12. components in complex networks’, New Journal of Physics,
Holland, P.W., Laskey, K.B. and Leinhardt, S. (1983) 10: 1–26.
‘Stochastic blockmodels: Some first steps’, Social Networks, Wasserman, S. and Anderson, C.J. (1987) ‘Stochastic a
5: 109–37. posteriori blockmodels: Construction and assessment’,
Hsieh, M.-H. and Magee C.L. (2008) ‘An algorithm and metric Social Networks, 9: 1–36.
for network decomposition from similarity matrices: Weber, M. and Denk, M. (2007) ‘Valued blockmodeling for
Application to positional analysis’, Social Networks, 30: input-output applications’, a paper presented at the
146–58. Workshop on Blockmodeling, Faculty of Social Sciences,
Huisman, M. (2009) ‘Imputation of missing network data: Ljubljana.
Some simple procedures’, Journal of Social Structure, 10:1. White, D.R. and Reitz, K.P. (1983) ‘Graph and semigroup
Kemp, C. and Tenenbaum, J.B. (2008) ‘The discovery of struc- homomorphisms on networks of relations’, Social Networks,
tural form’, Proceedings of the National Academy of 5: 193–234.
Sciences USA, 105(31): 10687–92. White, H.C., Boorman, S.A. and Breiger, R.L. (1976) ‘Social
Krackhardt, D. (1987) ‘Cognitive social structures’, Social structure from multiple networks, I Blockmodels of roles and
Networks, 9: 109–34. positions’, American Journal of Sociology, 81: 730–79.
Laumann, E.O., Marsden, P.V. and Prensky, D. (1983) ‘The Žiberna, A. (2007) ‘Generalized blockmodeling of valued
boundary specification problem in network analysis’, in networks’, Social Networks, 29: 105–26.
R.S. Burt and M.J. Minor (eds), Applied Network Analysis: Žiberna, A. (2008) ‘Direct and indirect approaches to block-
A Methodological Introduction. Beverly Hills, CA: Sage. modeling of valued networks in terms of regular equiva-
pp. 18–34. lence’, Journal of Mathematical Sociology, 32: 57–84.
Lerner, J. (2005) ‘Role assignments’, in Brandes and Erlebach Žiberna, A. (2009) ‘Evaluation of direct and indirect
(eds), Network Analysis: Methodological Foundations. blockmodeling of regular equivalence in valued networks
Heidelberg: Springer. pp. 216–52. by simulations’, Metodološki zvezki, 6: 99–134.

5605-Scott-Chap29.indd 446 4/6/2011 12:04:13 PM


30
Relation Algebras and
Social Networks
Philippa Pattison

INTRODUCTION the unobserved social processes from which they


emerge. In addition, structural regularities may
Algebraic approaches have played an important point to the likelihood of common consequences
historical role in formulating conceptions of for the actors involved; as a result, their identifica-
structure and structural change in networks. In tion may afford potential predictive power.
this chapter, I outline some of the algebraic Examples of such regularities abound in the
constructions that have informed an understand- networks literature and include such features as
ing of structure in social networks and argue that tie reciprocity – the tendency for mutual directed
these constructions make what are termed relation ties to occur (e.g. as the result of a reciprocity
algebras a natural framework for algebraic process); structural or regular equivalence – the
network analysis. I describe a number of ways in tendency for some actors to be related in the
which this algebraic characterisation of networks same way to the same or similar alters (perhaps
may be useful for network analysis and discuss through a process of social role differentiation);
some contemporary challenges for which it is clustering – the tendency for dense subgraphs to
likely to be particularly well suited. occur in a network (e.g. as the result of tie closure
processes); the presence of network hubs – the
tendency for high degree nodes to occur (possibly
as the result of an underlying heterogeneity
Why are algebraic models among nodes, or as the result of an endogenous
of interest? attraction process); and the presence of cycles –
the tendency for closed paths to occur in a
Social networks are generally construed as network (possibly as the result of a generalised
discrete entities, describing a pattern of social exchange process).
relations among a particular set of actors at a Algebraic constructions are of particular inter-
particular moment in time. Each time we observe est in this context because they provide a language
one or more social networks for a set of actors, we for expressing regularities in social forms,
see a particular instantiation of one of many pos- and hence they provide an important part of
sible relational patterns, and it is often of interest the process of their identifcation. In the next
to understand what kinds of structural regularities section, a collection of specific algebraic con-
characterise that particular pattern. Structural structions are described, and these are then used as
regularities are likely to occur as the result of a the basis for defining a relation algebra. In the
potentially small number of common though following sections, several applications of this
unobserved social processes driving the formation algebraic characterisation are outlined. The
of network ties. The form of these regularities chapter concludes with a discussion of future
provides a useful empirical guide to the nature of challenges and prospects.

5605-Scott-Chap30.indd 447 4/13/2011 2:39:29 PM


448 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

History of algebraic approaches social actors. Some ties, such as ‘seeks advice
from’ are regarded as directed, so that the tie from
Algebraic approaches to understanding relational actor l to actor k is distinguished from the tie from
network structures are often traced to earlier actor k to actor l, whereas others, such as ‘exchange
work on the analysis of kinship systems, where information’ may be regarded as nondirected,
structural regularities were argued to be associ- with no distinction between the tie from k to l and
ated with the use of certain distinctive relational the tie from l to k. In the former case, the tie is
and classificatory terms (e.g. Boyd, 1969; Boyd regarded as a property of the ordered pair (k, l) of
et al., 1972; White, 1963). actors; in the latter, the tie is a property of the
White foreshadowed as early as 1963 the unordered pair {k, l}. We also regard the ties as
potential application of these algebraic approaches labelled, and we distinguish ties with different
to a much broader and more contemporary array labels: a tie with the label ‘is a friend of’, for
of social relationships. Nadel (1957) appealed to example, is regarded as distinct from a tie with the
an abstract set-theoretic formulation in an attempt label ‘seeks advice from’. Formally, we denote the
to develop a formal account of interlocking role set of actors among whom linkages are defined as
structures within social systems. In a now well- N = {1, 2, . . . , n} and the set of relation labels for
known paper, White, Boorman and Breiger (1971) the ties as K = {1, 2, . . . , r}. If there is a tie with
presented the concept of structural equivalence of label m from actor k to actor l, we write Xm(k, l) =
two actors in a social system as a potent analytical 1; if there is no such tie, we set Xm(k, l) = 0. In
concept, giving rise to the concept of a block- cases where only one type of tie label is of interest
model, an assignment of actors to social positions (i.e. r = 1), we can omit the subscript m since there
and a description of the social relations among is no ambiguity in the label for the relation.
those positions. In a less well-known companion For each relation label m, we can regard the set
paper, Boorman and White (1976) developed a of ties with label m in terms of three equivalent
representation of role structures embedded in representations.
social networks in terms of algebraic semigroups. First, Xm is a binary relation on N. A binary
An important connection between these two papers relation on the set N is simply a set of ordered
resides in the observation that the semigroup of a pairs of members of N. Any binary relation
set of relations for a given set of actors is identical Xm is a subset of the set N × N of all possible
to the semigroup of its associated blockmodel ordered pairs of members of N; in other words,
(Lorrain and White, 1971). These papers spawned Xm ⊆ N × N.
a series of important generalisations and a deepen- Second, the ties with label m may be construed
ing understanding of the relationship between as a directed graph if Xm is directed, or simply a
partitions among actors in a collection of social graph if Xm is nondirected. The node set of the
networks and the algebraic structure of those net- graph or directed graph Gm is the set N. If the
works (Borgatti et al., 1989; Boyd et al., 1972; relation Xm is directed, the arc set Em = {(k, l):
Kim and Roush, 1984; Pattison, 1982, 1993; Xm(k, l) = 1}, whereas if Xm is nondirected,
White and Reitz, 1983; Winship, 1988). the edge set Em = {(k, l): Xm(k, l) = 1 and k < l}.
Further work extended the set of algebraic tools A graph drawing assigns a point or node to each
available for analysing these algebraic representa- actor in the node set and an edge or arc is drawn
tions (Pattison and Bartlett, 1982; Pattison, 1982; from the point assigned to actor k to the point
Boyd, 1990). Algebraic representations were also assigned to actor l if Xm(k, l) = 1. By convention,
generalised to accommodate a richer array of edges are drawn as lines and arcs are drawn as
potential relational contexts (Breiger and Pattison, arrows.
1986; Mandel, 1983; Pattison, 1989; Winship and Third, Xm may be regarded as an n × n binary
Mandel, 1983; Wu, 1983) as well as additional array recording the presence or absence of a tie
relational information (Pattison, 1993). In addi- with label m between each pair of actors; Xm is
tion, a number of methods for extracting structural referred to as the adjacency matrix for the directed
regularities from potentially stochastic network graph Gm. The matrix has a 1 in the cell (k, l) if
observations began to be developed; I discuss Xm(k, l) = 1; otherwise, the entry in cell (k, l) is 0.
these approaches further below. In the case that the relation with label m
is nondirected, then Xm(k, l) = 1 if and only if
Xm(l, k) = 1 and thus Xm is a symmetric matrix. In
many contexts, we exclude consideration of self-
RELATION ALGEBRAS FOR SOCIAL ties of the form Xm(k, k) in the set of observed
NETWORKS relations, so that there are no loops in the graph
or the directed graph corresponding to each
A social network can be conceptualised as a set of relation, and the entries on the diagonal of its
social linkages or ties among members of a set of adjacency matrix are regarded as structural zeros.

5605-Scott-Chap30.indd 448 4/13/2011 2:39:29 PM


RELATION ALGEBRAS AND SOCIAL NETWORKS 449

Table 30.1 Three representations of a directed network


relation on a node set N = {A,B,C,D,E,F}
Directed graph Matrix Relation
B 011000 {(A,B), (A,C), (B,A), (B,D),
A
100100 (C,D), (C,F), (D.E),
E 000101 (D.F), (E,B), (E,D),
D 000011 (E.F), (F.D), (F,E)}
010101
C
F 000110

For convenience, however, we set Xm(k, k) = 0 relation Y′ of a relation Y to be the relation for
and we allow nonzero values in certain relations which Y′ (k, l) = 1 if and only if Y(l, k) = 1; other-
derived from the observed relations below. wise, Y′ (k, l) = 0. For example, the converse of
Table 30.1 illustrates the three representational the relation shown in Table 30.2a appears in
forms in the directed case. Table 30.2c. Many role terms reflect the importance
of converse relations in everyday dialogue about
social relations; for example, a parent and child
Algebraic operations stand in converse relations to one another, as do a
teacher and student, a leader and follower, an
In describing relationships among actors, we advisor and advisee and so on.
typically make use of a variety of algebraic
operations even though we may generally be
unaware of these algebraic underpinnings. We Complement
consider a number of such operations in turn. We also recognise the absence of relationships in
many instances; for example, we may be aware
that one actor ‘is not acquainted with’ another, or
Converse that one actor ‘does not seek advice from’ another.
The asymmetry in many directed relations is well The absence of ties with a particular label can be
recognised in our language for describing them. captured by the complement of the relation: we
For example, if actor k ‘reports to’ actor l, then we define the complement Y – of a relation Y to be the
recognise actor l as ‘the boss of’ actor k. We can relation for which Y –(k, l) = 1 – Y(k, l). (Where
regard the relation ‘is the boss of’ as the converse self-ties are disallowed, we could choose to
of the relation ‘reports to’: we define the converse disallow them in the complement Y – as well;

Table 30.2 Relational operations on two relations

(a) (b) (c) (d)


Y1 Y2 Y1′ (converse) Y1– (complement)
011000 010001 010000 100111
100110 100001 100000 011001
000101 000001 100000 111010
000011 000011 011011 111100
000101 000101 010101 111010
000110 000110 001110 111001
(e) (f ) (g) (h)
Y1∩Y2 (intersection) Y1∪Y2 (union) Y1°Y2 (composition) Y1* (star)
010000 011001 100001 111111
100000 100111 010011 111111
000001 000101 000111 001111
000011 000011 000111 000111
000101 000101 000111 000111
000110 000110 000111 000111

5605-Scott-Chap30.indd 449 4/13/2011 2:39:29 PM


450 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

however, we do not make that choice here and which, as noted above, is also equivalent to
instead we set Y –(k, k) = 1 if Y(k, k) = 0.) The Y∩Z = Y. We also use the fact below that the union
complement of the relation in Table 30.2a is and intersection relations are related through
shown in Table 30.2d. Role descriptors may also complementation, that is,
reflect complementary relations; for example, a
stranger is a person who is not in an acquaintance Y∩Z = (Y –∪Z –) –
relation.
and

Intersection Y∪Z = (Y –∩Z –) –.


In some cases, ties with distinct labels link a
particular pair of actors; in this case, we often As a result, we can construct the intersection
refer to the tie as multiplex and contrast it with the operation from the union operation, and vice
case where only a single or uniplex tie links the versa, provided that the complement operation is
actors. The presence of multiple ties can be available for use.
expressed in terms of intersections among
relations. We define the intersection Y∩Z of
two relations Y and Z to be the relation for Composition
which Y∩Z(k, l) = 1 if and only if Y(k, l) = 1 and A particularly important operation on relations
Z(k, l) = 1; otherwise, Y∩Z(k, l) = 0. Table 30.2e allows us to trace sequences of ties of various
shows the intersection of the relations in types across a network: for example, we may refer
Table 30.2a and Table 30.2b. Everyday referents to ‘my friend’s friend’ or the ‘friend of my friend’.
may invoke intersection; for example, we In this case, ‘is the friend of my friend’ may be
may refer to a friend from work as a person to regarded as a compound relation, arising as the
whom we have both friendship and co-worker composition of ‘is a friend of’ and ‘is a friend of’.
relations. For example, if actor l is the friend of actor k, and
The intersection operation also allows us actor h is the friend of actor l, then actor h is the
to represent partial ordering among relations in friend of a friend of actor k. In some cases, such
a very natural way. We can define a partial as ‘is the sister of my parent’ or ‘is the parent of
ordering among relations as follows: for two my parent’, specific composite relation labels
binary relations Y and Z, let Y ≤ Z if and only such as ‘is the aunt of’ and ‘is the grandparent of’
if Z(k, l) = 1 implies Y(k, l) = 1 for any ordered have emerged to describe the compound relation;
pair (k, l) of actors. In other words, Y ≤ Z if the set in other cases, we use the compound form in
of ordered pairs connected in Y is a subset of the everyday language.
set of ordered pairs connected in Z. It can readily We can define composition more formally in the
be seen that: following terms. The composition Y°Z of two
relations Y and Z is the relation with ordered pairs
{(k, h): {(k, l) ∈ Y and {(l, h) ∈ Z for some actor
Y≤Z is equivalent to Y∩Z = Y. l ∈ N}. Of course, we may form compound relations
among compound relations, giving rise to more com-
plex forms such as ‘is the friend of my friend of my
Union friend’ or ‘is the brother of the wife of my boss’.
It may also be of interest to describe the presence The composition operation also has natural
of any of a number of distinct types of relations expression in graph-theoretical and binary matrix
among actors, and for this the union operation is terms. From a graph-theoretical perspective, we
useful. We define the union Y∪Z of two relations can think of each composite relation Y°Z as a set
Y and Z to be the relation for which Y∪Z(k, l) = 1 of all walks with the label YZ among actors in N:
if and only if Y(k, l) = 1 or Z(k, l) = 1; otherwise actor k is connected to actor l by a walk with label
Y∪Z(k, l) = 0. Table 30.2f shows the union of YZ if there is some actor h such that k is connected
relations in Tables 30.2a and 30.2b. Common role to h by a Y tie and h is connected to l by a Z tie
descriptors may also refer to the union of (e.g. see Pattison, 1993). If Y and Z are themselves
relations; for example, a relative is a person to compound relations, we can define walks making
whom we stand in one of many possible kinship up more than two ties. The binary matrix of the
relations. composite relation Y°Z is the Boolean product of
As for the intersection, there is a natural the binary matrices corresponding to the relations Y
expression for the partial ordering of relations in and Z; in other words,
terms of the union operation; in this case:
Y°Z(k, l) = [Y(k, 1)∩Z(1, l)] ∪ [Y(k, 2)∩Z(2, l)]
Y≤Z is equivalent to Y∪Z = Z, ∪ . . . ∪ [Y(k, n)∩Z(n, l)]

5605-Scott-Chap30.indd 450 4/13/2011 2:39:30 PM


RELATION ALGEBRAS AND SOCIAL NETWORKS 451

The composition of the relation in Table 30.2a this basic set, hence bringing in the derivative
with the relation in Table 30.2b is shown in operations of union and star as well.
Table 30.2g. Complementation allows us to talk about absent
Of the five relational operations just defined, relationships as well as those that are present, and
converse and complement are unary operations many authors have highlighted the absence of
since they transform one relation into another, relationships in their discussions of significant
whereas intersection, union and composition are relational patterns, including White et al. (1971)
binary operations, transforming a pair of relations in descriptions of blockmodel patterns, Granovetter
into another relation. (1973) on patterns characterizing strong and weak
ties, Freeman (1979) on patterns characterizing
various forms of centrality in networks, and Burt
Special relations (1992, 2005) on patterns characterizing structural
We also define three particular relations with holes and certain forms of social capital. The
important properties: union operation adds the capacity to create aggre-
gate relational categories from more elemental
• The null relation O is the relation with no ties: relationship terms; examples include ‘relative’
O(k, l ) = 0 for all pairs k, l of actors; from various kin term descriptors, or ‘social con-
• The universal relation U = O – is the comple- tact’ from terms such as ‘acquaintance’, ‘friend’,
ment of O and is the relation with all possible ‘relative’, ‘neighbour’ and ‘co-worker’. The star
ties: U(k, l ) = 1 for all pairs k, l of actors; and operation adds the valuable capacity to distinguish
• The identity relation I is the relation with ordered pairs of network actors for which a basic
self-ties only: I(k, l ) = 1 if k = l, and I(k, l ) = 0 connectivity condition holds, or not.
if k ≠ l, for all k, l.

These special relations are also termed nullary Relation algebras


relations.
For a given set N of actors, imagine the collection
RN of all possible binary relations on N. If N com-
Star prises n actors, then RN has 2n×n elements, since
Finally, we define the unary star operation for a each of the n×n ordered pairs of actors in N may
relation Y: have a tie or not. Using Y, Z, W, . . . to refer to
various relations in RN, we may consider the
Y* = I ∪ Y ∪ Y°Y ∪ Y°Y°Y ∪. . . . application of the various operations just defined
to members of RN and we can see that the opera-
The star operation adds self-ties to the ties in Y as tions yield other members of RN. Indeed, the set of
well as the sets of all ordered pairs who are relations RN and the set of operations F = {′, –,∪,°}
connected by some composite of Y ties. It is (or, equivalently, F = {′, –,∩,∪,°}) give rise to an
the reflexive and transitive closure of the algebra termed a relation algebra (e.g. Birkhoff,
relation Y, that is, as the least relation that contains 1967; Tarski, 1941).
Y and is both reflexive (Y* ⊇ I) and transitive More generally, we can consider algebras of
(Y* ° Y* ⊆ Y*). An ordered pair (k, l) is included the form [A, F], where A is a set of relations,
in Y* if k is identical to l or if there is some path F = {′, –,∪,°} is a set of operations, and A is closed
of Y ties from k to l. Thus the star operation yields under F: that is, for any relations Y, Z∈A, the
the reachability pattern for the relation Y, since it relations Y′, Y –, Y∩Z, Y∪Z, and Y°Z are also
includes pairs (k, l) of actors in which either k is members of the set A. We can then describe a
the same as l or l can be reached from k by a relation algebra [A, {′, –,∪,°}] as an algebra whose
sequence of Y ties. The application of the star operations satisfy a number of rules, or axioms.
operation to the network in Table 30.2a yields the The axioms for a relation algebra have been
network in Table 30.2h. set out in various forms by Alfred Tarski and his
collaborators, following foundational work in the
calculus of relations by Augustus de Morgan,
Are other operations of value? Charles Sanders Peirce and Ernst Schröder.
Arguably the list of operations just described is Specifically, [A, {′, –,∪,°}] is a relation
sufficient to describe many patterns and regulari- algebra if the following axioms hold for all
ties of interest in networks. White (1992) made a Y, Z, W, . . . ∈ A (e.g. see Birkhoff, 1967; Givant,
strong case for including at least the converse, 2006; Maddux, 1991):
intersection and composition operations in any
attempt to disciriminate among social structural [RA1] Y∪Z = Z∪Y
forms; we have here added complementation to [RA2] Y∪(Z∪W) = (Y∪Z)∪W)

5605-Scott-Chap30.indd 451 4/13/2011 2:39:30 PM


452 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

[RA3] (Y –∪Z) – ∪ (Y –∪Z –) – = Y Although Y* is necessarily included in any rela-


[RA4] (Y°Z )°W = Y°(Z°W ) tion algebra containing I and Y, the potential
[RA5] Y°I = Y importance of the operation makes it a valuable
[RA6] (Y′)′ = Y addition, particularly where partial algebras are
[RA7] (Y°Z )′ = (Z′)°(Y′) under consideration (see below).
[RA8] (Y∪Z )′ = Y′∪Z′
[RA9] (Y∪Z )°W = (Y°W )∪(Z°W) RA(N) and RAT(N)
[RA10] (Y′°(Y°W )–) ∪ W – = W –
In the case in which A comprises the set RN of
It may be noted that the operations ∩ and * have all binary relations on a set N, we write RA(N) =
been omitted from the list of operations in F since [RN, {′, –,∪,°}] and RAT(N) = [RN,{′, –,∪,°,*}].
they can readily be defined in terms of union and
complementation, as noted above. Many of these
axioms are familiar from other algebras. For The relation algebra generated by
example, RA1 refers to the commutativity of an observed set of relations
the union operation; RA2 and RA4 refer to the In empirical contexts we are not necessarily inter-
associativity of the union and composition opera- ested in all possible relations on a set of actors.
tions, respectively; RA8 and RA9 refer to the Rather, we are likely to have observed a small
distributivity of the converse and composition subset Aobs of specific relations on N, each with a
operations, respectively, over union; and RA5 different label, such as ‘works with’ and ‘seeks
establishes the special relation I as an identity for advice from’. It is helpful to define A to be the
the composition operation. closure of Aobs under the set F = {′, –,∪,°} or
Subsets of these axioms also describe other {′, –,∪,°,*} of operations; in other words, A is the
algebraic forms. For example, axioms RA1 to smallest set of relations that contains Aobs and is
RA3 establish that [A, { –,∪}] is a Boolean closed under F (that is, any operation in F
algebra under the union and complementation applied to any relation or pair of relations – as
operations. Axioms RA4 and RA5 establish that appropriate – in A yields an element in A). The
[A, {°}] is a monoid with identity I under composi- algebra [A, F ] is then the algebra generated by
tion; moreover, in conjunction with RA4 Aobs under F and [A, F] is a relational algebra if
and RA5, axioms RA6 and RA7 establish that F = {′, –,∪,°} and a relational algebra with
[A, {′,°}] is a monoid with identity in which the transitive closure if F = {′, –,∪,°,*}. Suppose, for
converse operation is an involution with respect to example, that we have observed relations of work
composition. collaboration (Y1) and advice-seeking (Y2) among
Axiom RA10 is due to Tarski (1941), but other members of a professional firm. In this case, the
equivalent axiomatisations are possible, as, for observed set of generator relations is Aobs =
example, Maddux (1991) explains. Pratt (1990), {Y1,Y2} and relations in A can be obtained by suc-
for example, showed that the equations for a cessive application of operations in F.
Boolean monoid together with: For example, initial application of all opera-
tions in F = {′, –,∪,°,*} to relations in A1 = Aobs
[RAT] ((Z –°Y′) – °Y )∪Z = Z∩(Y′°(Y°Z ) –) – yields A2 = {Y1′, Y2′, Y1–, Y2–, Y1∪Y1, Y1∪Y2,
Y2∪Y1, Y2∪Y2, Y1°Y1, Y1°Y2, Y2°Y1, Y2°Y2,
provide a complete equational axiomatisation for Y1*, Y2*}. Some of these relations in A2 will be
relation algebras. distinct from those in Aobs whereas others will
be identical, either because of the axioms RA1 to
RA10 that govern the operations or because of the
Relation algebra with transitive particular patterns of ties in the relations involved.
closure For example, we know from RA1 that Y1∪Y2 =
If the set F = {′, –,∪,°,*} also includes the unary Y2∪Y1 no matter what specific pairs are linked by
star operation, [A, F ] is termed a relation algebra Y1 and Y2, whereas it may happen to be true that
with transitive closure (e.g. Pratt, 1990), also Y1°Y2 is equal to Y1 for a specific pair of relations,
satisfying all of the axioms RA1 to RA10 above. Y1 and Y2. We can consider each relation in A2 in
In addition, star is defined by: turn, removing it from A2 if it is equal to some
element in A1 or an earlier relation in A2, recording
[S1] I ≤Y* such equalities as equations of the algebra.
[S2] Y°Y* ≤Y* We then apply operations in F to the distinct
set of relations in A1 ∪ A2 to obtain a set A3 of
and additional distinct relations and additional equa-
tions, and we continue this process until no
[S3] (Y*)°Z ≤ Z ∪ (Y*)°((Y°Z)∩Z –). new distinct relations are generated. We will then

5605-Scott-Chap30.indd 452 4/13/2011 2:39:30 PM


RELATION ALGEBRAS AND SOCIAL NETWORKS 453

have constructed the algebra [A, F ] = generated network relations. Boorman and White (1976)
by Aobs and F. The equations generated in proposed applying such an approach to a block-
the process of algebra construction represent model constructed from one or more relations,
structural regularities characteristic of relations in and thus of developing a more exact understand-
the generator set. ing of relational patterns at the level of relations
among social positions in the network, repre-
sented by blocks in a blockmodel, rather than at
the level of individual actors. A number of exam-
A GENERALISED AXIOM OF QUALITY ples of this approach can be found in the literature
(for example, Mullins et al., 1977; Breiger and
The construction just described relies on a gener- Pattison, 1978). Pattison (1993) used this approach
alised version of what Boorman and White (1976) to develop an extended capacity for structural
termed the Axiom of Quality: ‘Regard as equal any analysis in the case of partially ordered semi-
pair of relations comprising exactly the same set groups built from blockmodels; Pattison (2009)
of ordered pairs and refer to the equality as an generalised this structural analytic approach to
equation in the relation algebra generated by the quite general algebraic forms and hence also to
generator set Aobs’. relation algebras.
Application of the generalised Axiom of
Quality leads to equations in the relation algebra
(or relation algebra with transitive closure). With Comparing relation algebras
such equations, many important features of One particular application of this approach
network relations can be expressed. For example: deserves special mention as it provides the means
to make comparisons of structural regularities
• The relation Y is symmetric if Y = Y ′ across relation networks on distinct actor sets. An
• The relation Y is reflexive if Y ∩ I = I• important construction is a structure-preserving
The relation Y is transitive if Y °Y ∩ Y = Y °Y mapping or homomorphism from the relation
• The relation Y is an equivalence relation if Y = algebra associated with a set of relations on one
Y ′, Y ∩ I = I and Y °Y ∩ Y = Y °Y actor set to the relation algebra associated with
• The relation Y is a permutation relation a simiar set of relations on a second actor set.
if Y °Y ′ ∩ Y ′°Y = I We assume a set of relations Aobs = {Y1, Y2, . . ., Yk}
• The relation Y is a quasi-order if Y ∩ I = I and on an actor set N as well as a set of relations
Y °Y ∩ Y = Y °Y Bobs = {W1,W2, . . .,Wk} on a second actor set M.
• The relation Y is antisymmetric if Y ∩ Y ′∩ I = We assume that the relation Yj is comparable to
Y ∩ Y′ the relation Wj; indeed, in most cases we
• The relation Y is a partial order if Y ∩ Y ′∩ I = will assume that they are described by identical
Y ∩ Y ′, Y ∩ I = I, and Y °Y ∩ Y = Y °Y relational terms.
• The relation Y is strongly connected if Y * = U A homomorphism from an algebra [A,F ]
• The relation Y is weakly connected if generated by a set of relations Aobs = {Y1,Y2, . . .,Yk}
(Y ∪ Y ′)* = U on a set N onto an algebra [B, F ] generated by a
set of relations Bobs = {W1,W2, . . .,Wk} on a set M
is a mapping ϕ: S → T such that, for all Y, Z ∈ A:

APPLICATIONS OF RELATION ϕ(Y′) = ϕ(Y)′, ϕ(Y –) = ϕ(Y) – and ϕ(Y*) = ϕ(Y )*;
ALGEBRAS AND RELATION
and
ALGEBRAS WITH TRANSITIVE
CLOSURE ϕ(Y∪Z ) = ϕ(Y)∪ϕ(Z ) and ϕ(Y°Z) = ϕ(Y ) °ϕ(Z ).

Four distinct ways of utilising the algebraic The algebra [B, F] is termed a (homomorphic)
constructions just described have emerged in the image of [A, F], and we write B = ϕ(A). Each
literature. I briefly discuss each of these approaches homomorphism ϕ from [A, F] onto [B, F] has a
in turn. corresponding equivalence relation π on A termed
a congruence relation in which (Y, Z) ∈ π if and
only if ϕ(Y ) = ϕ(Z).
Construction and analysis If [B, F ] is a homomorphic image of [A, F ], then
of the full algebra its algebra has all of the equations of [A, F ], plus
some additional ones. It may therefore be regarded
For small networks, it is feasible to analyse the as an ‘abstraction’ of [A, F ] in the sense that
full relation algebra generated by one or more it makes fewer relational distinctions than [A, F ].

5605-Scott-Chap30.indd 453 4/13/2011 2:39:30 PM


454 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Of course, relation algebras are strictly comparable induced by the mapping ψ (so that k, l ∈ ρh for
in this sense only if one is a homomorphic image some h if ψ(k) = ψ(l )). Let the number of elements
of the other. Nonetheless, we might regard them as in ρ1 and ρ2 be n1 and n2, respectively. Let D
‘similar’ if they share many homomorphic images. be any subset of ρ1 of i elements or, if i > n1, let
In the context of semigroup algebras (or monoids), D = ρ1. Then, for any m = 1, 2, . . ., r, the set
Boorman and White proposed that the largest {l: l ∈ ρ2 and Ym(k, l ) = 1 for some k ∈ D} has at
shared homomorphic image (the so-called joint least min(i,n2) elements. The condition G1 is also
homomorphic image) is a useful construction for known as the outdegree condition and Gn is also
comparing network algebras. Bonacich (1980; termed the indegree condition. A network
also Bonacich and McConaghy, 1979; McConaghy, homomorphism that satisfies both G1 and Gn is
1981), on the other hand, argued that the smallest termed regular.
semigroup algebra containing each of two network Kim and Roush demonstrated that if ψ is
semigroups (the so-called common structure a network homomorphism from one multiple
semigroup) was a more appropriate representative network onto another that satisfies the condition
of common semigroup structure. As Pattison and Gi, then there is a homomorphism mapping the
Breiger argued, both of these constructions are semigroup of the first onto the semigroup of the
useful though for different purposes. The joint second.
homomorphic image provides a representation of A more general condition combines the
shared homomorphic images whereas the common condition Gi with what Pattison (1982) termed the
structure semigroup provides a representation of central representatives condition. Let ψ be a
shared equations. network homomorphism. Then ψ satisfies the
condition Gim if, for each class ρ of elements of N
induced by ψ,
Linking homomorphisms of a relation
algebra to network blockmodels • there exists a central subset C of ρ such that for
A second important strategy for understanding any Xm
structural regularities is to determine the conditions
• Ym(k, l ) = 1 for some k ∈ ρ implies Ym(k*, l )
under which network homomorphisms induce
= 1 for some k* ∈ C, and
homomorphisms of the network semigroup.
• Ym(l, k) = 1 for some k ∈ ρ implies Ym(l, k*)
A network homomorphism from a multiple
= 1 for some k* ∈ C; and
network {Y1, Y2, . . ., Yr} on actor set N to a
multiple network {W1, W2, . . ., Wr} on actor set M • if C* denotes the union of central subsets C, then
is a mapping ψ from N onto M such that the central subsets C satisfy Kim and Roush’s
(a) Ym(k, l ) = 1 implies Wm(ψ(k), ψ(l )) = 1, for any condition Gi on the network defined on C*.
k, l, m; and (b) Wm(i, j) = 1 for some i, j implies
that Ym(k, l ) = 1, for some k, l such that ψ(k) = I If each central subset C comprises a single
and ψ(l) = j. The network on M is termed the actor, then the condition is equivalent to Pattison’s
image of the network on N under the mapping ψ. central representatives condition, while if each
The mapping ψ satisfies the structural central subset C comprises the whole of the
equivalence condition if for any m, and for any equivalence class on N induced by ψ, it is equiva-
k, l ∈ N, ψ(k) = ψ(l) if and only if: lent to the condition Gi. Kim and Roush (1984)
showed that if one network can be mapped onto
• Ym(k, j ) = 1 iff Ym(l, j ) = 1 for any j ∈ N; and another by a network homomorphism satisfying
• Ym( j, k) = 1 iff Ym( j, l ) = 1 for any j ∈ N. the condition Gim, then there is a homomorphism
from the semigroup of the first to the semigroup
If two multiple networks are related by a of the second. The condition Gim is the most
network homomorphism satisfying the structural general condition known that guarantees the exist-
equivalence condition, then their semigroups are ence of such a homomorphism.
isomorphic and they can be said to possess the The constructions just described are readily
same relational structure (Lorrain, 1975; Lorrain defined for relation algebras and relation
and White, 1971). algebras with transitive closure. The joint
The more general question of the conditions homomorphic image of two algebras [A, F ] and
under which a homomorphism between two [B, F ] is simply the algebra with the greatest
networks induces a homomorphism between their number of distinct relations that is a homomorphic
semigroups has been addressed by Kim and image of both [A, F ] and [B, F ]. The joint relational
Roush (1984). algebra of [A, F ] and [B, F ], on the other hand, is
A network homomorphism ψ satisfies Kim and the relational algebra with the fewest number
Roush’s condition Gi if the following holds for of distinct relations that contains both [A, F ] and
any pair of equivalence classes ρ1 and ρ2 on N [B, F ] as a homomoprhic image. It is straightforward

5605-Scott-Chap30.indd 454 4/13/2011 2:39:30 PM


RELATION ALGEBRAS AND SOCIAL NETWORKS 455

to show that the joint relational structure of [A, F ] application of no more than a fixed number of
and [B, F ] is the relation algebra [C, F ] generated operations, and can have the advantage of restrict-
by Cobs = {V1, V2, . . ., Vk} defined on the disjoint ing attention to derived relations that are likely to be
union of the sets N and M; specifically, Vj in C is more salient for actors in the network, as Mandel
a relation constructed as the disjoint union of Yj (1983) originally proposed. For examples of the
on N and Wj on M. application of this approach, see Pattison (1993,
2009) and Pattison and Wasserman (1995).
This approach has several appealing features.
Limitations of exact structural First, it is applicable to observed networks of
analyses relations among actors, avoiding the need for a
More generally, while an exact analytical approach preliminary aggregation of actors into blocks.
is arguably very useful when the blockmodel(s) Second, by restricting the value of k to a relatively
that provide(s) the starting point for analysis (is) small value such as 2 or 3, we restrict attention to
are the faithful representation of underlying derived relations that are arguably accessible to
network relations among actors, it is clearly less actors in their appraisals of their relational contexts
satisfying when the blockmodel(s) omit(s) some and in their reasoning about the relational conse-
potentially important structural regularities. This quences of action. We may be aware, for example,
is an important qualification, since it is almost of the friends of our friends, but we are less likely
certainly rare that a blockmodel can be claimed to to be fully cognizant of the friends of the friends of
provide a faithful representation. Hence, it has our friends. Keeping k small in the construction of
proved valuable to supplement the exact algebraic a partial algebra restricts analysis to those relations
analytical approaches just described with several of which network members are potentially aware
other approaches to be described below. and hence identifies what we may think of as local
regularities.
One potential disadvantage of this approach,
though, is that it assumes that relational ties
Construction and analysis are deterministic and observed without error. No
of a partial algebra allowance is made for variability or error. This may
be a tenuous assumption, and several important
In empirical contexts, [A,F ] may contain a very developments described below have attempted to
large number of distinct elements. Mandel (1983) utilise algebraic constructions while also recognis-
and Pattison and Wasserman (1995; also Pattison, ing the likely presence of network tie variability.
1986; Pattison et al., 2000) developed an approach
for working with partial algebras making up subsets
of full algebras that are obtained when restrictions
are placed on the number of times that operations Development of approximate
in F are applied. A summary of this body of work is algebraic representations
presented in Pattison (2009). through statistical identification
More specifically, define the partial algebra of equations
[A,F ]k of rank k to comprise the set of relations
Aobs∪A2∪ . . . ∪Ak generated by application of The full and partial algebras just described
no more than k–1 operations in F as well as the provide exact and detailed representations of
relations in Aobs themselves. The algebra is termed structural relationships among observed relations.
partial because it is not closed: that is, the The algebraic constructions on which they depend
application of one or more operations to elements assume fixed relationships, measured accurately.
of [A, F ]k may yield an element that is not con- The next approach that we discuss relaxes the
tained in the set Aobs∪A2∪ . . . ∪Ak; in this case, the requirement that ties be regarded as fixed rather
outcome of the operation is regarded as undefined than as variable.
and is denoted by an asterisk. Despite its lack of In this approach, the Generalised Axiom of
closure, however, the algebra will satisy all of the Quality introduced earlier is replaced by an
axioms of the relation algebra [RN, F ] whenever Approximate Axiom of Quality: ‘Regard as equal
all relations relevant to an axiom are defined. In any pair of relations for which there is “sufficient
addition, applying the Generalised Axiom of evidence” of equality and regard the equality as an
Quality to the partial algebra [A,F ]k yields the set of equation in the relation algebra generated by the
all distinct relations in Aobs∪A2∪ . . . ∪Ak and all generator set Aobs’. Such an approach can lead to a
equations involving relations generated by applica- theoretically guided and structurally focussed form
tion of no more than k–1 operations in F. Thus, of exploratory data analysis for multiple networks.
partial algebras may be used to identify relational Theoretical guidance comes from the choice of
regularities among relations that arise from the operations in the set F, while structural focus

5605-Scott-Chap30.indd 455 4/13/2011 2:39:30 PM


456 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

resides in the algebra or partial algebra to which the 1978) and application of the quadratic assignment
approach gives rise. procedure to assess the association between two
In the context of specific algebraic constructions, networks (e.g. Hubert and Arabie, 1989).
Pattison and Wasserman (1995) and Pattison et al.
(2000) further proposed to generate approximate
equations among elements of [A,F ]k by statistically
evaluating evidence for relational equations. They Relational configurations in statistical
proposed that one of a number of possible random models for social networks
multigraph distributions could be adopted to
systematically assess evidence for both the statisti- The final potential application of relation algebras
cal significance and degree of overlap among all is to the development of stochastic models for
pairs of relations in Aobs∪A2∪ . . . ∪Ak for some social networks.
value of k. They developed a software package A logical next step in the development of
PACNET to perform the required statistical calcula- approaches that construe network ties as variables is
tions and to generate all of the derived equations to develop a parametric model for the ensemble of
implied by application of the axioms to a set of tie variables for a given set N of nodes, or actors. In
approximate equations identified by PACNET. this approach, each potential tie for an (ordered)
PACNET is currently restricted to the operations pair of actors is considered as a variable and a
{′,°}, though the complement and star of each model is developed for the array of tie variables
empirical generator relation as well as their inter- describing relations among actors in N (Holland
sections and unions can readily be computed and and Leinhardt, 1981; Frank and Strauss, 1986;
added to the generator set if desired. Wasserman and Pattison, 1996). As Frank and
PACNET implements one statistical procedure Strauss (1986) explain, a general formulation of this
for assessing the level of equality of two relations approach yields the so-called exponential random
and a second procedure for assessing an ordering graph models, of the form:
relation between them. For relation algebras, the
statistical assessment of equality is pertinent. Pr(Y) = exp(ΣAγAzA(Y))/κ
Two relations are judged to be approximately equal
if a statistical test of association between the two where:
relations meets predetermined thresholds for
significance and effect size. The relevant statistical • A is a subset of tie variables (defining a poten-
tests are constructed by regarding the observed tial network configuration);
networks as members of some conditional uniform • γA is a model parameter associated with the
random multigraph distribution on the given actor configuration A (to be estimated) and is nonzero
set. Pattison et al. (2000) discuss the important only if the subset A is a clique in the depend-
considerations that affect choice of a particular ence graph D;
conditional uniform random multigraph distribu- • zA(Y) = ΠYij∈AYij is the sufficient statistic
tion as appropriate for the statistical assessment. corresponding to the parameter γA, and
Pairs of relations found to be approximately indicates whether or not all tie variables in
equal by the process just described can be equated the configuration A have values of 1 in the
as the Approximate Axiom of Quality allows. network Y; and
Pattison et al. (2000) describe how to ensure that a • κ is a normalizing quantity.
closed partial algebra emerges from this construc-
tion, and they illustrate application of the approach, The associated dependence graph D codifies
including the use of several different conditional expected dependencies among tie variables and
uniform random multigraph distributions in one has as nodes the set of tie variables among nodes
setting. in N. Two tie variables are joined by an edge in D
The advantage of this approach is that it if they are assumed to be conditionally dependent,
combines a distinctive statistical tradition for given the values of all other tie variables.
network analysis based on random graph distribu- The link between this stochastic formulation of a
tions with an algebraic perspective, and hence network model and equations in a relation algebra
allows statistical assessment of those many struc- is that the latter equations give rise to expected
tural properties of relations that can be expressed in graph configurations and hence may be associated
algebraic form, including those listed earlier. with the designated effects of a stochastic model.
This statistical tradition began with the analysis For example, suppose there is a tendency for
of the property of reciprocity (Moreno and Jennings, any partner’s partner in a network to also be a
1938) and includes both the analysis of the triad partner (that is, there is a tendency for the equation
structure of a network including the assessment of Y°Y = Y to hold). A stochastic formulation of this
transitivity (e.g. Holland and Leinhardt, 1970, equation implies an otherwise unpredictably

5605-Scott-Chap30.indd 456 4/13/2011 2:39:30 PM


RELATION ALGEBRAS AND SOCIAL NETWORKS 457

large number of transitive triples (i, j,k) in which Borgatti, S. P., Boyd, J. P. and Everitt, M. G. (1989) ‘Iterated
Y(i, j) = 1 = Y(i,k) = Y(k, j). roles – mathematics and application’, Social Networks,
This link between algebraic and stochastic for- 11: 159–72.
mulations of network regularities are exemplified Boyd, J. P. (1969) ‘The algebra of group kinship’, Journal of
by what are termed degenerate forms of exponen- Mathematical Psychology, 6: 139–67.
tial random graph models for networks (Robins Boyd, J. P. (1990) Social Semigroups: A Unified Theory of
et al., 2005). Since an exponential random graph Scaling and Blockmodelling as Applied to Social Networks.
model defines a probability distribution on the set Fairfax, VA: George Mason University Press.
of all networks on a node set N as a function of Boyd, J. P., Haehl, J. H. and Sailer, L. D. (1972) ‘Kinship
some parameter vector, for any parameter vector, a systems and inverse semigroups’, Journal of Mathematical
subset of networks has what can be defined Sociology, 2: 37–61.
as minimum ‘energy’. These minimum-energy Breiger, R.L. and Pattison, P.E. (1978) ‘The joint role structure of
networks can be seen as highly constrained or two communities’ elites’, Sociological Methods and Research,
‘frozen’ structural forms associated with the 7: 213–26.
stochastic model. The structure of these forms will Breiger, R.L. and Pattison, P.E. (1986) ‘Cumulated social roles:
often warrant algebraic analysis; in addition, we can The duality of persons and their algebras’, Social Networks,
understand the nonfrozen models as stochastic 8: 215–56.
generalisations of these structural forms. Burt, R.S. (1992) Structural Holes: The Social Structure of
Competition. Cambridge, MA: Harvard University Press.
Burt, R.S. (2005) Brokerage and Closure: An Introduction to
Social Capital. Oxford: Oxford University Press.
PROSPECTS AND CHALLENGES Frank, O. and Strauss, D. (1986) ‘Markov graphs’, Journal of
the American Statistical Association, 81: 832–42.
The characterisation of networks in terms of Freeman, L.C. (1979) ‘Centrality in social networks: Conceptual
relation algebras is a compelling one because of clarification’, Social Networks, 1: 215–39.
the very natural connection between the opera- Givant, S. (2006) ‘Calculus of relations as a foundation
tions defining a relation algebra and our everyday of mathematics’, Journal of Automated Reasoning, 37:
conceptualisations of derivative network relations. 277–322.
In addition, the four applications of these ideas Granovetter, M. (1973) ‘The strength of weak ties’, American
that we have just described make clear the consid- Journal of Sociology, 78: 1360–80.
erable flexibility of application. Nonetheless, Holland, P.W. and Leinhardt, S. (1970) ‘A method for detect-
some significant further work remains. Not only ing structure in sociometric data’, American Journal of
do the links between stochastic and deterministic Sociology, 76: 492–513.
formulations need further elaboration, but there Holland, P.W. and Leinhardt, S. (1978) ‘An omnibus test for
are also some important generalisations to be social structureusing triads’, Sociological Methods and
developed. Arguably, the most important of these Research, 7: 227–55.
is the development of models for time-dependent Holland, P.W. and Leinhardt, S. (1981) ‘An exponential family
relation variables (Moody, 2002; Pattison et al., of probability distributions for directed graphs’, Journal of
2008), since the capacity to reflect the impact of the American Statistical Association, 76: 33–50.
temporal constraints on relational operations Homans, G. (1951) The Human Group. London: Routledge
is vital to understanding the consequences of and Kegan Paul.
network relations for the fundamental social Hubert, L.J. and Arabie, P. (1989) ‘Combinatorial data analysis:
processes that underpin them. Confirmatory comparisons between sets of matrices’,
Applied Stochastic Models and Data Analysis, 5: 273–325.
Kim, K.H. and Roush, F.W. (1984) ‘Group relationships and
homomorphisms of Boolean matrix semigroups’, Journal of
REFERENCES Mathematical Psychology, 28: 448–52.
Lorrain, F. (1975) Reseaux sociaux et classifications sociales.
Birkhoff, G. (1967) Lattice Theory. 3rd ed. Providence, RI: Paris: Hermann.
American Mathematical Society. Lorrain, F. and White, H.C. (1971) ‘Structural equivalence of
Bonacich, P. (1980) ‘The “common structure semigroup”, a individuals in social networks’, Journal of Mathematical
replacement for the Boorman and White “joint reduction”, Sociology, 1: 49–80.
American Journal of Sociology, 86: 159–66. Luce, R.D. (1956) ‘A note on Boolean matrix theory’, Proceedings
Bonacich, P. and McConaghy, M. (1979) ‘The algebra of of the American Mathematical Society, 3: 382–88.
blockmodeling’, in K.F. Schuesler (ed.), Sociological Maddux, R.D. (1991) ‘The origin of relation algebras in the
Methodology 1980. San Francisco: Jossey-Bass. pp. 489–532. development and axiomatization of the calculus of relations’,
Boorman, S.A. and White, H.C. (1976) ‘Social structures from Studia Logica, 50: 421–55.
multiple networks. II. Role structures’, American Journal of Mandel, M. (1983) ‘Local roles and social networks’, American
Sociology, 81: 1384–446. Sociological Review, 48: 376–86.

5605-Scott-Chap30.indd 457 4/13/2011 2:39:30 PM


458 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

McConaghy, M. (1981) ‘The common role structure: Pattison, P., Wasserman, S., Robins, G. and Kanfer, A. (2000)
Improved blockmodelling methods applied to two ‘Statistical evaluation of algebraic constraints for social net-
communities’ elites’, Sociological Methods and Research, works’, Journal of Mathematical Psychology, 44: 536–68.
9: 267–85. Pratt, V. (1990) ‘Dynamic algebras as a well-behaved frag-
Moreno, J.L. and Jennings, H.H. (1938) ‘Statistics of social ment of relation algebras’, Proceedings of Algebra and
configurations’, Sociometry, 1: 342–74. Computer Science, Ames, Iowa, June 2–4, 1988. Lecture
Moody, J. (2002) ‘The importance of relationship timing for Notes in Computer Science series.
diffusion’, Social Forces, 81: 25–56. Robins, G., Pattison, P. and Woolcock, J. (2005) ‘Small
Mullins, N., Hargens, L., Hecht, P. and Kick, E. (1977) ‘The and other worlds: Global network structures from local
group structure of cocitation clusters: A comparative processes’, American Journal of Sociology, 110: 894–936.
study’, American Sociological Review, 42: 552–62. Tarski, A. (1941) ‘On the calculus of relations’, Journal of
Nadel, S.F. (1957) The Theory of Social Structure. Melbourne: Symbolic Logic, 6: 73–89.
Melbourne University Press. Wasserman, S. and Pattison, P. (1996) ‘Logit models and
Pattison, P.E. (1982) ‘The analysis of semigroups of logistic regressions for social networks, I. An introduction
multirelational systems’, Journal of Mathematical to Markov graphs and p*’, Psychometrika, 61: 401–25.
Psychology, 25: 87–118. White, D.R. and Reitz, K.P. (1983) ‘Graph and semigroup
Pattison, P.E. (1989) ‘Mathematical models for local social homomorphisms on networks of relations’, Social Networks,
networks’, in J. Keats, R. Taft, R. Heath and S. Lovibond 5: 193–234.
(eds), Mathematical and Theoretical Systems. Amsterdam: White, H.C. (1963) An Anatomy of Kinship. Englewood Cliffs,
North Holland. NJ: Prentice-Hall.
Pattison, P.E. (1993) Algebraic Models for Social Networks. New White, H.C. (1992) Identity and Control. Chicago: University of
York: Cambridge University Press. Chicago Press.
Pattison, P.E. (2009) ‘Algebraic models for social networks’, in White, H.C., Boorman, S.A. and Breiger, R.L. (1971)
R. Myers (ed.), Encyclopaedia of Complexity and System ‘Social structure from multiple networks: I. Blockmodels of
Science. Berlin: Springer. roles and positions’, American Journal of Sociology, 81:
Pattison, P.E. and Bartlett, W.K. (1982) ’A factorization 730–80.
procedure for finite algebras’, Journal of Mathematical Winship, C. (1988) ‘Thoughts about roles and relations: An
Psychology, 25: 51–81. old manuscript revisited’, Social Networks, 10: 209–31.
Pattison, P.E., Robins, G.L. and Koskinen, J. (2008) ‘Algebraic Winship, C. and Mandel, M. (1983) ‘Roles and positions:
foundations for dynamic relation algebras: Preliminary steps’, A critique and extension of the blockmodelling
Sunbelt International Conference on Social Networks, San approach’, in S. Leinhardt (ed.), Sociological Methodology
Diego. 1983–1984. San Francisco: Jossey-Bass. pp. 314–44.
Pattison, P.E. and Wasserman, S. (1995) ‘Constructing Wu, L. (1983) ‘Local blockmodel algebras for analyzing
algebraic models for local social networks using statistical social networks’, in S. Leinhardt (ed.), Sociological
methods’, Journal of Mathematical Psychology, 39: Methodology 1983–1984. San Francisco: Jossey-Bass.
57–72. pp. 272–313.

5605-Scott-Chap30.indd 458 4/13/2011 2:39:30 PM


31
Statistical Models for
Ties and Actors
Marijtje A.J. van Duijn and Mark Huisman

INTRODUCTION blockmodels is to identify (groups of) stochasti-


cally equivalent actors, that is, actors who have the
Can we predict friendship between researchers if same probability distribution of ties to the other
we know how many email interactions they have? actors.1
Do researchers on a conference prefer to get The two different modeling approaches can be
acquainted with colleagues from the same research viewed as analyses of the same data (a social rela-
area or do they interact instead with colleagues tional system according to Wasserman and Faust
who have a high citation index? Could it be that [1994: 89]) with a different emphasis. In the
email contact, homophily, and scientific status are models for ties, the focal variable is formed by
all important to explain friendship or acquaint- the relationship, expressed as a tie variable or pair
anceship, and if so, which of these effects is of tie variables in a dyad whose outcome is
strongest? Can we distinguish different groups of observed and may be explained by attributes. In the
researchers based on how well they know each models for actors, the focal variable is the group
other, and if so, is this grouping related to a membership of the actors, expressed as a latent
research field or scientific status? (unobserved) actor variable, whose value may be
To answer these types of questions we need derived from the observed ties between actors and
statistical models that can deal with the combina- additional actor and dyadic characteristics.
tion of network data and individual actor and/or The models presented here can be viewed as a
dyadic attributes. They are presented in this sequel to the two earlier chapters by Hanneman
chapter. The statistical models are categorized by and Riddle (this volume) that described the basic
the type of research question they can handle. Two concepts of the analysis of egocentric networks
streams of analysis are distinguished: the first are and of complete network data, including some of
relationship-level models, modeling the ties their statistical properties used for testing simple
between actors, and the other are actor-level hypotheses. Other introductions to statistical net-
models with an emphasis on differences between work models can be found in Wasserman and
or grouping of actors. Faust (1994) and Scott (2000). The exponential
The first three questions stated above can be random graph models treated by Robins (this
answered with models that explain or predict the volume) have the same goal as the models for ties
occurrence or value of ties in the network, using in this chapter but model the complete network
additional information on the relationships or using statistics to represent more complex depend-
actors if available. The last question is addressed ence structures than the dyadic dependence that is
using stochastic a posteriori block models that handled by most of the models presented in this
categorize or group actors based on their ties to chapter. The stochastic actor-oriented or actor-
each other, again using additional covariate infor- based models for longitudinal network data in the
mation if available. The principle of stochastic chapter by Snijders (this volume) are aimed at

5605-Scott-Chap31.indd 459 4/13/2011 2:41:48 PM


460 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

explaining changes in the observed networks and created to indicate the similarity or homophily of
in the observed actor characteristics. O’Malley the researchers with respect to their research field
and Marsden (2008) present a broad overview (including “other”).
of social network analysis with illustrations of The data are summarized in Table 31.1. For
exponential random graph models and individual most social network analyses the acquaintance-
outcome regression models. Goldenberg et al. ship network(s) had to be dichotomized, which we
(2009) review an even wider range of statistical chose to indicate friendship: categories 3 and 4
models for social network analysis. (“friend” or “close personal friend”) versus “did
The methods and models are presented in a not know,” “had heard of but not met,” and “had
nontechnical manner, avoiding the use of formu- met” the other, categories 0–2. Measures are cal-
las. Our aim is to convey the main objective of a culated on the complete network (n = 32), and on
model and relate it to the research question it can subnetworks defined by research field. The sum-
answer. Moreover, we try to compare and link mary statistics were calculated with the programs
models that, although their definition or assump- StOCNET (Boer et al., 2006) and NetMiner 3
tions may differ, answer similar questions. We (Cyram, 2009).
use the EIES data (Freeman and Freeman, 1979) For the acquaintance network the mean
and various software programs to illustrate the weighted (column and row) sum of the ties is
methods and models presented in this chapter.2 42.4 at the first time point, which increases to 52.1
at the second time point. The incoming tie sum
has a larger standard deviation than the outgoing
tie sum. Note that the acquaintance ties are
valued (0–4), making the numbers somewhat hard
DESCRIPTION OF THE EIES DATA to interpret. Therefore, the degree distributions
of the dichotomized acquaintance network
The EIES data (Freeman and Freeman, 1979, (0→0 and >0→1) are presented in Figure 31.1.
taken from Wasserman and Faust, 1994, Appendix Both indegree and outdegree distributions at the
B, Tables 8–11) contain two observations of an two time points are slightly left skewed. At time 1,
acquaintanceship network. Acquaintanceship is a the average number of ties is 20.3 (out of 31 pos-
directed valued network, measured on a five-point sible relations; not reported in table), indicating
scale ranging from (0) “don’t know the other” to that the mean value of these 20.3 relations is about
(4) “close personal friend.” Complete network 2.1 (“had met the other”). At time 2, the average
data are available for 32 out of 50 researchers number of ties has increased to 23.7, making the
participating in a study carried out in 1978, which mean value slightly larger, 2.2. The acquaintance
investigated the influence of electronic communi- networks of the smaller groups of anthropologists
cation using the Electronic Information Exchange and the statisticians/mathematicians have on aver-
System (EIES). Participants were able to use the age the strongest relations: at time 1 the mean
then novel technology to send each other email. values are 2.7 and 2.5, respectively, and at time 2
The number of messages were recorded over the the mean values are 2.8 and 2.35 (numbers not pre-
eight-month period that the experiment lasted and sented in Table 31.1).
can thus be regarded as a directed valued network. The friendship network has mean degrees of
The acquaintanceship network was determined at 4.8 and 6.4 at times 1 and 2, respectively, with
the beginning (time 1) and at the end of the study densities 0.15 and 0.21. The increase in the
(time 2). In addition to the acquaintanceship and number of friends is largest in the sociologist net-
communication relations, actor attributes are work, whereas in the other fields the mean degrees
available: The number of citations of the research- stay more or less the same. Thus, friendships
ers, which we consider as a scientific status meas- between actors of different fields were estab-
ure, and their primary disciplinary affiliation lished. The subnetworks of the anthropologists
(research field). Four categories are distinguished: and statisticians/mathematicians have the highest
sociology, anthropology, mathematics/statistics, densities (at both time points). All (sub)networks
and a rest category “other” discipline. Because of have become slightly denser at the second time
the skewedness of the number of messages and point, with more mutual relations, except the (small)
the number of citations, the square roots of these network of the statisticians/mathematicians, which
(sometimes large) numbers were used in the did not change. The statisticians/mathematicians
analyses. Two more sociomatrices were con- have the highest reciprocity score, 1, because
structed: the first by taking the difference in there is one mutual dyad and two null dyads in
status, to express the status hierarchy between the this group of three. At the second time point, all
researchers, and the second by taking the absolute (sub)networks have reciprocity scores of 0.59 or
difference in status, measuring their distance.3 higher, showing that friendship nominations are
Moreover, a (symmetric adjacency) matrix was often reciprocated. Transitivity only increased

5605-Scott-Chap31.indd 460 4/13/2011 2:41:48 PM


STATISTICAL MODELS FOR TIES AND ACTORS 461

Table 31.1 Description of the EIES network attribute data


obtained with StOCNET and NetMiner

Research field

Socio. Anthro. St/Ma. Other Total

n 17 6 3 6 32

Acquaintance 1
Mean sum 28.88 12.50 3.67 4.33 42.44
SD column sum1 8.64 2.59 2.31 2.25 17.36
SD row sum2 6.98 3.15 1.53 3.08 13.29

Acquaintance 2
Mean sum 31.76 13.17 4.67 5.00 52.09
SD column sum1 8.09 3.65 2.31 2.19 16.39
SD row sum2 7.92 2.32 0.58 3.52 14.33

Friendship 1
Mean degree 3.53 2.50 0.67 0.17 4.78
SD indegree 2.15 1.38 0.47 0.37 3.47
SD outdegree 2.52 1.38 0.47 0.37 3.53
Density 0.22 0.50 0.33 0.03 0.15
Reciprocity3 0.67 0.53 1.00 0.00 0.56
Transitivity4 0.44 0.50 − − 0.38

Friendship 2
Mean degree 4.82 2.67 0.67 0.50 6.38
SD indegree 2.73 1.80 0.47 0.50 4.78
SD outdegree 3.00 0.94 0.47 0.50 3.82
Density 0.30 0.53 0.33 0.10 0.21
Reciprocity3 0.66 0.63 1.00 0.67 0.59
Transitivity4 0.44 0.50 − 0.00 0.40

Citations (square root)


Mean 4.61 1.93 3.66 4.22 3.95
SD 2.27 0.72 1.85 4.68 2.75
Range 0.0−8.0 1.0−3.0 2.0−5.7 1.0−13.0 0.0−13.0

Messages sent (square root)


Mean5 2.10 2.88 1.28 1.87 2.13
SD 2.47 2.06 0.90 1.81 2.15
Range 0.1−9.0 0.2−5.3 0.3−2.1 0.2−5.2 0.1−8.9

Messages received (square root)


Mean5 2.06 2.85 1.76 1.79 2.13
SD 1.69 1.39 0.73 1.44 1.51
Range 0.8−7.1 1.1−4.3 0.9−2.3 0.8−4.6 0.8−7.1

1
The sample standard deviation of the n column sums.
2
The sample standard deviation of the n row sums.
3
R = 2M/(2M + A), with M the number of mutual ties and A the number of asymmetric ties.
4
The proportion of the triplets with two ties present that are transitive.
5
The mean number of messages to/from all other actors (within and between groups).

5605-Scott-Chap31.indd 461 4/13/2011 2:41:48 PM


462 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

12 12
10 10
8 8
6 6
4 4
2 2
0 0
0 10 20 30 40 0 10 20 30 40 0 5 10 15 20 0 5 10 15 20
Acquaintance 1: Indegree Acquaintance 1: Outdegree Friendship 1: Indegree Friendship 1: Outdegree

12 12
10 10
8 8
6 6
4 4
2 2
0 0
10 20 30 40 0 10 20 30 40 0 5 10 15 20 0 5 10 15 20
Acquaintance 2: Indegree Acquaintance 2: Outdegree Friendship 2: Indegree Friendship 2: Outdegree

Figure 31.1 Degree distributions of the dichotomized acquaintanceship and friendship


network at both time points

slightly in the total network and remained statisticians/mathematicians of whom one is con-
unchanged for the networks of sociologists and of nected mainly with the group of sociologists, the
anthropologists. It is not defined for the small second mainly to the anthropologists, and the third,
group of statisticians/mathematicians at both time with the highest number of citations, has about the
points and at time 1 for the group of “other” same number of ties to all three other groups.
researchers.
For citations, messages sent, and messages
received, the mean score, standard deviation, and
range are reported in Table 31.1. The fields of soci- MODELING TIES
ologists and “other” contain actors with the highest
number of citations and the highest variation in An interesting research question for the EIES data
number of citations. The anthropologists have the concerns the impact of the communication during
smallest number of citations, but on average the the experiment as measured by the number of
highest number of messages sent and received. messages sent on the acquaintanceship at time 2,
Interestingly, the statisticians/mathematicians taking into account the research area and status of
received more messages than they sent, where for the researchers, and possibly also their acquaint-
the other fields the numbers are almost the same. anceship at time 1. Such a question implies mod-
The friendship network at time 2 is depicted in eling one complete network (acquaintanceship
Figure 31.2. The graph was made using the layout at time 2) using covariate network information
option group by categorical attribute in NetDraw (communication, hierarchy, distance, acquaint-
(Borgatti, 2002) to show the ties within and anceship at time 1) as well as actor attributes
between the different fields. In the upper left corner (status, research field).
the largest group of 17 sociologists (represented by Several types of statistical models for (complete)
circles) is positioned. Their status (depicted by the network data are available. They differ in measure-
node size) varies from small to medium, approxi- ment level of the tie variable (dichotomous or con-
mately. The researcher with the largest number of tinuous) on the one hand and the statistical modeling
citations belongs to the group of six researchers tradition on the other hand.
with an “other” research field (reflected in the large The section starts with QAP (Quadratic
standard deviation of the number of citations in Assignment Procedure). This method is based on
Table 31.1). This group is much less dense (with regression models and permutation tests for con-
only one mutual and one asymmetric dyad) than tinuous tie variables (see Dekker et al., 2007 for
the groups with specific disciplines. This is visually an overview of its development). Next, the Social
most clear in the comparison with the group of the Relations Model (SRM) is explained. The SRM
same size in the lower right corner, consisting of was first proposed by Kenny and La Voie (1984)
six anthropologists with relatively low status. The and is rooted in an ANOVA-tradition. It has been
small group in the lower left corner are the three used in many applications in social psychology

5605-Scott-Chap31.indd 462 4/13/2011 2:41:48 PM


STATISTICAL MODELS FOR TIES AND ACTORS 463

1
23 3
11
14
20
28
12 17 7
4
6
22

26 10 31
19 18
5
15 24 25
29

8 13

30
2
21

16 32
9

27

Figure 31.2 EIES friendship network at time 2. The actors are distinguished by research
field (node shape and color) and by number of citations (node size). The graph was made
with NetDraw

and other fields (see Kenny et al., 2006 for a more model shared under the models for ties is the bilin-
detailed account). An important extension is the ear model developed by Hoff (2005). The bilinear
random effects or multilevel model version of model resembles the SRM and p2 in its way of
the SRM proposed by Snijders and Kenny (1999, incorporating dyadic and actor covariates, with
see also Snijders and Bosker, 1999, Chapter random and correlated sender and receiver effects.
11.3.3). QAP and SRM assume continuous tie It is more than dyadic, however, because it incor-
variables (or at least a relation with a sufficient porates additional parameters to capture third-or-
number of values). der dependence (such as transitivity and balance)
Based on loglinear modeling, Holland and between the actors. The extra parameters define a
Leinhardt (1981) proposed the p1 model for the (latent) space in which the actors are positioned
analysis of binary complete network data. The p2 relative to each other. The bilinear model is related
model (Van Duijn et al., 2004) combines this tra- to the latent cluster model (Handcock et al., 2007)
dition with a random effects approach borrowed presented later in this chapter.
from the SRM, including actor and dyadic
attributes. A different extension of the p1 model is
the so-called p* model or exponential random
graph model (Wasserman and Pattison, 1996;
QAP
Snijders et al., 2006; Robins et al., 2007). This When investigating the association between two
model is not treated in this chapter but is the topic (or more) network matrices one has to take into
of the chapter by Robins (this volume). The final account the dependence inherent in the data due to

5605-Scott-Chap31.indd 463 4/13/2011 2:41:49 PM


464 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Table 31.2 QAP correlations for the EIES complete network data obtained with UCINET based
on 5000 permutations (p-values in parentheses; QAP correlations of square-root transformed
variables below the diagonal)

1 2 3 4 5

1 Network time 1 – 0.800 0.214 −0.039 0.001


(<0.0001) (0.001) (0.153) (0.490)
2 Network time 2 – – 0.355 −0.043 −0.076
(<0.0001) (0.114) (0.215)
3 Communication 0.250 0.431 0.888 −0.020 −0.157
(<0.0001) (<0.0001) (<0.0001) (0.170) (0.001)
4 Hierarchy −0.070 −0.060 −0.045 0.928 0.000
(0.031) (0.039) (0.077) (<0.0001) (1.000)
5 Distance −0.126 −0.180 −0.189 0.000 0.905
(0.067) (0.021) (0.009) (1.000) (<0.0001)

the fact that actors send and receive multiple ties. computed between the five available social
Thus, the observed outcomes of the tie variable networks with continuous tie variables. These are
are not independent. One could use OLS correla- presented in Table 31.2.
tion and regression models to estimate the associa- The QAP correlations between the EIES net-
tion, implicitly assuming independence over and works are highest for the strength of acquaint-
within dyads. This approach results in incorrect anceship at time 1 and time 2 (0.80) and with the
tests of the correlation and regression coefficients number of messages sent between the researchers
(due to underestimation of the standard errors). stronger at time 2 than at time 1, even more so
The quadratic assignment procedure (QAP), when the square-root transformed variable is used.
applied to social networks by Hubert (1987) and The correlations of the absolute difference between
Krackhardt (1987), tests the null hypothesis of no actors in number of citations (distance) and the
correlation between two matrices, Y and X, by difference measure (hierarchy) with acquaintance-
repeatedly permuting the order of the rows (and ship at both time points are all negative, weak and
columns) of one of the matrices, Y, while keeping only significant for the square root transformed
X intact. The resulting sample of product-moment variables, except for distance and acquaintance
correlations of the permuted Y and X after vectori- time 1.
zation provides the distribution of the correlation The expected negative effect of distance reflects
coefficient under the null hypothesis to which the that researchers far apart in status are less well
observed correlation can be compared. When the acquainted; the negative effect of hierarchy indi-
association between two matrices is investigated cates the asymmetric phenomenon that research-
while controlling for a third matrix Z, a more com- ers tend to rate the intensity of acquaintanceship
plex procedure is needed because of the depend- higher with others who are “higher in rank” in
ence between X and Z, comparable to terms of the number of citations than vice versa,
multicollinearity in multiple regression (MR). which may be called a status effect or aspiration
Several MR-QAP procedures have been proposed, effect. There is some evidence of a weak relation
of which the residual permutation methods are between communication and distance, as research-
found to perform best (Dekker et al., 2007). In ers at a smaller distance tend to communicate
these approaches the residuals of either the regres- more (r = –0.16 and –0.19 for the transformed
sion of Y on Z or X on Z obtained in a first step in variables). The correlations between the explana-
the analysis are permuted and included in the tory variables and their square-root transformed
regression equation in the second step to compute version are quite high, as expected.
the association between Y and X controlling for Z. In Table 31.3, the results of an MR-QAP analy-
The latter approach is the Double-Semi-Partialing sis are given with the acquaintanceship at time 2
approach used in the application. as outcome variable. We start with hierarchy
and distance as explanatory variables to decide
which of the two effects of citations is stronger:
Application to acquaintance network hierarchy or distance. Next, the effect of the mes-
The QAP and MR-QAP methods are implemented sages sent is added to the model (Model 2 in
in UCINET (Borgatti et al., 2002), and SNA Table 31.3). The results are computed using
(Butts, 2008). As a first step, correlations are MR-QAP with the residual permutation method

5605-Scott-Chap31.indd 464 4/13/2011 2:41:49 PM


STATISTICAL MODELS FOR TIES AND ACTORS 465

Table 31.3 MR-QAP analyses results for the EIES acquaintanceship


data at time 2 obtained with UCINET based on 2000 permutations
(p-values in parentheses)

Model 1 Model 2 Model 3

Intercept 1.866 1.458 0.576


– – –
Communication 0.175 0.102
(0.001) (0.001)
Hierarchy −0.017 −0.012 0.000
(0.041) (0.103) (0.454)
Distance −0.060 −0.047 −0.019
(0.028) (0.080) (0.079)
Network time 1 0.735
(0.001)
R2 (adjusted) 0.035 0.196 0.698
(0.012) (<0.0001) (<0.0001)

proposed by Dekker et al. (2007), called “Double reformulated as a random effects or multilevel
Dekker Semi-Partialling” in UCINET (based on model (Snijders and Kenny, 1999) incorporating
the 2000 permutations and the t-statistic). No explanatory dyadic covariates and using actor
p-value for the intercept is reported. The QAP and characteristics to further model (random) sender
MR-QAP procedures are also available in the R and receiver effects. Note that the dyadic and actor
package sna and take slightly longer to produce covariates can be categorical or continuous. The
(almost) identical results. SRM can be regarded as a cross-nested multilevel
Model 1 in Table 31.3 shows that distance (regression) model where dyads are nested within
has a stronger effect on acquaintanceship than actors, who for each of the directed relations act as
hierarchy. When communication (i.e., the square sender or receiver (Snijders and Bosker, 1999,
root of the number of messages sent) is added Chapter 11).4
to the model, the effects of distance and The SRM requires continuous dyadic outcomes
hierarchy are reduced and not significant in order to make the assumption of a normal error
anymore. The effect of communication is distribution of the residuals at tie-level and at
strong, as is also shown by a large increase in actor-level. The dependence between the two roles
(adjusted) R2, the proportion of variance explained of each actor is represented by the covariance
in the analysis. Adding the degree of acquaint- between the random sender and receiver effects.
anceship at time 1 as explanatory variable to The random effects and their (co)variances can be
the model increases the amount of explained viewed as measures of (unexplained) actor socia-
variance even more. The parameter value of bility. In multilevel terminology, the regression
communication is smaller while still significant. parameters for the actor and dyadic covariates are
The effect of hierarchy is gone, apparently fixed effects. The SRM does not require complete
completely absorbed in or represented by the network data and is easily extended to the situa-
acquaintanceship at the start of the experiment. tion of multiple (independent) networks by adding
Thus, evidence is found for a positive impact of an extra level (see, for example, Gerlsma et al.,
communication on acquaintanceship. 1997). The SRM for observations of independent
dyads (networks with only two actors) is known as
the Actor Partner Interdependence Model (APIM)
developed by Cook and Kenny (2005); see also
Social Relations Model (SRM) the textbook on dyadic data analysis by Kenny
et al. (2006).
The Social Relations Model (SRM; Kenny and
La Voie, 1984) assigns the variance observed in
dyadic relations Yij to parts attributable to senders
of the relations, to their receivers, and to their Application to acquaintance network
interaction. This definition makes it clear that the
model was originally formulated as an ANOVA The SRM is estimated with MLwiN (Rasbash et al.,
model (Kenny and La Voie, 1984). It was later 2005), using a macro written by Tom Snijders,

5605-Scott-Chap31.indd 465 4/13/2011 2:41:50 PM


466 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

available from his Web site (http://stat.gamma. These parameters are present in all subsequent
rug.nl/). Note that the model can be estimated models. Next, an SRM is estimated with exactly
with any software that allows specification of the same effects as the first MR-QAP model,
random effects model with a complex variance hierarchy, and distance, dyadic covariates based
structure (see David Kenny’s Web site, http:// on the actor covariate status (the square root of
davidakenny.net/srm/srm.htm, for more specific the number of their citations). As a third model,
information about software for estimating the separate sender and receiver effects of status are
SRM). The SRM is applied to the EIES acquaint- used instead of the dyadic hierarchy effect to dem-
anceship data in four models presented in onstrate the properties of the SRM. The dyadic
Table 31.4. The first one is a so-called null or communication effect and homophily effect of
empty model. This model serves as a baseline research field are added as well. In the fourth and
model, to obtain information on the overall mean final model, the first measurement of the acquaint-
strength of acquaintanceship, while taking into anceship network is added, to judge the strength
account individual differences between the of the previously present effects and for compari-
researchers acting as both senders and receivers of son with the MR-QAP results. The models are
ties through the sender and receiver variances. compared by deviance tests. Although the devi-
Moreover, an estimate of within-dyad reciprocity ance serves to assess improvement of the model
is obtained, in the form of the covariance (or cor- after adding (or deleting) covariates, it does
relation) between the residuals of the directed ties. not provide a direct measure of the variance
An estimate of the tie variance is also available, explained by the model. Because these models are
which can be viewed as a measure of the within- nested, the usual procedures of model comparison
actor variability of the acquaintanceship intensity. apply.

Table 31.4 SRM analyses results for the EIES acquaintanceship data
at time 2 obtained with MLwiN (standard errors in parentheses)

Model 0 Model 1 Model 2 Model 3

Intercept 1.680 2.109 1.059 0.661


(0.17) (0.19) (0.22) (0.012)
Communication 0.120 0.0655
(0.014) (0.00091)
Hierarchy −0.0150
(0.0098)
Distance −0.142 −0.123 −0.0365
(0.022) (0.020) (0.012)
Network time 1 0.690
(0.021)
Same field 0.331 −0.0362
(0.084) (0.050)
Sender status 0.0655 0.00654
(0.026) (0.015)
Receiver status 0.0929 0.00830
(0.026) (0.014)
Sender variance 0.198 0.234 0.128 0.0366
(0.057) (0.065) (0.038) (0.012)
Receiver variance 0.264 0.266 0.124 0.0301
(0.073) (0.073) (0.037) (0.010)
Sender/Receiver 0.193 0.215 0.0842 0.0206
covariance (0.059) (0.063) (0.031) (0.0087)
Residual tie variance 0.869 0.809 0.717 0.328
(0.047) (0.043) (0.037 ) (0.015)
Reciprocity 0.531 0.471 0.370 0.0534
within-dyad covariance (0.047) (0.043) (0.037) (0.015)

Deviance 2563.7 2521.6 2437.2 1769.1

5605-Scott-Chap31.indd 466 4/13/2011 2:41:50 PM


STATISTICAL MODELS FOR TIES AND ACTORS 467

Model 0 in Table 31.4 shows that the overall which makes sense, and to a lesser extent the
average strength of acquaintanceship is 1.68, a effect of distance. The amount of communication,
little left from the middle of the 0–4 scale. The however, adds to the explanation of the acquaint-
actor receiver variance is somewhat larger than anceship at time 2. This seems very much in
the sender variance, corresponding to what is line with the purpose of the study and could be
found in Table 31.1. The covariance of the interpreted as a success of the experiment with
random sender and receiver effects is equal to computer communication.
0.19, implying a high correlation of 0.84 (0.19/
√(0.20 · 0.26)) between them. This means that an
actor with a positive sender effect (i.e., who has a
higher than average mean strength of outgoing The p1 and p2 model
acquaintanceships) tends to also have a higher
than average mean strength of received acquaint- In a separate development, statistical models for
anceship ratings (a positive receiver effect). dichotomous relations (in a directed graph) were
Note that this model describes the overall struc- proposed that distinguish the four possible out-
ture in the network, without using any of the comes of a dyad: one null (0,0), one mutual (1,1),
covariate information. The residual tie variance and two asymmetric (0,1) and (1,0) dyadic states.
is much larger than the actor variances. The Holland and Leinhardt (1981) proposed the first
overall reciprocity in the network is high, with a so-called p1 model. It can be considered as the
correlation of 0.61(0.53/0.87) between the two loglinear pendant of the Kenny and La Voie
directed ties. (1984) ANOVA SRM, distinguishing the sender
Like in the MR-QAP analysis, the effect of and receiver roles of all n actors. The model
distance is stronger than that of hierarchy, as is contains 2n actor parameters in addition to a den-
evident from the small and nonsignificant effect of sity and reciprocity parameter representing the
hierarchy in Model 1. The model is a clear overall propensity to engage in any relationship
improvement over the empty model with a differ- (no matter the direction) and a mutual relation-
ence in deviance of 42.1 (2563.7 – 2521.6), which ship, respectively.
is significant at the .001 level with two degrees of Similar to the Snijders and Kenny (1999) SRM,
freedom (due to adding two parameters). The the p1 model was extended with random sender
reduced total variance leads to a lower residual tie and receiver effects to the so-called p2 model
variance and slightly higher sender and receiver (Lazega and Van Duijn, 1997). The model pro-
variances (a phenomenon well known in multi- vides the possibility to include (actor) sender and
level analysis, cf. Snijders and Bosker, 1999: receiver effects as well as dyadic covariates for
100). The correlation between sender and receiver density and reciprocity effects. In the p2 model,
effects and the unexplained reciprocity are approx- the four outcomes of a dyad for binary relations
imately the same as in Model 0 (0.86 and 0.58, are modeled explicitly (comparable to polytomous
respectively). logistic regression) with the null dyad (0,0) as the
In Model 2 both actor variances and residual tie reference category. It has correlated random
variances are reduced after adding sender and sender and receiver effects (like in the SRM). Its
receiver covariates of status, communication, and density parameter represents the log-odds of a
field homophily. The parameters pertaining to directed tie (vs. no tie), regardless of the outcome
these effects are all significant, as is assessed of the other tie in the dyad. The reciprocity param-
by a t-test (or approximate z-test) dividing the eter represents the interaction effect of the increase
parameter estimate by its standard error. A value in log-odds of a mutual dyad in comparison to the
larger than 2 is a rough indication of significance sum of the two log-odds of the asymmetric
at the 5 percent level. After adding acquaintance dyads.
at time 1 in Model 3, the covariate effects are Unlike the p1 model, which can be estimated
greatly reduced, and all parameter estimates easily using straightforward methods for loglinear
except communication and distance are no longer or generalized linear models, the IGLS estimation
significant. The variances are reduced by more first proposed by Van Duijn et al. (2004) for the p2
than half, with an unexplained reciprocity of only model was improved by using Markov Chain
0.16(0.05/0.33). The correlation between random Monte Carlo methods (Zijlstra et al., 2009). They
sender and receiver effects remains strong at 0.62 used a Bayesian model formulation in the tradi-
(0.02/√(0.03·0.04)). tion of Wong (1987), which was extended to
An interpretation of these changes is that much categorical covariates by Wang and Wong (1987)
of the acquaintance network at time 2 can be and Gill and Swartz (2004). The p2 model can also
explained by its state at time 1. Especially the be estimated for multiple (independent) networks
effects of field similarity and (sender and receiver) (Zijlstra et al., 2006) and multiple relations
status are captured by the network at time 1, (Zijlstra, 2008).

5605-Scott-Chap31.indd 467 4/13/2011 2:41:50 PM


468 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Application to friendship network much smaller than 0.50 (corresponding to the


We turn our attention to the binary friendship net- observed overall density of 0.21). The reciprocity
work, to demonstrate the p1 and p2 models. The p2 parameter is positive (4.33), slightly larger in
model is estimated using the P2 module in absolute value than the density parameter. These
StOCNET. The results are presented in Table 31.5. values reflect that the occurrence of a mutual dyad
The p1 estimates were obtained with UCINET and is somewhat more likely than one of the asym-
only reported in the text. After estimating the p1 metric dyadic outcomes (corresponding to the
model, four p2 models are fitted to the EIES observed number of 60 mutual dyads, which is
friendship data, starting with the null model. The more than half the number of asymmetric dyads,
next model is comparable to SRM Model 2 in 82). The 32 individual estimates for sender and
Table 31.4, estimating the effect of communica- receiver effects are summarized by their variances
tion, distance, and status. The third model shows and covariances 1.74, 2.23, and –1.26, respec-
the specific feature of the p2 model to include cov- tively (the latter implying a correlation of –0.64).
ariates for the reciprocity parameter. In the fourth The p2 null model (Model 0 in Table 31.5)
model this model is extended with the (density) shows, as expected, a negative density parameter
effect of friendship at the start of the experiment. estimate and positive reciprocity parameter. The
The analysis of the EIES data with the p1 model receiver variance is, again, higher than the sender
results in a negative estimate of the density variance and the covariance (and correlation)
(–3.34). This implies that the probability of a tie is negative. Different than for the SRM, this correla-

Table 31.5 p1 and p2 analyses results for the EIES friendship data at
time 2 obtained with StOCNET (standard errors in parentheses)

p1 p2

Model Model 0 Model 1 Model 2 Model 3

Density −3.34 −3.01 −4.67 −4.12 −5.22


(0.27) (0.50) (0.53) (0.76)
Communication 0.426 0.424 0.484
(0.061) (0.067) (0.078)
Distance −0.224 −0.365 −0.340
(0.055) (0.084) (0.121)
Same field 0.717 0.736 0.677
(0.20) (0.20) (0.34)
Network time 1 6.59
(0.62)
Reciprocity 4.33 3.82 3.30 2.43 0.839
(0.45) (0.48) (0.60) (0.71)
Distance 0.364 0.519
(0.16) (0.21)
Sender status 0.171 0.155 0.108
(0.12) (0.13) (0.14)
Receiver status 0.0962 0.0851 0.0251
(0.077) (0.087) (0.10)
Sender variance 1.741 1.06 3.40 3.49 2.97
(0.40) (1.20) (1.29) (1.34)
Receiver variance 2.232 1.46 0.730 0.740 0.731
(0.52) (0.35) (0.34) (0.48)
Sender/ Receiver −1.263 −0.829 −1.15 −1.18 −0.901
covariance (0.40) (0.51) (0.55) (0.55)

Deviance (approx.) 663.7 531.2 526.8 258.5


1
Based on the variance of the n estimated sender parameters.
2
Based on the variance of the n estimated receiver parameters.
3
Based on the covariance of the n pairs of sender and receiver parameters.

5605-Scott-Chap31.indd 468 4/13/2011 2:41:50 PM


STATISTICAL MODELS FOR TIES AND ACTORS 469

tion cannot be linked to the observed correlation and actor covariate effects. The model goes
between in- and outdegree, because of the inclu- beyond dyadic dependence, because it includes
sion of the reciprocity parameter in the model. additional parameters to capture specific forms of
Finally, a deviance value is reported, that due to third-order dependence, defined as balance or
the nonlinearity of the model is only approximate clusterability. This can be understood as looking
(cf. random effects logistic regression). No formal for further structure in the residuals of the model.
tests for model comparison can be based on the The residuals are defined as a function of latent
deviance (see Zijlstra et al., 2005). actor characteristics, forming a distance or space.
Model 1 in Table 31.5 is analogous to SRM Thus, a more complex dependence structure is
Model 2 in Table 31.4 and has the same substan- modeled than in the SRM or p2 model, although
tive interpretation with positive effects of com- not as complete or complex as in the Exponential
munication and field similarity and a negative Random Graph Models. The bilinear model is
effect of distance on friendship. The actor status set up as a Bayesian Generalized Linear Model,
effects, however, are too small to be significant. accommodating normal, Poisson and binomial
(Direct comparison of the regression parameters tie distributions, and is estimated using MCMC
to the previous model is difficult, because methods. The dimensionality of the latent space
they tend to increase in size with more variables in is to be decided on by the researcher, with the
the model. This is a well-known phenomenon help of (Bayesian) fit statistics. If the dimensions
in logistic regression with random effects, see, of the latent space are chosen equal to zero,
for example, Snijders and Bosker [1999].) Note the bilinear model with a normal distribution
that the sender variance has increased as well. for the ties amounts to the Social Relations
This is best interpreted in comparison to Model. For dichotomous ties there is no
the receiver variance. Apparently the network equivalence with the p2 model because the
effects included in the model explain more of the bilinear model does not include a reciprocity
differences between the friendship ties received parameter in the fixed (mean) part of the model.
than those sent. A similar pattern, although not Bayesian model summary and selection tools are
quite as strong, was also observed in the SRM available to decide whether the model fits the data
analysis. satisfactorily.
In Model 2, the typical p2 feature of reciprocity
covariates is demonstrated, by including distance
in the model, not only for density but also for Application to acquaintance network
reciprocity. An interesting positive effect of The bilinear model is not part of the statnet suite
distance for reciprocity is found, which can be in R (Handcock et al., 2003), but for its estimation
interpreted in combination with the negative effect R source code is available at Peter Hoff’s Web site
of distance for density. The negative effect of (http://www.stat.washington.edu/hoff/Code/
distance on density implies that the overall GBME/). The bilinear model presented here is
probability of a friendship tie is smaller for used for illustration and is not intended to be pre-
researchers with a larger status difference. The sented as the best fitting model to the EIES data.
reciprocity distance parameter is an interaction A model is fitted with parameters equal to those of
effect, implying that the negative effect of Models 2 of the SRM model and p1 model, that is,
distance on density is reduced in mutual dyads by including the effect of communication, distance,
the positive effect of density on reciprocity, thus and field similarity, as well as sender and receiver
making mutual and asymmetric ties approxi- effects of status but without the acquaintanceship
mately equally likely for dyads with the same network at time 1 (as this explains so much of the
distance between actors. acquaintanceship at time 2). Further, the latent
Finally, the friendship network at time 1 is space is chosen to be two-dimensional to facilitate
added to the model.5 Model 3 shows that this cov- graphical representation obtained after a Procrustes
ariate has by far the largest influence, and like in rotation.6
the SRM analysis, the effects of field similarity Comparing the model results of the bilinear
and distance are reduced (although not for reci- model, presented in Table 31.6 to those of the
procity), whereas the effect of communication Social Relations Model (Model 2 in Table 31.4
remains relatively strong. and also obtained with the bilinear model setting
the number of latent space dimensions equal
to 0), it becomes clear that the effects of the cov-
ariates are considerably reduced, notably the
The bilinear model effects of field homophily, distance and sender
status, and, to a lesser extent, of receiver status.
Hoff’s (2005) bilinear model builds on the earlier The sender and receiver variances are practically
presented dyadic models, by incorporating dyadic the same, but the residual tie variance has

5605-Scott-Chap31.indd 469 4/13/2011 2:41:50 PM


470 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Table 31.6 Bilinear model analysis results for the EIES


acquaintanceship data at time 2 obtained with StOCNET
(standard errors in parentheses)
Density 1.14 (0.25)
Communication 0.107 (0.014)
Distance −0.0496 (0.026)
Same field 0.175 (0.089)
Sender status 0.0363 (0.028)
Receiver status 0.0650 (0.030)
Sender variance 0.117 (0.039)
Receiver variance 0.136 (0.045)
Sender/Receiver covariance 0.0880 (0.036)
Residual tie variance 0.544 (0.029)
Within-dyad covariance 0.363 (0.041)
Latent dimension 1 variance 0.317 (0.10)
Latent dimension 1 variance 0.312 (0.094)

gone down. The variances of the two latent dimen- through colleagues in the same field or with a
sions are in size between the sender and receiver similar status. Interesting is that the (truly) dyadic
variances and the residual tie variance, and (com- effect of communication is only slightly reduced.
pared to the SRM) picking up some of the residual Figure 31.3 depicts the position of the actors in the
variance. latent space. The symbols represent the locations
Our interpretation of the results is that, since of the actors, obtained as posterior mode from the
the latent space serves to capture third order MCMC runs. The tiny dots are the realizations
dependence, some of these structural effects were obtained in all runs of the MCMC sampler, and
hidden in field similarity and distance. This seems they give an indication of the spread of nodal loca-
plausible for effects like transitivity and balance tions and of the overlap between nodes. Actors
on acquaintanceship, which may well work who are located close together have many ties to
1.5
1.0
0.5
0.0
−0.5
−1.0
−1.5

−1.5 −1.0 −0.5 0.0 0.5 1.0 1.5

Figure 31.3 Bilinear model results for the EIES friendship network at time 2

5605-Scott-Chap31.indd 470 4/13/2011 2:41:50 PM


STATISTICAL MODELS FOR TIES AND ACTORS 471

each other and/or a similar pattern of ties to others INVESTIGATING GROUPS OF ACTORS
(Hoff, 2005). Some grouping seems to be present;
the grouping of actors will be further investigated In this section we take a different perspective on
in the next section, after the summary of the the social relational system. Instead of focusing
results obtained with the tie models. on the relation(s), trying to explain the observed
social network using dyadic and/or actor charac-
teristics, we now turn to the actors. For the EIES
data this amounts to how we can categorize the
Summary and discussion of researchers best, based on the individual covari-
the tie models ates available or on the acquaintance relations and
the communication network. Before we proceed
Four different models with increasing complexity
with presenting some stochastic a posteriori block
were discussed and illustrated in this section. With
models, we mention other methods and models
the MR-QAP model, we were able to identify a
with the aim to compare actors across known
sizable influence of communication on the EIES
groups (for instance, according to research field)
acquaintanceship network at time 2, also (be it
or to explain or predict an actor outcome variable
less strong) after controlling for the relations at
using the network ties and possibly actor and
time 1.
dyadic covariates (for instance, scientific status
All other models are more geared toward social
using the acquaintanceship or friendship network
network data in the sense that they specifically
and field).
model dyadic dependence. In addition to the
dyadic effect of communication, the analyses with
these models showed a symmetric dyadic effect of
status (distance), also after controlling for the first Comparing groups of actors
measurement of the network (not computed for
the bilinear model). If the distance between actors The use of well-known methods like t-tests and
is large, both tie values reported are lower, on ANOVA for the comparison of actors and their
average. The individual status effects were stronger network characteristics suffers from the incorrect
in the SRM and bilinear model (with only a sig- assumption of independence of observations (see,
nificant receiver effect) than in the p2 model. e.g., Hanneman and Riddle, 2005: Chapter 18). It
Because the p2 model models “friendship” (defined is easy to summarize relational data to the actor
as dichotomized acquaintanceship), this differ- level (although the choice for summary statistics
ence might be interpreted substantively as that may be overwhelming), but the resulting “actor”
acquaintanceship is more sensitive to individual data are dependent by definition. As for correla-
status than friendship. Such an interpretation is tions, a solution is to use permutation-based meth-
tentative because an alternative explanation could ods (cf. QAP), which are implemented in UCINET
be lack of power due to the dichotomous tie vari- for t-tests, ANOVA and regression with actor out-
able (as indicated by the larger standard errors for comes. In the case of the EIES researchers it
all parameters in the p2 model). would be natural to compare the researchers by
The interpretation of the random effects their disciplinary affiliation.
included in the models may seem difficult at first To investigate the influence of relations on
but is informative. The most important informa- actor characteristics, contagion models were pro-
tion in the SRM and bilinear model is captured by posed by, for example, Doreian (1980), Burt
the reciprocity effect, reporting the association (1987), Friedkin (1998) and Leenders (2002). In
between the two ties in the dyad. The sender and these models the outcome variable is an actor
receiver variances can be interpreted relative to characteristic, where the dependence between
each other, so for the EIES data it was found that actors is represented by including (some form of)
researchers differ more from each other in report- the social network in the regression equation.
ing ties than in receiving ties. The positive covari- A contagion model is thus a kind of spatial regres-
ance implies that researchers who report more sion model (cf. Ord, 1975; Anselin, 1988), mode-
than average tie values also tend to receive such ling autoregression or (network) autocorrelation
values, which could be interpreted as a general or both. Contagion models can be estimated using
sociability effect. Reciprocity is treated as a fixed software for spatial regression or sna (Butts,
effect in the p2 model and also showed the 2008). See O’Malley and Marsden (2008) for a
expected positive effect. The results of the bilinear good overview and application of these models.
model with a two-dimensional latent space showed We do not illustrate these models here for the
that the effects obtained with the other models reason that continuous time models are available
were probably somewhat inflated due to the pres- in which contagion can be distinguished from
ence of third-order effects. selection effects (cf. Steglich et al., 2010).

5605-Scott-Chap31.indd 471 4/13/2011 2:41:51 PM


472 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Identifying groups of actors observed social network, conditional on the latent


(unknown) group membership of the actors (their
The aim of a stochastic blockmodel analysis is the so-called colors). Together with a color distribu-
identification of groups (or positions) of actors. As tion defining a priori probabilities for each color
in latent class analysis, one of the questions in (similar to latent class analysis), the joint distribu-
such an analysis is to determine how many groups tion of dyadic outcome and color is obtained.
are needed to distinguish the set of actors suffi- Parameter estimates of the a posteriori probabili-
ciently, with the immediate next question whether ties for each color (per actor) are obtained using
the group assignment is consistent with the MCMC estimation, which is implemented in
researcher’s expectation or can be understood BLOCKS. Note that this model only uses the
given other quantitative (or qualitative) informa- observed (binary) network and no covariate
tion. In some stochastic blockmodels additional information.
information on the positions of the actors is Each actor is assigned to the color with the
obtained, to be used for a graphical representation. highest posterior probability for that actor. To
Note that the bilinear model presented in the determine the number of groups, two fit statistics
previous section also had this feature. Early pertaining to the extra information (Iy) and clarity
examples of stochastic blockmodels can be found (Hx) of the obtained actor positions are available.
in Anderson and Wasserman (1992), who group For both measures, values close to zero are pre-
the sender and receiver parameters of the p1 ferred. The statistics are compared across models
model. with a (predetermined) different number of groups
In the remainder of this section we present four to obtain the best solution.
stochastic blockmodels, which will be indicated
by the name of the software in which they are
implemented. The first stochastic blockmodel, Application to friendship data
BLOCKS, was proposed by Nowicki and Snijders BLOCKS was run on the EIES friendship data in
(2001) for (valued) social network data. This an exploratory approach to obtain solutions for
model follows an earlier model for (binary) net- models with two to six classes. It turned out that
work data to assign actors to (latent) groups none of the group assignments could be classified
(Snijders and Nowicki, 1997). Tallberg (2005) as very informative or clear. We focused on the
proposed an extension of the model by further solutions for three to five groups (colors).
modeling the group probabilities using covariate BLOCKS has the option to discard stepwise the
information (not illustrated here because no soft- “worst” fitting actors in order to obtain a network
ware is readily available). The next model pre- with a reduced number of actors who are more
sented is the stochastic block model proposed by easily assigned to groups such that the probability
Frank (1995), KliqueFinder. In addition to a group of within-group ties is higher than between-group
assignment, a graphical display of the positions of ties. Using the stepwise approach, only four
the actors is obtained. A somewhat different groups remained in the five-group solution. We
approach is the third model, proposed by therefore chose four as the desired number of
Schweinberger and Snijders (2003) and based on groups. For reasons of comparability with the
the ultrametric distances between actors involving other stochastic block models we did not want to
triads of actors and resulting in hierarchically leave out actors of the network (although it can be
clustered groups. As a final model the latent clus- an attractive feature to identify “ungroupable”
ter models of Handcock et al. (2007), latentnet, actors), and therefore we used the option to re-
are presented, in which dyadic and actor covariate assign actors to groups. The algorithm gives the
information is incorporated. These models are three or four best-fitting actors, that is, actors who
related to the models presented by Hoff et al. are unambiguously assigned to different groups.
(2002), Shortreed et al. (2006), and Krivitsky The first three actors all had different research
et al. (2009). fields and we chose this as a starting configurat-
ion for the four-group solution. The obtained
group assignment is depicted in Figure 31.4 and
Blocks Table 31.7. For this solution, the values Hx = 0.27
and Iy = 0.70 were obtained, indicating that the
The stochastic a posteriori model proposed by solution is not particularly informative, which is at
Nowicki and Snijders (2001) defines groups of least partly due to our choice to assign all actors to
stochastic equivalent actors, having the same a group.
probability of dyadic outcomes with actors in their Table 31.7 and Figure 31.4 show that the
own group and the same probability of dyadic groups indicate no association with the research
outcomes with actors in other groups. It is based field as there are researchers from different
on the assumption of dyad independence in the disciplines (depicted by the shapes of their nodes

5605-Scott-Chap31.indd 472 4/13/2011 2:41:51 PM


STATISTICAL MODELS FOR TIES AND ACTORS 473

Table 31.7 BLOCKS four-group solution for the EIES friendship data at
time 2 (excerpt from output obtained with StOCNET; slightly adapted
to distinguish groups (Grp: A–D), actors (Id), and research fields
(Fld: Sociology, Anthropology, Statistics/Mathematics, and Other)

5605-Scott-Chap31.indd 473 4/13/2011 2:41:51 PM


474 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

2
18
C 26
13 6

30 32
7 27

9
11

8
31

28
21
4

5
3 16
20 14 25
12
23

19 10
24
15 22
17
D
B 29

Figure 31.4 EIES friendship network at time 2. The actors are assigned to four different
groups (distinguished by location) and are distinguished by research eld (node shape and
color; same as in Figure 31.2) and by number of citations (node size). The program NetDraw
is used to draw the group solution obtained with BLOCKS

in the graph) in all groups except for group D, (indicating a null relation) by dots and adding the
positioned in the lower righthand corner. There information on the actors’ fields. The 2s indicate
are many ties among the groups, especially mutual relations, the 3s and 4s asymmetric rela-
between the groups B and D on the lower side of tions, from column to row and vice versa, respec-
the picture. The picture, however, seems to show a tively. Group A (top right in Figure 31. 4) has
hierarchy in citation status among the groups: the mutual relations within the group and mainly
largest group, B (bottom left), contains the sends relations to the other groups (in view of the
researchers with high citation status, followed by many 3s in the rows of group A), with also a good
the smaller group, D positioned bottom right, deal of mutual relations with group C (top left in
consisting of five sociologists. The second largest Figure 31.4), the group with a slightly lower
group, C (top left), and the small group, A (top status. Group B (bottom left in Figure 31.4) is the
right), consist of the researchers with different largest, with the highest status, and exhibits all
fields with the lowest status, where the researchers forms of dyadic relations within the group (with
in group C have a lower status than those in group many null dyads), and only sends some ties to the
A. Some more precise information can be derived first group and even fewer to the third group but
from Table 31.7. It represents the adjacency receives a lot of ties (some reciprocal) to the
matrix, as available in the output of BLOCKS, fourth group. Group C is large and like group B
slightly adapted by replacing the original 1s has relatively few ties within the group. It has

5605-Scott-Chap31.indd 474 4/13/2011 2:41:53 PM


STATISTICAL MODELS FOR TIES AND ACTORS 475

hardly any ties with groups B and D and more ties highest status and are all sociologists except for
(some reciprocal) with group A. Finally, group D the most-cited researcher from an “other” disci-
is quite dense and its actors send ties to especially pline but are further apart within the groups.
groups A and B (some reciprocal) but have hardly Figure 31.6, obtained with UCINET, confirms this
any ties with researchers in group C. The many view of the KliqueFinder solution and gives some
ties with group B are well visible in Figure 31.4. more information on the middle groups (bottom
In terms of hierarchy defined as receiving many left and top right), which have a high density and
choices by other groups, the order of the groups also many relations with each other. Finally, the
is A, C, B, D. adjacency matrix representation in Table 31.8
(slightly adapted from the KliqueFinder output to
indicate the original research fields) shows the
high density within the five groups, where the 1s
KliqueFinder indicate either asymmetric or mutual relations and
the dots no relation.
The procedure implemented in KliqueFinder
(Frank, 1995, 1996, 2009) is based on a p1-like
model7 extended with a categorical actor covariate
(group), in the form of a group similarity
(homophily) effect on the density. The underlying ULTRAS
idea is that of cohesion: Actors in the same group The model proposed by Schweinberger and
should have a higher probability to interact with Snijders (2003) to find groups (or settings as they
each other than with actors from other groups. call it) is based on the assumption that there is an
Just like in BLOCKS no other information is nec- unknown distance between the actors in the net-
essary than one observed social network. Unlike work that governs the probability of ties between
BLOCKS, KliqueFinder makes no distinction them, leading to a nested grouping of the actors.
between the direction of ties. The distance (or proximity) is measured by an
The model was developed before MCMC esti- ultrametric (latent) space defined for pairs of
mation became more common and is estimated actors, relative to their distance to third actors, and
with an algorithm called iterative partitioning. The implies a transitive structure. The larger the dis-
actors are preassigned to a group, starting with a tance between actors, the lower their probability
clique of three actors, and this assignment is of a tie. The nested grouping leads to regions with
changed iteratively until no further improvement higher density like a geographic map with contour
of the objective function is possible. The objective lines (see Schweinberger and Snijders, 2003:
function is usually defined to maximize the prob- Figure 2). The ULTRAS model requires a sym-
abilities of in-group ties, but some other, related, metric matrix and can deal with dichotomous,
definitions are also available. Preassignment of count, or continuous tie variables, using, respec-
actors to different groups is optional. A graphical tively, a Bernoulli, Poisson, or normal distribution
representation of the groups and the actors for the tie probabilities, intensities, or strengths. It
within them is obtained using MDS on distances is estimated using Maximum Likelihood or
between actors and groups defined by the amount Bayesian methods.
of interaction between them.

Application to the symmetrized


Application to friendship data friendship data
The EIES friendship data were analyzed with The “ultrametric” model is implemented in the
KliqueFinder. This resulted in five groups, STOCNET module ULTRAS. The results for the
depicted in Figure 31.5. It is clear that the five EIES friendship data are based on a standard setup
groups do not correspond to the four research with three runs of 10,000 iterations of the MCMC
fields distinguished in the EIES data. A possible sampler. The first step is to decide how many
interpretation is a hierarchy of actors according to levels are needed in the grouping of the actors.
status but with a different result than the BLOCKS Running the module for 2 to 9 levels, it was found
solution with four groups. The upper group (B in that four levels sufficed in the sense that solutions
Table 31.8) consists of researchers with a rela- with five or more levels had all very small proba-
tively low number of citations and is far away bilities of ties between actors at a distance of five
from the middle two groups (A and E) containing or more. We did not run extensive checks for con-
most actors. Of these middle groups, only three or vergence or model fit. The solution is presented in
four (in the lower-middle group E) have a higher Figure 31.7, not as a map but in the form of an
status. The two overlapping lower groups (C and adjacency matrix, consisting of several “blocks”
D) consist of fewer actors. These actors have the or “settings,” where the last simply comprises the

5605-Scott-Chap31.indd 475 4/13/2011 2:41:53 PM


476 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

D
C

Figure 31.5 EIES friendship network at time 2. The actors are assigned to five different
groups (distinguished by location) and are distinguished by research eld (node shape and
color; same as in Figure 31.2) and by number of citations (node size). The program NetDraw
is used to draw the graph obtained with KliqueFinder

whole network, with a very low overall probabil- the fifth group of the KliqueFinder solution (see
ity (approximately 0.001) of a tie between actors Table 31.8).
not belonging to a further nesting (here, none of
the actors). The lower right block consisting of
actors 7 through 12 (as ordered by ULTRAS, see
Figure 31.7) has a probability of 0.05 of a tie,
Latentnet
whereas within the upper left block (actors 4 The latent position cluster model proposed by
through 20) this probability has increased to 0.20. Handcock et al. (2007) is based on a different
This division roughly corresponds to the two larg- concept of latent space, which was previously
est groups in the BLOCKS solution. Within these discussed for Hoff’s (2005) bilinear model. The
two settings a large number of groups are nested, latent space model proposed by Hoff et al. (2002)
many of which contain only pairs of actors. does not have the feature of assigning group
The highest density is found in the darker blocks, positions to actors. It was extended to the latent
with a tie probability of 0.70. The largest block position cluster model by assuming unknown
of actors this close together is the second block in group (latent cluster) membership of the actors on
the adjacency matrix (consisting of actors 8 the dimension(s) in the latent space. Actor and
through 25), which shows some resemblance with dyadic covariates can be included in the model as

5605-Scott-Chap31.indd 476 4/13/2011 2:41:53 PM


STATISTICAL MODELS FOR TIES AND ACTORS 477

12
10 D

3 23

15 A
19
31
11
28
26
7
18
1
13
32 6

8 2

24
25

14

29
21
16

20
17

E 22 30
5 27
B
9

Figure 31.6 EIES friendship network at time 2. The actors are assigned to five different
groups (distinguished by location) and are distinguished by research eld (node shape and
color; same as in Figure 31.2) and by number of citations (node size). The program NetDraw
is used to draw the group solution obtained with KliqueFinder

well, which makes the model more elaborate than 2008) with the same covariates as in the bilinear
the previously presented stochastic a posteriori model. Again, we did not search for a best-fitting
blockmodels. The model is estimated with model but compared the four and five latent clus-
advanced Bayesian (MCMC) techniques and has ter solutions, including the dyadic covariates for
several options for the definition of distance on communication, distance, and field homophily.
which graphical representation is based (see The four latent cluster solution was to be preferred
Shortreed et al., 2006). Various statistics are avail- according to the Bayesian Information Criterion.
able to make the sometimes difficult choice on the The regression parameters (not shown in a table)
optimal number of latent clusters (as in the revealed that the effect of communication was
BLOCKS model), and the number of dimensions strongest, but interestingly, there was also a sig-
of the latent space. The model was extended with nificant effect of field similarity, whereas the
random sender and receiver effects (comparable to effect of distance was small and insignificant.
the bilinear model) by Krivitsky et al. (2009). (Recall that in the bilinear model with random
sender and receiver effects both field similarity
and distance did not reach significance.) The
Application to friendship data graphical representation of the solution in
The EIES friendship data are analyzed using the Figure 31.8 shows large overlap in the four
R package latentnet (see Krivitsky and Handcock, clusters and a lot of variation around the cores of

5605-Scott-Chap31.indd 477 4/13/2011 2:41:54 PM


Table 31.8 KliqueFinder five-group (Grp: A–E) solution for the
EIES friendship data at time 2. Actors (Id) and Research fields
(Fld: Sociology, Anthropology, Statistics/Mathematics, and Other)
are distinguished

5605-Scott-Chap31.indd 478 4/13/2011 2:41:54 PM


STATISTICAL MODELS FOR TIES AND ACTORS 479

Ultrametric settings structure


4 10 23 8 14 16 21 22 24 25 1 15 29 31 3 17 11 32 5 20 7 13 18 26 9 27 2 30 19 28 6 12
4
10
23
8
14
16
21
22
24
25
1
15
29
31
3
17
11
32
5
20
7
13
18
26
9
27
2
30
19
28
6
12

Figure 31.7 Block structure obtained with ULTRAS for the symmetrized EIES friendship
network at time 2

the clusters. A general positive association between extended to all possible dyadic outcomes (four in
the positions on the two dimensions is visible. The the case of binary data). The concept of stochastic
resemblance with the BLOCKS solution is larger equivalence is not as clearly defined in the latent
than with the KliqueFinder solution. position cluster model, because group member-
ship is defined on the latent space dimensions
(possibly while taking into account covariate
Summary effects on the probability of a tie). The interpreta-
tion of these dimensions is not always easy or
Four different stochastic a posteriori block models immediately clear. ULTRAS is conceptually
were presented. Although they have the same related to latentnet but employs a different defini-
goal, finding a (good) classification of the actors tion of latent space and distance.
in a network, their properties are very different. Given the different definitions of stochastic
The first three models do not use covariate infor- equivalence it is not surprising that rather different
mation and aim to find groups consisting of solutions are found. KliqueFinder gave a five-
stochastic equivalent actors, which in the case of group solution with high within-group density
KliqueFinder is defined simply as having an as (see Figures 31.5 and 31.6) which seemed to be
high as possible probability of within-group ties somewhat related to the scientific status of the
(and therefore lower between-group ties). This is actors and not so much to research field, although
also one of the assumptions in ULTRAS, whose scientific status is related to field as the sociolo-
definition of distance leads to a classification of gists have the highest number of citations
actors in nested groups. In BLOCKS the defini- (cf. Table 31.1). For the four-group solution found
tion of stochastic equivalence is more general and by BLOCKS, a weak relation with scientific status

5605-Scott-Chap31.indd 479 4/13/2011 2:41:55 PM


480 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

−1

−2

−3

−4 −2 0 2

Figure 31.8 Latent position and latent cluster graph obtained with latentnet for the EIES
friendship network at time 2

was suggested as well. The nested group structure association between the networks and covariates.
obtained with ULTRAS could be roughly related Some tentative answers are that communication is
to both earlier solutions but contained many more an important explanatory variable for the observed
smaller groups. The analysis with latentnet indi- acquaintanceship at time 2 for the EIES research-
cated that a solution with four groups was to be ers. This could be regarded as a proof of the suc-
preferred over a five-group solution, although cess of the experiment that led to the data. Status
from the overlap between clusters a solution with effects are less clear, and the influence of working
fewer clusters might have been better. The assign- in the same area on the relationship seems to
ment of actors to groups (not precisely shown depend to some extent on the model applied.
here) resembled the group assignment by BLOCKS Whether and how the actors could be assigned to
and is therefore also weakly related to scientific different groups has not become very clear, as the
status of the actors. Interestingly, no significant methods presented gave different solutions. If
effect of scientific status (through dyadic distance) anything, the grouping seems related to scientific
was found. A possible interpretation is that dis- status, not to research area.
tance does not directly influence the (dyadic) The difference in (ease of) interpretation under-
probability of a tie but is present in the latent lines the differences between the two classes
dimensions that capture third-order dependence. of stochastic models we discussed. Modeling the
ties using dyadic and actor covariate information
is relatively straightforward because the focus is
on the explanatory power of the covariates and
less on unexplained differences between actors.
CONCLUDING REMARKS In the models for finding groups of actors,
there seems to be a need to interpret the groups a
Although we did not find an answer to all of the posteriori using additional (covariate) information
questions posed in the introduction of this chapter, as well.
the models and methods presented gave a lot of The latent space models with covariates form
insight into the structure of the EIES data and the in this sense an interesting hybrid class of

5605-Scott-Chap31.indd 480 4/13/2011 2:41:56 PM


STATISTICAL MODELS FOR TIES AND ACTORS 481

models with the possibility of using covariate because it preserves the 0 and 1, both frequently
information and finding groups, although this occurring as citation numbers.
does not solve the problem of interpreting the 4 A straightforward multilevel model is obtained
latent space dimension(s), capturing a form of for egocentric data, where (ties to) alters are nested
triadic dependence. The random effects in the in egos, under the assumption of nonoverlapping
models for ties can be regarded as latent variables ego networks, leading to a simple distinction of
as well, forming a two-dimensional latent space of within-ego and between-ego variance (see also Van
(unexplained) sender and receiver effects related Duijn et al., 1999).
to the actors. Such an interpretation is easier and 5 Note that it would have been possible to use
more straightforward than the interpretation of the the acquaintanceship network instead of the binary
latent space defined by the bilinear model and friendship network, because the network is used as a
latent space models. Even if no further interpreta- covariate.
tion can be obtained, it is expected that modeling 6 The results are based on a sample of 1,000
network dependence explicitly improves the esti- draws from a sample of 50,000 from the posterior
mates of the covariate parameters. distribution of the parameters, taking every 50th
All models and methods presented can be draw, after a burn-in of 50,000.
estimated with (more or less readily) available 7 Note that the p1 model and its early extensions
software. The development of the R packages with categorical actor variables are also considered
for social network analysis have made it almost stochastic blockmodels (with groups defined a priori)
easy to apply the complex latent position cluster because in these models the actors belonging to the
models. The interpretation of social network same group are stochastically equivalent.
data, however, remains not very easy. It requires
the expertise of applied researchers, who, just
like the EIES researchers, may want to have
colleagues with statistical expertise in their
network. REFERENCES

Anderson, C.J. and Wasserman, S. (1992) ‘Building stochastic


blockmodels’, Social Networks, 14(1–2): 137–61.
ACKNOWLEDGMENTS Anselin, L. (1988) Spatial Econometrics: Methods and Models.
Dordrecht, Netherlands: Kluwer Academic.
Boer, P., Huisman, M., Snijders, T.A.B., Steglich, C.E.G.,
The authors would like to thank Christian Steglich,
Wichers, L.H.Y. and Zeggelink, E.P.H. (2006) StOCNET: An
Tom Snijders, and Peter Carrington for helpful
Open Software System for the Advanced Statistical Analysis
comments, and Ken Frank for advice on the use of
of Social Networks. Version 1.8. Groningen: ICS, University
KliqueFinder.
of Groningen/SciencePlus.
Borgatti, S.P. (2002) NetDraw: Graph Visualization Software.
Harvard: Analytic Technologies.
Borgatti, S.P., Everett, M.G. and Freeman, L.C. (2002) UCINET
NOTES 6 for Windows: Software for Social Network Analysis.
Harvard, MA: Analytic Technologies.
1 The principles of blockmodeling are laid out by Burt, R.S. (1987) ‘Social contagion and innovation: Cohesion
Doreian et al. (this volume); see also De Nooy et al. versus structural equivalence’, American Journal of
(2005) and Wasserman and Faust (1994, Sociology, 92(6): 1287–335.
Chapter 10). Butts, C.T. (2008) ‘Social network analysis with sna’, Journal
2 Although the availability of software is dis- of Statistical Software, 24(6): 30.
cussed to some extent, a more complete overview of Cook, W.L. and Kenny, D.A. (2005) ‘The actor-partner interde-
software for network analysis can be found in pendence model: A model of bidirectional effects in devel-
Huisman and van Duijn’s chapter (this volume). opmental studies’, International Journal of Behavioral
Full-color versions of the figures are available on Development, 29(2): 101–9.
http://www.gmw.rug.nl/~huisman/sna/figures.html. Cyram (2009) Cyram NetMiner 3. Seoul: Cyram Co., Ltd.
3 This is just a simple and straightforward way to Dekker, D., Krackhardt, D. and Snijders, T.A.B. (2007)
express status differences among the researchers and ‘Sensitivity of MRQAP tests to collinearity and autocorrela-
is here mainly used for illustration. We have not tion conditions’, Psychometrika, 72(4): 563–81.
investigated other definitions and cannot claim that De Nooy, W., Mrvar, A. and Batagelj, V. (2005) Exploratory
this would be the best or most meaningful way to Social Network Analysis with Pajek. Cambridge: Cambridge
operationalize status. The square-root transforma- University Press.
tion is preferred over the log-transformation, another Doreian, P. (1980) ‘Linear models with spatially distributed
commonly used transformation of right-skewed data, data.’ Sociological Methods and Research, 9(1): 29–60.

5605-Scott-Chap31.indd 481 4/13/2011 2:41:56 PM


482 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Frank, K.A. (1995) ‘Identifying cohesive subgroups’, Social Krivitsky, P.N., Handcock, M.S., Raftery, A.E. and Hoff, P.D.
Networks, 17(1): 27–56. (2009) ‘Representing degree distributions, clustering, and
Frank, K.A. (1996) ‘Mapping interactions within and between homophily in social networks with latent cluster random
cohesive subgroups’, Social Networks, 18(2): 93–119. effects models’, Social Networks 31(3): 204–13.
Frank, K. (2009) KliqueFinder for Windows. Version 0.11. East Lazega, E. and van Duijn, M.A.J. (1997) ‘Formal structure and
Lansing: Michigan State University. exchanges of advice in a law firm: A logistic regression
Freeman, S.C. and Freeman L.C. (1979) ‘The networks net- model for dyadic network data’, Social Networks, 19(4):
work: A study of the impact of a new communications 375–97.
medium on sociometric structure’, Social Science Research Leenders, R.Th.A.J. (2002) ‘Modeling social influence through
Reports 46. Irvine: University of California. network autocorrelation: Constructing the weight matrix’,
Friedkin, N.E. (1998) A Structural Theory of Social Influence. Social Networks, 24(1): 21–47.
Cambridge: Cambridge University Press. Nowicki, K. and Snijders, T.A.B. (2001) ‘Estimation and pre-
Gerlsma, C., Snijders, T.A.B., van Duijn, M.A.J. and diction for stochastic blockstructures’, Journal of the
Emmelkamp, P.M.G. (1997) ‘Parenting and psychopathol- American Statistical Association, 96(455): 1077–87.
ogy: Differences in family members perceptions of parental O’Malley, A.J. and Marsden, P.V. (2008) ‘The analysis of social
rearing styles’, Personality and Individual Differences, networks’, Health Services and Outcomes Research
23(2): 271–82. Methodology, 8(4): 222–69.
Gill, P.S. and Swartz, T.B. (2004) ‘Bayesian analysis of directed Ord, K. (1975) ‘Estimation methods for models of spatial
graphs data with applications to social networks’, Journal interaction’, Journal of the American Statistical Association,
of the Royal Statistical Society. Series C (Applied Statistics), 70(349): 120–26.
53(2): 249–60. Rasbash, J., Charlton, C., Browne, W.J., Healy, M. and
Goldenberg, A., Zheng, A.X., Fienberg, S.E. and Airoldi, E.M. Cameron, B. (2005) MLwiN Version 2.02. Bristol: Centre
(2009) ‘A survey of statistical network models’, Foundations for Multilevel Modelling, University of Bristol.
and Trends in Machine Learning, 2(2): 129–233. Robins, G.L., Snijders, T.A.B., Wang, P., Handcock, M.S. and
Handcock, M.S., Hunter, D.R., Butts, C.T., Goodreau, S.M., Pattison, P. (2007) ‘Recent developments in exponential
Krivitsky , P.N. and Morris, M. (2003) Statnet: Software random graph (p_ p*) models for social networks’, Social
Tools for the Statistical Modeling of Network Data. Networks, 29(2): 192–215.
Version 2.1-1.31. Schweinberger, M. and Snijders, T.A.B. (2003) ‘Settings in
Handcock, M.A., Raftery, A.E. and Tantrum, J.M. (2007) social networks: A measurement model’, Sociological
‘Model-based clustering for social networks. With discus- Methodology, 33(1): 307–41.
sion’, Journal of the Royal Statistical Society A, 170(2): Scott, J. (2000) Social Network Analysis: A Handbook.
301–54. London: Sage.
Hanneman, R.A. and Riddle, M. (2005) Introduction to Social Shortreed, S., Handcock, M.S. and Hoff, P.D. (2006) ‘Positional
Network Methods. Riverside: University of California. estimation within a latent space model for networks’,
http://faculty.ucr.edu/~hanneman/. Methodology, 2(1): 24–33.
Hoff, P.D. (2005) ‘Bilinear mixed-effects models for dyadic Snijders, T.A.B. and Bosker, R.J. (1999) Multilevel Analysis: An
data’, Journal of the American Statistical Association, Introduction to Basic and Advanced Multilevel Modeling.
100(469): 286–95. London: Sage.
Hoff, P.D., Raftery, A.E. and Handcock, M.S. (2002) Snijders, T.A.B. and Kenny, D.A. (1999) ‘The social relations
‘Latent space approaches to social network analysis’, model for family data: A multilevel approach’, Personal
Journal of the American Statistical Association, 97(460): Relationships, 6(4): 471–86.
1090–98. Snijders, T.A.B. and Nowicki, K. (1997) ‘Estimation and
Holland, P.W. and Leinhardt, S. (1981) ‘An exponential prediction for stochastic blockmodels for graphs with
family of probability distributions for directed graphs’, latent block structure’, Journal of Classification, 14(1):
Journal of the American Statistical Association, 76(373): 75–100.
33–50. Snijders, T.A.B., Pattison, P.E., Robins, G.L. and Handcock,
Hubert, L.J. (1987) Assignment Methods in Combinatorial M.S. (2006) ‘New specifications for exponential
Data Analysis. New York: Marcel Dekker. random graph models’, Sociological Methodology, 36(1):
Kenny, D.A., Kashy, D.A. and Cook, W.L. (2006) Dyadic Data 99–153.
Analysis. New York: Guilford. Steglich, C., Snijders, T.A.B. and Pearson, M. (2010)
Kenny, D.A. and La Voie, L. (1984) ‘The social relations ‘Dynamic networks and behavior: Separating selection
model’, in L. Berkowitz (ed.), Advances in Experimental from influence’, Sociological Methodology, 40(1):
Social Psychology, Vol. 18. New York: Academic Press. 329–393.
pp. 141–82. Tallberg, C. (2005) ‘A Bayesian approach to modeling sto-
Krackhardt, D. (1987) ‘QAP partialling as a test of chastic blockstructures with covariates’, Journal of
spuriousness’, Social Networks, 9(2): 171–86. Mathematical Sociology, 29(1): 1–23.
Krivitsky, P.N. and Handcock, M.S. (2008) ‘Fitting latent clus- Van Duijn, M.A.J., Snijders, T.A.B. and Zijlstra, B.J.H. (2004)
ter models for networks with latentnet’, Journal of ‘p2: A random effects model with covariates for indirected
Statistical Software, 24(5): 1–23. graphs’, Statistica Neerlandica, 58(2): 234–54.

5605-Scott-Chap31.indd 482 4/13/2011 2:41:56 PM


STATISTICAL MODELS FOR TIES AND ACTORS 483

Van Duijn, M.A.J., van Busschbach, J.T. and Snijders, T.A.B. Zijlstra, B.J.H. (2008) ‘Random effects models for directed
(1999) ‘Multilevel analysis of personal networks as depend- graphs with covariates’. Unpublished Ph.D. thesis,
ent variables’, Social Networks, 21(2): 187–209. University of Groningen, The Netherlands.
Wang, Y.J. and Wong, G.Y. (1987) ‘Stochastic blockmodels for Zijlstra, B.J.H., van Duijn, M.A.J. and Snijders, T.A.B. (2005)
directed graphs’, Journal of the American Statistical ‘Model selection in random effects models for directed
Association, 82(397): 8–19. graphs using approximated Bayes factor’, Statistica
Wasserman, S. and Faust, K. (1994) Social Network Analysis: Neerlandica, 59(1): 107–18.
Methods and Applications. Cambridge: Cambridge Zijlstra, B.J.H., van Duijn, Marijtje A.J., and Snijders, Tom A.B.
University Press. (2006) ‘The multilevel p2 model: A random effects model
Wasserman, S. and Pattison, P. (1996) ‘Logit models and for the analysis of multiple social networks’, Methodology
logistic regression for social networks: I. An introduction to 2(1): 42–47.
Markov graphs and p*’, Psychometrika, 61(3): 401–25. Zijlstra, B.J.H., van Duijn, M.A.J. and Snijders, T.A.B. (2009)
Wong, G.Y. (1987) ‘Bayesian models for directed graphs’, ‘MCMC estimation of the p2 network regression model
Journal of the American Statistical Association, 82(397): with crossed random effects’, British Journal of
140–48. Mathematical and Statistical Psychology, 62(1): 143–66.

5605-Scott-Chap31.indd 483 4/13/2011 2:41:56 PM


32
Exponential Random Graph
Models for Social Networks
Garry Robins

INTRODUCTION How can a researcher, confronted by only a


single network observation, infer particular organ-
Humans constantly monitor and respond to their izing principles for that network? In what sense
social environment. We seek advantage from the can we detect a structural signature? Even when
opportunities the social environment presents, to data are impeccably collected under the very best
adapt our behaviors in response to social con- of conditions, a single network observation is no
straints imposed on us, and to change our social more than a solitary instance from an ongoing
worlds to maximize those opportunities and mini- stream of change. Yet because of the relative con-
mize those constraints. This incessant flow of stancy of network organizing principles, a single
social process implies that social networks are not network observation captures the accumulation of
fixed structures that are predetermined and singu- social processes, like an archaeological trace.
lar. Rather, they are changeable, evolving not Stable organizing principles will result in patterns
towards a single optimal point – for there is no of network ties that can be observed in the data,
single optimal point of social structure – but even when data are from a single instance in time.
towards a range of varying networks, each broadly These patterns of network ties are indeed the
consistent with one another but instantiated at dif- structural signature of the network and provide
ferent points in time. This constant change does evidence from which we may infer something of
not imply that social networks are random and the social processes that build the network.
unpredictable. They are built by social processes So we look for patterns in the network. Yet it is
that are ongoing and multiple, and they result in not sufficient to inspect the data for one pattern at
the presence of observable network substructures. a time, because structures build on one another.
Each network presents with a “structural signa- For instance, a triangle contains three network
ture” that embodies certain self-organizing princi- ties, so it follows that if the network has many ties
ples. For a given network, the stability of these we will see more triangles simply by chance. The
principles arises from the constancy of general question then is, given the density of the network,
social behaviors that we as humans have evolved, do we see more triangles than expected? If so,
combined with the more specific norms, localized perhaps we need to postulate a specific social
cultures, and other particular features of the social process that could lead to triangles (e.g., network
contexts within which we operate, features that do closure – see below). If not, we have no need for
not change rapidly. But these organizing princi- a triangulation mechanism, as density alone – the
ples can and do vary locally to a greater or lesser propensity for individuals within the network to
extent, so they are not deterministic and do not form network ties – is a sufficient and parsimoni-
have an optimum. Social processes are variable; ous explanation.
social networks are stochastic entities; network Exponential random graph models (ERGMs) –
properties need to be assessed statistically. sometimes called p* models – are a family of

5605-Scott-Chap32.indd 484 4/13/2011 2:43:39 PM


EXPONENTIAL RANDOM GRAPH MODELS FOR SOCIAL NETWORKS 485

statistical models for social networks that permit models. However, a modicum of mathematical
inference about prominent patterns in the data, notation and technical terminology is required.
given the presence of other network structures. In A social network comprises a set of n actors and a
a loose sense, they enable network pattern recog- set of network ties among those actors. For every
nition. There are several classes of ERGMs, some pair i and j of actors in the network, let Xij = 1 if
with a long tradition in social network analysis. there is a network tie from actor i to actor j, and
Holland and Leinhardt’s (1981) p1 model can be Xij = 0 if there is no such tie. Xij is then a binary
seen as an early dyadic independent version. random variable, and we denote X as the matrix of
Frank and Strauss (1986) proposed Markov all such variables (with empty cells Xii on the
random graph models, further elaborated by diagonal, since actors are assumed not to have ties
Wasserman and Pattison (1996). Robins, Pattison with themselves). Let xij be the observed value of
et al. (2007) provide an introductory review of the variable Xij and x the matrix of observed ties
these earlier developments. Recent work has (i.e., the observed network). X may be directed
focused on new improvements to model specifica- (so that Xij is distinguished from Xji) or undirected.
tions, as described below. There will be more For a given set of n actors, an ERGM models
model development in the future, but the underly- an observed network x by assigning a probability
ing impetus will continue to be the search for a to every network of n actors, based on network
parsimonious description of the small network configurations that are hypothesized through
patterns – termed configurations1 – that can be the dependence hypothesis. The form of the
seen as the building blocks of the network. model is:
Each different class of ERGM involves differ-
ent assumptions of dependence among network Pr(X = x) = (1/κ) exp{ΣA ηAgA(x)} (32.1)
ties. These are the theoretical ground for different
models, not just technical decisions. Through a where:
dependence assumption, a researcher makes the summation is over all configuration types A;
claims about the type, extent, and accumulation ηA is a parameter corresponding to configura-
of patterning that builds the network. Dependence tion type A;
is crucial. Independence of observations – the gA(x) is the network statistic for A and is a
fundament of general linear model statistical count of the number of configurations
techniques – cannot simply be presupposed. The A observed in x (although recent work has
presence of some ties will encourage other ties to extended the statistic beyond a simple
come into existence, to be maintained, or to be count);
destroyed. The dependence assumption is thereby κ normalizes (1) to be a proper probability
a theory about the basis of tie-formation processes. distribution.
The network’s self-organizing principles represent For readers not keen on mathematical formula-
the way that ties lead to other ties (or their tions, equation 32.1 essentially tells us that the
absence). The observable configurations of ties probability of a network x depends on the configu-
then constitute the network’s structural signature. rations A, that is, small network patterns such as
The focus on network ties is important: atten- triangles or reciprocated ties. These configura-
tion is on pairs of actors and the possible relation- tions can be chosen by the researcher but at a
ships between them. This is a major difference deeper level can be derived from theories of
from other areas of social science where the unit dependence among ties, as presented below. Given
of analysis is typically the individual. This is not a set of configurations, the probability of x
to say that features of individuals need be excluded. depends on how many configurations are actually
They can be important explanations of how ties observed in x (the statistics gA(x)), weighted by
come into existence and need to be incorporated how important those patterns are (the parameters
into models in ways described below. But in this ηA). In simple terms, if a configuration is impor-
chapter, we concentrate on methods for under- tant, and there are many observed in x, then the
standing endogenous network tie formation, using model says the probability of x will be larger.
exogenous node attribute information to assist. (In that sense, the summation inside the exponen-
tial is equivalent to a regression.) Equation 32.1
implies that there is a probability distribution of
all possible networks with n nodes, with each pos-
sible network having a distinct probability.
THE GENERAL FORM OF AN If we have a single network observation x,
EXPONENTIAL RANDOM GRAPH MODEL our goal is to find a set of parameter values
that best represents our network, and then to inter-
The intent of this chapter is to provide a relatively pret the results in terms of the patterns that are
intuitive introduction to exponential random graph important in x.

5605-Scott-Chap32.indd 485 4/13/2011 2:43:39 PM


486 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Before considering how we do this, it is worth NETWORK BUILDING BLOCKS FOR


noting that a tractable model has to impose some UNDIRECTED GRAPHS
level of homogeneity to limit the number of
parameters. Typically this means that there is one We begin by describing the various configurations
parameter for one type of configuration: for relevant to different families of ERGMs for
instance, one parameter for triangles in the net- undirected networks. There are currently three
work, rather than one for every single possible important classes of models, each based on a
triangle in the network. The idea is that a single different dependence hypothesis.
process of triangulation can be inferred across the
entire network, with local variations subsumed as
statistical noise. Of course, this is an assumption
that may or may not be correct, as evidenced by Bernoulli graph models
how well the model fits the data.
The simplest dependence hypothesis is of no
dependence at all among the tie variables. This
assumption results in the Bernoulli random graph
Parameters model (also known as simple random graph, or
Erdös-Renyi, models [Erdös and Renyi, 1959],
From where do we get parameter values ηA that where the only applicable configuration is that
represent the importance of different configura- of a single edge [Figure 32.1a]). This model
tions in our model? For a given network dataset x, simply proposes that pairs of individuals have
we seek to estimate parameter values using the a propensity to form ties with a given probability
following approach. The model assumes that x is p. The resulting distribution exhibits networks
a single network from the distribution of networks of varying density with a mean of p. The probabil-
given by equation 32.1, for which we do not know ity of any graph x in this distribution can be
parameter values ηA. In reality, x could conceiva- described as:
bly come from a distribution of networks in which
it is very unusual, but we have no grounds to sup-
Pr(X = x) = (1/κ) exp{θ L(x)} (32.2)
pose that. Rather x is most likely to come from a
distribution in which it is typical. Accordingly, we
seek parameter values that produce a distribution where θ is an edge or density parameter and L(x)
of graphs in which x is most typical. These param- is the number of edges in the graph x. The maxi-
eter values are called maximum likelihood esti- mum likelihood estimate of θ turns out to be log
mates. Actual procedures for maximum likelihood {p/(1–p)}, where p is the density of x.
estimation are discussed below. Of course, there is The Bernoulli assumption is inadequate for
no guarantee that a set of maximum likelihood most social networks because social relationships
estimates exists: it may be, for instance, that the are typically intertwined in ways that are not inde-
configurations chosen for our model are not ade- pendent. In particular, a Bernoulli graph model
quate to represent the data. But a well-specified does not represent well the way in which social
model for the data will have sensible maximum networks tend to cluster into denser regions of
likelihood estimates. network ties. The most basic form that a clustering
When a parameter estimate is large and posi- process can take is triangulation, where three
tive, we infer that the configuration occurs more actors, if they are connected through a two-path,
frequently than expected by chance, given the tend to form a clique (for three nodes, a triangle).
other effects in the model. For instance, suppose In social network theory, this frequently observed
we fit a model to a directed network using two configuration represents a process known as
parameters: an arc parameter that represents the network closure. With independent ties, a Bernoulli
baseline propensity to form ties and a reciprocity model has no mechanism (other than chance)
parameter that represents the presence of recipro- whereby a two-path can lead to network closure.
cated arcs within dyads. A large and positive reci- Another common feature of real social network
procity estimate indicates a distinct process of data is a skewed degree distribution whereby a
reciprocation over and above the baseline propen- small number of nodes have high degree, while
sity to form arcs (i.e., the network density). On the many nodes have low degree. This skew cannot
other hand, a large but negative parameter esti- be adequately captured using a Bernoulli graph
mate indicates a tendency against such configura- model, which tends to produce symmetric degree
tions. In this way, the set of parameter estimates distributions. Nevertheless, the Bernoulli model
indicate the structural signature of the network, can be a useful baseline and has important
enabling us to make inferences about the self- properties that are well studied (e.g., Bollobás,
organizing network processes that are operating. 1985).

5605-Scott-Chap32.indd 486 4/13/2011 2:43:39 PM


EXPONENTIAL RANDOM GRAPH MODELS FOR SOCIAL NETWORKS 487

Markov random graph models configurations in the model, any more than we
have to include every higher order interaction in a
Frank and Strauss (1986) proposed the more real- standard regression. So, following equation 32.1,
istic dependence assumption that tie variables a simplified model including edge, 2-star, 3-star,
might be conditionally dependent if they shared and triangle parameters would take the following
an actor. The resulting models were called Markov form:
random graph models. Under Markov depend-
ence, tie variables Xij and Xik are conditionally
dependent because they both involve actor i, Pr(X = x) = (1/κ) exp(θ L(x) +
whereas Xij and Xrs with no nodes in common are σ2 S2(x) + σ3 S3(x) + t T(x)) (32.3)
conditionally independent.2
It can be shown that configurations for a where, as for Bernoulli graphs, θ is an edge
Markov random graph model comprise those or density parameter, and L(x) the number of
where every edge is connected to every other edge edges in x; σ2 and σ3 are parameters for 2- and
in the configuration. A little thought convinces 3-stars, respectively, and S2(x) and S3(x) are the
that, apart from the simple edge (Figure 32.1a), numbers of 2- and 3-stars in x; τ is a triangle
possible configurations are those with star-like parameter, and T(x) is a count of the number of
structures (with all edges centered on one actor – triangles in x.
Figure 32.1b – with the number of edges k termed The four-parameter model in equation 32.3
a k-star) and the triangle (Figure 32.1c). Markov suggests the network is built up from intertwining
dependence then results in models that have a processes: a baseline propensity to form ties;
capacity to handle variation in the number of (nonlinear) tendencies for nodes to have differing
degrees (through the star parameters) and the ten- numbers of partners, depending on the star param-
dency for network closure (through the triangle eters; and a tendency for network closure. For
parameter). instance, if the 2-star parameter is positive and the
Of course, for the sake of parsimony we do 3-star parameter is negative, actors seek multiple
not have to include parameters for all the star partners but with a ceiling effect. Some level of

(a)

(b)

(c)

Figure 32.1 Configurations for Markov random graph model for undirected graphs (a) edge;
(b) 2-star, 3-star, 4-star (higher-order star configurations may also be included); (c) triangles

5605-Scott-Chap32.indd 487 4/13/2011 2:43:39 PM


488 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

network activity is desired but too much is costly network observations. Second, the argument is
(Robins et al., 2005). independent of triangulation, so there is no
For several years, Markov random graph requirement that Ken also need have a tie to Sally
models were the ERGM mainstay. Wasserman (although that could be the case). The point is
and Pattison (1986) elaborated them as p* models, more apparent with a relationship less generic
with extensions to multivariate (Pattison and than simple “knowing.” Suppose that the
Wasserman, 1999) and valued networks (Robins relationship is some form of professional
et al., 1999). However, with more sophisticated collaboration, so that Xrk = Xls = 1, which means
estimation and simulation procedures, it became that Liam and Sally collaborate on one project,
apparent that Markov random graph models were and Rochelle and Ken on another. Then, a little
frequently not adequate to model real data. Despite thought will show that it is quite possible that col-
the hopes that they could handle skewed degree laboration in the form of a four-cycle could
distributions and areas of triangulation, these emerge across four different projects, without any
models faced difficulties when there were serious triangulation.
heterogeneities in the data, as is often the case Nevertheless, it is equally apparent that trian-
for real social networks. There were two steps that gulated collaboration is possible, and perhaps
needed to be taken: first, a more complex repre- even likely, so Snijders et al. (2006) proposed that
sentation of triangulation was required (single Markov dependence be retained in models, with
triangles were insufficient to describe the tenden- social circuit dependence an additional refine-
cies for denser regions of the network), and a ment. Snijders et al. then showed that a number of
method to permit greater heterogeneities in new configurations would be possible. While
degrees and clustering. Markov star structures (Figure 32.1) continue to
be important elements, new configurations reflect-
ing both triangulated and nontriangulated cycles
were consistent with the dependence assumption.
Social circuit models Multiple triangulation configurations, termed
k-triangles (in analogue to k-stars), were now pos-
Snijders et al. (2006) proposed new specifications sible: a k-triangle has an edge between two nodes
for ERGMs to be used in addition to Markov i and j (the base of the k-triangle), with multiple
parameters. These were intended to overcome the triangles involving k shared partners of i and j
deficiencies of Markov models and were based on built on a common base (Figure 32.2). Additional
a novel dependence assumption. Pattison and configurations representing short-range multiple
Robins (2002) had argued that dependence connectivity were based on two-paths between
between tie variables might arise because of nodes i and j (irrespective of whether they were
the presence of other network edges: partial con- tied or not). These configurations were termed
ditional dependence. Snijders et al. proposed a k-2paths (Figure 32.2).
version of partial conditional dependence termed These novel configurations were the first step
social circuit dependence (Robins, Snijders proposed by Snijders et al. (2006). The second step
et al., 2007b). involved a further extension to model homogeneity,
Under the social circuit assumption, two tie where higher order parameters were assumed to
variables not sharing a node may be still condi- have a relationship to lower order parameters, in
tionally dependent, provided other edges exist in such a way that the effects of higher order
the observed network. In particular, there need to parameters were attenuated so as not to dominate.
be at least two observed network ties such that if They proposed that k-star, k-triangle, and k-2path
the two original tie variables are also present, a parameters could each be incorporated into one
four-cycle is created. So, for instance, tie variables degree-based parameter, one triangulation
Xkl and Xrs become conditionally dependent when parameter, and one connectivity parameter,
Xrk = Xls = 1 in the observed network. Although respectively. The specific proposal was an alter-
this assumption may seem complex, the argument nating parameter form. For the star parameters the
is relatively straightforward and similar ideas go alternating form was σk = −(1/λ) σk-1, where σk is
back at least to Coleman (1988). Suppose Rochelle the parameter for a k-star and λ is an attenuation
and Ken have a friendship, and also Liam and factor, with analogous versions for the k-triangle
Sally, so that Xrk = Xls = 1. If Ken knows Liam, the and k-2path parameters. Snijders et al. (2006)
chances of Sally coming to know Rochelle showed that for the star parameters this step
increase: that is, Xrs is contingent on the state of explicitly models the degree distribution but puts
Xkl – and vice versa – so that the two variables are more weight on the numbers of nodes with lower
dependent. There are two important points. First, degrees, with weights decreasing geometrically
this argument simply does not work unless Xrk = as the degrees increase (see also Hunter, 2007;
Xls = 1, so that the dependence emerges from Hunter and Handcock, 2006). The upshot is that

5605-Scott-Chap32.indd 488 4/13/2011 2:43:39 PM


EXPONENTIAL RANDOM GRAPH MODELS FOR SOCIAL NETWORKS 489

. .
. .
. .
k nodes k nodes

(a) (b)

Figure 32.2 Some configurations for social circuit model for undirected graphs (a) k-2path;
(b) k-triangle

heterogeneities in the form of very high degree For instance, for 30-node networks, consider
nodes can be better tolerated by the model. three different models:
Similarly, the k-triangle parameter models (with a
geometric attenuation) the distribution of shared 1 Bernoulli model (equation 2), with θ = −2
partners across all pairs of tied nodes. This param- 2 Markov model (equation 3), with θ = −2, σ2 = 1,
eter is much better than the Markov triangle param- σ3 = −0.5, t = 0
eter at dealing with regions of the network with 3 Markov model (equation 3), with θ = −2, σ2 = 1,
high triangulation. The attenuation factor can be σ3 = −0.5, t = 1
set at a given value (λ = 2 has been widely used –
Robins et al., 2007 a,b) but can also be specified as The first model is a simple random graph model,
a parameter and an optimal value estimated (Hunter whereas the second imposes constraints on the
2007; Hunter and Handcock, 2006). degree distribution, notably, a propensity for
nodes to exhibit some variability in degrees (the
positive 2-star parameter) but with a tendency
against nodes having high degrees (the negative
SOME TECHNICAL ISSUES 3-star parameter). The third model includes the
star effects of the second model but also includes
a positive triangulation parameter.
Simulation By simulating this model with 500,000 itera-
tions, and taking a sample of 1,000 graphs we
By choosing a model specification and setting examine the propensity for triangulation for each
parameter values, it is possible to simulate expo- model. Figure 32.3 gives histograms of the number
nential random graph models using standard sta- of triangles for each sample, as well as an example
tistical algorithms (e.g., Metropolis-Hastings graph from each simulation. It can be seen that the
algorithms) to produce a distribution of graphs, number of triangles is considerably greater for
from which a sample of graphs can be taken model 3, a result that is not surprising given that
(Handcock, 2002, 2003; Hunter and Handcock, we have explicitly included a positive triangula-
2006; Robins et al., 2005; Snijders, 2002; Strauss, tion effect in that model.
1986). The properties of the sampled graphs can
be examined, including properties that do not
relate directly to model configurations. For
instance, it is possible to examine the typical
degree distribution, geodesic distribution, level of Estimation
clustering, and so on. This procedure permits For observed network data, simulation can be
understanding of the properties of exponential used in algorithms to estimate parameter values.
random graph models with different parameters. Strauss and Ikeda (1990) originally suggested

5605-Scott-Chap32.indd 489 4/13/2011 2:43:39 PM


490 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Model 1
120

100

80
Frequency

60

40

20

0
0 10 20 30 40 50 60
Triangle
Model 2

125

100
Frequency

75

50

25

0
0 10 20 30 40 50 60
Triangle
Model 3

80

60
Frequency

40

20

0
0 10 20 30 40 50 60
Triangle

Figure 32.3 Simulation of exponential random graph models: histograms for number of
triangles for samples of 1,000 graphs for three models on 30 nodes, together with an
example graph from each simulation

5605-Scott-Chap32.indd 490 4/13/2011 2:43:40 PM


EXPONENTIAL RANDOM GRAPH MODELS FOR SOCIAL NETWORKS 491

pseudo-likelihood estimation based on logistic how well a model is consistent with the degree
regression, a procedure approximate at best and in distribution, the geodesic distribution, and other
some cases quite misleading (Van Duijn et al., global features of the data (Hunter et al., 2008).
2009). Monte Carlo Markov chain maximum like- This heuristic procedure amounts to a diagnostic
lihood estimation (MCMCMLE) is a more princi- goodness of fit examination of a model.
pled approach. There is a variety of possible
methods but they share a common conceptual
basis. Approximate parameter estimates are
obtained as a starting point, and then the model is Model degeneracy, nonconvergence,
simulated and the means of the distributions of
model statistics compared with the observed data.
and multiple regions
The trial parameter estimates are then adjusted to The previous paragraphs have supposed that it is
attempt to get closer to the means. Once the means possible to obtain a convergent set of parameter
are sufficiently close to the observed data, the estimates. Sometimes this is not so for a given
estimation has converged and the final parameter model applied to a given network. A related prob-
estimates approximate the maximum likelihood lem arises when a set of parameter values implies
values. Approximate standard errors for the two or more regions of graphs, resulting in a
parameter estimates can also be obtained, ena- bimodal or multimodal distribution of edges.
bling inference about whether a parameter is Often these two regions feature the uninteresting
important in the model. Snijders (2002) and possibilities of the (near) empty and the complete
Hunter and Handcock (2006) discuss different graph. In cases like these, the model will be a poor
methods within this general approach. Robins, representation of the data, and the models are
Snijders et al. (2007b) review publicly available described as near degenerate (Handcock, 2002,
software that can estimate these models (see also 2003). It is beyond the scope of this chapter to
Handcock et al., 2008). discuss these issues in depth but interested readers
can refer to a number of authors who investigate
details (e.g., Burda et al., 2004; Häggström and
Jonasson, 1999; Handcock, 2002, 2003; Jonasson,
Diagnostic goodness of fit 1999; Park and Newman, 2004; Robins, Pattison
et al., 2005; Robins et al., 2007; Snijders, 2002;
With convergent parameter estimates, we can Snijders et al., 2006). Suffice to say that, on the
investigate how well the model reproduces the whole, Markov models are much more likely than
data using simulation, including aspects of the social circuit models to exhibit degeneracy, multi-
data not explicitly modeled. Suppose for instance ple regions, and nonconvergence (Robins, Snijders
that the graph in the bottom righthand corner of et al., 2007b). If parameter estimation does not
Figure 32.3 (from model 3 with the positive trian- converge, if the model is degenerate and there is
gle parameter) is the observed social network. The evidence of multiple regions, then the model is not
data have 32 triangles, whereas the sample of adequate for the data. A different model specifica-
Bernoulli graphs (model 1) has a mean of 6.8 tion is required.
triangles, with a standard deviation of 3.7. So the
Bernoulli model does not convincingly reproduce
this number of triangles, in that a network with
32 triangles is highly unlikely for a Bernoulli
model with θ = −2 (as can be seen from the histo- EXAMPLE FOR UNDIRECTED GRAPHS
gram at the top lefthand corner of the figure).
Rather than relying on visual inspection, the Figure 32.4 presents a simple undirected network
observed graph with 32 triangles, assuming it of acquaintanceship among 20 people. The results
came from the Bernoulli model, has a t-statistic of of fitting Markov and social circuit models are
nearly 7 in the distribution of triangles from the presented in Table 32.1, including parameter esti-
Bernoulli model. Using the heuristic rule that mates and standard errors, as well as convergence
observations are unlikely if they have a t-ratio statistics. The convergence statistic is a t-ratio that
with an absolute value larger than 2, the distribu- reports how close statistics from the observed data
tion of triangles for this Bernoulli model does not are to the mean statistics from the distribution of
seem a plausible representation of triangulation in graphs implied by the model. It is calculated in
the data. exactly the same way as for the heuristic goodness
Such a procedure gives an indication of which of fit discussed above. Good convergence is then
aspects of the observed data a model can plausibly indicated by a convergence statistic that is very
reproduce and which it cannot. Graphical inspec- small. An absolute value less than 0.1 is evidence
tion can also be conducted to decide qualitatively for successful convergence (Snijders et al., 2006;

5605-Scott-Chap32.indd 491 4/13/2011 2:43:40 PM


492 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 32.4 An undirected acquaintanceship network

Table 32.1 Parameter estimates, standard errors, and convergence statistics for
two models for the network in Figure 32.4.

Parameter Estimate Standard error Convergence

Markov model
–2.165* 0.716 –0.046
Edge
0.108 0.100 –0.038
2-star
–0.044* 0.012 –0.032
3-star
0.733* 0.104 –0.022
Triangle
Social circuit model
–2.232 1.270 –0.015
Edge
–0.165 0.476 –0.015
Popularity/Activity (k-stars)
1.355* 0.535 –0.016
Multiple triangulation (k-triangles)
–0.252* 0.088 –0.025
Multiple connectivity (k-2paths)

*indicate estimates that are more than twice the standard error in absolute value; model fitted with pnet.

Robins, Snijders et al., 2007b). We can see from modes for the Markov model (as they must be if
the table that both models converged well. the model has converged – 68 edges and 583
However, good convergence does not necessar- 2-stars are very close to the means of each distri-
ily imply that the models avoid the problem of bution, respectively, consistent with the conver-
multiple regions of graphs. Following simulations gence statistics in Table 32.1). In other words,
from the parameter estimates, Figure 32.5 shows although the observed network is in the center of
distributions of the number of edges and the the two distributions as required by the estimation
number of 2-stars (just as examples – we could procedure, it is not “typical” of the networks
have used other model statistics to illustrate the implied by the model, with more networks having
same point). The figure shows bimodal distribu- either lower or higher density (and lower and
tions for the Markov model but not for the social higher numbers of 2-stars). Accordingly, the
circuit model. The observed network has 68 edges Markov model is not a good representation of the
and 583 2-stars, which can be seen to be in the data. As can be seen from panels (c) and (d) of
regions of the distributions between the two Figure 32.5, the same problem does not arise for

5605-Scott-Chap32.indd 492 4/13/2011 2:43:40 PM


EXPONENTIAL RANDOM GRAPH MODELS FOR SOCIAL NETWORKS 493

400 400

300 300
Frequency

Frequency
200 200

100 100

0 0
0 20 40 60 80 100 120 0 250 500 750 1000 1250 1500
(a) Edge (b) Start2

400 400

300 300
Frequency
Frequency

200 200

100 100

0 0
0 20 40 60 80 100 120 0 250 500 750 1000 1250 1500
(c) Edge (d) Start2

Figure 32.5 Simulation results for models from Table 32.1: histograms for (a) number of
edges for Markov model; (b) number of 2-stars for Markov model; (c) number of edges for
social circuit model; (d) number of 2-stars for social circuit model

the social circuit model, so the social circuit parameter suggests that edges are uncommon,
model is to be preferred. unless they are part of the higher order configura-
The interpretation of the social circuit model is tions represented in the model. The popularity/
relatively straightforward. Important reliable activity effect (corresponding to the alternating
effects in the model are asterisked in the table k-star configurations) is small, suggesting that
(indicating a parameter estimate in absolute value there are no particular high-degree actors in this
more than twice the standard error). Although not network, unless they are involved in triangulation
asterisked because of a large standard error (and so or multiple connectivity effects. In other words,
we cannot be entirely sure that the parameter is there is no need to invoke a degree-based
reliably different from zero), the negative edge explanation for this network. The strongly positive

5605-Scott-Chap32.indd 493 4/13/2011 2:43:40 PM


494 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

triangulation effect indicates that a number of 1.1, respectively, so the model implies a degree
actors have formed a denser core of multiple trian- distribution that is somewhat more spread out than
gles. The negative connectivity effect indicates a is seen in the data. The global clustering coeffi-
tendency against multiple 2-paths unless those are cient3 has a t-statistic of 3.5, indicating that,
implicated in triangles. This suggests that triangula- although the model does reproduce the number of
tion occurs through the formation of k-triangle triangles well, it underestimates the number of
bases, rather than edges: that is, that sharing a 2-stars that are implicated in triangles. The model
number of network partners tends to encourage a suggests strong clustering effects, but they are
direct tie. To use a more network-theoretic explana- even stronger in the actual data.
tion, structural holes tend to lead to network closure
when those holes are bridged by several others.
To see how well this model reproduces the
network, we can simulate to investigate goodness EXTENSIONS FOR DIRECTED GRAPHS
of fit t-ratios for nonmodeled effects. For instance,
the t-ratios for Markov 2-stars, 3-stars, and trian- When dealing with directed networks, possible
gles are 0.15, 0.34, and 0.78. For effects that are configurations become more complex. Wasserman
not directly parameterized, we assess a t-statistic and Pattison (1996) described Markov configura-
with an absolute value greater than two as a poorly tions for directed networks. The most common
fitted effect. So we can say that the model is plau- Markov configurations are depicted in Figure 32.6.
sible for the Markov configurations (perhaps not Snijders et al. (2006) originally provided a limited
surprising given that k-star and k-triangle effects range of directed social circuit configurations,
are in the model). However, the model does not do again using the alternating parameter forms.
such a good job in reproducing other effects. For Robins et al. (2009) proposed an extended range
instance, t-ratios for the standard deviation and the of social circuit configurations, including those
skewness of the degree distribution are 2.1 and set out in Figure 32.7.

(a) (b)

(c) (d) (e)

(f) (g)

Figure 32.6 Some common Markov configurations for directed graphs. (a) Arc
(b) reciprocated arc, (c) 2-outstar, (d) 2-instar, (e) 2-path, (f) transitive triad , and
(g) cyclic triad

5605-Scott-Chap32.indd 494 4/13/2011 2:43:40 PM


EXPONENTIAL RANDOM GRAPH MODELS FOR SOCIAL NETWORKS 495

. . . .
. . . .

(a) (b) (c) (d)

. . .
. . .

(e) (f) (g)

Figure 32.7 Closure and connectivity configurations for directed social circuit models:
(a) path closure (AT-T); (b) activity closure (AT-U); (c) popularity closure (AT-D); (d) cyclic
closure (AT-C); (e) multiple two-paths (A2P-T); (f) shared activity (A2P-U); and (g) shared
popularity (A2P-D)

Robins et al. (2009) provided theoretical inter- indicates “down”) is a structural homophily effect
pretations of the parameters associated with these based on shared popularity. The cyclic closure
closure configurations. The path closure parame- parameter, with statistic AT-C (Figure 32.7d – C
ter (Figure 32.7a), with associated statistic AT-T for “cyclic”) represents closure in the form of
(for alternating k-triangle-transitive), represents nontransitive (i.e., nonhierarchical) cycles. Robins
transitive path closure. A nonclosed two-path can et al. argue that these can be thought of as a
also represent a structural hole with connections generalized exchange version of structural hole
from actors i to j through partners k, so the path closure.
closure parameter expresses tendencies for struc- The multiple connectivity configurations (multiple
tural holes to close when there are multiple two- 2paths, shared activity, shared popularity – Figure
paths between i and j. The activity closure 32.7e–g) are lower order to the closure configura-
parameter (Figure 32.7b), with statistic AT-U tions. When counterpart parameters for closure
(where U stands for “up”), represents what Robins and connectivity are both in the model, inferences
et al. called a form of structural homophily, can be made about whether a closure effect arises
whereby actors who make similar choices of because of the formation of the base or of the side
others form a tie. This is structural homophily of the k-triangle. The interpretations in the previ-
based on shared choices or shared network activ- ous paragraph assume that the base arises because
ity. On the other hand, the popularity closure of the multiple connections between two actors.
parameter, with statistic AT-D (Figure 32.7c – D A pattern of a positive closure parameter and a

5605-Scott-Chap32.indd 495 4/13/2011 2:43:40 PM


496 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

negative connectivity parameter would suggest binary or continuous measures. Information about
that multiple connections are relatively unlikely a binary attribute (with values 0 or 1) can be incor-
unless they occur in closed form. This would be porated into visual representations of network
consistent with an argument that multiple connec- configurations by coloring the nodes, whereas
tivity configurations are likely to lead to closure at information about a continuous attribute can be
the base. incorporated using node size. For directed net-
In addition to the closure and connectivity con- works, and for each type of measure, five dyadic
figurations in Figure 32.7, Robins et al. proposed configurations that may be incorporated into a
parameters for the following effects: model (32.4) are presented in Figure 32.8.
Interpretations are straightforward. A large
• density and reciprocity, as in Markov models positive parameter estimate for configuration
(Figure 32.6a, b); 32.8a provides evidence that individuals who have
• activity spread and popularity spread, with asso- an attribute score of 1 (i.e., who “have” the
ciated statistics of alternating k-outstars and attribute) are more active in the network (often
alternating k-instars, as originally proposed by called a sender effect because the “sender” of the
Snijders et al.; these parameters control for the tie has the attribute); whereas in contrast configu-
outdegree and indegree distribution, respec- ration 32.8b refers attribute-based popularity
tively; effect, or receiver effect, relating to whether
• sources (number of nodes with zero indegree), people with the attribute tend to be more popular
sinks (number of nodes with zero outdegree), by receiving more ties. Configuration 32.8c
isolates (number of isolated nodes); represents a homophily effect whereby people
• a generalized transitivity effect combining with who share the attribute are more likely to be tied.
equal strengths the path closure, activity clo- Configurations 32.8d and 32.8e are reciprocal-
sure, and popularity closure effects into the one tie counterparts for activity/popularity and
parameter; a counterpart generalized connectiv- for homophily. Configurations 32.8f to 32.8j
ity parameter is also possible. are analogous versions for continuous attribute
measures.
More complex configurations with attributed
nodes involving stars and triangles could also be
incorporated into models (e.g., Robins, Elliott
ACTOR ATTRIBUTES et al., 2001). The choice of parameters will be
dependent on the research issue under considera-
Individual-level variables may also contribute to tion. For instance, sometimes reciprocity may not
the formation of social relationships. Individual- be of particular relevance to the attribute under
level variables may be incorporated into ERGMs study, so that reciprocated activity and homophily
in a variety of ways, but here we present some may be excluded from models in the interests of
simple dyadic social selection parameters (Robins, parsimony. It is usually important to include activ-
Elliott et al., 2001). Social selection processes ity and popularity parameters as attribute-based
occur when network relationships are formed as a main effects. Strongly positive activity and popu-
result of node attributes. For instance, homophily larity parameters alone are evidence for a form of
is a process whereby individuals who are similar homophily since individuals with the attribute
to one another form a relationship (McPherson both send and receive more arcs, and hence the
et al., 2001). probability of an arc from a person with the
Assuming social selection processes, we are attribute to another person with the attribute is
interested in modeling the network x not just in enhanced. What we cannot ascertain, though,
terms of the network-based configurations from these two parameters alone is whether there
described above but also in terms of a vector of are distinct homophily effects over and above
attributes y that represent a measure on the nodes. activity and popularity.
Instead of equation 32.1, we then have a slightly
more complex form:

Pr(X = x | Y = y) = (1/κ) exp{ΣA ηAgA(x) +


Example for directed networks
ΣB ηBgB(x, y)} (32.4)
As an empirical example of fitting models includ-
where ηB is a set of parameters relating to selec- ing attributes, we fit the Krackhardt Hi-tech man-
tion effects, and gB(x, y) are statistics that are agers (directed) advice network (Krackhardt,
essentially counts of configurations that involve 1987), including a binary attribute indicating posi-
both attributes and network ties. In this chapter, tion (1= “more senior,” 0 = “less senior”) and a
we consider attribute variables Y that are either continuous attribute for age in years. We fitted

5605-Scott-Chap32.indd 496 4/13/2011 2:43:40 PM


EXPONENTIAL RANDOM GRAPH MODELS FOR SOCIAL NETWORKS 497

a. Attribute-based activity f. Attribute-based activity


(sender effect) (sender effect)

b. Attribute-based g. Attribute-based
popularity popularity
(receiver effect) (receiver effect)

c. Attribute homophily h. Attribute homophily

d. Attribute-based i. Attribute-based
reciprocated activity reciprocated activity

e. Reciprocated attribute j. Reciprocated attribute


homophily homophily

Figure 32.8 Configurations including attribute variables (binary attributes in left column;
quantitative in right column. Dotted border indicates a node irrespective of attribute value;
a black node indicates binary attribute value of one; the size of node for quantitative
attributes indicates value of the attribute measure)

four models: the first with only network effects, From the first column of Table 32.2, we see
the second with network effects and position, reliable effects for path closure (positive) and
the third with network effects and age, and the multiple two-paths (negative), a pattern that
fourth with network effects, position, and age. indicates a tendency for structural hole closure,
We fitted sender, receiver, and homophily param- which is more pronounced as the number of
eters for attribute effects (as there was little reci- actors who bridge the hole increase. Reciprocity is
procity in the network – see below – the close to zero, so advice seems quite hierarchical.
reciprocated versions of these parameters were There is no pronounced effect of activity spread,
excluded). After some experimentation with dif- so there is no tendency for any actors to seek
ferent triangulation configurations (Figure 32.7), advice from many others. Although we cannot be
we settled on a model with only the path closure assured of the reliability of the effects represented
and two-path connectivity parameters. Parameter by the positive density and negative popularity
estimates and standard errors are presented in parameter estimates because of large standard
Table 32.2. (Convergence statistics are not pre- errors, this pattern of estimates suggests that there
sented in the table, but all were under 0.1 in is a readiness to seek advice (positive density),
absolute value.) constrained by a tendency for no one actor to be

5605-Scott-Chap32.indd 497 4/13/2011 2:43:40 PM


498 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Table 32.2 Parameter estimates (standard errors in brackets) for four models for
the Krackhardt advice network, with position and age attributes: model 1—network
structural effects; model 2—network structural effects plus position; model 3—network
structural effects plus age; model 4—network structural effects plus position and age
(model fitted with pnet)5

Structural + position + age +position +age

Arc 3.64 (2.20) 6.09 (2.12)* 3.19(2.34) 7.17 (2.46)*


Reciprocity 0.14(0.25) 0.24 (0.30) 0.09 (0.27) 0.19 (0.31)
Activity spread –0.64 (0.51) 0.39 (0.53) –0.74 (0.47) 0.34 (0.56)
Popularity spread –1.94 (1.01) –4.11(1.05)* –1.71(0.99) –4.39 (1.18)*
Path closure 0.85 (0.24)* 0.62 (0.25)* 0.83(0.23)* 0.55 (0.26)
Multiple two–paths –0.36 (0.03)* –0.33 (0.03)* –0.37(0.03)* –0.33 (0.04)
Sender position 0.02(0.22) 0.02 (0.24)
Receiver position 1.03 (0.28)* 1.03 (0.29)*
Homophily position 1.11 (0.74) 1.27 (0.81)
Sender age 0.01 (0.01) 0.005 (0.01)
Receiver age 0.01(0.01) –0.003 (0.01)
Homophily age 0.03(0.01)* 0.03 (0.01)*

*indicate estimates that are more than twice the standard error in absolute value; model fitted with pnet.

a pronounced source of advice (negative popular- FURTHER EXTENSIONS AND FUTURE


ity). To the extent that any of these managers is a DIRECTIONS
popular source of advice, this happens within tri-
adic configurations involving path closure. If The form of equation 32.1 is quite general and is
anything, the evidence here suggests that, given not restricted to a single binary network. In prin-
the various effects in the model, this is an antipref- ciple, ERGMs can be applied to any form of
erential attachment network. Responsibility for relational data, although there are often important
advice is spread rather evenly among the manag- and complex decisions to be made about the exact
ers: there are few obvious organizational bottle- parameterization that is most suitable for actual
necks here. datasets. It is beyond the scope of this article to go
Including the attributes adds to the inter- into full detail on possible extensions, but inter-
pretation. Model 2 includes position effects. ested readers can consult the relevant literature in
More senior managers receive more advice ties, the following areas:
and once this is controlled for, the positive
density/negative popularity parameters become
stronger (in opposite directions). So among more • Bipartite networks: Markov models were origi-
junior managers, advice responsibilities are spread nally proposed by Skvoretz and Faust (1999),
even more equally than among senior managers. with Agneessens et al. (2004) adding node-level
Again, reliability is uncertain because of a large effects. Recently, Wang et al. (2009) updated
standard error, but there is a suggestion here model specification with social circuit-type
of homophily among senior managers. Model 3 dependence assumptions.
includes age effects and we see a reliable effect • Valued networks: There has not been much
for age homophily. Model 4 includes both recent work on valued networks. Robins et al.
position and age effects. Interpretations do not (1999) provided a Markov parameterization.
change from previous findings. This is not a trivial • Multivariate networks: Human social life impli-
result and indicates that age and position effects cates many different types of networks that can
are relatively independent in this network. If, operate simultaneously and be associated with
for instance, advice tended to be sought from one another. For instance, in an organization
senior managers who were older, it is possible there may be interest in how trust and com-
that age and position could have been somewhat munication networks intersect and relate to
confounded and that when both were included one another. Multivariate ERGMs permit infer-
in the model, one set of parameters may ences about structural processes both within
have ceased to be important. This is not the and between networks. Pattison and Wasserman
case here. (1999) first set out Markov models of this type.

5605-Scott-Chap32.indd 498 4/13/2011 2:43:41 PM


EXPONENTIAL RANDOM GRAPH MODELS FOR SOCIAL NETWORKS 499

Further interesting extensions were provided by NOTES


Koehly and Pattison (2005), including extensions
to cognitive social structures (Krackhardt, 1987). 1 This follows terminology first used by Moreno
There has been some important applied work in and Jennings (1938), rather than the more recent
organizations using these approaches (Lazega network motifs of Milo et al. (2002).
and Pattison, 1999; Lomi and Pattison, 2006; 2 Conditional independence – conditional on all
Rank et al., 2010). A straightforward approach to other tie variables – is what is important here,
incorporating social circuit effects into a bipartite because tie variable Xij does affect Xrs under Markov
model is to include within-network effects using dependence, as it is dependent on Xir which in turn
standard social circuit parameters and then is dependent on Xrs. But once the values of “inter-
include dyadic multiplex tie association param- vening” tie variables such as Xir are controlled, Xij has
eters between networks (although more complex no further effect on Xrs. In other words, there is no
across network effects are possible). direct effect between Xij and Xrs.
• Social influence models: Rather than mode- 3 The clustering coefficient is thrice the number
ling network ties conditional on a fixed set of of triangles divided by the number of 2-stars. It is an
attributes, it is possible to model a set of (change- index between 0 and 1 that measures the propensity
able) attributes conditional on a fixed network for 2-stars in the network to “close” into triangles.
within an ERGM-type framework. Such a model The factor of three (applicable to undirected net-
represents a social influence or social contagion works) is because every undirected triangle contains
process. Robins, Pattison, and Elliott (2001b) three 2-stars.
first described this approach: more recent work 4 This labeling of the figure to indicate the direc-
includes that of Daraganova et al. (2007). tion of the arcs (in this case “Up”) is consistent with
• There is some interesting early work on models the usage of Holland and Leinhardt (1970) in labeling
for missing network data and on related issues the triad census.
such as snowball sampling of networks. If 5 Regular users of pnet will realize that homophily
brought to full fruition, these developments have on continuous attributes is evidenced by a negative
considerable potential to enhance the scope of parameter estimate, given an absolute difference
ERGMs in application. See Handcock and Gile effect (but not for binary attributes). Here, the sign of
(2010) and Koskinen et al. (2010). the continuous attribute difference effect has been
changed for simplicity. So in Table 32.2 a positive
parameter estimate indicates homophily (not
heterophily) for both binary and continuous attribute
measures.
CONCLUSIONS

Since the Wasserman and Pattison paper in 1996,


there has been greatly increased interest in expo-
nential random graph models. Due to some impor- REFERENCES
tant and innovative technical work in recent years,
these models are now much better understood and Agneessens, F., Roose, H. and Waege, H. (2004) ‘Choices of
new social circuit specifications have dramatically theatre events: p* model for affiliation networks with
enhanced their applicability for real data. This attributes’, Metodoloˇski zvezki, 1:419–39.
does not mean, however, that issues of model Bollobás, B. (1985) Random Graphs. London: Academic
specification have been finalized or that current Press.
models are capable of dealing with all network Burda, Z., Jurkiewicz, J. and Kryzwicki, A. (2004) ‘Network
data. It is harder to obtain convergence for models transitivity and matrix models’, Physical Review E,
for directed networks and for larger networks. 69: 026106.
The computational requirements for estimation Coleman, J.S. (1988) ‘Social capital in the creation of human
imply that modeling large networks is difficult capital’, American Journal of Sociology, S95–S120.
and currently is not feasible for very large net- Daraganova, G., Pattison, P., Robins, G. and Wang, P. (2007)
works. Snowball sampling could assist with Social Influence Models. 8th Asia-Pacific Complex Systems
this situation, but techniques still need to be Conference, Queensland, Australia.
developed fully. As we move to the modeling Erdös, P. and Renyi, A. (1959) ‘On random graphs. I’,
of larger networks it is quite possible that addi- Publicationes Mathematicae, (Debrecen) 6: 290–97.
tional parameters will be required to capture Frank, O. and Strauss, D. (1986) ‘Markov graphs’, Journal of
dependencies. the American Statistical Association, 81: 832–42.
Work is proceeding on all of these fronts. Given Häggström, O. and Jonasson, J. (1999) ‘Phase transition in the
the rapid advances of the last few years, we may random triangle model’, Journal of Applied Probability,
expect further developments lie ahead. 36: 1101–15.

5605-Scott-Chap32.indd 499 4/13/2011 2:43:41 PM


500 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Handcock, M. (2002) ‘Statistical models for social networks: Park, J. and Newman, M. (2004) ‘Solution of the 2-star model
Degeneracy and inference’, in R. Breiger, K. Carley and of a network’, Physical Review E, 70: 066146.
P. Pattison (eds), Dynamic Social Network Modeling Pattison, P. and Robins, G. (2002) ‘Neighbourhood based
and Analysis. Washington, DC: National Academies Press. models for social networks’, Sociological Methodology,
pp. 229–40. 32: 301–37.
Handcock, M. (2003) Assessing Degeneracy in Statistical Pattison, P. and Wasserman, S. (1999) ‘Logit models and
Models of Social Networks. Center for Statistics and the logistic regressions for social networks, II. Multivariate rela-
Social Sciences, Working Paper no. 39, University of tions’, British Journal of Mathematical and Statistical
Washington. Psychology, 52: 169–94.
Handcock, M. and Gile, K. (2010) ‘Modeling networks from Rank, O., Robins, G. and Pattison, P. (2010) ‘Structural logic
sampled data’, Annals of Applied Statistics, 4: 5–25. of intra-organizational networks’, Organization Science.
Handcock, M., Hunter, D., Butts, C., Goodreau, S. and Morris, M. 21: 745–64.
(2008) ‘Statnet: Software tools for the representation, Robins, G., Elliott, P. and Pattison, P. (2001a) ‘Network
visualization, analysis and simulation of network data’, models for social selection processes’, Social Networks,
Journal of Statistical Software, 24(1). 23: 1–30.
Holland, P. and Leinhardt, S. (1970) ‘A method for detecting Robins, G., Pattison, P. and Elliott, P. (2001b) ‘Network
structure in sociometric data’, American Journal of models for social influence processes’, Psychometrika,
Sociology, 70: 492–513. 66: 161–90.
Holland, P. and Leinhardt, S. (1981) ‘An exponential family of Robins, G., Pattison, P., Kalish, Y. and Lusher, D. (2007) ‘An
probability distributions for directed graphs (with discus- introduction to exponential random graph (p*) models for
sion)’, Journal of the American Statistical Association, social networks’, Social Networks, 29: 173–91.
76: 33–65. Robins, G., Pattison, P. and Wang, P. (2009) ‘Closure, con-
Hunter, D. (2007) ‘Curved exponential family models for social nectivity and degrees: New specifications for exponential
networks’, Social Networks, 29: 216–30. random graph (p*) models for directed social networks’,
Hunter, D., Goodreau, S. and Handcock, M. (2008) ‘Goodness Social Networks, 31:105–17.
of fit of social network models’, Journal of the American Robins, G., Pattison, P. and Wasserman, S. (1999) ‘Logit
Statistical Association, 103: 248–58. models and logistic regressions for social networks, III.
Hunter, D. and Handcock, M. (2006) ‘Inference in curved Valued relations’, Psychometrika, 64: 371–94.
exponential families for networks’, Journal of Computational Robins, G., Pattison, P. and Woolcock, J. (2005) ‘Social net-
and Graphical Statistics, 15: 565–83. works and small worlds’, American Journal of Sociology,
Jonasson, J. (1999) ‘The random triangle model’, Journal of 110: 894–936.
Applied Probability, 36: 852–67. Robins, G.L., Snijders, T.A.B., Wang, P., Handcock, M. and
Koehly, L.M. and Pattison, P.E. (2005) ‘Random graph models Pattison, P. (2007) ‘Recent developments in exponential
for social networks: Multiple relations or multiple raters’, in random graph (p*) models for social networks’, Social
P. J. Carrington, J. Scott, and S. Wasserman (eds), Models Networks 29: 192–215.
and Methods in Social Network Analysis. New York: Skvoretz, J. and Faust, K. (1999) ‘Logit models for affiliation
Cambridge University Press. pp. 162–91. networks’, Sociological Methodology, 29: 253–80.
Koskinen, J., Robins, G. and Pattison, P. (2010) ‘Analysing Strauss, D. (1986) ‘On a general class of models for interac-
exponential random graph (p*) models with missing tion’, SIAM Review, 28: 513–27.
data using Bayesian data augmentation’, Statistical Strauss, D. and Ikeda, M. (1990) ‘Pseudo-likelihood estima-
Methodology, 7: 366–384. tion for social networks’, Journal of the American Statistical
Krackhardt, D. (1987) ‘Cognitive social structures’, Social Association, 85: 204–12.
Networks, 9: 104–34. Snijders, T.A.B. (2002) ‘Markov chain Monte Carlo estimation
Lazega, E. and Pattison, P. (1999) ‘Multiplexity, generalized of exponential random graph models’, Journal of Social
exchange and cooperation in organizations’, Social Structure, 3: 2.
Networks, 21: 67–90. Snijders, T.A.B., Pattison, P., Robins, G. and Handcock, M.
Lomi, A. and Pattison, P. (2006) ‘Manufacturing relations: (2006) ‘New specifications for exponential random graph
An empirical study of the organization of production models’, Sociological Methodology, 36: 99–153.
across multiple networks’, Organization Science, 17: Van Duijn, M., Gile, K. and Handcock, M. (2009) ‘A frame-
313–32. work for comparison of maximum pseudo likelihood and
McPherson, M., Smith-Lovin, L. and Cook, J. (2001) ‘Birds of maximum likelihood estimation of exponential family
a feather: Homophily in social networks’, Annual Review of random graph models’, Social Networks, 31: 52–62.
Sociology, 27: 415–44. Wang, P., Sharpe, K., Pattison, P. and Robins, G. (2009)
Milo, R., Shen-Orr, S., Itzkovitz, S., Kashtan, N., Chkovskii, D. ‘Exponential random graph (p*) models for affiliation net-
and Alon, U. (2002) ‘Network motifs: Simple building works’, Social Networks, 31: 12–25.
blocks of complex networks,’ Science, 298: 824–27. Wasserman, S. and Pattison, P. (1996) ‘Logit models and
Moreno, J. and Jennings, H. (1938) ‘Statistics of social logistic regressions for social networks: I. An introduction
configurations’, Sociometry, 1: 342–74. to Markov graphs and p*’, Psychometrika, 61: 401–25.

5605-Scott-Chap32.indd 500 4/13/2011 2:43:41 PM


33
Network Dynamics
Tom A.B. Snijders

A DYNAMIC APPROACH TO Shop, Newcomb’s Fraternity, and Sampson’s


NETWORK ANALYSIS Monastery. The leading textbook on social net-
work analysis, by Wasserman and Faust (1994),
Dynamic ideas have been pursued in much of has a section of half a page on dynamic and longi-
social network analysis. Network dynamics is tudinal network models. The limited amount of
important for domains ranging from friendship attention paid to explicit longitudinal treatment of
networks (e.g., Pearson and West, 2003; Burk social network analysis may be understood from
et al., 2007) to, for example, interorganizational the difficulties of collecting network data, which
networks (see the review articles by Borgatti and are multiplied when a researcher wishes to collect
Foster, 2003; Brass et al., 2004). However, formal them longitudinally, and from the difficulties
models of analysis, both in the tradition of dis- in explicitly modeling the dynamics of social
crete mathematics and in the tradition of statistical networks.
inference, have for a long time focused mainly on Starting in the 1980s, network panel data
single (i.e., cross-sectional) methods of analysis. started to be collected more widely. Panel data are
data collections where the researchers collected
data on a given group of social actors at two or
more consecutive moments, called the “panel
Some history: empirical research waves”. Examples are Bauman’s study of friend-
ship networks in five schools, collected in the
Important early longitudinal network studies were course of a study focusing on dynamics of ciga-
those by Nordlie (1958) and Newcomb (1961), rette smoking (Bauman et al., 1984), with 954
who studied friendships in a college fraternity complete questionnaires in a two-wave study; and
based on the empirical data collected; Coleman’s the Teenage Friends and Lifestyle Study in
(1961) Adolescent Society study with friendship Scotland with three waves (West and Sweeting,
data in 10 schools and 9,702 individuals; 1995; Michell and Amos, 1997; Pearson and West,
Kapferer’s (1972) study of observed interactions 2003). The currently most well-known study
in a tailor shop in Zambia (then Northern Rhodesia) probably is the Add Health study in the United
over 10 months, in a period of industrial conflict; States with three waves (Harris et al., 2003; Udry,
Sampson’s (1969) Ph.D. dissertation on the devel- 2003). Christakis and Fowler (2007) discovered
opments of the relations in a group of 18 monks in interesting network data in the Framingham Heart
a monastery; and the study by Hallinan with seven Study, a longitudinal study not originally intended
waves (see Hallinan, 1974, 1979; Sørensen and to contain a network component. Official records
Hallinan, 1976). However, attention before about and directories also have been used as sources of
1990 was mostly on single observations of net- longitudinal network data. Some examples of such
works. Of the 20 data sets distributed with the studies are Gulati and Gargiulo (2000), Powell
UCINET package (Borgatti et al., 1998), only et al. (2005), and the review by Hagedoorn
three provide longitudinal data: Kapferer’s Taylor (2002).

5605-Scott-Chap33.indd 501 4/6/2011 4:47:40 PM


502 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Some history: statistical models Dependence across time


A probabilistic model for network dynamics For modeling dependence across time, the great
requires to specify the simultaneous probability majority of published models seem to have used
distribution of where t is some variation of the Markov property. Loosely
the time parameter, which assumes values in a set defined, this is a property, defined for stochastic
T of time points, and X(t) is the network at time t. processes, which expresses that the future depends
In probability theory, this is called a stochastic on the past via the present. A more formal defini-
process, where the outcome space is a space of tion (although still slightly incomplete) is that, for
networks. It will be convenient to think of the time points t1 < t2 < t3, X(t3), conditional on X(t2),
network as a directed graph (digraph), although is independent of X(t1). The earliest proposed
depending on the situation at hand it might be a models postulated that, if the panel data are X(t1),
different structure – for example, undirected, a X(t2), … X(tn), then these n consecutive observa-
valued network, and so on. For a directed graph, tions constitute a Markov process. This was
the network X(t) is composed of directed tie vari- assumed, for example, by Katz and Proctor (1959),
ables Xij(t) indicating by the value 1 that there Wasserman (1987), Wasserman and Iacobucci
exists an arc i → j at time t, and by 0 that no such (1988), and Robins and Pattison (2001). Since the
tie exists. In all cases we assume that there are no observations are finite in number, this is called a
self-loops, that is, always Xii(t) = 0. We shall focus discrete-time Markov process.
on situations where the node set is fixed and However, the feedback processes mentioned
denoted by {1, …, n}. Thus, the network is com- above may be assumed to operate, unobserved,
prised of n actors. This is usually meaningful for between the observations. For example, in a group
network panel data, if we allow some flexibility in which the Matthew effect operates, if at time t1
for nodes representing actors who entered after some node i has a low in-degree and at the next
the start of data collection or left before the end. It observation t2 it has a very high in-degree then it
should be noted that there are models also for is likely that this has come about by the gradual
growing networks, with nodes entering the net- accumulation of ties directed toward i; the first of
work, often with the additional assumption that these may have been chance occurrences, but once
ties do not change once they are established, and the in-degree was relatively high, it became a self-
the network change is determined by the links cre- reinforcing process. Such a model presupposes
ated by the newly created nodes. This is a classical that there were changes occurring between the
approach in the mathematical theory of random observation moments t1 and t2. The most elegant
graphs (e.g., Bollobás, 1985). and mathematically tractable way of modeling
Dynamic network models have to represent this is to postulate a continuous-time Markov
the feedback processes that are characteristic of process {X(t) | t1 ≤ t ≤ tm}, in other words to let the
networks. As examples, consider some of the set of time points of the process T be the entire
processes of tie creation that are traditional in interval [t1, tm], while still sticking to the panel
social network analysis: reciprocation (Moreno, design for the observed networks: thus, it is postu-
1934), transitive closure (Rapoport, 1953a, 1953b; lated that the process of network change goes on,
Davis, 1970), and the Matthew effect (“unto him unobserved, between the moments of data collec-
that hath is given and unto him that hath not is tion. This was proposed by Sørensen and Hallinan
taken away, even that which he hath”; Merton, (1976) and Holland and Leinhardt (1977). These
1963; de Solla Price, 1965, 1976; called “prefer- authors also proposed that in this change process,
ential attachment” by Barabási and Albert, 1999). at any instance of time t no more than one tie
If at some moment t the tie i → j does not exist, variable Xij(t) can change. This decomposes the
then at some later moment it might be created by change process into its smallest possible constitu-
reciprocation if currently there is a tie j → i; it ents and rules out coordination in the form of the
might be created by transitive closure if there are simultaneous creation of a set of ties, as in mutual
two ties arranged in a two-path i → h → j – that love at first sight or the spontaneous creation of a
is, there currently is an indirect connection from group of friends. This is a reasonable requirement
i to j; and it might be created by the Matthew that greatly reduces the complexity of modeling.
effect if there are many other actors h for which The model of Sørensen and Hallinan (1976)
there is a tie h → j – that is, currently, actor j is focused on the dynamics of the triad census
highly popular in the sense of having a high in- (Holland and Leinhardt, 1975) and had the set of
degree. These examples illustrate that statistical vectors defining the outcomes of the triad census
models for network dynamics have to express as the outcome space. This model was incomplete,
dependence between ties as well as dependence however, as it did not elaborate the dependence
across time. between the triads in a network. A similar but

5605-Scott-Chap33.indd 502 4/6/2011 4:47:40 PM


NETWORK DYNAMICS 503

simpler model was presented by Hallinan (1979), scale-free networks where the distribution of
focusing on the dyad census. General models rep- degrees has a power distribution. For most types
resenting the dynamics of networks as continu- of networks between human individuals, this does
ous-time Markov processes where ties change one not seem realistic because various constraints will
by one were proposed by Holland and Leinhardt limit the frequency of occurrence of very high
(1977). They did not, however, elaborate ways to degrees.
specify the dependence of ties in the network.

Dependence across ties STOCHASTIC MODELS FOR


NETWORK DYNAMICS
The Markov chain model of Katz and Proctor
(1959) assumed independent tie variables that
could change according to a Markov chain at each One of the reasons why stochastic models for
next observation. Independence of ties is, of network dynamics did not take off before the
course, no more than a straw-man assumption as 1990s is that the dependence structures that char-
it goes against basic ideas of social network analy- acterize networks are so complicated that plausi-
sis. A first relaxation of this assumption is to ble models for network dynamics can be
postulate independence of dyads, or pairs of tie implemented only (at least, so it seems in the cur-
variables of the type (Xij(t), Xji(t)). Such an rent state of knowledge) as computer simulation
assumption was made, for longitudinal models, by models, like in agent-based models, and do not
Wasserman (1977, 1979, and other publications), permit the exact calculations that were used in
Hallinan (1979), and Leenders (1995 and other data analysis in the precomputer era.
publications) for continuous-time Markov proc- In this section we first present tie-based
esses; and Wasserman (1987) and Wasserman dynamic models, then actor-based models. The
and Iacobucci (1988) for discrete-time Markov former are simpler; the latter are closer to most
processes. theories in social science. Both should be regarded
The assumption of independent dyads breaks as process models, which can be defined by
apart the stochastic process into n(n−1)/2 inde- probabilistic rules that give a representation of
pendent subprocesses. This helps for tractability, how the network might have evolved from one
but of the three basic component processes observation to the next. Technically speaking, all
mentioned above as examples – reciprocity, trani- models presented are Markov processes on the
tivity, and the Matthew effect – it represents space of digraphs. These are continuous-time
only reciprocity. Wasserman (1980) proposed the models, which means that time increases gradu-
so-called popularity model, which may be said to ally in an infinitesimal fashion, and now and then,
represent the Matthew effect but without the reci- at random moments, a change takes place. To keep
procity process. In that model the rows of the the model relatively simple, the assumption is
random adjacency matrix (Xij(t)) are independent, followed, which first was made by Holland
which again gives a simplification of the model to and Leinhardt (1977), that at any given moment
make it tractable. (“in any split second”) only one tie can change.
Stochastic models that allow triadic and other This decomposes the dynamics of the network in
higher-order dependencies were proposed for data the smallest possible steps. It assumes away the
in the form of rankings – as in the Newcomb- possibility of simultaneous coordination by actors:
Nordlie data by Snijders (1996), and for data in actors are dependent because they react to each
the form of digraphs by Snijders and Van Duijn other (cf. Zeggelink, 1994), not because they
(1997) and Snijders (2001). The latter model is coordinate.
described in detail later in this chapter.

Tie-based models
Scale-free networks
The simplest approach to construct dynamic
De Solla Price (1976), Barabási and Albert (1999), network models with quite general dependence
and Dorogovtsev et al. (2000) proposed models structures is by formulating a model where a
where new nodes are added to an existing network random pair (i, j) is chosen and with some proba-
and each new node links to m existing nodes with bility it is decided to change the value of tie vari-
probabilities that depend linearly on the degrees able Xij: create a new tie (change the value 0 to 1)
of the existing nodes. This leads to so-called or terminate an existing tie (change 1 to 0).

5605-Scott-Chap33.indd 503 4/6/2011 4:47:40 PM


504 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The probability of change can depend on various f(x; b) = b1 L(x) + b2 M(x) + b3 T(x)
function of the network, thus representing the + b4 S2(x) (33.7)
combination of several “mechanisms,” theories,
constraints, and so forth. Technically this is based where the values of the parameters bk determine
on the combination of ideas about exponential the strength of these four tendencies, and x is an
random graph models with ideas about Markov arbitrary digraph. A change process for networks
processes and Gibbs sampling. Let us first con- now will be defined, which operates by changing
sider an example with four components of the (“toggling”) single tie variables Xij(t) and that
theory, or mechanisms, driving the network favors changes in the statistics L, M, T, and S2,
dynamics: the tendency to a given average degree, depending on the values of the coefficients bk.
toward reciprocation, transitivity, and the Matthew This is achieved by the following algorithm,
effect. The Matthew effect is interpreted here as which shows how to transform the current graph
self-reinforcing popularity, contributing to the X(t) to the next graph, and when this change
dispersion of the in-degrees. All of these are occurs.
understood as stochastic, not deterministic, ten-
dencies. These four components will be reflected
by the following network statistics:
Algorithm 1. Tie-based network
L(X) = ∑ij Xij number of ties (33.1) dynamics.
M(X) =∑ij Xij Xji number of reciprocal
dyads (33.2) For digraphs x, define x(ij+) and x(ij−) as the graphs
that are identical to x in all tie variables except
T(X) = (1/6) ∑ij Xij Xjh Xih number of transitive those for the ordered pair (i, j), and for which x(ij+)
triplets (33.3) does have a tie i → j, while x(ij−) does not have this
Vin(X) = (1/n)∑j (X+i – X+.)2 in-degree variance tie. In other words, x ij( ijj ) = 1 and x ( ijj ) = 0 .
ij
(33.4)
where 1. Choose a random pair (i, j) with equal probabili-
ties, given that i ≠ j.
X+i =∑j Xji in-degree of i (33.5) 2. Define x = X(t).
3. Define
X+. = (1/n) ∑i X+i average degree (33.6)
exp(f x ( ijj + ) ); )
If the network dynamics has a tendency to favor p ij =
exp(f x ); ) + expp(f x ( ijj − ) );
( ijj + )
)
changes that increase the value of these four
statistics, respectively, then this will steer the
With probability πij, choose the next network
network process into a direction, respectively, of
to be x(ij+);
higher density, more reciprocity, stronger transi-
with probability 1 – πij, choose the next
tivity, or larger in-degree (popularity) differences.
network to be x(ij-).
This can be achieved by a model in the following
4. Increment the time variable t by the amount Δt,
way. First, let us rewrite the in-degree variance
being a random variable with the exponential
Vin(X) as follows:
distribution with parameter ρ.
V in ( X ) = ( / n ) ∑ i X +2 i − X +2.
This is a model for network dynamics closely
= ( / n)) ∑ i +i ( +i −1) + X +. − X +2. related to the exponential random graph model
developed by Frank and Strauss (1986), Frank
= ( / n)) 2 ( ) − +. ( +. −1) (1991), and Wasserman and Pattison (1996). To
elucidate the link to this model, the basic issue is
where S2(X) is the number of two-in-stars in the that (33.8) is the conditional probability for the
digraph X, that is, the number of configurations i, existence of the tie i → j, given that we know the
j, k with j → i; k → i and j ≠ k. This shows that, entire network x except whether this particular
for a fixed average degree X+., having a large tie exists, under the exponential random graph
in-degree variance Vin(X) is just the same as distribution defined by the probability function
having a large number of two-in-stars S2(X). We
shall henceforth be working with two-in-stars exp((f (x ; β )) (33.9)
instead of the in-degree variance to express the P{X = x} =
C
Matthew effect.
For allowing differential strengths for the ten- where C is the normalizing constant
dency toward the four theoretical components,
define the linear combination C =∑x exp (f(x;b))

5605-Scott-Chap33.indd 504 4/6/2011 4:47:40 PM


NETWORK DYNAMICS 505

the summation extending over all digraphs x. that in the continuous-time representation ties are
Thus, the dynamic algorithm above selects changed only one at a time, and that the probabil-
whether or not the tie i → j exists using the condi- ities of changes take into account the total current
tional probability of this tie under model (33.9), network configuration. The model specification
the condition being the total network configura- employs the so-called rate function λi(x;α),
tion outside of the existence of this tie. From depending on actors i and the current network
general theorems about Markov processes, or state x, which indicates the frequency per unit of
more specifically about Gibbs sampling (Geman time with which actor i gets the opportunity to
and Geman, 1983), it follows that when this algo- change an outgoing tie; and the objective function
rithm is repeated indefinitely, the distribution of fi(x;b), which can be interpreted as a measure of
X(t) (where repeating indefinitely means that t how attractive the network state x is for actor i.
tends to infinity) tends to the distribution with Formulated more neutrally, the objective function
probability function (33.9). This dynamic algo- is such that, when making a change, actors have a
rithm is one of the standard algorithms to obtain higher probability to move toward networks x for
random draws from this model (see Snijders, which the objective function fi(x;b) is higher. The
2002; Robins et al., 2005). statistical parameters α and b are used to reflect
By choosing the parameters bk in (33.7), one the strengths of the various different components
can choose different models with different strength included in the rate and objective functions. (For
of the tendencies toward density, reciprocation, extensions of this model without antisymmetry
transitivity, and self-reinforcing popularity. For between creating a new tie and terminating an
example, for b2 = b3 = b4 = 0 one obtains a random existing tie, see the discussion in the mentioned
(“Erdös–Rényi,” “Bernoulli”) graph. For b3 = literature about gratification or endowment
b4 = 0 this is a special case of the reciprocity functions.)
model of Wasserman (1977, 1979), with inde- The algorithm is formulated in terms of proba-
pendent dyads. This independence between dyads bility distributions only, but it can be interpreted
is broken when b3 ≠ 0 or b4 ≠ 0. For b2 = b3 = 0, as representing actors embedded in a network,
one obtains the popularity model of Wasserman being each others’ changing environment
(1977, 1980). The possibility of having positive (cf. Zeggelink, 1994), who make changes in their
values of b3 as well as b4, allows us to have a outgoing ties each at a rate λi(x; α) (which could
model that expresses a tendency towards transitiv- be constant, but which will be changing if the rate
ity as well as the Matthew effect. function is a nonconstant function of x) so as to
optimize the value of the objective function that
will obtain after their change is made, given that
random disturbances are added to the objective
Actor-based models function. This may be called myopic stochastic
optimization of the objective function and is often
One of the challenges of network analysis is used in game-theoretical models of network
to incorporate agency in a network model. This formation (e.g., Bala and Goyal, 2000).
was formulated forcefully by Emirbayer and
Goodwin (1994) – who likewise stressed the
importance of culture, which has to be left aside in
this chapter. A natural way to combine agency and Algorithm 2. Actor-based network
structure in a statistical model is to use a model dynamics.
for network dynamics where changes of ties are
initiated by actors. Such a model can be a good For digraphs x, define x(ij±) as the graph that is
vehicle for expressing and testing social science identical to x in all tie variables except those
theories in which the actors have a central role for the ordered pair (i, j), and for which the tie
(cf. Udehn, 2002; Hedström, 2005). Actor-based variable Xij in x(ij±) is just the opposite of this tie
models were proposed by Snijders (1996) for variable in x, in the sense that ij( ij ) 1 ij .
ranked network data and by Snijders and van Define x(ii±) = x (as a convenient formal defini-
Duijn (1997) for binary network data. Here, the tion without ulterior meaning).
presentation of Snijders (2001) will be followed.
A tutorial introduction to these models, also 1. Define x = X(t).
including practical advice on how to employ 2. For i ∈ {1, …, n}, define
and specify them, is given by Snijders et al.
λi ( ;α )
(2010). τi = (33.10)

n
The actor-based nature of the model means that h =1
λh ( ;α )
the model is formulated as if the actors have con-
trol over their outgoing ties – under constraints Choose actor i with probability τi.

5605-Scott-Chap33.indd 505 4/6/2011 4:47:42 PM


506 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

3. For j ∈ {1, …, n}, define in-degrees ∑h xhj of the actors j toward whom i
has an outgoing tie. The tie-based model with
exp(f i (x ( ijj ± ) ; β )) specification (33.7) and the actor-based model
π ij = (33.11)

n
h =1
exp(f i (x ( ihh ± ) ; β )) with specification (33.14) define very similar
but nevertheless different probability distributions
With probability πij, choose the next network to for the network dynamics; the choice between
be x(ij±). the tie-based and actor-based specifications will
4. Increment the time variable t by the amount Δt, have to be based on theoretical preferences or
being a random variable with the exponential on empirical fit if any differences in fit can be
distribution with parameter ∑ λh ( ; ).
n
discerned.
h =1
This model specification just serves here as
The properties of the exponential function an example of how these models can be used to
imply that equation (12) can be rewritten as represent, by the four parameters b1 to b4, tenden-
cies toward a given value for the mean degree,
exp(f i (x ( ijj ± ) ; β β )) (33.12) toward reciprocity, transitive closure, and prefer-
π ij = i

∑ ence for already popular actors. It should be noted


n ( ihh ± )
h =1
exp(f i (x ;β i β ))
that these four statistics are highly correlated,
that is, the probability of a given change depends which implies that although the parameters b2, b3,
monotonically on the increase in objective func- and b4 can be used to test the respective tenden-
tion that would be generated by this change. This cies, these parameters all collaborate in their
shows that an actor i for whom the current state x implications for the probability distributions of
of the network is near the optimum of the objec- the statistics that could be calculated from the
tive function fi(x;b), is rather likely to make no network. In practically all cases it will be desira-
change, because the probability πii of choosing to ble to control for the average degree, and testing
keep the current state x(ii±) = x as the next network hypotheses about b1 does not seem very meaning-
then is relatively high. ful in general.
Many other statistics of the personal network of
actor i may be used as the ski(x) in expression
(33.13) for the objective function. Such statistics
Model specification are called effects. Since the actor has control only
In the tie-based as well as in the actor-based over the outgoing tie variables, what is important
model, the researcher has to specify the function here is how the effects depend on the outgoing tie
f(x;b) or fi(x;b), respectively, to specify the model variables xij; effects depending only on incoming
(and in the actor-based model also the rates of tie variables have no consequence on the condi-
change λi(x;α)). This choice should be based on tional probability (33.11). An ample discussion of
knowledge of the subject matter, theoretical con- many statistics that could be included to reflect
siderations, and the hypotheses to be investigated. various theoretically interesting network tenden-
We discuss here only the actor-based case. cies and that can be helpful to give a good repre-
Like in generalized linear modeling, a conven- sentation of the dependencies between tie variables
ient class of functions is offered by linear is given by Snijders et al. (2010). The following is
combinations an incomplete outline.

fi ∑β s
k
k ki (x ) (33.13) 1. Two fundamental statistics are
(a) the outdegree ∑j xij, of which the param-
where the ski(x) are functions of the network, as eter – such as b1 in example (33.14) – can
seen from the point of view of actor i – in many be used to fit the level and tendency of the
cases, functions of the personal network of i. An average degree; most other statistics will be
analogue of (33.7), but now defined for the actor- correlated with the average degree, which
based model, is |implies that the precise value of this param-
eter will depend strongly also on the other
fi(x;b) = b1 ∑j xij + b2 ∑j xij xji parameters; and
+ b3 ∑j,h xij xjh xih + b4 ∑ xij xhj (33.14) (b) the reciprocated degree defined as ∑j implies
xijxji, the number of reciprocal ties in which
Just like the four terms in (33.7), but now actor i is involved, and also included in
seen from the point of view of actor i, these four (33.14); in almost all directed social networks
statistics represent, respectively, the number of reciprocity is a basic tendency, and including
ties, number of reciprocated ties, number of tran- this effect will allow a good representation of
sitive triplets {i → j → h, i → h}, and the added the tendency toward reciprocation.

5605-Scott-Chap33.indd 506 4/6/2011 4:47:43 PM


NETWORK DYNAMICS 507

2. The local structure of networks is determined by STATISTICAL INFERENCE FOR


triads, that is, subgraphs on three nodes (Holland ACTOR-BASED MODELS
and Leinhardt, 1975). The main dependencies
between ties in triads are captured by
Varying the parameters α and b can yield very
(a) transitivity: the tendency that “friends of different network dynamics, and for a given longi-
friends become, or stay, friends,”expressed tudinal network data set the question is how to
by the number of transitive triplets in the determine these parameter values to achieve a
personal network, ∑j,h xij xjh xih, included as good fit between model and data. This is the usual
the third term in (33.14); and question of statistical inference. A technical diffi-
(b) three-cycles: the tendency to form culty here is that no easily computable measure
closed cycles i → j → h → i, measured by exists for the fit between the model and the data,
∑j,h xij xjh xhi. This can represent generalized like the sum of squares in the analysis of variance,
exchange (Bearman, 1997); however, it is and the properties of the model can be assessed in
more frequent to observe that this effect has practice only by computer simulation. Indeed the
a negative sign, meaning that three-cycles actor-based model can be seen as an agent-based
tend to be avoided (Davis, 1970), a sign of computational model (cf. Macy and Willer, 2002)
local hierarchy. that is meant to mimic the way in which the
network evolves.
3. In- and out-degrees are fundamental aspects
of individual network position, and creation or
termination of ties can be more or less likely
depending on the degrees of the actors involved. Estimation
This is expressed by degree-related effects. The
basic degree effects are For parameter estimation in actor-based models,
three methods have been proposed in the litera-
(a) in-degree popularity, indicating the extent to
ture. In the Method of Moments (Snijders and van
which those with currently high in-degrees
Duijn, 1997; Snijders, 2001), a set of statistics of
are more popular as receivers of new ties –
the longitudinal network data set is suitably
which is just the Matthew effect mentioned
chosen, one for each estimated parameter, and the
above and the fourth term in (33.14);
parameters are determined so that for these statis-
(b) out-degree activity, indicating whether those
tics there is a perfect fit between observed values
with currently high out-degrees have a greater
and the expected values in the population of all
tendency to create rather than terminate ties;
simulations from this model: the expected values
and analogously
should be equal to the observed values. This can
(c) out-degree popularity and
in practice be achieved only approximately, by a
(d) in-degree activity.
stochastic approximation algorithm, with some
Also higher-order degree effects such as degree- randomness in the results due to the limited
based assortativity may be included, which number of simulations actually conducted.
express a stronger or weaker tendency to form Bayesian procedures were proposed by
and maintain ties depending on the combination Koskinen and Snijders (2007) and Schweinberger
of the degrees of both. (2007). The Bayesian method postulates a proba-
4. In addition to these effects based on the net- bility distribution of the parameters that represents
work structure itself, it is important to include prior beliefs or prior ignorance, and then calcu-
statistics depending on attributes of the actors – lates or approximates the so-called posterior dis-
their demographic characteristics, indicators of tribution of the parameters. The latter is the
resources, etc. A given actor variable can be conditional distribution of the parameters given
included as an ego effect, reflecting the effect the data that were observed, and it represents how
of this variable on the propensity to send ties, the prior beliefs have been transformed by the
and as an alter effect, reflecting the effect on empirical observations. Third, an algorithm to
the propensity to receive ties. In addition, the approximate the Maximum Likelihood estimator
combination of sender and receiver usually is was developed by Snijders et al. (2010). This
important, such as their similarity on salient algorithm is based on simulating the likely contin-
attributes, reflecting tendencies toward homoph- uous-time process that might have led from one
ily (McPherson et al., 2001). panel wave observation to the next, and then
5. It is also possible to include attributes of pairs approximating the parameters using an appropri-
of actors – which may be their relatedness in ate method of averaging.
a different network. Such dyadic covariates can For data sets that are not too small, and if the
express, for example, meeting opportunities, model holds to a good approximation, these three
costs, and benefits of the dyadic tie, etc. methods will yield similar estimation results.

5605-Scott-Chap33.indd 507 4/6/2011 4:47:44 PM


508 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Testing embeddedness of the actors (see, for example,


Granovetter, 1973; Burt, 1992; and Lin et al.,
Connected to the Method of Moments and the 2001). Such individual characteristics, however,
Maximum Likelihood method as estimation meth- will also play a role in the explanation of the net-
ods, there are procedures for testing statistical work dynamics. Thus we encounter the situation
hypotheses about the parameters, following the where the network and the behavior – a term that
general principles for constructing statistical tests we use here as a shorthand for the relevant
(see, for example, Cox and Hinkley, 1974). Often changeable characteristics of the actors, which
the most straightforward way is to use the param- also could be attitudes, performance, and so on –
eter estimates and their standard errors. For testing both can be considered as dependent variables,
a null hypothesis such as changing interdependently. It is assumed here that
the behavior variables are ordinal discrete varia-
H0 : bk = 0 bles, with values 1, 2, and so forth, up to some
maximum value, for instance, several levels of
the test statistic, then, is the ratio of the estimate alcohol consumption, or several levels of political
to the standard error, attitudes on a left-right scale; a binary variable is
βˆk a special case. The dependence of the network
t= (33.15) dynamics on network and behavior jointly will be
s.e.( ˆ )
k called the social selection process, and the depend-
This can be tested in a standard normal reference ence of the behavior dynamics on network and
distribution. This may be called a t-test, as it is behavior will be called the social influence
based on a t-ratio. Multiparameter tests can be process (An, this volume).
derived in an analogous fashion. For estimates Both social influence and social selection can
obtained by the method of moments such tests lead to similarity between tied actors, which is
may be called Wald-type tests, for Maximum descriptively called network autocorrelation
Likelihood estimates Wald tests. (Doreian, 1989; Leenders, 1997). Whether this
There is a different way of hypothesis testing network autocorrelation is caused mainly by influ-
that does not require that the tested parameter is ence or mainly by selection can be an important
estimated. This is the general principle of Rao’s question. This is demonstrated by Ennett and
efficient score test. For the method of moments a Bauman (1994) for smoking and by Haynie
special adaptation is required, which yields the (2001) and Carrington (this volume) for delin-
score-type test as developed by Schweinberger quent behavior.
(2008). There is a special practical advantage to
score or score-type tests for these models, because
the Monte Carlo algorithms for parameter estima-
tion may fail to converge in cases when the model Actor-based models
is relatively complicated given the amount of
information in the data; the score principle then To answer such questions, it can be helpful to
can provide a test even if one does not have a employ process models that represent the interde-
parameter estimate. pendent evolution of the tie variables as well as
Associated with Maximum Likelihood estima- the actors’ behavior variables. Here actor-based
tion is the likelihood ratio test. An algorithm is models are especially natural; such models were
presented in Snijders et al. (2010). specified in Snijders et al. (2007) and in Steglich
The algorithms currently available for Method et al. (2010). They assume that the outgoing ties of
of Moments are much less time-consuming than an actor, as well as the behavior of the actor, are
those for Maximum Likelihood estimation and under this actor’s control, subject to various
testing. However, this is an area of active develop- restrictions.
ment, and the computational efficiency of the The process model assumes that at random
available algorithms may change. moments, either a network tie or a behavior vari-
able can be changed. The actors have rate func-
tions and objective functions for the network
and the behavior separately. That networks and
behavior are governed potentially by different
DYNAMICS OF NETWORKS AND processes can be argued, for example, by regard-
BEHAVIOR ing network choice and behavior choice as being
determined by different decision frames
What makes networks important often are the (Lindenberg, 2001).
individual behavior and other individual outcomes Decomposing the changes in the smallest
that are in some way related to the network possible steps here means that at one given

5605-Scott-Chap33.indd 508 4/6/2011 4:47:44 PM


NETWORK DYNAMICS 509

(“infinitesimal”) moment in time, the possibilities λiZ ( , z ;α )


for an actor to change his or her behavioral varia- τ iZ = (33.19)

n
ble are limited to moving one category up or down λ Z ( , z ;α )
h =1 h
on the ordered scale.
Choose actor i with probability τ iZ .
We denote the behavior of actor i at time t by
6. For d ∈ {−1, 0, 1}, if zi + d is in the permitted
Zi(t), collected in the vector Z(t). It now is assumed
range of Z, define
that the change probabilities of the network will
depend on the current state of the network as well exp(f i Z (x , z ( i + d ) ; β ))
as the behavior; and the change probabilities of π idZ = (33.20)

1
the behavior will depend on the current state of the k =−1
exp(f i Z (x , z i + k ; β ))
behavior as well as the network. The objective
function for actor i for the network is denoted Values d for which zi + d would be outside of
f iX x , z ; β ), and for the behavior f i Z x , z ; β ). the permitted range are not included in the
Similarly to the objective function for the net- denominator.
work, the objective function for behavior is such With probability π idZ , choose the next behavior
that changes toward higher values of the objective vector to be z(i+d).
function are more likely than changes toward Go to step 7.
lower values. The rate function for actor i for 7. Increment the time variable t by the amount
network change is denoted λiX ( , z ;α ), and for Δt, being a random variable with the
behavior change λiZ ( , z ;α ). exponential distribution with parameter
∑ (h
n
h =1 h ).
The choice d = 0 means that actor i has the oppor-
Algorithm 3. Actor-based dynamics of tunity to change her or his behavior but refrains
network and behavior. from doing so. The probability of this will be
higher, accordingly as the value of the objective
For the network, the same definitions are used as function of the current state, f i Z x , z ; β ) is higher
in the algorithm for actor-based network dynam- compared to the value of the neighboring states
ics. For the behavior, for any actor i and a poten- f i Z x , z ( i d ) ; β ) for d = − 1, +1.
tial increment d, define z(i+d) as the vector of
behaviors, which is identical to z in all coordi-
nates except that d is added to the i’th coordinate:
z i( i d ) = z i + d . Model specification
1. Define x = X(t), z = Z(t). For the behavior also, the most convenient
2. Calculate the ratio expression for the objective function is a linear
combination

n
λhX ( , z ;α )
φX = h =1

∑ (λ
n X
( , z ;α ) + λhZ ( , z ;α ))
(33.16) f iZ x , z ; β ) ∑β Z Z
s (x , z ),
k ki
(33.21)
h =1 h k

where the s kiZ (x , z ) are functions of the behavior


With probability ϕX, go to item 3 to make a
and other characteristics of actor i, but may
network step; else (with probability 1−ϕX), go to
depend also on the personal network, the behavior
item 5 to make a behavior step.
of those to whom i is tied, and so on. In studies of
3. For i ∈ {1,…, n}, define
selection and influence, the behavior-dependent
λiX ( , z ;α ) selection part is modeled by the specification of
τ iX = (33.17) the model for network dynamics, for example, by

n
h =1
λhX ( , z ;α ) a term expressing the preference (homophily) for
ties to others who are similar on the behavioral
Choose actor i with probability tiX .
variable Z.
4. For j ∈ {1,…, n}, define
The network-dependent influence part is mod-
eled by appropriate terms in the objective function
exp(f iX (x ( iijj ± ) , z ; β ))
π ijX = (33.18) for behavior. A basic example of a specification

n
h =1
exp(f iX (x ( ihh ± ) , z ; β )) for this function is

With probability π ijX choose the next network to ⎛∑ x z ⎞


be x(ij±). f i Z x , z ; β ) β1Z z i + β 2Z z i2 β 3Z z i ⎜ j ij j ⎟
⎜ ∑ x ⎟
Go to step 7. ⎝ j ij ⎠

5. For i ∈ {1,…, n}, define (33.22)

5605-Scott-Chap33.indd 509 4/6/2011 4:47:45 PM


510 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The first two terms represent a quadratic prefer- statistical system R (R Development Core Team,
ence function for the behavior Z. If preferences 2009), called RSiena. The R system and its pack-
are unimodal, then the coefficient of the quadratic ages are freeware, running on Windows, Mac, and
term, β 2Z, is negative. For addictive behaviors, Unix/Linux systems. An extensive and frequently
however, this coefficient can be positive. The third updated manual is available (Ripley and Snijders,
term indicates that the “value” for actor i of 2010). This manual gives detailed instructions for
behavior zi depends on the average behavior of installing and working with RSiena.
those to whom i has an outgoing tie. A first requirement is to install R, the package
RSiena, and a few auxiliary packages, as described
in the RSiena manual. If desired, RSiena can be
operated apparently without any knowledge of R,
EXAMPLES by means of a graphical user interface; after the
installation, it is then not necessary to operate R.
Because of space constraints, this chapter does not Once the installation is done, RSiena can be run in
contain an elaborate empirical example. The men- two ways:
tioned methodological articles that further explain
the actor-based model for network dynamics can 1. Run R, load the package RSiena and the auxiliary
be consulted for some examples. Other published packages, and run the graphical user interface
examples of network dynamics (ordered by the for RSiena from within R by the command sien-
age of the population of actors) include Schaefer a01Gui(). This offers the basic functionality of
et al. (2010) about the effects of reciprocity, tran- RSiena, with the possibility to integrate the use
sitivity, and popularity in friendship dynamics of RSiena with the use of any other R packages.
between preschool children; Selfhout et al. (2010) It has the advantage that no knowledge of the
about the way in which friendship dynamics of commands of RSiena is required.
adolescents depend on personality characteristics; 2. Run R, load the package RSiena and the auxiliary
van Duijn et al. (2003) about the effects of visible packages, and run RSiena by using its R com-
and nonvisible attributes on dynamics of friend- mands. This is the best option for users fully
ship between university students; and Checkley conversant with RSiena.
and Steglich (2007) about how the mobility of
managers affects interfirm ties. As basic literature, the best combination is to
Examples of the joint dynamics of networks use Snijders et al. (2010) as a tutorial for the meth-
and behavior have been published only recently, odology, and Ripley and Snijders (2010) (or more
because of the recency of the model. Some of recent versions) for the requirements on data for-
these examples are the following. mats and the operation of the software.
Burk et al. (2007) present a study on influence
and selection processes in the dynamics of friend-
ship and delinquent behavior of adolescents.
Steglich et al. (2010) studied the co-evolution of
friendship and smoking as well as drinking behav- OUTLOOK AND DISCUSSION
ior in a secondary school cohort. Mercken et al.
(2009) studied influence and selection processes Statistical methods for social network analysis
in smoking initiation among adolescents in a that represent network dependencies in a satisfac-
large-scale study with networks in 70 schools in 6 tory way have been available only since recent
countries. The study by De Klepper et al. (2010) years. The methods presented here for analyzing
is set in a naval academy and studies the mutual network evolution, and for the co-evolution of
dependence in the evolution of friendships and networks and behavior, allow researchers to test
military discipline. competing as well as complementary theories
about dynamics elating to networks. More reflec-
tion now is needed from a theoretical as well as
methodological viewpoint to combine the statisti-
THE SIENA PROGRAM cal approach with the network approach. The
network approach is rich in structural and posi-
The actor-based model for network dynamics as tional analysis. The statistical approach, by con-
well as the model for dynamics of networks and trast, has a tradition of parsimony, which often
behavior are implemented in the SIENA limits model specification for hypothesis testing
(“Simulation Investigation for Empirical Network to the choice of tested variables together with a
Analysis”) program. Initially a standalone pro- few control variables. Much research in the statis-
gram with a user interface through the program tical approach is purely individualistic, ignoring
StOCNET, since 2009 it is a package within the the importance of distinguishing multiple types of

5605-Scott-Chap33.indd 510 4/6/2011 4:47:49 PM


NETWORK DYNAMICS 511

unit of analysis and where hypotheses are uniquely although not always of tie termination, such as in
formulated without further ado in the scheme of Hagedoorn (2002). Second, with respect to
“X leads to Y, when controlling for A”. Convincing models, it will be worthwhile to develop models
gatekeepers such as reviewers and editors of that are non-Markovian, for example, models with
journals of the importance of a network approach, latent variables or more general hidden Markov
where theories and statistical models are more models (Cappé et al., 2005). The models pre-
complex, can be difficult. sented here assume implicitly that actors have full
Two major limitations of the purely individual- knowledge of the network, and to model larger
istic approach can be mentioned here. In the first networks in a plausible way it will be helpful to
place, most network research is observational develop models that do not assume complete
rather than experimental, which means that meth- information. Third, statistical procedures have to
ods of analysis must incorporate adequate control be developed further. Algorithms should be
for competing hypotheses or theories, and a good improved and their mathematical properties inves-
specification of statistical dependencies between tigated. In addition, procedures for assessing
observed variables is essential to obtain reliable goodness of fit should be developed and the
conclusions. In network phenomena, endogenous robustness of parameter estimators and tests for
(also called self-referential, emergent, self- misspecification should be studied. Together with
organizing, feedback) processes are essential, and the software implementation, this implies a con-
these lead to dependencies between variables siderable amount of methodological work.
rather than effects of some measured variable X
on a dependent variable Y. The failure to specify
such dependencies appropriately will lead to
hypothesis tests with inadequate control for REFERENCES
competing theories.
Second, network dependencies can be a treas- Barabási, A.L. and Albert, R. (1999) ‘Emergence of scaling in
ure grove of interesting theories and hypotheses, random networks’, Science, 286: 509–12.
and the infusion of network approaches into theo- Bala, V. and Goyal, S. (2000) ‘A noncooperative model of
retical thinking and statistical hypothesis testing, network formation’, Econometrica, 68: 1181–229.
along theoretical lines such as Hedström’s (2005) Borgatti, S.P. and Foster, P.C. (2003) ‘The network paradigm
analytical sociology, can lead to better explana- in organizational research: A review and typology’, Journal
tions of empirical phenomena and to improved of Management, 29: 991–1013.
interventions in domains such as public health. Brass, D.J., Galaskiewicz, J., Greve, H.R. and Tsai, W. (2004)
A similar kind of progress has started earlier in ‘Taking stock of networks and organizations: a multilevel
contextual analysis by multilevel modeling, where perspective’, Academy of Management Journal, 47:
the analytical use of several types of unit of analy- 795–817.
sis is now generally accepted to be fruitful and Bauman, K.E., Fisher, L.A., Bryan, E.S. and Chenoweth, R.L.
even necessary, although not yet generally prac- (1984) ‘Antecedents, subjective expected utility, and
ticed; examples are Sampson et al. (2002) and behavior: A study of adolescent cigarette smoking’,
O’Campo (2003). Addictive Behaviors, 9: 121–36.
Such theoretical-methodological advances will Bearman, P.S. (1997) ‘Generalized exchange’, American
be easier when further progress in statistical mod- Journal of Sociology, 102: 1383–415.
eling for network dynamics will have been made Bollobás, B. (1985) Random Graphs. London: Academic Press.
along three lines: models for richer data struc- Borgatti, S., Everett, M.G. and Freeman, L.C. (1998) UCINET V,
tures, less restrictive models, and richer statistical Reference Manual. Columbia, SC: Analytic Technologies.
procedures. With respect to data structures, when Burk, W.J., Steglich, C.E.G. and Snijders, T.A.B. (2007)
remaining within the confines of network panel ‘Beyond dyadic interdependence: Actor-oriented models
designs, one can think of extending this type of for co-evolving social networks and individual behaviors’,
modeling to data types such as valued networks, International Journal of Behavioral Development, 31:
multivariate networks, and nondirected networks. 397–404.
Developments should not be limited to panel Burt, R.S. (1992) Structural Holes. Cambridge, MA: Harvard
designs, however. In studies of networks between University Press.
organizations, sometimes the observation moments Cappé, O., Moulines, E. and Rydén, T. (2005) Inference in
are spaced so tightly that it is reasonable to make Hidden Markov Models. New York: Springer.
the approximation that the preceding observation Checkley, M. and Steglich, C.E.G. (2007) ‘Partners in power:
of the network state is used to directly predict the Job mobility and dynamic deal-making’, European
next observation in a network autoregressive Management Review, 4: 161–71.
model, as done by Leenders (1997) and Gulati and Christakis, N.A. and Fowler, J.H. (2007) ‘The spread of obesity
Gargiulo (1999); sometimes the observations even in a large social network over 32 years’, New England
provide a continuous record of tie creation, Journal of Medicine 357: 370–379.

5605-Scott-Chap33.indd 511 4/6/2011 4:47:49 PM


512 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Coleman, J.S. (1961) The Adolescent Society. New York: Free Hedström, P. (2005) Dissecting the Social: On the Principles of
Press of Glencoe. Analytical Sociology. Cambridge: Cambridge University
Cox, D.R. and Hinkley, D.V. (1974) Theoretical Statistics. Press.
London: Chapman & Hall. Holland, P.W. and Leinhardt, S. (1975) ‘Local structure in social
Davis, J.A. (1970) ‘Clustering and hierarchy in interpersonal networks’, Sociological Methodology – 1976, pp.1–45.
relations: Testing two graph theoretical models on Holland, P.W. and Leinhardt, S. (1977) ‘A dynamic model for
742 sociomatrices’, American Sociological Review, 35: social networks’, Journal of Mathematical Sociology, 5:
843–52. 5–20.
De Klepper, M., Sleebos, E., van de Bunt, G. and Agneessens, F. Kapferer, B. (1972) Strategy and Transaction in an African
(2010) ‘Similarity in friendship networks: Selection or influ- Factory. Manchester: Manchester University Press.
ence? The effect of constraining contexts and non-visible Katz, L. and Proctor, C.H. (1959) ‘The configuration of inter-
individual attributes’, Social Networks, 32: 82–90. personal relations in a group as a time-dependent stochas-
de Solla Price, D. (1965) ‘Networks of scientific papers’, tic process’, Psychometrika, 24: 317–27.
Science, 149: 510–15. Koskinen, J.H. and Snijders, T.A.B. (2007) ‘Bayesian inference
de Solla Price, D. (1976) ‘A general theory of bibliometric and for dynamic network data’, Journal of Statistical Planning
other advantage processes’, Journal of the American and Inference, 13: 3930–38.
Society for Information Science, 27: 292–306. Leenders, R.T.A.J. (1995) ‘Models for network dynamics:
Doreian, P. (1989) ‘Network autocorrelation models: Problems A Markovian framework’, Journal of Mathematical
and prospects’, in D.A. Griffith (ed.), Spatial Statistics: Sociology, 20: 1–21.
Past, Present, Future. Ann Arbor: Michigan Document Leenders, R.T.A.J. (1997) ‘Longitudinal behavior of network
Services. structure and actor attributes: Modeling interdependence
Dorogovtsev, S.N., Mendes, J.F.F. and Samukhin, A.N. (2000) of contagion and selection’, in P. Doreian and
‘Structure of growing networks with preferential linking’, F.N. Stokman (eds), Evolution of Social Networks.
Physical Review Letters, 85: 4633–36. New York: Gordon and Breach.
Emirbayer, M. and Goodwin, J. (1994) ‘Network analysis, Lin, N., Cook, K. and Burt, R.S. (eds) (2001) Social Capital:
culture, and the problem of agency’, American Journal of Theory and Research. New York: Aldine de Gruyter.
Sociology, 99: 1411–54. Lindenberg, S. (2001) ‘Social rationality versus rational
Ennett, S.T. and Bauman, K.E. (1994) ‘The contribution of egoism’, in J. Turner (ed.), Handbook of Sociological
influence and selection to adolescent peer group homoge- Theory. New York: Kluwer/Plenum. pp. 635–68.
neity: The case of adolescent cigarette smoking’, Journal of Macy, M.W. and Willer, R. (2002) ‘From factors to actors:
Personality and Social Psychology, 67: 653–63. Computational sociology and agent-based modelling’,
Frank, O. (1991) ‘Statistical analysis of change in networks’, Annual Review of Sociology 28: 143–66.
Statistica Neerlandica, 45: 283–93. McPherson, M., Lynn, S.-L. and James M.C. (2001) ‘Birds of a
Frank, O. and Strauss, D. (1986) ‘Markov graphs’, Journal of feather: Homophily in social networks’, Annual Review of
the American Statistical Association 81: 832–42. Sociology, 27: 415–44.
Geman, S. and Geman, D. (1983) ‘Stochastic relaxation, Gibbs Mercken, L., Snijders, T.A.B., Steglich, C. and de Vries, H.
distributions, and the Bayesian restoration of images’, IEEE (2009) ‘Dynamics of adolescent friendship networks
Transactions on Pattern Analysis and Machine Intelligence, and smoking behavior: Social network analyses in six
6: 721–41. European countries’, Social Science and Medicine, 69:
Granovetter, M.S. (1973) ‘The strength of weak ties’, American 1506–14.
Journal of Sociology, 78: 1360–80. Merton, R. (1963) ‘The Matthew effect in science’, Science,
Gulati, R. and Gargiulo, M. (1999) ‘Where do interorganiza- 159(3810): 56–63.
tional networks come from?’, American Journal of Michell, L. and A. Amos, (1997) ‘Girls, pecking order and
Sociology, 104: 1439–93. smoking’, Social Science and Medicine, 44: 1861–69.
Hagedoorn, J. (2002) ‘Inter-firm R&D partnerships: an over- Newcomb, T.M. (1961) The Acquaintance Process. New York:
view of major trends and patterns since 1960’, Research Holt, Rinehart and Winston.
Policy, 31: 477–92. Nordlie, P.G. (1958) ‘A longitudinal study of interpersonal
Hallinan, M.T. (1974) The Structure of Positive Sentiment. attraction in a natural group setting’, PhD thesis, University
New York: Elsevier. of Michigan.
Hallinan, M.T. (1979) ‘The process of friendship formation’, O’Campo, P. (2003) ‘Invited commentary: Advancing theory
Social Networks, 1: 193–210. and methods for multilevel models of residential neighbor-
Harris, K.M., Florey, F., Tabor, J., Bearman, P.S., Jones, J. and hoods and health’, American Journal of Epidemiology,
Udry, J.R. (2003) ‘The national longitudinal study of ado- 157: 9–13.
lescent health: Research design’. Technical report, Pearson, M. and West, P. (2003) ‘Drifting smoke rings: Social
University of North Carolina. http://www.cpc.unc.edu/ network analysis and Markov processes in a longitudinal
projects/addhealth/design/. study of friendship groups and risk-taking’, Connections,
Haynie, D.L. (2001) ‘Delinquent peers revisited: Does network 25(2): 59–76.
structure matter?’ American Journal of Sociology, 106: Powell, Walter W., White, Douglas R., Koput, Kenneth W. and
1013–57. Owen-Smith, Jason. (2005) ‘Network dynamics and field

5605-Scott-Chap33.indd 512 4/6/2011 4:47:50 PM


NETWORK DYNAMICS 513

evolution: The growth of interorganizational collaboration Snijders, T.A.B., Pattison, P., Robins, G.L., Handock, M. (2006)
in the life sciences’, American Journal of Sociology, 110: ‘New specifications for exponential random graph models’,
1132–205. Sociological Methodology – 2006, 99–153.
R Development Core Team (2009) R: A Language and Snijders, T.A.B., Steglich, C.E.G. and Schweinberger, M.
Environment for Statistical Computing. R Foundation for (2007) ‘Modeling the co-evolution of networks and
Statistical Computing, Vienna, Austria. http:// behavior’, in Kees van Montfort, Han Oud and Albert
www.R-project.org. Satorra (eds), Longitudinal Models in the Behavioral
Rapoport, A. (1953a) ‘Spread of information through a popu- and Related Sciences. Mahwah, NJ: Lawrence Erlbaum.
lation with socio-structural bias: I. Assumption of transitiv- pp. 41–71.
ity’, Bulletin of Mathematical Biophysics, 15: 523–33. Snijders, T.A.B., van de Bunt, G.G. and Steglich, C.E.G. (2010)
Rapoport, A. (1953b) ‘Spread of information through a popu- ‘Introduction to stochastic actor-based models for network
lation with socio-structural bias: II. Various models with dynamics’, Social Networks, 32: 44–60.
partial transitivity’, Bulletin of Mathematical Biophysics, Snijders, T.A.B., and van Duijn, M.A.J., ‘Simulation for statisti-
15: 535–46. cal inference in dynamic network models’. In: R. Conte,
Ripley, R. and Snijders, T.A.B. (2010) Manual for SIENA R. Hegselmann, and P. Terna, (eds) Simulating Social
version 4.0. Oxford: University of Oxford, Department of Phenomena. Lecture Notes in Economics and Mathematical
Statistics, http://www.stats.ox.ac.uk/siena/. Systems, 456. Berlin: Springer, 1997, pp. 493–512.
Robins, G. and Pattison, P. (2001) ‘Random graph models for Sørensen, A. B. and Hallinan, M.T. (1976) ‘A stochastic model
temporal processes in social networks’, Journal of for change in group structure’, Social Science Research,
Mathematical Sociology, 25: 5–41. 5: 43–61.
Robins, G.L., Woolcock, J., and Pattison, P. (2005) ‘Small and Steglich, C.E.G., Snijders, T.A.B. and Pearson, M. (2010)
other worlds: Global network structures from local proc- ‘Dynamic networks and behavior: Separating selection
esses’, American Journal of Sociology 110: 894–936. from influence’, Sociological Methodology – 2010,
Sampson, R. J., Morenoff, J.D. and Gannon-Rowley, T. (2002) pp. 329–393.
‘Assessing “neighborhood effects”: Social processes and Udehn, L. (2002) ‘The changing face of methodological indi-
new directions in research’, Annual Review of Sociology vidualism’, Annual Review of Sociology, 8: 479–507.
28: 443–78. Udry, J.R. (2003) ‘The national longitudinal study of adoles-
Sampson, S.F. (1969) ‘Crisis in a cloister’, Ph.D. dissertation, cent health (add health), Waves I & II, 1994–1996; Wave
Cornell University. III, 2001–2002’, technical report, Carolina Population
Schaefer, D.R., Light, J.M., Fabes, R.A., Hanish, L.D. and Center, University of North Carolina at Chapel Hill.
Martin, C.L. (2010) ‘Fundamental principles of network van Duijn, M.A.J., Zeggelink, E.P.H., Huisman, M., Stokman,
formation among preschool children’, Social Networks F.N. and Wasseur, F.W. (2003) ‘Evolution of sociology
32: 61–71. freshmen into a friendship network’, Journal of
Schweinberger, M. (2007) ‘Statistical methods for studying the Mathematical Sociology, 27: 153–91.
evolution of networks and behavior’, Ph.D. dissertation, Wasserman, S. (1977) ‘Stochastic models for directed graphs’,
University of Groningen. Ph.D. dissertation, University of Harvard, Dept. of
Schweinberger, M. (2008) ‘Statistical modeling of network Statistics.
dynamics given panel data: Goodness-of-fit tests’. Wasserman, S. (1979) ‘A stochastic model for directed graphs
Submitted for publication. with transition rates determined by reciprocity’, Sociological
Selfhout, M., Burk, W., Branje, S., Denissen, J.J.A., Van Aken, Methodology – 1980, pp. 392–412.
M.A.G. and Meeus, W. (2010) ‘Emerging late adolescent Wasserman, S. (1980) ‘Analyzing social networks as stochas-
friendship networks and big five personality traits: A tic processes’, Journal of the American Statistical
dynamic social network perspective’, Journal of Personality, Association, 75: 280–94.
78: 509–38. Wasserman, S. (1987) ‘The conformity of two sociometric rela-
Snijders, T.A.B. (1996) ‘Stochastic actor-oriented dynamic tions’, Psychometrika, 53: 261–82.
network analysis’, Journal of Mathematical Sociology, 21: Wasserman, S. and K. Faust. (1994) Social Network Analysis:
149–72. Methods and Applications. New York: Cambridge University
Snijders, T.A.B. (2001) ‘The statistical evaluation of social net- Press.
work dynamics’, Sociological Methodology – 2001, 361–95. Wasserman, S. and D. Iacobucci. (1988) ‘Sequential social
Snijders, T.A.B. (2002) ‘Markov chain Monte Carlo estimation network data’, Psychometrika, 53: 261–82.
of exponential random graph models’, Journal of Social Wasserman, S. and Pattison, P.E. (1996) ‘Logit models and
Structure, 3: 2. logistic regression for social networks: I. An introduction to
Snijders, T.A.B. (2005) ‘Models for longitudinal network data’, Markov graphs and p*’, Psychometrika, 61: 401–25.
in P.J. Carrington, J. Scott, and S. Wasserman (eds), Models West, P. and Sweeting, H. (1995) ‘Background rationale and
and Methods in Social Network Analysis. New York: design of the West of Scotland 11–16 Study’, Working
Cambridge University Press. Paper No. 52. Glasgow: MRC Medical Sociology Unit
Snijders, T.A.B., Koskinen, J.H. and Schweinberger, M. Glasgow.
(2010) ‘Maximum likelihood estimation for social network Zeggelink, E.P.H. (1994) ‘Dynamics of structure: An individual
dynamics’, Annals of Applied Statistics, 4: 567–588. oriented approach’, Social Networks, 16: 295–333.

5605-Scott-Chap33.indd 513 4/6/2011 4:47:50 PM


34
Models and Methods to
Identify Peer Effects
Weihua (Edward) An

INTRODUCTION the identification issues. In addition, this review


differs from the above ones in two aspects. First,
There have been numerous studies on peer effects. it is interdisciplinary, drawing on literature not
But inadequate attention has been paid to making only from sociology but also from economics,
valid causal inference about peer effects, either political science, statistics, etc. Second, it uses the
due to intellectual negligence or methodological potential outcomes framework etc. to unify and
limitations. This paper will review recent advances elaborate the critiques and emphasizes the condi-
in statistical modeling and inference on peer tions in which peer effects can be attributed as
effects and point out some directions for future causal.
research in this area. In sociology, the literature on
methodological issues in studying peer effects can
be traced back at least to the classic paper written
by Duncan et al. (1968). Other notable studies and What peer effects are and why
reviews include Kandel (1978), Marsden and
they are important
Friedkin (1993), Doreian (2001), Carrington et al.
(2005), Valente (2005), Mouw (2006), O’Malley In the literature, there is no consensus on exactly
and Marsden (2008), Smith and Christakis (2008), what “peers” mean. They can refer to friends,
and so forth. There also exist some very good roommates, classmates, colleagues, neighbors,
reviews on this topic in economics, including co-offenders, inmates, even firms making same
Manski (1993, 2000, and 2010), Brock and products or providing same services or operating
Durlauf (2001a), Blume and Durlauf (2005), in same neighborhoods, and so forth, depending
Soetevent (2006), Hartmann et al. (2008), Jackson on the context. To facilitate elaboration, I will use
(2008) and Moffitt (forthcoming); in political sci- “peer” and “friend” interchangeably in the follow-
ence, including Fowler, Heaney et al. (2009); and ing text unless it is explicitly specified otherwise.
in physics and statistics, including Albert and Although sometimes people nominate their
Barabási (2002), Newman (2003), Goldenberg spouses or siblings as their best friends, in gen-
et al. (2009), and Kolaczyk (2009). eral, researchers tend not to view social contacts
Generally speaking, methodological studies of connected through marriage or kinship as peers.
peer effects can be divided into two different Even so, it can still be very hard in practice to
approaches. One is about mathematical modeling clearly define peership. Take “friends” as an
of peer effects, like Jackson (2008, esp. Chapter example: different subjects may have very differ-
8), which mainly studies the long run behaviors or ent definitions of what friends mean. A general
equilibria of the social interactions of peer groups. approach to dealing with this kind of ambiguity is
The other is about statistical identification to provide an explicit name generator, like “Whom
and estimation of peer effects. This review will do you usually discuss important affairs with?”
mostly focus on the second approach, especially But what constitute important affairs are likely

5605-Scott-Chap34.indd 514 4/13/2011 2:44:33 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 515

to differ across subjects and discussing important 4 Contemporaneous vs. lagged peer effects. The
affairs is neither the only nor the central element effects due to peers’ contemporaneous influence
of friendship. Regardless of these conceptualiza- are called contemporaneous peer effects while
tion issues, there are at least eight ways we can the effects due to peers’ previous influence are
categorize peer effects, which may help us better called lagged peer effects. Social interactions in
understand the subtleties and varieties of peer a study group generate contemporaneous peer
effects. effects while diffusions of infectious diseases
represent lagged peer effects.
1 Exogenous vs. endogenous peer effects. The 5 Group vs. individual peer effects. Peer effects can
difference between exogenous and endogenous be either based on the group or the individual.
peer effects mainly lies in the ultimate cause Sometimes people are more likely to be influ-
of peer effects. The former usually refers to enced by their peer groups while other times only
the spillover effects of some exogenous policy by their best friends or other types of individual
intervention on subjects who are not originally social ties. Peer effects within a study group
targeted by the intervention but are connected to can be an example for the former while obesity,
the original target population of the intervention. smoking, or monopolistic competition can be
For example in Figure 34.1, there is an exogenous examples for the latter.
intervention (e.g., a smoking prevention or cessa- 6 Unidirectional vs. bidirectional peer effects.
tion program) that is aimed to change subject j's Unidirectional peer effects occur when peer effects
attitude and behavior regarding smoking, Yj. Peer flow only one way, from one subject to another,
effects in this case refer to the spillover or conta- but not the other way around. Bidirectional peer
gion effects of subject j ’s attitudinal or behavioral effects happen that peers influence each other
change in smoking due to the intervention on and the peer effects flow reciprocally.
his or her friend subject i’s attitude and behavior 7 Symmetric vs. asymmetric peer effects. The effect
regarding smoking. In contrast, endogenous peer a subject has on his or her peer is the same as
effects come directly from peers. Still using Figure the effects that this peer has on the subject him/
34.1 to illustrate, endogenous peer effects refer herself, they are called symmetric peer effects.
to situations in which subject j directly influ- When the two effects are not equal, they are
ences subject i without being affected by any called asymmetric peer effects. For example,
external intervention first. In reality, it could be religious persons are may have stronger effects in
very difficult to completely separate endogenous converting their contacts into religions than the
peer effects from exogenous ones, as many of effects their contacts have in pulling them out of
the endogenous peer effects could originally be religions. Similar are the peer effects between
generated by external forces unobservable to smokers and nonsmokers.
researchers. 8 Peer effects on preference, behavior, or outcome.
2 Positive vs. negative peer effects. By desirability, In terms of the content of peer influence, peer
peer effects can be viewed either as positive or effects can be operate on preference, behavior,
negative. For example, peers who smoke ciga- outcome, or any combination of them.
rettes are usually considered to have negative
effects on their contacts while students who The important role played by peer effects
study hard may have a positive influence on their in mediating social economic outcomes have
classmates. been repeatedly documented in the literature.
3 Active vs. passive peer effects. Active peer Researchers have shown that peers matter on dif-
effects come from connections that a person can fusion of innovations (Coleman et al., 1957) and
explicitly recognize while passive peer effects technology adoption (Oster and Thornton, 2009),
come from peers that a subject does not have an job seeking and status attainment (Granovetter,
explicit tie with. Friends’ effects are examples of 1973, 1974; Williams, 1981; Fernandez and
the former. Transmission of infectious diseases or Weinberg, 1997; Lin, 1999; Fernandez et al.,
market competition can serve as examples of the 2000), widening of socioeconomic inequality
latter. (Finneran and Kelly, 2003; Calvo-Armengol and
Jackson, 2004, 2007; Salganik et al., 2006), social
spreading of obesity (Christakis and Fowler, 2007;
ei Intervention Trogdon et al., 2008; Halliday and Kwak, 2009;
Carrell et al., 2010), autism (Liu et al., 2010),
cigarette smoking (Ennett and Baumann, 1993;
Yi Yj ej
? Maxwell, 2002; Christakis and Fowler, 2008),
criminal or delinquent behaviors (Baerveldt et al.,
Figure 34.1 Exogenous peer effects from 2008; Carrington, this volume), and sexually
to Yj to Yi transmitted diseases (Laumann and Youm, 1999;

5605-Scott-Chap34.indd 515 4/13/2011 2:44:33 PM


516 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Bearman et al., 2004), flow of mass communica- ei Yi Yj ej


tion (Katz and Lazarsfeld, 2005), mobilization of ?
social movements and civic participation (Diani
and McAdam, 2003; Lim, 2009), patterns of Xi Xj
migrations (Garip, 2008) and energy consumption
(Ayres et al., 2009), conformity of political opin-
Figure 34.2 The causal paths of
ions (Lazer et al., 2008), spillover of workers’
productivity (Moretti, 2004; Greenstone et al., endogenous peer effects from Yj to Yi
2008; Mas and Moretti, 2009), and so on.
Understanding peer effects through the lens of
social network analysis has important implica- version of peer(s) effects. If we have perfect meas-
tions for public policies. We can either change or urement on all the relevant variables and the dia-
utilize the social network structures of peer groups gram accurately characterizes how peer effects
to improve policy effectiveness. Take the seating work in reality, the causal effects from Yj to Yi are
arrangement in a classroom, for an example. If certainly identifiable, as all the backdoor paths are
students with high GPAs have larger positive peer essentially blocked. But there are several issues to
effects on students with low GPAs than on stu- be solved before we can make such an optimistic
dents with high GPAs, then students with high claim.
GPAs should be seated with students with low The first issue is what we mean by “causal
GPAs to maximize the average student GPA. effects”. There has been a tremendous amount of
Certainly, the seat arrangement also depends philosophical discussion on this, from Aristotle to
on the objectives of the education and the incen- Hume, to Lewis, and so on (Zalta, 2008). Among
tives of the teachers. Maybe the teachers do not them, Donald Rubin’s counterfactual model or
care about the average GPA but the number of potential outcomes framework (1974) is increas-
students who have GPAs above a certain thresh- ingly popular and more relevant here. Below is a
old. If that is the case, students with high GPAs simple introduction to it. See Morgan and Winship
probably should be seated together. Take smoking (2007) and Pearl (2009) for more comprehensive
prevention for another example. We can choose reviews.
the popular subjects, for example, those who Suppose there is a binary treatment D and
receive the most friendship nominations in a peer outcome Y that we are interested in. Let Yi(1)
group, as opinion leaders to lead smoking preven- denote the potential outcome for unit i under treat-
tion programs and accelerate the diffusion of ment while Yi(0) is its potential outcome under
positive information, attitudes and behaviors control. Then the individual treatment effect is
regarding smoking (Valente and Davis, 1999). defined as the difference between the two poten-
tial outcomes, that is, ti = Yi(1) – Yi(0). However,
since we can observe only one of the potential
outcomes for each unit, ti is not directly identifi-
Understanding peer effects using able. To identify each individual treatment effect,
DAGs and counterfactuals ti, we need to impute the missing potential out-
come for each unit, for example, by matching on
An important issue in studying peer effects is how covariates or propensity scores, and so on. Below
to identify the observed correlations among peers’ I will use the potential outcomes framework to
attitudes, behaviors, or outcomes as causal. examine the various difficulties in identifying peer
Directed acyclic graphs (DAGs) (Pearl, 2000) effects.
provide a very intuitive conceptual tool to present
causal paths and can be deployed here to show the
causal paths of peer effects. For simplicity, sup- Ambiguity of the treatment
pose we have data on some outcome of interest (Y) If we are studying the peer effects of some exog-
and attributes (X) of a group of subjects and we enous policy intervention, then the treatment is
are interested in whether subjects’ outcomes are well defined, which is the designed policy inter-
affected by their peers’ outcomes. We can use the vention. But if we are interested in endogenous
following DAG to present the hypothetical causal peer effects, then the treatment is conceptually
paths of such endogenous peer effects. ambiguous. To fix ideas, let’s suppose we are
In Figure 34.2, we assume that subject i has studying the effects of a hypothetical person’s best
nominated j as his or her peer and are interested in friend’s smoking status on his or her own smoking
if Yj has any effects on Yi. We assume that each status. What is the treatment in this case? Is it the
subject’s outcome Y is affected not only by their pure fact that this person’s friend is or is not
own covariates, Xi, but also by the covariates of a smoker, or the number of cigarettes smoked per
their connected peers, Xj. ei and ej are just idiosyn- day by the friend, or both? In addition, what is the
cratic error terms. This is an extremely simplified counterfactual in this case? Is it that this person

5605-Scott-Chap34.indd 516 4/13/2011 2:44:33 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 517

has no friends at all, or that this person does not conditional ignorability may not hold is due to
know this particular friend, or that this person confounding, meaning other factors correlated
knows this friend but he or she is not a smoker? In with the outcomes of both the subject and his or
practice, peer effects are usually estimated using her peers, be they biological or contextual, are
dyadic data, which implicitly assumes that the omitted from the model. For example, it might be
estimated peer effects only apply to populations the poor neighborhood that a person and his friend
who have friends but not to those who do not have both reside in that leads both of them to be obese
friends. From this perspective, it can be argued or overweight. Not taking into account this neigh-
that peer effects are conditional effects, condition- borhood alike factors in the analysis will lead to
ing on the fact that there is at least one friend for omitted variable bias in the estimated peer effects.
the subjects of interest. Hence, in the above exam- Below is a diagram showing the causal paths of
ple, the counterfactual for a person whose best peer effects with an omitted variable U. Without
friend is a smoker would be that this person’s best control for U, the backdoor path between Yj and Yi
friend is not a smoker. If we are going to use will be left open.
matching methods to estimate peer effects, we
would have to adopt a double-matching algorithm,
namely, both the person of focus and his/her Violation of STUVA
friend need to be matched with another pair of A fundamental assumption of potential outcomes
people who share similar characteristics with the framework is the stable treatment unit value
original pair of people respectively, except that the assumption (STUVA), which says that a subject’s
counterfactual friend is not a smoker. In general, treatment status should not affect another sub-
careful thoughts are needed to define the counter- ject’s outcome. There are two features of peer
factual clearly in any specific study. effects that clearly violate such an assumption –
one is simultaneity and the other is transitivity.
Simultaneity means that Yi also affects Yj at the
Violation of ignorability same time Yj is affecting Yi. Simultaneity causes
A very important condition for the use of potential ordinary least squares (OLS) estimates of peer
outcomes framework to analyze causal effects in effects to be both biased and inconsistent.
observational studies is conditional ignorability, Transitivity means subject k is a common friend of
meaning that conditional on covariates, potential both subject j and subject i, and Yk affects both Yj
outcomes are independent of treatment. It is very and Yi. It also allows Yi and Yj to react to Yk. In
likely that the conditional ignorability does not some sense, transitivity can be viewed as a special
hold when studying peer effects, for two reasons. type of simultaneity. Below is a diagram showing
One is because of selection bias or homophily. peer effects with simultaneity and transitivity.
Namely, subjects tend to be friends with other Special techniques have to be employed to
subjects who are similar to them, which may lead address the simultaneity and transitivity problem.
assignment of treatment to depend on potential For example, we can check for simultaneity using
outcomes. For example, overweight people may the Hausman test. If simultaneity does exist and
tend to be friends with other overweight people, the parameters governing peer effects are not
corrupt officials tend to befriend other corrupt underidentified, either indirect least squares (ILS)
officials, and so on. Hence, it is not your over- or two stage least squares (2SLS) estimators can
weight or corrupt friends who make you over- be applied to estimate the peer effects. See
weight or corrupt, but you select people who are Chapters 18–20 of Gujarati (2002) for an intro-
overweight or corrupt to be friends from the duction to the simultaneity problem. As to the
beginning. Without taking such a selection into transitivity problem, a sort of system of equations
account, estimates of peer effects will certainly be method seems necessary. Further work needs to be
biased, often upwardly. The other reason that the done in this area.

ei U ej Yk
ei U ej

S
Yi Yj Yi Yj
? ?

Xi Xj Xi Xj

Figure 34.3 Peer effects with omitted Figure 34.4 Peer effects with omitted
variable U variable, simultaneity, and transitivity

5605-Scott-Chap34.indd 517 4/13/2011 2:44:33 PM


518 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

The second large issue in modeling and estimat- have been considered as important in friendship
ing peer effects originates from the static view of formation. To put it simply, they are choice,
network and behavior. We usually assume that chance, and gene. Choice means subjects have
social networks and social behaviors embedded in certain preference and the autonomy to choose
them are fixed. But in many cases, both networks whom they want to affiliate with. The underlining
and behaviors keep evolving and we need to model assumption is that friendship formation is based
the co-evolution of the networks and behaviors in on utilitarian consideration. Unsurprisingly, many
order to separate peer selection from peer influence economists take this point of view and treat
and obtain precise estimates of peer effects. There friendship as an instrument to obtain material or
have been only a few studies taking this approach. emotional benefits. For example, Jackson and
I will review them more thoroughly below. Wolinsky (1996: 44) assumed that “self-interested
The third issue in identifying peer effects individuals choose to form new links or to sever
comes from missing data and measurement error. existing links.” For another example, Bala and
They can arise from a variety of reasons. For Goyal (2000: 1181) argued that “social networks
example, people may forget some of their social are formed by individual decisions that trade off
ties being inquired, there might be coding errors the costs of forming and maintaining links against
in the data (e.g., because of duplicated names), or the potential rewards from doing so. We suppose
a social network is constructed only using a that a link with another agent allows access, in
convenience sample in which subjects are not part and in due course, to the benefits available to
appropriately sampled and their links are not fully the latter via his own links.” Similar utilitarian
traced, and so forth. argument can be found in Christakis et al. (2010)
In summary, some of the biggest problems in and Ellison (2010) as well. See Demange and
studying peer effects arise from (1) unclear defini- Wooders (2005) for more papers on economic
tion of peer effects; (2) ambiguity of treatment; view of group formation. The utilitarian view
(3) violation of ignorability either due to selection of friendship formation leads to predictions of
or confounding; (4) violation of STUVA either particular networks which usually consist of only
due to simultaneity or transitivity; (5) static view simple architectures like the wheel and the star
of networks and behaviors; and (6) missing data (Bala and Goyal, 2000).
and measurement error. Another important factor in friendship forma-
The first two problems are more at a conceptual tion is chance. By chance I do not mean “random-
level and have been addressed above. I will pro- ness” but the structure governing the opportunities
vide more thorough review on the rest four issues for people to meet or know each other. According
in the following sections. More specifically, in to Zeng and Xie (2008: 4), opportunity structure
section 2, I will review the literature on why and refers to “the influence of all factors other than
how people form peer networks. This will help us preference on choice” and it can include popula-
better understand the mechanisms of how peer tion composition and organizational structure and
effects work out and the importance to separate activities. Obviously, it is very difficult to opera-
peer selection from peer influence in order to tionalize and measure opportunity structure accu-
obtain valid casual estimates of peer effects. In rately. The basic point is that the likelihood for
section 3, I will review some of the popular any pair of subjects to form a friendship is not
models and methods that were developed recently only determined by their preference and choice,
to identify peer effects. This is the central part of but also by the possibility and the number of times
this review. Section 4 will focus on missing data that they can meet and interact. In this sense,
and measurement error in social networks and researchers like Zeng and Xie recognize and
review their consequences on the estimations and emphasize that choices of friends are bounded by
inference of peer effects. Lastly, I will summarize the opportunity structure. The following studies
and discuss some breakthroughs in studying peer present some of the empirical evidence supporting
effects that are tangible in the near future. the important role played by opportunity struc-
ture. For example, Abu-Ghazzeh (1999: 41)
showed that “opportunities to walk around a small
group of houses or to sit in small, confined spaces,
by contrast, were significantly related to social
WHY AND HOW PEER NETWORKS interaction and friendship formation.” For another
ARE FORMED example, Carrington (2002) demonstrated that the
observed amount of sex homogeneity among co-
offenders, particularly among males, to a large
Choice, chance, and gene
extent can be attributed to the relatively small
To fix ideas, I will use the friendship network as number of females involved in crime, rather than
an example to illustrate why and how peer net- signifying a preference for sex homophily. Lastly,
works are formed. In the literature, three factors Marmaros, and Sacerdote (2004: 1) presented that

5605-Scott-Chap34.indd 518 4/13/2011 2:44:34 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 519

“two randomly chosen white students interact blockmodels (Holland et al., 1983; Wang and
three times more often than do a black student Wong, 1987) and latent space model (Hoff et al.,
and a white student. However, placing the black 2002).
and white student in the same freshman dorm Assuming dyadic independence, Holland and
increases their frequency of interaction by a factor Leinhardt (1981) developed the p1 model for
of three.” friendship formation. Given two randomly chosen
Many scholars acknowledge that the above subjects i and j, there are four possible relation-
two factors may work together in generating ships between them: (1) there is no tie between
social networks. For example, Jackson and them; (2) there is a tie from i to j; (3) there is a tie
Rogers (2007: 1) showed that social networks from j to i; and (4) there is a mutual tie between
generated through the combination of both i and j. The probabilities of these four types of ties
random and local search process “results in a are assumed to be given as follows.
spectrum of features exhibited by large social
networks.” Currarini et al. (forthcoming: 1) ln(P00) = kij (34.1)
showed that empirical social networks “can be
generated by biases in preferences and biases in ln(P10) = kij + ai + bj + µ (34.2)
meetings.” ln(P01) = kij + aj + bi + µ (34.3)
Whatever the specific driving force is under-
neath, social networks present a large degree of ln(P11) = kij + ai + bj + aj + bi + 2µ+ rij (34.4)
homophily regarding to many sociodemographic,
behavioral, and intrapersonal characteristics where kij is a normalizing constant, ensuring
(McPherson et al., 2001: 415). Homophily due to probabilities summarized to one, a the sender
selection on the outcomes will bias the estimates effect (or “a productivity parameter”), b the
of peer effects if not accounted for properly. For receiver effect (or “an attractiveness parameter”),
example, Arala et al. (2009) found that previous µ a base rate of tie formation or a density param-
methods overestimated peer influence in product eter, and r the reciprocity effect (“force of recip-
adoption decisions by three to seven folds and that rocation”). For identification reason, it is assumed
homophily explained more than 50 percent of the that rij is same across all ties, designated as r.
perceived behavioral contagion in a global instant Then the log likelihood function for observing a
messaging network of 27.4 million users. network w can be written as
According to some recent studies, genes also
N
played some part in producing the correlations of
ln P1 ( ) ∝ μ L ( ) + ∑ α iw i +
friends’ behaviors and some features of their i
social networks. Fowler et al. (2007) found a sig- N
(34.5)
nificant genetic influence on adolescent friends’ + ∑ β jw j ρM ( )
alcohol use (about 30%) and significant correla- j
tions between the genetic influences on friends’
alcohol use and adolescents’ own use and their with the constraint that a+ = b+ = 0. L(w) is the
problem use of alcohol. Fowler, Dawesa et al. number of ties in the network, wi+ the number of
(2009) showed that at least three social network outgoing ties, w+j the number of incoming ties,
attributes including in-degree, transitivity, and and M(w) the number of mutual ties. Maximum
centrality, were inheritable and could be attributed Likelihood method can be used to estimate the
to genetic factors. Also see Madden et al. (2002) parameters.
for a similar study using twins or siblings pairs to As a random effects version of the p1 model,
assess the respective contributions of peer selec- the p2 model was developed to account for the
tion and peer influence to the correlations of peer dependence between ties sharing a same subject
behaviors. and the effects of covariates on tie formation
One limitation of the above studies is that they (Van Duijn et al., 2004). The model setup is the
neglect the social opportunities produced and same as in the p1 model except for the following:
delimited by the structures of the social networks
and their roles in friendship formation. Random ai = X1i g1 + a (34.6)
graph models are invented partly to address this bi = X2i g2 + b (34.7)
problem.
µij = µ + Z1ij l1 (34.8)
rij = r + Z2ij l2 (34.9)
Random graph models
where a and b are random variables drawn from a
For brevity, I will review only three classic multivariate distribution with mean zero, and
random graph models here. Readers are encour- Z’s are attributes measured at dyadic level. The
aged to read other related models like stochastic estimation is usually done by generalized least

5605-Scott-Chap34.indd 519 4/13/2011 2:44:34 PM


520 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

squares or by Markov Chain Monte Carlo Linear-in-means model


(MCMC) methods. The linear-in-means model is very popular in eco-
p* model can contain more complicated forms nomics (Manski, 1993; Weinberg, 2007; Graham
of dependence between network structures. The and Hahn, 2009; Bramoullé et al., 2009). It
literature on p* model has been growing dramati- assumes that a subject’s outcome is determined by
cally in the past few years. Some of the notable not only his or her own covariates but also the
papers include Wasserman and Robins (2005), respective mean values of the covariates and
Snijders et al. (2006), Goodreau (2007), Robins, outcomes of his or her peer group. Without loss
Pattison et al. (2007), Robins, Snijders et al. of generality, we can assume there are only two
(2007), and Robins (this volume), to name only a subjects in any peer group. Their outcomes are
few. In the p* model, the probability of observing modeled by the following equations:
any social network is assumed to take the follow-
ing form: Yi = a1Xi + a2Xj + bYj + ei (34.11)

ln P(W = w|q) ∞ ∑qkSk (w) (34.10) Yj = a1Xj + a2Xi + bYi + ej (34.12)


k

First note that the above simultaneous equations


Sk can be any network statistics of interest, for cannot be estimated using OLS, because the Y’s in
example, the number of reciprocal ties, the number the regressors are correlated with the error terms.
of triangles, and so on. Note that p1 model is actu- If we write out the reduced form of the above two
ally a special form of p* model, both belonging to equations, we can see that
exponential random graph models (ERGMs).
Pseudo-likelihood methods or MCMC methods α + βα 2 α + β α1
are generally used to estimate the parameters in p* Yi Xi + 2 Xj b j + ei )
be
models. 1− β2 1− β2
(34.13)
To conclude this section, we can see that peer
networks are not formed randomly. On the one Basically what we try to do using the reduced
hand, people are free to choose their friends. On form of equation is to regress the outcomes on all
the other hand, their freedom to choose friends is the exogenous covariates and use the estimated
constrained by their biological predisposition and coefficients to recover the original parameter
whom they can meet in the physical or social values. Since there are only two exogenous cov-
environment in which they are embedded. Taking ariates but three parameters (a1, a2, and b) to be
into account the process of friendship formation is estimated, the above simultaneous equations are
very crucial for addressing the selection problem not identified without further assumptions. One
in estimating peer effects. assumption, which is reasonable in some cases, is
that there is an exogenous variable included in one
equation but excluded in the other equation. For
example, we can think of a2 is equal to zero in
MODELS AND METHODS TO equation (34.11). If this is the case, then (34.11) is
IDENTIFY PEER EFFECTS identifiable and indirect least squares (ILS) will
provide an estimate of the coefficient of peer
effects, b. If there are more than one such exoge-
Now let’s look at how selection, confounding, nous variable, the model will be overidentified. In
and simultaneity problems are handled in that case, two-stage least squares (2SLS) can be
specific models. Depending on the data structure, used to estimate the peer effects. Another approach
these models can be roughly divided into is to use instrumental variables (IVs) for Yi and Yj
four groups: static models, dynamic models, in the regressors so that their correlations with the
experiments and natural experiments, and simula- error terms are blocked. For example, we can use
tion studies. lagged Y’s as instruments for Y’s in the regressors,
but this requires dynamic data. Bramoullé et al.
(2009) proposed using the outcomes of intransi-
tive and indirect contacts as IVs to identify peer
Static models
effects. For example, according to Bramoullé
There are generally two types of static models for et al. (2009), suppose there is an intransitive triad
studying peer effects, depending on the feature of in which subject i is affected by j and j is affected
the dependent variables. The linear-in-means by k, but i is not affected by k, then k’s outcome
models is suitable for modeling continuous out- can be used as an instrumental variable for j’s
comes while the binary model aims at dealing outcome to identify the effects of j on i. Bramoullé
with binary outcomes. et al. (2009) also extended the above technique to

5605-Scott-Chap34.indd 520 4/13/2011 2:44:34 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 521

deal with situations in which fixed network effects Dynamic models


are present. See Chapter 15 of Greene (2002) and
Chapters 10–11 of Wooldridge (2002) for more Dynamic network data are very useful to solve or
discussions on the general techniques to address mitigate the selection and confounding problems.
the simultaneity problem. If transitivity exists, Besides the models being reviewed below, some
namely, some of the peer groups overlap with other useful techniques suitable for analyzing
one another, either the method proposed by dynamic network data include event history analy-
Bramoullé et al. (2009) or some other methods sis (e.g., Liu et al., 2010), the dynamic matched
based on system of equations have to be sample estimation framework (Aral et al., 2009),
employed to estimate peer effects. This needs and so forth.
further investigation.
Dynamic logit model
Binary outcome model Christakis and Fowler (2007 and 2008) and
If the outcomes of interest are measured as binary, Fowler and Christakis (2009a) applied dynamic
a logit or probit model is usually adopted to model logit models to analyze peer effects on obesity,
peer effects (Brock and Durlauf, 2001a and 2001b; smoking and happiness, respectively. The out-
Bulte and Lilien, 2001; Sorensen, 2006; Krauth, comes are assumed to be generated according to
2009). Below shows the logit model: the following model:
logit[ P(( )] = α1X it Y it −1 + β1Y jt
⎡ P(( )⎤ it
logit[ P(( i )] ln ⎢ i
⎥ + β 2Y jt −1 e it (34.17)
⎣ P(( i )⎦
logit[ P(( )] = α1X jt Y jt −1 + β1Y it
= α 1X i X j + βY j (34.14) jt

+ β 2Y it −1 e jt (34.18)
⎡ P(( )⎤
)] ln ⎢ ⎥
j
logit[ P(( j According to Christakis and Fowler (2007: 373),
⎢⎣ P(( j ) ⎥⎦ they used “generalized estimating equations to
= α 1X j X i + βY i (34.15)
account for multiple observations of the same ego
across examinations and across ego-alter,” and
The likelihood function can be written as “assumed an independent working correlation
structure for the clusters. . . . The use of a time-
yi lagged dependent variable (lagged to the previous
n
⎡ 1 ⎤
L (Y | X ,α1 ,α 2 , β ) = ∏ ⎢ −(( βY j ) ⎥
examination) eliminated serial correlation in the
i =1 ⎣ 1 + e ⎦
1X i Xj
errors (evaluated with a Lagrange multiplier test)
1− y i and also substantially controlled for the egos
⎡ 1 ⎤
⎢ (α X + α βY j ) ⎥ genetic endowment and any intrinsic, stable pre-
⎣1 + e 1 i 2 j
⎦ (34.16) disposition to obesity. The use of a lagged inde-
pendent variable for an alter weight status
According to Brock and Durlauf (2001b), the controlled for homophily.”
nonlinearity between predictors and outcomes Cohen-Colea and Fletcherb (2008) raised some
solves the simultaneity problem and facilitate the critiques of the dynamic logit model used in
identification of peer effects. Christakis and Fowler (2007), claiming that it may
One challenge to the static models is that there overestimate peer influence by ignoring contex-
may be omitted variable bias. In other words, the tual effects. Regardless of the model specification
estimated peer effects may be due to common issue, some recent research finds that the magni-
environment factors rather than peer influence. tudes of peer influence may vary by health behav-
For example, Bulte and Lilien (2001) showed that iors or outcomes. For example, VanderWeele
when pharmaceuticals’ marking efforts were con- (2010) finds that the contagion effects for obesity
trolled for, the social contagion of physician and smoking are reasonably robust to possible
prescription, originally attributed to peer influ- homophily or contextual effects while those for
ence by Coleman et al. (1957), disappeared. happiness are less so.
Other static methods to identify peer effects
include variance decomposition (Glaeser et al.,
1996), comparison of group and individual level Fixed effects model
of regression coefficients (Glaeser et al., 2002), Fixed effects can be used to explicitly account
Rosenbaum’s nonparametric methods (2007), for some part of the omitted variable bias and
strategies based on group size variations (Davezies selection bias (e.g., Nanda and Sorensen, 2008;
et al., 2009; Lee, 2009), and so on. Mas and Moretti, 2009). For example, suppose

5605-Scott-Chap34.indd 521 4/13/2011 2:44:34 PM


522 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

there is a variable measuring the common envi- In addition, we can include lagged outcome
ronmental factor for subject i and j, Uij, and there variables on the right side of equation 34.19 to
is another variable measuring the propensity for account for any inertia between successive out-
subject i and j to form a tie, Sij. We can use G to comes. Arellano and Bond (1991) proposed a
represent the time-invariant variables like race, method to estimate this type of dynamic panel
gender, or even genes. Then a dynamic linear peer data model.
effects model can be written as:
Y it α1X it + α 2 X jt βY jt + θ1U ijt Stochastic actor-oriented model
+ θ 2S ijtj θ3G i + e it The stochastic actor-oriented model was devel-
(34.19) oped by Snijders (2001 and 2005) and also pre-
sented in Snijders et al. (2009), Steglich et al.
Using a first-difference estimator by subtract- (2010), Snijders (this volume), and so on, to
ing both sides of the above equation by previous model peer network formation and peer influence
values, we will get (i.e., behavioral changes) jointly. It assumes
Δ α1ΔX it + α 2 Δ βΔY jt changes in peer networks and behaviors follow
it jt
two separate continuous Markov processes. The
+ θ1ΔU ijt θ ΔS ijt + Δe it (34.20) frequencies of the two types of changes are deter-
mined by two rate functions, one for each: λN for
The effects of time-invariant variables are dropped network and λB for behavior. The waiting time for
out. If we assume both Uijt and Sijt do not change any change is assumed to follow an exponential
over time, their effects will be dropped out as well distribution, P(T > t) = e–(λN+λB)t. Potentially, the
and the above equation can be simplified to λ’s can vary across subjects, by incorporating
subjects’ covariates and network positions into the
Δ it α1ΔX it + α 2 Δ jt βΔY jt + Δe it (34.21) rate functions. Subjects make both types of
changes according to two objective functions,
If Uijt and Sijt do change over time and cannot which are assumed to be a linear summation of
be observed or measured directly, there are gener- the effects of network structures and behavioral
ally two ways to solve the problem. One is to use features.
proxy variables to measure the two change varia-
bles. For example, ΔUijt, representing environ- f iN w ,w ′, z ) = ∑ β kN S kN (i ,w ,w ′, z ), (34.22)
mental changes, can be approximated by the k
average change in the outcomes of the neighbors
of subjects i and j. It is difficult to find proxy f iB w ,w ′, z ) = ∑ β kB S kB (i ,w ,w ′, z , z ′) (34.23)
k
variables for ΔSijt. So a model for friendship for-
mation is needed to predict the propensity for any w and w’ represent the network statistics of subject
pair of subjects to form friendship. For example, i and his or her peers, respectively and z and z’ the
we can use the random graph models covered in covariates (including behavioral measures) of sub-
the previous section to model friendship forma- ject i and his or her peers respectively. Thus, this
tion and plug into the outcome model the pre- model combines both the random network model
dicted probabilities of friendship formation to with the behavioral model, and so allows us to
account for friendship selection. The other way separate peer selection from peer influence. One
is to use IVs. Since it is difficult to come up with drawback of this model is that it is too compli-
any IVs for ΔSijt, this approach is more suitable cated to allow for closed-form estimation of the
to address the unobserved ΔUijt problem. For parameters. Usually stochastic simulation tech-
example, we can use the outcome of subject niques like MCMC are needed to estimate the
j’s siblings who do not live in the same neighbor- parameters. Koskinen (2004) and Koskinen and
hood as does subject j, to instrument for subject Snijders (2007) have extended the stochastic
j’s outcome. In many cases, it is reasonable to actor-oriented model using Bayesian methods.
assume that siblings’ outcomes are correlated and Another limitation of this model is that it assumes
there are no direct effects of subject j’s siblings’ at any given time, there can only be one change
outcomes on subject i’s outcome and so the IVs happening in a social network, which might not be
are valid in this sense. Of course, if there are good realistic in some cases. For example, in faction
measures for environmental changes, we should politics, the rupture between leaders of members
directly include them into the model. But in prac- of the two factions may lead to massive dissolving
tice measures of the environmental changes may of ties between the members of the two factions at
not be available, comprehensive, or accurate. So the same time. Similar examples can be found in
the above approaches may still be useful in many international politics, in social events where people
cases. make multiple friends at the same time, etc.

5605-Scott-Chap34.indd 522 4/13/2011 2:44:36 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 523

Experiments and natural experiments attendance rate of these treated individuals (rela-
tive to controls), and tripled that of untreated
If we say the above models and methods try to individuals within departments where some
address the various problems in estimating peer individuals were treated” (Duflo and Saez, 2003:
effects in the data analysis process, experiments 815). They also found that the retirement plan
and natural experiments are used to solve some of enrollment five and eleven months after the fair
those problems in the data generation process. was significantly higher in departments where
Broadly speaking, there are two types of experi- some employees were treated than in departments
ments. One is randomly assigning policy treat- where none was treated.” For another example,
ment to subjects. This type of experiment is not Cipollone and Rosolia (2007) provided evidence
particularly concerned with estimating peer on the social interaction effects of the schooling
effects. Instead, it provides an estimate of the total achievement of young men on those of young
policy effects including peer effects. To separate women. The authors found that an exemption
peer effects, special experimental designs are nec- from compulsory military service was granted to a
essary. For example, a partial population design few cohorts of males living in southern Italy as a
can be used for estimating peer effects under con- result of an earthquake in 1980, and showed that
trol (PEC), in which treatment is applied to only the exemption increased boys’ high school gradu-
partial members of each of the treatment groups. ation rates by more than 2 percentage points and
The difference between the average outcome of that at the same time the graduation rates of girls
the untreated units in the treatment groups and the in the same cohorts increased by about 2 percent-
average outcome of the control units in the control age points. Since in Italy women are not subject to
groups can be viewed as an estimate of PEC. To military draft, they attributed the change in their
estimate peer effects under treatment (PET), a schooling achievements to the schooling behavior
group-based treatment design is needed in which of the exempt males (Cipollone and Rosolia,
treatment is assigned to two groups, with partici- 2007: 948).
pants in one group being random individuals with As examples for studying PET, Wing and
no connections between one another while par- Jeffrey (1999) showed that in a weight loss pro-
ticipants in the other group with internal connec- gram, participants recruited with friends had a
tions among them, for examples, a group of higher treatment completion rate and greater
friends or colleagues. The difference between the weight loss than those who were recruited to par-
average outcome of the former participants and ticipate in the program alone; Falk and Ichino
that of the latter participants will provide an esti- (2006) provided experimental evidence showing
mate of PET. that subjects working as a pair had higher produc-
The other type of experiment is randomly tivity than those working alone; and Babcock and
assigning friends to subjects. This aims at elimi- Hartman (2010) found that students who had been
nating the selection problem, but note that it does incentivized to exercise increased gym usage
not necessarily eliminate the confounding prob- more if they had more treated friends.
lem. For example, in many colleges roommates Examples for the second type of experiment are
are randomly assigned. Suppose there is a positive abundant. Sacerdote (2001) found that among
correlation of the academic performance of the freshman year roommates and dormmates who
roommates. Because the roommates are randomly were randomly assigned at Dartmouth College,
assigned, we know such a correlation cannot be peers had an impact on grade point average and on
attributed to the fact that the students select others decisions to join social groups such as fraternities.
whose academic performance is similar to them to Kremer and Levy (2003) examined students at a
be their roommates. But this does not eliminate large state university who were randomly assigned
the possibility that part of the correlation may be roommates through a lottery system and found
due to a roommates’ common teaching fellow, that on average, males assigned to roommates
common living environment, and so on. Special who had reported drinking in the year prior to
care has to be taken to mitigate the effects of the entering college had one quarter-point lower GPA
common environmental factors in order to obtain than those assigned to non-drinking roommates.
good estimates of peer effects. Using a dataset in which students were exoge-
There have been many studies using the first nously assigned to peer groups, Carrell et al.
type of experiment. Here are a few examples for (2009) were able to find much larger academic
studying PEC. Duflo and Saez (2003) recruited a peer effects than in previous studies Boisjoly et al.
random sample of employees in a number of (2006: 2) presented that “white students at a large
departments in a university to attend a retirement state university who were randomly assigned
plan information fair by promising a monetary African-American roommates in their first year
reward for attendance. They found that “the are more likely to endorse affirmative action and
experiment multiplied by more than five the view a diverse student body as essential for a

5605-Scott-Chap34.indd 523 4/13/2011 2:44:37 PM


524 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

high-quality education.” Camargo et al (2010: 1) It should be noted that peer effects are often
also documented that “randomly assigned room- connected to neighborhood effects. In general, we
mates of different races are as likely to become can say peer effects reflect the impact of the social
friends as randomly assigned roommates of the environment of a neighborhood. In this sense,
same race,” and “in the long-run, white students recent studies using experiments (e.g., Moving to
who are randomly assigned black roommates have Opportunity) to detect neighborhood effects are
a significantly larger proportion of black friends informative to studying peer effects (Kling et al.,
than white students who are randomly assigned 2007; Clampet-Lundquist and Massey, 2008;
white roommates.” Rao et al. (2007) found that at Ludwig et al., 2008; Sampson, 2008). Three com-
a large private university where undergraduates ments are in order on these studies. First, if there
were randomly assigned to residential halls, a are no neighborhood effects there might not be
student becames up to 8.3 percentage points more peer effects either, as peer effects are often nested
likely to get immunized if an additional 10 percent in neighborhood effects. Second, some measures
of his or her friends received flu shots. Carrell et need to be taken to account for the selection bias
al. (2010) reported that when individuals were when participants of the experiments can move
randomly assigned to peer groups, there were into different neighborhoods. If by neighborhood
statistically significant peer effects on fitness out- effects we mean “the consequences of living in a
comes and such effects were caused primarily by certain type of neighborhood,” then we should fix
friends who were the least fit. Another interesting the assignment of neighborhood. For example, we
study is conducted by Cook et al. (2007) who can move subjects from a disadvantaged neigh-
showed that sixth grade students attending middle borhood to an advantaged neighborhood and do
schools were much more likely to be cited for not allow them to move afterwards to other types
discipline problems than those attending elemen- of neighbourhoods, especially to disadvantaged
tary schools. The authors explained that this was ones. Otherwise, if we allow individuals to freely
possibly because the sixth graders attending choose the neighborhoods they want to reside in,
middle schools were exposed to older peers and the resulting estimates of the neighborhood effects
relatively loose supervision. In a recent experi- will be biased. Third, a more interesting question
ment on trust games conducted by Fowler and is why subjects from disadvantaged neighbor-
Christakis (2009b: 1), “subjects were randomly hoods tend to move to other disadvantaged neigh-
assigned to a sequence of different groups.” They borhoods. As Sampson (2008) pointed out,
showed that “focal individuals (‘egos’) are influ- selection bias is a fundamental social process that
enced by fellow group members (‘alters’) in is worth studying in itself. Is this due to personal
future interactions with others. Furthermore, this preference, stocks of social capital in different
influence persists for multiple periods and spreads neighborhoods, or segregative policies and actions
up to three degrees of separation (from person to in the receiving neighborhoods? Similarly, if we
person to person to person).” are studying peer effects on smoking, we need to
Admittedly, there are also some studies that ask why smokers tend to be friends with other
reported only modest or marginal peer effects. For smokers and where such homophily comes from,
example, Angrist and Lang (2004) found that a and so on. Answers to these questions are very
school integration program sending minority stu- crucial for us to better understand and correctly
dents from Boston schools to more affluent subur- estimate both neighborhood effects and peer
ban schools did not significantly affect the scores effects.
of white students and only modestly decreased the
scores of the minority third graders, both in the
host districts. Another study done by Imberman
et al. (2009) suggested that the influx of evacuated Simulation studies
students because of Hurricanes Katrina and Rita
moderately reduced elementary math test scores Simulations enable researchers to manipulate the
in the receiving schools in Houston, whereas features of social networks and policy treatments
Katrina evacuees benefited from the relocation, at their will and so provide them with a flexible
experiencing a .15 standard deviation improve- tool to model and identify peer effects and to
ment in scores (Sacerdote, 2008). Jackson evaluate model performance, etc. Here are some
(2010: 1) indicated that within-school increases in notable studies using simulations to study peer
peer achievement improved outcomes only at effects. Christakis and Fowler (2007) argued that
high-achievement schools. See Boozer and the directionality of social ties could be used as an
Cacciola (2001), Boruch (2005), Carrell et al. identification strategy for distinguishing peer
(2008), Ammermueller and Pischke (2009), and influence from other social correlation effects.
Duflo et al. (2009) for more experimental studies They showed that mutual friends influence each
on educational peer effects. other the most and people who are nominated by

5605-Scott-Chap34.indd 524 4/13/2011 2:44:37 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 525

others as friends have influence on the nominators Bahr et al. (2009) provided an interesting
while the nominators have no influence on the example of using simulations to study social con-
nominees. Anagnostopoulos et al. (2008) refor- tagion of obesity. The authors showed that “indi-
mulated this as the edge-reversal test, arguing that, viduals with similar BMIs will cluster together
“Since other forms of social correlation (other into groups, and if left unchecked, current social
than social influence) are only based on the forces will drive these groups toward increasing
fact that two friends often share common charac- obesity. . . . The popular strategy for dieting with
teristics or are affected by the same external friends is shown to be an ineffective long-term
variables and are independent of which of these weight loss strategy, whereas dieting with friends
two individuals has named the other as a friend, of friends can be somewhat more effective by
we intuitively expect reversing the edges not forcing a shift in cluster boundaries . . . simula-
to change our estimate of the social correlation tions also show that interventions targeting well-
significantly. On the other hand, social influence connected and/or normal-weight individuals at the
spreads in the direction specified by the edges of edges of a cluster may quickly halt the spread of
the graph, and hence reversing the edges should obesity” (Bahr et al., 2009: 723). See Fu (2011)
intuitively change the estimate of the correlation” for another interesting simulation study on the
(2008: 11). However, the simulations he imitation dynamics of vaccination behaviors on
conducted indicated that the edge-reversal test social networks.
might not be so effective as expected. One reason
for this, I conjecture, is that even though the
edge-reversal test could possibly eliminate the
bias due to contextual effects, it does not necessar-
ily exclude selection bias. It might be that the
MISSING DATA AND MEASUREMENT
nominees just tend to have a smaller variation in ERROR
outcomes of interest. For example, people who are
fitter may be more likely to be nominated as So far we have been assuming that there are nei-
friends. In the simplest OLS framework, when ther missing data nor measurement error in the
you use these friends’ weight as predictors of the observed social networks. But, in reality, missing
nominators’ weight, it is likely to see significance. data and measurement error are quite prevalent in
But in the reverse regression setting where you social network data. First, missing data can arise
use the nominators’ weight to predict the nomi- from several scenarios (Handcock and Gile, 2007).
nees’ weight, due to the larger variation in the Here are some examples:
nominators’ weight, it is likely you do not obtain
significance. 1 Nonrandom sampling of subjects. A typical
In addition, this might happen because of example for this is that social network data is
random sampling errors. The nominees are usu- collected using only a convenience sample in
ally just a small subset of the subjects in a social which subjects and their contacts are not prop-
network who are repeatedly nominated by others erly sampled.
as friends or social contacts. Even if the nominees 2 Missing links. Subjects may not want to release
are randomly chosen from the total subjects, any information about their contacts or just
the variation in the nominees’ outcomes is likely forget to nominate some of their friends. So
to be smaller than the variation in the nominators’ when there is no tie between subjects, we may
outcomes due to the repetition of nominations not be able to distinguish if there is really not a
while the variance of the variation in the nomi- relationship between them or the relationship is
nees’ outcomes is likely to be larger than the missing in the data collection process.
variance of the variation in the nominators’ out- 3 Not fully traced links. For example, in a fixed-
comes from trial to trial. Hence, any observed choice design, subjects are asked to nominate
directional peer effects may just be a result of only a fixed number of contacts. As a result,
sampling error. subjects with more than the fixed number of
Anagnostopoulos et al. (2008) brought up contacts will underreport their real number
another type of innovative test of peer effects in of contacts. This problem may also come from
dynamic network data: the shuffle test. In brief, the fact that the boundary of the social net-
they showed that if social influence does not play work being studied is not clearly defined. For
a role, the estimates of peer effects will be close to example, what we mean by friendship, peer
each other whether the timing of peers’ actions are group, and neighborhoods are not always clearly
shuffled or not while in contrast, if social influ- or consistently understood by researchers and
ence indeed plays a role, the estimates of peer respondents.
effects will generally be different when the timing 4 Absence or attrition of subjects. These may occur
of peers’ actions are shuffled. when subjects or their contacts are dropped out

5605-Scott-Chap34.indd 525 4/13/2011 2:44:37 PM


526 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

of a study, due to their absence at the survey omission of affiliations or fixed choice thereof,
time, moving or death, and so on. and underestimated via actor non-response, which
5 Missing covariates. Some covariates like income results in inflated measurement error.”
and education may not be readily available when There have been some attempts to address the
the social network data are collected. problems due to missing data and measurement
error. Butts (2003: 103) developed a family of
Similarly, measurement error in social network hierarchical Bayesian models to allow for “the
data can arise because of several reasons. First, it simultaneous inference of informant accuracy and
might be that what friendship means is different to social structure in the presence of measurement
each respondent—do we allow respondents to cite error and missing data.” Handcock and Gile
themselves, their spouses, or relatives as their best (2007) developed inferences for social networks
friends? Second, although unlikely but still possi- with missing data based on information from
ble, people may misreport their contacts. For adaptive network mechanisms. Koskinen et al.
example, if you ask middle school students to (2008: 2) discussed “various aspects of fitting
nominate their close friends, many of them may exponential family random graph models to net-
over-report the number of close friends they have, works with missing data and present a Bayesian
because of implicit social competition for popu- data augmentation algorithm for the purpose of
larity. In addition, it is well known that due to the estimation.”
sensitivity issue, some of the covariates like A general procedure to deal with missing data
income, sexual activities, political orientation, (and potentially measurement error as well) in
psychological measures, and so on, tend to be social network analysis has been laid out by Butts
reported with a lot of measurement error. Last, (2003: 105), which is worth repeating here.
inaccurate data input can generate another source “(1) Determining the extent of error in existing
of measurement error. For example, people with data. (2) Determining the mechanisms by which
same names might bring about errors in data error is produced. (3) Finding means of collecting
input, etc. higher quality data. (4) Minimizing and account-
Missing data and measurement error may have ing for the uncertainty associated with missing
severe consequences on social network analysis of data in network analyses.”
peer effects. Brewer and Webster (1999: 361)
noticed that “on average, residents forgot 20 per
cent of their friends. Forgetting also influenced
the measurement of some social network struc- SUMMARY AND FUTURE DIRECTIONS
tural properties, such as density, number of cliques,
centralization, and individuals’ centralities.” Ghani This chapter reviewed the literature on models and
et al. (1998: 2079) found that when there were methods to identify peer effects. Below is a sum-
missing data, “substantial systematic biases are mary of what we can learn from the literature.
introduced. The direction and magnitude of these Bear in mind this summary only provides a gen-
biases suggest that, by ignoring them, the risk for eral outline to handle the problems in studying
the establishment and persistence of infection in a peer effects. There must be ad hoc considerations
population may be underestimated.” Robins et al. and solutions to the problems in any specific
(2004: 257) distinguished “ties between respond- research.
ents from ties that link respondents to non- (1) Explicitly define the concept of peers and
respondents”, and found that “if we assume that the boundary of the peer group. (2) Clearly discuss
the non-respondents are missing at random, . . . the content, meaning, and directionality of the
treating a sizable proportion of nodes as non- peer effects. (3) If possible, try to use dynamic
respondents may still result in estimates, and data analysis techniques (e.g., fixed effects
inferences about structural effects, consistent models) to model the co-evolution of network and
with those for the entire network. . . . If, on the behavior and to control for confounding and
other hand, the principal research focus is on the selection. (4) Use statistical techniques like instru-
respondent-only structure, with non-respondents mental variables, 2SLS, or system of equations to
clearly not missing at random, . . . values account for simultaneity or transitivity. (5) Adjust
of parameter estimates may not be directly for missing data and measurement error through
comparable to those for models that exclude non- imputation, etc.
respondents.” Kossinets (2006: 247) showed that Despite the significant progress that has been
“network boundary specification and fixed choice made in the last decade in modeling and analyzing
designs can dramatically alter estimates of net- peer effects, there are certain areas that need
work-level statistics. The observed clustering and further investigation and the study of which may
assortativity coefficients are overestimated via generate fruitful results.

5605-Scott-Chap34.indd 526 4/13/2011 2:44:37 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 527

1 Experiments. Given the complexity and difficulty of the peer influence process: “When we see men
in analyzing peer effects using observational of worth, we should think of equalling them; when
data, experiments like those with the partial we see men of a contrary character, we should
population design should be applied more often turn inwards and examine ourselves.”
to surpass some of the barriers and to obtain
better estimates of peer effects.
2 Front door mechanisms. More research needs
to be done to identify and describe the specific NOTE
mechanisms by which peer effects operate. For
example, suppose we are interested in the
The author wants to thank Professor Nicholas
social spreading of obesity. The potential front
Christakis, Christopher Winship, Filiz Garip and Peter
door mechanisms may include that friends tend
Carrington for their helpful comments and sugges-
to share similar norms or standards on what
tions. Sincere thanks also go to relevant participants
constitute a normal weight, that friends tend to
of the American Sociological Association Methodology
eat similar food, that friends tend to do group
Section Conference at University of Illinois at Urban-
exercises together, and so on. If we can opera-
Champaign (04/03, 2010), the Health and Social
tionalize some of these mechanisms and obtain
Structure Workshop at the Department of Health
measures on the variables involved, we can study
Care Policy of Harvard Medical School (06/24, 2010),
the specific mechanisms by which peers affect
the SunBelt XXX of International Network for Social
each other (e.g., Anderson, 2009; de la Haye
Network Analysis at Riva del Garda, Italy (07/04,
et al., 2009). In addition, qualitative studies (e.g.,
2010), the International Sociological Association
Michell and West, 1996; Stewart-Knox et al.,
World Congress in Gothenburg, Sweden (07/12,
2005) based on interviews and focus groups can
2010) and the 105th American Sociological
serve for that purpose as well.
Association Meeting in Atlanta, Georgia, USA (08/15,
3 Model network formation and peer effects jointly.
2010).
On the one hand, those continuous Markov proc-
ess models need to be refined to account for
more nuanced processes of peer network forma-
tion and peer influence, for example, by properly
distinguishing social contagion, social influence, REFERENCES
and social learning from each other (Young,
2009). On the other hand, new models and meth- Abu-Ghazzeh, T.M. (1999) ‘Housing layout, social interaction,
ods, simpler to communicate and compute while and the place of contact in Inabu-Nuseir, Jordan’. Journal
still with good approximations to the real world, of Environmental Psychology, 19: 41–73.
need to be developed (e.g., Merckena et al., Albert, R. and Barabási, A.-L. (2002) ‘Statistical mechanics of
2009). Given the similarities between spatial complex networks’. Reviews of Modern Physics, 74(1):
models and network models, some techniques 47–97.
developed in spatial analysis may be applicable Ammermueller, A. and Pischke, J.-S. (2009) ‘Peer effects in
to social network analysis as well (e.g., O’Malley European primary schools: Evidence from the progress in
and Marsden, 2008; Lee, 2009). international reading literacy study’. Journal of Labor
4 Computation with large social networks. With Economics, 27(3): 315–48.
large social network data becoming increasingly Anagnostopoulos, A., Kumar, R. and Mahdian, M. (2008)
available and models becoming more compli- ‘Influence and correlation in social networks’. In Proceedings
cated, there must be new and better solutions of the 14th ACM SIGKDD International Conference on
to reduce the mounting computational cost in Knowledge Discovery and Data Mining. New York: ACM,
social network analysis. One possible solution is pp. 7–15.
to use partial samples of social network data to Anderson, L.B. (2009) ‘The trend in obesity: The effect of
estimate and infer peer effects. The other is more social norms on perceived weight and weight goal’.
of a brute force approach, just inventing faster Working paper, http://www2.binghamton.edu/economics/
computational methods such as parallel comput- graduate/documents/prospectus-by-l-anderson.pdf.
ing. Both network sampling and computing for Angrist, J.D. and Lang, K. (2004) ‘Does school integration
analysis of large social network data demand generate peer effects? Evidence from Boston’s Metco pro-
further research. gram’. American Economic Review, 94(5): 1613–34.
Aral, S., Muchnika, L. and Sundararajana, A. (2009)
Last, I want to close this review with a quote from ‘Distinguishing influence-based contagion from homophily-
The Analects of Confucius (adopted from the driven diffusion in dynamic networks’. PNAS, 106(51):
English version by Legge, 2004), which perfectly 21544–49.
accords with one of the main purposes of this Arellano, M. and Bond, S. (1991) ‘Some Tests of Specification
review and may shed some light on the dynamics for Panel Data: Monte Carlo Evidence and an Application

5605-Scott-Chap34.indd 527 4/13/2011 2:44:37 PM


528 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

to Employment Equations’. The Review of Economic Calvo-Armengol, A. and Jackson, M. (2007) ‘Networks in
Studies, 58(2): 277–297. labor markets: Wage and employment dynamics and
Ayres, I., Raseman, S. and Shih, A. (2009) ‘Evidence from inequality’. Journal of Economic Theory, 132: 27–46.
two large field experiments that peer comparison Camargo, B., Stinebrickner, R. and Stinebrickner, T.R. (2010)
feedback can reduce residential energy usage’. NBER ‘Interracial Friendships in College’. NBER Working Paper
Working Paper No. 15386, http://www.nber.org/papers/ No. 15970, http://www.nber.org/papers/w15970.pdf
w15386.pdf Carrell, S.E., Fullerton, R.L. and West, J.E. (2009) ‘Does your
Babcock, P.S. and Hartman, J.L. (2010) ‘Networks and cohort matter? Measuring peer effects in college achieve-
Workouts: Treatment Size and Status Specific Peer Effects ment’. Journal of Labor Economics, 27(3): 439–64.
in a Randomized Field Experiment’. NBER Working Paper Carrell, S.E., Hoekstra, M. and West, J.E. (2010) ‘Is poor
No. 16581, http://www.nber.org/papers/w16581.pdf fitness contagious? Evidence from randomly assigned
Baerveldt, C., Volker, B. and Rossem, R.V. (2008) ‘Revisiting friends’. NBER Working Paper No. 16518, http://www.
selection and influence: An inquiry into the friendship nber.org/papers/w16518.pdf.
networks of high school students and their association Carrell, S.E., Malmstrom, F.V. and West, James E. (2008) ‘Peer
with delinquency’. Canadian Journal of Criminology and effects in academic cheating’. Journal of Human Resources,
Criminal Justice, 50(5): 559–87. 43(1): 173–207.
Bahr, D.B., Browning, R.C., Wyatt, H.R. and Hill, J.O. (2009) Carrington, P.J. (2002) ‘Sex homogeneity in co-offending
‘Exploiting social networks to mitigate the obesity groups’, in J. Hagberg (ed.), Contributions to Social
epidemic’. Obesity, 17(4): 723–28. Network Analysis, Information Theory and Other Topics in
Bala, V. and Goyal, S. (2000) ‘A noncooperative model of Statistics: A Festschrift in Honour of Ove Frank. Stockholm:
network formation’. Econometrica, 68(5): 1181–229. Stockholm University. pp. 101–16.
Bearman, P.S., Moody, J. and Stovel, K. (2004) ‘Chains Carrington, P.J., Scott, J. and Wasserman, S. (eds) (2005)
of affection: The structure of adolescent romantic Models and Methods in Social Network Analysis. New York:
and sexual networks’. American Journal of Sociology, Cambridge University Press.
110: 33–91. Christakis, Nicholas A., and Fowler, James H. (2007) ‘The
Blume, L. and Durlauf, S.N. (2005) ‘Identifying social interac- spread of obesity in a large social network over 32 years’.
tions: A review’. http://www.ssc.wisc.edu/econ/archive/ New England Journal of Medicine 357(4): 370–79.
wp2005–12.pdf. Christakis, N.A. and Fowler, J.H. (2008) ‘The collective dynam-
Boisjoly, J., Duncan, G.J., Kremer, M., Levy, D.M. and Eccles, J. ics of smoking in a large social network’. New England
(2006) ‘Empathy or antipathy? The impact of diversity’. Journal of Medicine, 358(21): 2249–58.
American Economic Review, 96(5): 1890–905. Christakis, N.A., Fowler, J.H., Imbens, G.W. and Kalyanaraman, K.
Boozer, M.A. and Cacciola, S.E. (2001) ‘Inside the ‘bBlack (2010) ‘An empirical model for strategic network forma-
box‘ of Project Star: Estimation of peer effects using tion’. NBER Working Paper No. 16039, http://www.nber.
experimental data’. Yale Economic Growth Center org/papers/w16039.pdf
Discussion Paper No. 832, http://www.econ.yale.edu/ Cipollone, P. and Rosolia, A. (2007) ‘Social interactions in
growth_pdf/cdp832.pdf. high school: Lessons from an earthquake’. The American
Boruch, R.F. (ed.). (2005) Place-Based Trials: Experimental Economic Review, 97(3): 948–65.
Tests of Public Policy. Thousand Oaks, CA: Sage. Clampet-Lundquist, S. and Massey, D.S. (2008) ‘Neighborhood
Bramoullé, Y., Djebbari, H. and Fortin, B. (2009) ‘Identification effects on economic self-sufficiency: A reconsideration of
of peer effects through social networks’. Journal of the moving to opportunity experiment’. American Journal
Econometrics, 150(1): 41–55. of Sociology, 114(1): 107–43.
Brewer, D. and Webster, C. (1999) ‘Forgetting of friends and Cohen-Colea, E. and Fletcherb, J.M. (2008) ‘Is obesity conta-
its effects on measuring friendship networks’. Social gious? Social networks vs. environmental factors in
Networks, 21: 361–73. the obesity epidemic’. Journal of Health Economics, 27:
Brock, W.A. and Durlauf, S.N. (2001a) ‘Interactions-based 1382–1387.
models’. Chapter 54 of Handbook of Econometrics V, Coleman, J., Katz, E. and Menzel, H. (1957) ‘The diffusion of
edited by J.J. Heckman and E. Leamer. Elsevier Science. an innovation among physicians’. Sociometry, 20: 253–
Brock, W.A. and Durlauf, S.N. (2001b) ‘Discrete choice 70.
with social interactions’. The Review of Economic Studies, Cook, P.J., MacCoun, R., Muschkin, C. and Vigdor, J. (2007)
68(2): 235–60. ‘Should sixth grade be in elementary or middle school? An
Bulte, C.V. d. and Lilien, G.L. (2001) ‘Medical innovation analysis of school configuration and student behavior’.
revisited: Social contagion versus marketing effort’. NBER Working Paper No. w12471, http://www.nber.org/
American Journal of Sociology, 106(5): 1409–35. papers/w12471.pdf.
Butts, C. (2003) ‘Network inference, error, and informant Currarini, S., Jackson, M. and Pin, P. (forthcoming) ‘An
(in) accuracy: A Bayesian approach’. Social Networks, economic model of friendship: Homophily, minorities and
25: 103–40. segregation’. Econometrica.
Calvo-Armengol, A. and Jackson, M. (2004) ‘The effects of Davezies, Laurent, D”Haultfoeuille, Xavier Fougre, Deni.
social networks on employment and inequality’. American (2009) ‘Identification of peer effects using group size
Economic Review, 94 (3): 426–54. variation’. Econometrics Journal, 12: 397C413.

5605-Scott-Chap34.indd 528 4/13/2011 2:44:37 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 529

Demange, G. and Wooders, M. (2005) Group Formation in and own alcohol use in adolescents’. Addiction, 102:
Economics: Networks, Clubs, and Coalitions. New York: 894–903.
Cambridge University Press. Fu, F., Rosenbloom, D.I., Wang, L. and Nowak, M.A. (2011)
Diani, M. and McAdam, Doug. (eds) (2003) Social Movements ‘Imitation dynamics of vaccination behaviour on social
and Networks: Relational Approaches to Collective Action. networks’. Proceedings of Royal Society B, 278 (1702):
New York: Oxford University Press. 42–49.
Doreian, Pa. (2001) ‘Causality in social network analysis’. Garip, F. (2008) ‘Social capital and migration: How do similar
Sociological Methods & Research 30(1): 81–114. resources lead to divergent outcomes?’, Demography,
Duflo, E., Dupas, P. and Kremer, M. (2009) ‘Peer effects, 45(3): 591–617.
teacher incentives, and the impact of tracking: Evidence from Ghani, A.C., Donnelly, C.A. and Garnett, G.P. (1998) ‘Sampling
a randomized evaluation in Kenya’. NBER Working Paper biases and missing data in explorations of sexual partner
No. 14475, http://www.nber.org/papers/w14475.pdf. networks for the spread of sexually transmitted diseases’.
Duflo, E. and Saez, E. (2003) ‘The role of information and Statistics in Medicine, 17(18): 2079–97.
social interactions in retirement plan decisions: Evidence Glaeser, E.L., Sacerdote, B.I. and Scheinkman, J.A. (1996)
from a randomized experiment’. The Quarterly Journal of ‘Crime and social interactions’. Quarterly Journal of
Economics, 118(3): 815–42. Economics, 111(2): 507–48.
Van Duijn, M., Snijders, T. and Zijlstra, B. (2004) ‘p2: Glaeser, E.L., Sacerdote, B.I. and Scheinkman, J.A. (2002) ‘The
A random effects model with covariates for directed social multiplier’. NBER Working Paper 9153, http://www.
graphs’. Statistica Neerlandica, 58: 234–54. nber.org/papers/w9153.pdf.
Duncan, O.D., Haller, A.O. and Portes, A. (1968) ‘Peer influ- Goldenberg, A., Zheng, A.X., Fieberg, S.E., and Airoldi, E.M.
ences on aspirations: A reinterpretation’. American Journal (2009) ‘A survey of statistical network models’. Foundations
of Sociology, 74(2): 119–37. and Trends in Machine Learning.
Ellison, G., Glaeser, E.L. and Kerr, W.R. (2010) ‘What causes Goodreau, S. (2007) ‘Advances in exponential random graph
industry agglomeration? Evidence from coagglomeration (p*) models applied to a large social network’. Social
patterns’. American Economic Review, 100: 1195–1213. Networks, 29: 231–48.
Ennett, S.T. and Baumann, K.E. (1993) ‘Peer group structure Graham, B.S. and Hahn, J. (2009) ‘Identification and estima-
and adolescent cigarette smoking: A social network analy- tion of the linear-in-means model of social interactions’.
sis’. Journal of Health and Social Behavior, 34: 226–36. Economics Letters, 88(1): 1–6.
Falk, A. and Ichino, A. (2006) ‘Clean evidence on peer effects’. Granovetter, Mark S. (1973) ‘The strength of weak ties’.
Journal of Labor Economics, 24(1): 39–57. American Journal of Sociology 78(6): 1360–80.
Fernandez, R.M., Castilla, E.J. and Moore, P. (2000) ‘Social Granovetter, M.S. (1974) Getting a Job: A Study of Contacts
capital at work: Networks and employment at a phone and Careers. Chicago: University of Chicago Press.
center’. American Journal of Sociology, 105(5): 1288–356. Greene, W.H. (2002) Econometric Analysis. 5th ed. Prentice
Fernandez, R.M. and Weinberg, N. (1997) ‘Sifting and sorting: Hall.
Personal contacts and hiring in a retail bank’. American Greenstone, M., Hornbeck, R. and Moretti, E. (2008)
Sociological Review, 62(6): 883–902. ‘Identifying agglomeration spillovers: Evidence from million
Finneran, Lisa, and Kelly, Morgan (2003) ‘Social networks dollar plants’. NBER Working Paper 13833, http://www.
and inequality’. Journal of Urban Economics 53: nber.org/papers/w13833.pdf.
282–99. Gujarati, D. (2002) Basic Econometrics. 4th ed. McGraw-Hill/
Fowler, J.H. and Christakis, N.A. (2009a) ‘Dynamic spread of Irwin.
happiness in a large social network: Longitudinal analysis Halliday, T.J. and Kwak, S. (2009) ‘Weight gain in adolescents
over 20 years in the Framingham heart study’, British and their peers’. Economics and Human Biology, 7:
Medical Journal 337(42): 2338–47. 181–90.
Fowler, J.H. and Christakis, N.A. (2009b) ‘Cooperative behav- Handcock, M. and Gile, K. (2007) ‘Modeling social networks
iour cascades in human social networks’. http://www. with sampled or missing data’. Working Paper No. 75,
citebase.org/abstract?id=oai:arXiv.org:0908.3497. Center for Statistics and the Social Sciences, University
Fowler, J., Dawesa, C. and Christakis, N. (2009) ‘Model of of Washington, http://www.csss.washington.edu/Papers/
genetic variation in human social networks’. Proceedings of wp75.pdf.
the National Academy of Sciences of the USA, 106(6): Hartmann, W.R., Manchanda, P., Nair, H., Bothner, M.,
1720–24. Dodds, P., Godes, D., Hosanagar, K. and Tucker, C. (2008)
Fowler, J.H., Heaney, M.T., Nickerson, D.W., Padgett, J.F. and ‘Modeling social interactions: Identification, empirical
Sinclair, Betsy (2009) ‘Causality in political networks’. methods and policy implications’. Marketing Letters, 19:
Political Networks Paper Archive Working Papers, Southern 287–304.
Illinois University Carbondale, http://opensiuc.lib.siu.edu/ de la Haye, K., Robins, G., Mohrd, P. and Wilsone, C. (2009)
cgi/viewcontent.cgi?article=1034&context=pn_wp. ‘Obesity-related behaviors in adolescent friendship net-
Fowler, T., Shelton, K., Lifford, K., Rice1, F., McBride, A., works’. Social Networks.
Nikolov, I., Neale, M.C., Harold, G., Thapar, A. and Hoff, P.D., Raftery, A.E. and Handcock, M.S. (2002) ‘Latent
van den Bree, M.B.M. (2007) ‘Genetic and environmental space approaches to social network analysis’. Journal of
influences on the relationship between peer alcohol use the American Statistical Association, 97: 1090–98.

5605-Scott-Chap34.indd 529 4/13/2011 2:44:38 PM


530 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Holland, P.W., Laskey, K.B. and Leinhardt, S. (1983) in the United States: A network explanation’. Sexually
‘Stochastic blockmodels: First steps’. Social Networks, Transmitted Diseases, 26(5): 250–61.
5(2): 109–37. Lazer, D., Rubineau, B., Katz, N., Chetkovich, C. and
Holland, P.W. and Leinhardt, S. (1981) ‘An exponential Neblo, M.A. (2008) ‘Networks and political attitudes:
family of probability distributions for directed graphs (with Structure, influence, and co-evolution’. Harvard
discussion)’. Journal of the American Statistical Association, Kennedy School Faculty Research Working Paper Series
76: 33–65. RWP08-044, http://web.hks.harvard.edu/publications/
Imberman, S, Kugler, A.D. and Sacerdote, B. (2009) ‘Katrina’s getFile.aspx?Id=310
children: Evidence on the structure of peer effects from Lee, L.-f. (2009) ‘Identification and estimation of spatial
Hurricane evacuees’. NBER Working Paper No. 15291, econometric models with group interactions, contextual
http://papers.nber.org/papers/w15291.pdf. factors and fixed effects’. Journal of Econometrics, 140(2):
Jackson, C.K. (2010) ‘Peer Quality or Input Quality?: Evidence 333–74.
from Trinidad and Tobago’. NBER Working Paper Legge, J. (Trans.) (2004) The Analects of Confucius, http://
No. 16598, http://www.nber.org/papers/w16598.pdf ebooks.adelaide.edu.au/c/confucius/c748a/part4.html.
Jackson, M.O. (2008) Social and Economic Networks. Lim, C. (2009) ‘Mobilizing on the margin: How does
Princeton: Princeton University Press. interpersonal recruitment affect citizen participation in
Jackson, M.O. and Rogers, B.W. (2007) ‘Meeting strangers politics?’ Social Science Research.
and friends of friends: How random are socially generated Lin, N. (1999) ‘Social networks and status attainment’. Annual
networks?’ American Economic Review, http://citeseerx.ist. Review of Sociology, 25: 467–87.
psu.edu/viewdoc/download?doi=10.1.1.84.8381&rep= Liu, K.-Y., King, M. and Bearman, P.S. (2010) ‘Social influence
rep1&type=pdf. and the autism epidemic’. American Journal of Sociology,
Jackson, M.O. and Wolinsky, A. (1996) ‘A strategic model of 115(5): 1387–1434.
social and economic networks’. Journal of Economic Ludwig, J., Liebman, J.B., Kling, J.R., Duncan, G.J., Katz, L.F.,
Theory, 71: 44–74. Kessler, R.C. and Sanbonmatsu, L. (2008) ‘What can we
Kandel, D.B. (1978) ‘Homophily, selection, and socialization in learn about neighborhood effects from the moving to
adolescent friendships’. American Journal of Sociology, opportunity experiment?’, American Journal of Sociology,
84(2): 427–36. 114(1): 144–88.
Katz, E. and Lazarsfeld, P.F. (2005) Personal Influence: The Madden, Pamela A. F., Bucholz, Kathleen K., Todorov,
Part Played by People in the Flow of Mass Communications. Alexandre A., Grant, Julia D., and Heath, Andrew C. (2002)
New Brunswick, NJ: Transaction. ‘The assessment of peer selection and peer environmental
Kling, J.R., Liebman, J.B. and Katz, L.F. (2007) ‘Experimental influences on behavior using pairs of siblings or twins’.
analysis of neighborhood effects’. Econometrica, 75(1): Twin Research, 5(1): 38–43.
83–119. Manski, C.F. (1993) ‘Identification of endogenous social
Kolaczyk, E. (2009) Statistical Analysis of Network Data. effects: The reflection problem’. Review of Economic
Springer. Studies, 60: 531–42.
Koskinen, J. (2004) ‘Bayesian inference for longitudinal social Manski, C.F. (2000) ‘Economic analysis of social interactions’.
networks’. Research Report 2004:4, Department of NBER Working Paper No. 7580, http://papers.nber.org/
Statistics, Stockholm University, http://gauss.stat.su.se/site/ papers/w7580.pdf.
pdfer/RR2004_4.pdf. Manski, C.F. (2010) ‘Identification of treatment response with
Koskinen, J.H., Robins, G.L. and Pattison, P.E. (2008) ‘Analysing social interactions’. Working Paper, http://faculty.wcas.
exponential random graph (p-star) models with missing northwestern.edu/~cfm754/treatment_with_interactions.
data using Bayesian data augmentation’. MelNet Social pdf.
Networks Laboratory Technical Report 08–04, Department Marmaros, D. and Sacerdote, B. (2004) ‘How do friendships
of Psychology, School of Behavioural Science, University of form?’ NBER Working Paper 11530, http://www.nber.org/
Melbourne, Australia, http://www.sna.unimelb.edu.au/ papers/w11530.pdf.
publications/MelNet_Techreport_08_04.pdf. Marsden, P.V. and Friedkin, N.E. (1993) ‘Network studies of social
Koskinen, J. and Snijders, T. (2007) ‘Bayesian inference for influence’. Sociological Methods Research, (22): 127–51.
dynamic social network data.’ Journal of Statistical Planning Mas, A. and Moretti, E. (2009) ‘Peers at work’. American
and Inference, 137: 3930–38. Economic Review, 99(1): 112–45.
Kossinets, G. (2006) ‘Effects of missing data in social Maxwell, K.A. (2002) ‘Friends: The role of peer influence
networks’. Social Networks 28: 247–68. across adolescent risk behaviors’. Journal of Youth and
Krauth, B.V. (2009) ‘Simulation-based estimation of peer Adolescence, 31(4): 267–77.
effects’. Journal of Econometrics, 1: 243–71. McPherson, M., Smith-Lovin, L. and Cook, J.M. (2001) ‘Birds
Kremer, M. and Levy, D.M. (2003) ‘Peer effects and alcohol of a feather: Homophily in social networks’. Annual Review
use among college students’. Working Paper, http://www. of Sociology, 27: 415–44.
povertyactionlab.org/papers/12_Kremer_Peer_Effects_ Merckena, L., Candela, M., Willemsd, P. and de Vries, H.
and_Alcohol_Use.pdf. (2009) ‘Social influence and selection effects in the
Laumann, E.O. and Youm, Y. (1999) ‘Racial/ethnic group dif- context of smoking behavior: Changes during early and
ferences in the prevalence of sexually transmitted diseases mid adolescence’. Health Psychology, 28(1): 73–82.

5605-Scott-Chap34.indd 530 4/13/2011 2:44:38 PM


MODELS AND METHODS TO IDENTIFY PEER EFFECTS 531

Michell, L., and West, P. (1996) ‘Peer pressure to smoke: The Sampson, R.J. (2008) ‘Moving to inequality: Neighborhood
meaning depends on the method’. Health Education effects and experiments meet social structure’. American
Research, 11(1): 39–49. Journal of Sociolog,y 114(1): 189–231.
Moffitt, R.A. (forthcoming) ‘Policy interventions, low-level Smith, K.P. and Christakis, N.A. (2008) ‘Social networks and
equilibria, and social interactions’. In Steven Durlauf and health’. Annual Review of Sociology, 34: 405–29.
Peyton Young (eds), Social Dynamics. MIT Press. Snijders, T.A.B. (2001) ‘The statistical evaluation of social net-
Moretti, E. (2004) ‘Workers’ education, spillovers and work dynamics’. In M. Sobel and M. Becker (eds), Sociological
productivity: Evidence from plant-level production Methodology. Boston: Basil Blackwell. 361–95.
functions’. American Economic Review, 94(3): 656–90. Snijders, T.A.B. (2005) ‘Models for longitudinal network data’.
Morgan, S.L. and Winship, C. (2007) Counterfactuals and In Peter Carrington, John Scott, and Stanley Wasserman
Causal Inference: Methods and Principles for Social (eds), Models and Methods in Social Network Analysis.
Research. New York: Cambridge University Press. New York: Cambridge University Press. Chapter 11.
Mouw, T. (2006) ‘Estimating the Causal Effects of Social Snijders, T.A.B., van de Buntz, G.G. and SteglichIn, C.E.G.
Capital: A Review of Recent Research’. Annual Review of (2009) ‘Introduction to stochastic actor-based models for
Sociology, 32: 79–102. network dynamics’. Draft article for special issue of Social
Newman, M.E.J. (2003) ‘The structure and function of Networks on Dynamics of Social Networks, http://www.
complex networks’. SIAM Review, 45: 167–256. stats.ox.ac.uk/~snijders/SnijdersSteglichVdBunt2009.pdf.
Nanda, R. and Sorensen, J.B. (2008) ‘Peer effects and Snijders, T.A.B., Pattison, P., Robins, G. and Handcock, M.
entrepreneurship’. Harvard Business School Working (2006) ‘New specifications for exponential random graph
Paper, pp. 08–051, http://papers.ssrn.com/sol3/papers. models’. Sociological Methodology, 36: 99–153.
cfm?abstract_id=1084874. Soetevent, A.R. (2006) ‘Empirics of the identification of social
O’Malley, J.A. and Marsden, P.V. (2008) ‘The analysis of interactions: An evaluation of the approaches and their
social networks’. Health Services and Outcomes Research results’. Journal of Economic Surveys, 20(2): 193–228.
Methodology, 8(4): 222–69. Sorensen, A.T. (2006) ‘Social learning and health plan
Oster, E. and Thornton, R. (2009) ‘Determinants of Technology choices’. RAND Journal of Economics, 37(4): 929–45.
Adoption: Private Value and Peer Effects in Menstrual Cup Steglich, C., Snijders, T. and Pearson, M. (2010) ‘Dynamic
Take-Up’. NBER Working Paper No. 14828, http://www. networks and behavior: Separating selection from influ-
nber.org/papers/w14828.pdf. ence’. Sociological Methodology, http://www.stats.ox.ac.
Pearl, J. (2000) Causality: Models, Reasoning, and Inference. uk/~snijders/siena/SteglichSnijdersPearson2009.pdf.
New York: Cambridge University Press. Stewart-Knox, B.J., Sittlington, J., Rugkasa, J., Harrisson, S.,
Pearl, J. (2009) ‘Causal inference in statistics: An overview’. Treacy, M. and Abaunza, P.S. (2005) ‘Smoking and peer
Statistics Surveys, 3: 96–146. groups: Results from a longitudinal qualitative study of
Rao, N., Mobius, Markus M. and Rosenblat, T. (2007) ‘Social young people in Northern Ireland’. British Journal of Social
networks and vaccination decisions’. FRB of Boston Psychology, 44: 397–414.
Working Paper No. 07–12, http://papers.ssrn.com/sol3/ Trogdon, J.G., Nonnemaker, J. and Pais, J. (2008) ‘Peer effects
papers.cfm?abstract_id=1073143. in adolescent overweight’. Journal of Health Economics,
Robins, G., Pattison, P., Kalish, Y. and Lusher, D. (2007) 27: 1388–99.
‘An introduction to exponential random graph (p*) models Valente, T.W. (2005) ‘Network models and methods for
for social networks’. Social Networks, 29: 173–91. studying the diffusion of innovations’. In Peter Carrington,
Robins, G., Pattison, P. and Woolcock, J. (2004) ‘Missing data in John Scott, and Stanley Wasserman (eds) Models and
networks: Exponential random graph (p*) models for net- Methods in Social Network Analysis. New York: Cambridge
works with non-respondents’. Social Networks, 26: 257–83. University Press. pp. 98–116.
Robins, G., Snijders, T. Wang, P., Handcock, M. and Pattison, P. Valente, T.W. and Davis, R.L. (1999) ‘Accelerating the diffu-
(2007) ‘Recent developments in exponential random graph sion of innovations using opinion leaders’. The ANNALS
(p*) models for social networks’. Social Networks, 29: of the American Academy of Political and Social Science,
192–215. 566: 55–67.
Rosenbaum, P.R. (2007) ‘Interference between units in rand- VanderWeele, T.J. (2010) ‘Sensitivity analysis for contagion
omized experiments’. Journal of the American Statistical effects in social networks’, Unpublished Manuscript.
Association, 102(477): 191–200. Wang, Y.J. and Wong, G.Y. (1987) ‘Stochastic blockmodels for
Sacerdote, B. (2001) ‘Peer effects with random assignment: directed graphs’. Journal of the American Statistical
Results for Dartmouth roommates’. Quarterly Journal of Association, 82(397): 8–19.
Economics, 116: 681–704. Wasserman, S. and Robins, G. (2005) ‘An introduction to
Sacerdote, B. (2008) ‘When the saints come marching in: random graphs, dependence graphs, and p*’. In Peter
Effects of Hurricanes Katrina and Rita on student evacu- Carrington, John Scott, and Stanley Wasserman (eds),
ees’. NBER Working Paper No. 14385, http://www.nber. Models and Methods in Social Network Analysis. New York:
org/papers/w14385.pdf. Cambridge University Press. Chapter 8.
Salganik, M.J., Dodds, P.S. and Watts, D.J. (2006) ‘Experimental Weinberg, B.A. (2007) ‘Social interactions with endogenous
study of inequality and unpredictability in an artificial associations’. NBER Working Paper No. 13038, http://
cultural market’. Science, 311: 854–56. www.nber.org/papers/w13038.pdf.

5605-Scott-Chap34.indd 531 4/13/2011 2:44:38 PM


532 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Williams, R.A. (1981) ‘Peer influence vs. peer selection: An Zalta, E.N. (2008) The Stanford Encyclopedia of Philosophy.
attempted separation’. CDE Working Paper 81–20, http:// The Metaphysics Research Lab Center for the Study
www.ssc.wisc.edu/cde/cdewp/8120.pdf. of Language and Information, Stanford University,
Wing, R.R. and Jeffery, R.W. (1999) ‘Benefits of Recruiting http://plato.stanford.edu/. Especially the entries on
Participants With Friends and Increasing Social Support for ‘Aristotle on Causality’, ‘David Hume’, ‘Causal Processes’
Weight Loss and Maintenance’. Journal of Consulting and amd ‘Counterfactual Theories of Causation’.
Clinical Psychology, 67(I): 132–138. Zeng, Z. and Xie, Y. (2008) ‘A preference-opportunity-
Wooldridge, J. (2002) Econometric Analysis of Cross Section choice framework with applications to intergroup
and Panel Data. Cambridge: MIT Press. friendship’. American Journal of Sociology, 114(3):
Young, H. P. (2009) ‘Innovation diffusion in heterogeneous 615–48.
populations: Contagion, social influence, and social learn-
ing’. American Economic Review, 99(5): 1899–924.

5605-Scott-Chap34.indd 532 4/13/2011 2:44:38 PM


35
Kinship Network Analysis
Klaus Hamberger, Michael Houseman, and
Douglas R. White

KINSHIP IN A NETWORK PERSPECTIVE kinds of kinship ties between spouses may be


overrepresented. Marriage rules and prohibitions,
Kinship, like language, is a structure, not a sub- but also residential organization, social morpho-
stance.1 The distinctive features of kinship networks logy, and so forth, affect the relative frequencies
reside less in how their constitutive ties – be they of different types of cycles in a kinship network.
biological, jural, ritual, symbolic, or whatever – are Analyzing the distribution of cycles therefore
defined and established than in the way these is the key to kinship network classification and
ties are organized. Kinship network theory interpretation.
is thus not just another “application” of general
network theoretic methods to a particular social
domain but a specific branch of social network
theory in itself, defined by its own axioms and Paths and cycles in kinship networks
described by its own theorems.
Kinship networks are characterized by the Kinship network theory thus rests on a theory of
interplay of three fundamental principles: filia- cyclic configurations. We call a path an alternat-
tion, marriage, and gender. We ordinarily repre- ing sequence of vertices and lines (edges or arcs
sent filiation by a set of arcs (descent arcs) that are of whatever direction), where every vertex is inci-
directed from parents to children, and marriage dent with the lines that precede and follow it in the
by a set of undirected edges (marriage edges) sequence, and all vertices are distinct. If, by con-
between spouses (for alternative representations trast, the first and the last vertices are identical (all
of kinship networks without edges, see below). others being distinct), we obtain a cycle. A path is
Kinship networks thus are mixed graphs, contain- said to be closed by a line connecting its first and
ing both arcs and edges. Gender is usually taken last vertices, so that adding that line turns the
into account by a partitioning of the vertex set path into a cycle. A path or cycle is called oriented
(the gender partition), usually into two or three if all lines are arcs oriented in the same direction.3
disjoint classes (male, female, and possibly A weakly acyclic network is one that contains no
unknown sex). oriented cycles and an acyclic network contains
The characteristic features of kinship networks no cycles whatsoever.
can be described in terms of cyclicity. While kin- Alternatively to their definition as (open or
ship networks do not contain oriented cycles closed) sequences of vertices and lines, paths and
(nobody can be his or her own descendant2), they cycles are also often defined as the graphs made
may contain cycles (where arc direction does not up of these vertices and lines (in this perspective,
matter): people may marry persons with whom a cycle is a connected graph where every vertex
they are already linked by kinship or affinity. has degree 2, a path a connected graph where two
Now, such cyclic configurations occur not just vertices have degree 1, and all others degree 2).
randomly but in ways that are informative about There is, however, a crucial difference between
the self-organizing behavior of the network. Some the two concepts. If we define a path as a
kinds of relatives hardly ever marry, while other sequence, the starting point matters. A path ABC

5605-Scott-Chap35.indd 533 4/15/2011 5:05:02 PM


534 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

is distinguished from its inverse CBA, or to take A weakly acyclic graph is one that contains no ori-
a kinship example, the path “father’s wife’s ented cycles and an acyclic graph contains no
daughter” (FWD) is distinguished from its inverse, cycles whatsoever.
“mother’s husband’s son” (MHS). If, by contrast, A chain is a graph whose vertices and arcs form a
we define a path as a graph, ABC and CBA are single path (alternatively, it may be defined as a
only two different notations for one and the same connected graph where two vertices have degree
mathematical object – for the kinship case, this 1 and all others have degree 2).
means that FWD and MHS are two different ways A circuit is a graph whose vertices and arcs form
to express the same kinship chain. a single cycle (alternatively, it may be defined
The ambiguity is less severe in the case of as a connected graph where every vertex has
cycles, where, by convention, graph theorists treat degree 2).
starting and ending points as irrelevant: the The first and the last vertices of a path are called
sequences ABCA and BACB are considered to be endpoints. Any line connecting the endpoints of
identical. Nevertheless, in kinship network analy- a path is said to close it; the line’s addition to the
sis we often need to distinguish them. In an ego- path transforms the latter into a cycle.
centric perspective, marrying one’s “father’s
wife’s daughter” (FWD) is different from marry- Armed with these basic concepts, we can now
ing one’s “son’s wife’s mother” (SWM). By con- describe kinship networks entirely in structural
trast, in a socio-centric perspective – as it is terms, without making statements regarding the
required if, for example, we want to count all nature of the relations involved. Characterizing
cycles of a given type in a kinship network – we kinship networks by weakly acyclic filiation, acy-
have to treat FWD and SWM marriages as two clic gendered descent, nonoccurrence of certain
different aspects of one and the same configura- types of circuits, and so on is not equivalent to
tion. In other words, we should define paths and stating that no one can be engendered by his or her
cycles as sequences when adopting an ego-centric own offspring, that it takes a man and a woman to
view and as graphs when adopting a socio-centric produce children, or that self-organization is
view. In order to avoid any ambiguity, we shall brought about by incest prohibitions that prevent
reserve the terms “path” and “cycle” to sequences people in certain kinship relations from having
and use the terms “chain” and “circuit” when we sex with each other. Filiation does not necessarily
speak of the corresponding graphs.4 A chain is involve a biological tie, procreation is not the only
thus a graph made up by the vertices and lines of basis for parenthood, and marriage prohibitions
a single path, and a circuit is a graph made up by are not defined everywhere in terms of sexual
the vertices and lines of a single cycle (alternative relations. Kinship network structures may have
definitions in terms of degrees and connectedness biological explanations, but these are culturally
are given below). determined, variable from one society to another,
and far from universal.
A path is an alternating sequence of vertices and Biology is the privileged model for kinship
lines (arcs or edges), where each vertex is inci- inasmuch as it affords a universally intelligible
dent to the preceding and the succeeding line, code for expressing the latter’s fundamental rela-
the vertices preceding and succeeding a line are tions: procreation as a model for filiation, sex as a
its endpoints, and all vertices are distinct. model for marriage, and so forth. However, being
A cycle is a sequence of vertices and lines sharing a model for a relationship does not mean being the
the properties of a path, except that the first and essence of this relationship. There are many social
the last vertex are identical (all other vertices networks that are clearly kinship networks, both
being distinct). according to structural criteria and in the minds of
A path or cycle is called oriented if all its lines are those concerned, but where filiation, marriage, and
arcs oriented in the same direction. gender cannot be defined exclusively in reference

a c a c a c a c

b b b b
Path Cycle Oriented path Oriented cycle

Figure 35.1 Paths and cycles in kinship networks

5605-Scott-Chap35.indd 534 4/15/2011 5:05:03 PM


KINSHIP NETWORK ANALYSIS 535

to biological givens. Kinship is a type of social to the same child vertex necessarily implies the
structure, and if people all over the world have existence of a marriage edge between the parent
chosen to express its basic relations in a biological vertices.
idiom, there are numerous cases where these
relations are defined independently of, and some- A kinship network is a mixed graph G(V, E,
times even in opposition to, biological relation- A, ~), where V is a set of vertices, called individual
ships. Defining kinship in network terms recognizes vertices, E is a set of edges, called marriage
this fact. edges, A is a set of arcs (directed from parents
to children), called descent arcs, and ~ is an
equivalence relation on V partitioning it into n
disjoint classes Vi (i = 1, …, n), called genders
(usually n = 2 for {male,female}), with the
NETWORK REPRESENTATIONS following property:
OF KINSHIP
1 the network is weakly acyclic
Ore-graph representation The descent graph for the ith gender is the subgraph
of a kinship network produced by all descent arcs
What we have described in our introductory state-
springing from individuals of gender i. They are
ment is the most conventional representation of
called agnatic for male gender and uterine for
a kinship network, where vertices represent
female gender.
individuals, arcs represent filial ties, and edges
represent marriages. Such networks are called
A kinship network is regular if
Ore-graphs.5 If not specified otherwise, kinship
networks are treated in this article as Ore-graphs. 2 [unique descent] no vertex in a subgraph
Their characteristic feature is that they are weakly G(V, Ai) (the descent graph for the ith gender)
acyclic.6 As a consequence, kinship networks con- has indegree higher than 1 (which rules out
tain a directed generational hierarchy. cycles in descent graphs), where Ai is the
Gender in Ore-graphs is represented by a parti- subset of arcs with origin in Vi. Descent graphs
tion of the vertex set. This gender partition gives of regular kinship networks are acyclic.
rise to an analogous partition of arcs, according to
the gender of the vertex from which they origi- A regular kinship network is standard if
nate. The subgraph produced by arcs originating
from parental vertices of the same gender can be 3 [heterosexual marriage] the subgraphs
termed a descent graph. Cycles in descent graphs G(Vi, E ) are empty.
are ruled out as soon as we impose the condition
of unique descent, that is, filial arcs for only one A standard kinship network is canonical if
parent of each gender: one father and one mother. 4 [married co-parents] any two vertices that
Under this condition, descent graphs are acyclic, are arc-adjacent to the same vertex8 are edge-
and their connected components are trees (the adjacent to each other.
well-known unilinear descent trees of “lineages”).
This condition is closely related to the condition Every kinship network G(V, E, A, ~) is par-
of heterosexual marriage, according to which a tially ordered on V, as is any weakly acyclic
marriage edge can only link vertices from a differ- graph. This is the generational partial order rela-
ent gender. We speak of a standard kinship tion. In addition, a kinship network may be
network if these two conditions – unique descent ordered on V by assigning an arbitrary unique
and heterosexual marriage – are satisfied. This identity number to each individual (this is impor-
allows for the possibility of nonstandard kinship tant for computation issues, but also for data
networks, which, because they admit multiple storage in general, see below).
descent7 and homosexual marriage, require a more Two individuals linked by a descent arc are
complex analysis. In this chapter, we will restrict called parent and child with respect to each other.
ourselves to discussing standard kinship networks. Two individuals linked by an oriented path of
In many cases, marriage is the correlate, some- descent arcs are called ascendant and descendant
times even the condition or equivalent of having with respect to each other. Two individuals linked
children in common. It is therefore useful to dis- by a marriage edge are called the spouses of each
tinguish, as a particular category of standard other. Two individuals are called co-parents
kinship networks, those networks that meet if they are parents of the same child (arc-adjacent
the condition of married co-parents: a standard to the same vertex), siblings if they are children
kinship network will be called canonical if the of the same parent (arc-adjacent from the same
presence of descent arcs from two parent vertices vertex), and co-spouses if they are spouses

5605-Scott-Chap35.indd 535 4/15/2011 5:05:03 PM


536 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Kinship network Regular kinship Standard kinship Canonical kinship


network network network

Figure 35.2 Types of kinship networks

of the same spouse (edge-adjacent to the same P-graphs


vertex). P-graphs10 represent couples as vertices and indi-
We can reformulate conditions (1)–(4) as viduals as individually and gender-labeled lines.
follows: As these individuals are at once born of one
couple and may become partners in another, the
1 In a kinship network, no individual can be his or arcs that represent them run from the couple
her own ascendant or descendant. formed by an individual and his or her spouse to
2 In a regular kinship network, no individual has the couple formed by his or her parents. Unmarried
more than one parent of each gender. individuals are treated like couples.
3 In a standard kinship network, parents are P-graphs have the advantages of incorporating
regular and spouses are always of different fewer lines and vertices, allowing marriage cycles
gender. to be more easily detected. An individual who
4 In a canonical kinship network, spouses are marries several times is represented by several
standard and all co-parents are spouses. lines that are numbered with individual identity
numbers (IDs) or can be given names. The way to
distinguish two lines representing the same indi-
vidual from those representing two same-gender
Simple digraph representations full siblings is by either the line IDs or vectors
There are a variety of ways of representing stand- for individual male or female IDs for each
ard kinship networks as digraphs. In addition to vertex. Apart from these two differences, P-graphs
an Ore-graph, two of these, P-graphs (White and share the structural properties of Ore-graphs,
Jorion, 1992; Harary and White, 2001, also see such as weak acyclicity and generational partial
White, this volume) and bipartite P-graphs ordering.
(proposed by White, implemented by Batagelj and
Mrvar, 2004), are represented in Figure 35.3
where letters indicate individuals (a married
couple, wife A and husband B, who have a daugh- Bipartite P-graphs
ter C and a son D).9 These are all isomorphic once Bipartite P-graphs are two-mode networks
arc-labels for P-graphs are included. where individuals and couples are represented by

C D

A B
C D

A B

C D A B

Ore-graph P-graph Bipartite P-graph

Figure 35.3 Graph representations of kinship networks

5605-Scott-Chap35.indd 536 4/15/2011 5:05:03 PM


KINSHIP NETWORK ANALYSIS 537

vertices. There are therefore no marriage edges, and direction enter into its definition; for example,
but there are arcs that run from individuals to the definition of “widow” requires a supplemen-
couples and from couples to individuals. tary partition of vertices (alive vs. dead), the defi-
Bipartite P-graphs are weakly acyclic and, nition of “elder brother” makes reference to a
because marriages are represented by vertices, it is partial order relation defined on filial arcs, and
possible to represent sibling relations even if the so forth.
siblings’ parents are unknown. In addition, mar-
riages can be easily partitioned, for example, A kinship path is a path in a kinship network. The
according to marriage dates. first vertex of a kinship path is called Ego; the
last one is Alter.
The direction of a line in a kinship path is 0
(“horizontal”) if it is a marriage edge, –1
(“descending”) if it is an arc directed to the
KINSHIP PATHS, KINSHIP RELATIONS, successor, and +1 (“ascending”) if it is inversely
AND MATRIMONIAL CIRCUITS directed.
Two kinship paths are isomorphic if there is a
Kinship paths and relations bijection between them that preserves the
gender of vertices and the sequence and direc-
The most general definition of a kinship relation tion of lines.
relies on the existence of a path linking one indi- An elementary kinship relation corresponds to a
vidual to another in a kinship network. If we maximal set of isomorphic paths in a kinship
abstract from the individual identity of vertices, network. Any of these paths represents the kin-
kinship paths can be characterized by generic ship relation. Any invariant property of these
properties such as the gender of vertices and the paths – beginning with the gender and direction
direction of lines. This abstract form of a kinship sequence – can be considered as a property of
path is an elementary kinship relation. Elementary the elementary relation.
kinship relations thus can be considered as abstract A complex kinship relation is any relation that can be
kinship paths (where vertex identity does not obtained by logical junction of several elemen-
matter as long as vertex gender, line direction, and tary kinship relations.
vertex-line incidence are preserved). Whatever
property we may state of a path without reference
to individual vertices, we may consider as a The notation of kinship paths and relations
property of the corresponding elementary kinship The conventional notation of kinship relations
relation. uses capital letters for indicating direction and the
We shall call a simple kinship relation one that gender of Alter (the gender of Ego must be indi-
connects Ego and Alter by a single line. By con- cated by additional signs such as ♂ [male Ego]
trast, we shall call a relation compound if it con- or ♀ [female Ego] placed before the initial letter):
nects Ego and Alter by several consecutive lines. ascending arcs are F(ather) and M(other), descend-
Compound relations can be defined by the compo- ing arcs are S(on) and D(aughter), marriage edges
sition of simple relations. For instance, “father” is are H(usband) and W(ife), plus supplementary
a simple kinship relation, while “mother’s father” letters for B(rother) and Z (sister) relations.
is a compound one. Examples of this are MBD (mother’s brother’s
Elementary kinship relations are defined by a daughter, a matrilateral cross-cousin), ZH
complete specification of the gender and the (sister’s husband, a brother in-law), and FWS
direction pattern of a single kinship path connect- (father’s wife’s son, a stepbrother).
ing Ego and Alter. Complex kinship relations are This conventional notation, a simple abbrevia-
obtained by combining elementary relations by tion of English kinship terminology, has the
means of one or more logical operations (“and,” advantage of being easy to learn and to apply, but
“or,” “not,” etc.). If the logical connective is “or,” it is hardly the best tool for analysis. It may even
we obtain a disjunctive (or “classificatory”) rela- obscure the structural similarities and the distinc-
tion (e.g., “uterine sibling” is defined as “mother’s tive properties of kinship relations.
son or mother’s daughter”). If the connective is In this respect it can be contrasted with the
“and,” we obtain a conjunctive (or “multiple”) alternative, positional notation developed by
relation (e.g., “full brother” is defined as Barry (2004). Here, a kinship relation is repre-
“mother’s son and father’s son”). If the connective sented by a sequence of letters specifying vertex
is “not,” we obtain a residual relation (e.g., labels (gender) and diacritical signs, which indi-
“nonagnatic kin”). cate the presence of a marriage edge (the point
Finally, we call a kinship relation mixed if or full stop “.”) and the apical position of
properties of vertices and lines other than gender a vertex (the parentheses “()”). All letters not

5605-Scott-Chap35.indd 537 4/15/2011 5:05:04 PM


538 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

separated by a point represent vertices connected homogeneous representation of kinship paths


by arcs, vertices in “apical” position (i.e., vertices (with individual numbers), of kinship relations
that are not a neighbor’s children) are put into (with gender letters), and of kinship relation
parentheses and, by convention, all arcs to the left classes (with gender variables), positional nota-
of an apical vertex have ascending direction, all tion may be used not only as a means of notation
arcs to its right have descending direction, and the but also as a classificatory or programming tool.
marriage point implies change of direction.
Consider, for example, the kinship path linking
a male Ego (1) to a female Alter (5) who is Ego’s The classification of kinship relations
paternal sister’s husband’s daughter (Figure 35.4). In order to compare kinship relations, and to
In positional notation, this relation is written as analyze the ways they combine so as to give rise
1 (2) 3 . (4) 5, where 2 is Ego’s and 3’s father, 4 to particular network structures, these relations
is Ego’s sister’s husband and 5 is the latter’s may be classified according to different criteria.
daughter. We restrict ourselves here to some basic defini-
By abstracting the concrete identity of the indi- tions (for a more extensive treatment, see
viduals concerned (represented by their number) Hamberger and Daillant, 2008 and Hamberger
and retaining their gender only (H for male and F forthcoming).
for female11), one obtains the kinship relation in
question: H(H)F.(H)F.12 See Table 35.1 for an A kinship relation is linear if it is oriented (we speak
example of how standard and positional notations of “oriented” paths but of “linear” relations).
are used. Any linear kinship relation can be represented by a
The principle of positional notation also applies characteristic number λ
to P-graphs. In P-graph notation, with labels for

κ
arcs rather than for vertices, the ZHD relation of i =0
( σ i )..2 i
Figure 35.4 is written HfH.hf, where H and F
(solid and dotted lines) give the parents of a male where κ is the degree of the relation (see
and a female, respectively,13 relation inverses note 15) and σi is the gender number (0 = male,
h=H-1, f=F-1 give sons and daughters, and mar- 1 = female) of the ith individual in ascending
riages are thus written fH and hF, respectively. The direction (starting with Ego i = 0), for example,
full stop “.” in H.h identifies the same individual λ = 1 for male Ego, λ = 3 for F/S, λ = 5 for M/S,
in a different couple – a distinction that is neces- λ = 7 for FF/SS, λ = 13 for MM/DS, and so on.14
sary to clarify that 5 is the child of 4 but not of 3. Characteristic numbers impose an order on all
Positional notation has a number of important linear kinship relations.
advantages. It incorporates the gender of Ego as A kinship relation is canonical if it contains no link-
well as that of Alter, and it provides a clear repre- ing children positions (i.e., if the kinship path
sentation of the structural properties of kinship does not pass through parental triads as defined
relations, which is not radically changed by sym- below).
metry transformations. Thus, for example, a man A canonical kinship relation is consanguineous if it
who marries his HF()HF is his wife’s FH()FH contains no marriage edge.
(in P-graph version: HFhf and FHfh), whereas A consanguineous component of a kinship network
in conventional notation, a man who marries is a maximal set of individuals linked to each
his MBD is his wife’s FZS. Allowing for a other by consanguineous paths (an individual

1 3 4 4

1 3 4

Ore-graph P-graph

Figure 35.4 A kinship relation in Ore-graph and P-graph representation

5605-Scott-Chap35.indd 538 4/15/2011 5:05:04 PM


KINSHIP NETWORK ANALYSIS 539

Table 35.1 Matrimonial census

111 marriages (2.06%) involving 211 (1.41%) individuals (105 men, 106 women) in 114 circuits
of 37 different types (average frequency 3.08) of order 1 and depth 3

ID Standard Positional P-Graph Marriages Circuits % Circuits

1 FBD HH()HF HHhf 3 3 2.63


2 FZD HH()FF HHff 5 5 4.39
3 FFSD HH(H)HF HHH.hhf 4 4 3.51
4 FFDD HH(H)FF HHH.hff 10 10 8.77
5 MBD HF()HF HFhf 9 9 7.89
6 MZD HF()FF HFff 2 2 1.75
7 MFSD HF(H)HF HFH.hhf 13 13 11.4
8 MFDD HF(H)FF HFH.hff 2 2 1.75

372 marriages (6.89%) involving 667 (4.47%) individuals (339 men, 328 women) in 267 circuits
of 152 different types (average frequency 1.76) of order 2 and depth 2

46 FWFSD H(H).F(H)HF HH.hfH.hhf 6 3 1.12


47 FWFDD H(H).F(H)FF HH.hFH.hff 2 1 0.37
48 FWFFSD H(H).FH(H)HF HH.hFHH.hhf 2 1 0.37
49 MHBD H(F).H()HF HF.fHhf 2 1 0.37
50 BW H()H.(F) HhF 20 10 3.75
51 BWMD H()H.F(F)F HhFF.ff 2 1 0.37

62 marriages (1.15%) involving 112 (0.75%) individuals (53 men, 59 women) in 23 circuits
of 16 different types (average frequency 1.44) of order 3 and depth 1

190 FWBWZ H(H).F()H.F()F HH.hFhFf 6 2 8.7


191 FWZHD H(H).F()F.(H)F HH.hFfH.hf 6 2 8.7
192 FWFSWFD H(H).F(H)H.F(H)F HH.hFH.hhFH.hf 3 1 4.35
193 FWFDHD H(H).F(H)F.(H)F HH.hFH.hfH.hf 6 2 8.7
194 BWBWFD H()H.F()H.F(H)F HhFhFH.hf 3 1 4.35
...

without consanguineous kin constitutes a consan- together with two arcs linking it to its parents,
guineous component in itself). who are, at the moment of birth, the individual’s
The length of a kinship relation is the number only direct neighbors in the network. If we assume
of arcs and edges it contains. The depth of a that the parents are already linked by a marriage
kinship relation is the length of the longest edge (i.e., we are dealing with a canonical kinship
linear kinship relation it contains. The order of a network), the emergence of a new child vertex
kinship relation is the number of consanguine- does not create a chain between individuals who
ous components it contains.15 The kinship rela- are not already linked by a shorter chain. Its
tion represented by the path in Figure 35.4, for impact on global structure may thus be said to be
example, has a length of 4, a depth of 2, and marginal: it enlarges the network but does not
an order of 2. alter its connectivity.
On the other hand, kinship networks also grow
by marriage, that is, by the creation of new edges
between two vertices, each of which can already
Matrimonial circuits be linked to a neighborhood of other vertices by
several different lines going in all directions. The
The concept of a matrimonial circuit new marriage edge creates new connections
Real-world kinship networks grow in two ways. between all these neighbors. In this way, marriage
On the one hand, new individuals are born, gener- changes social structure. But at the same time, the
ally being assigned a father and a mother from way in which social structure would be changed
birth. In other words, a new vertex emerges by a potential marriage influences the marriage

5605-Scott-Chap35.indd 539 4/15/2011 5:05:04 PM


540 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

choice itself, be it explicitly (through marriage If the kinship network is ordered (e.g., by arbitrary
rules and incest prohibitions), implicitly (by virtue identity numbers), there is a unique rule of select-
of preferences or strategies), directly (by taking ing, for any matrimonial circuit, a characteristic
into account kinship ties between potential path: it is the matrimonial path that has the
spouses), or indirectly (by taking into account lowest possible Ego and (if there are two such
other factors that are in turn correlated with paths) the lowest possible Alter.
kinship). The probability of two potential partners A matrimonial circuit type is a class of isomorphic
becoming a couple thus depends upon the nature matrimonial circuits. Any matrimonial circuit type
of the kinship chains between them. Now, the can be represented as a complex kinship rela-
most direct way to study this dependency is to tion formed by a marriage relation and another
look for those kinship chains that actually connect elementary kinship relation. We can define a
marriage partners – in other words, to look for unique rule for selecting, among these relations,
circuits. the characteristic relation of a matrimonial circuit
It should be clear from the preceding remarks type: for example, the relation that begins with
that we are not interested in just any type of cir- the longest sequence of ascending arcs and (if
cuit, but in those circuits that contain at least one there are several sequences of equal length) with
marriage edge. However, this restriction is not the lowest characteristic number.
enough. Every triangle formed by a couple and
their child – a parental triangle – is a circuit con-
taining a marriage edge, and yet the couple’s rela-
tion to their common child is hardly a condition of Circuit inclusion and rings
marriage that we wish to consider. More gener- Matrimonial circuits have been defined in a most
ally, we want to exclude all circuits containing general manner as circuits that do not pass through
parents together with their children – parental parental triads. However, there may be situations
triads. We can therefore define the types of cir- where we might want to reduce our analysis to
cuits of interest to us as those that contain at least only some of these circuits – namely, those that
one marriage edge and no parental triads. But in have no “shortcut” linking two of its vertices.
fact, the second condition implies the first: as Consider, for example, a marriage with the daugh-
descent is weakly acyclic, the only way to form a ter of the maternal uncle’s wife (MBWD). Now, if
circuit in a kinship network without passing this woman is at the same time the maternal
through a parental triad is to pass through a mar- uncle’s daughter (MBD), many anthropologists
riage edge. We thus arrive at a simple definition of would consider it improper to count her as an
a matrimonial circuit: MBWD and would want to distinguish such
marriages from marriages with “true” MBWDs
A parental triad is a graph formed by three vertices (stepdaughters rather than daughters of maternal
and arcs pointing from two of them to the third uncles). There is no a priori answer to the question
(i.e., by parents and their child). If the parents are of whether or not to count circuits that contain
joined by a marriage edge, the resulting circuit “shortcuts” of this kind. The choice depends both
constitutes a parental triangle. on the ethnographical context16 and on the type of
A matrimonial circuit is a circuit that does not circuit in question.17 In either case, it is useful to
contain a parental triad. Alternatively, it can be distinguish circuits that contain shortcuts from
defined as a connected subgraph where every circuits without shortcuts that link their vertices.
vertex has degree 2 but no vertex has arc- The latter are called rings (White, 2004).18
indegree 2. Because of the weak acyclicity of We say that a circuit A includes another circuit
descent (condition 1 in the definition of kinship B if all vertices of the circuit B form part of
networks), this definition implies that a matri- the circuit A. This may also be stated by saying
monial circuit necessarily contains at least one that B forms part of the subgraph induced by
marriage edge. In P-graph representation (where the vertices of A, that is, the graph constituted
marriages are vertices and not edges), every by these vertices and all of the lines that
circuit is a matrimonial circuit. connect them in the global network (if a circuit
Any maximal connected consanguineous chain within A contains all the vertices of circuit B, the sub-
a circuit is called an arch of the circuit. graph induced by these vertices also includes the
A matrimonial path is a kinship path that passes lines of B). An induced circuit or ring can thus
through all vertices of a matrimonial circuit as be defined as a circuit that is its own induced
well as through all of its lines except the closing subgraph.19
marriage edge, which links the first and the last
vertex of the path. For a matrimonial circuit con- The subgraph of a graph G induced by a vertex set
taining n marriage edges, there are 2n different V is the maximal subgraph of G having V as its
matrimonial paths. vertex set (see Harary, 1969: 11). The subgraph

5605-Scott-Chap35.indd 540 4/15/2011 5:05:04 PM


KINSHIP NETWORK ANALYSIS 541

induced by a circuit in the kinship network G is than itself is called reducible; if it cannot, it is
the subgraph of G induced by the vertices of the called irreducible. By definition, every irreducible
circuit. We also call it briefly the induced sub- circuit is also a ring.
graph of the circuit. It should be stressed that reducible circuits are
A circuit A includes a circuit B if every vertex of B is not necessarily sociologically less relevant than
also a vertex of A (i.e., if B lies in the induced irreducible circuits. If a Fulani man, for instance,
subgraph of A). marries an FFBSD who is at the same time an
An induced circuit or ring is a circuit that does not MBD (due to an FBD marriage between the hus-
include any other circuit (i.e., a circuit that is band’s parents), the apparent cross-cousin mar-
its own induced subgraph). Alternatively, it can riage MBD may simply be a by-product of
be defined as a circuit such that no two vertices successive parallel-cousin marriages (FBD and
of the circuit are connected by a line that is not FFBSD): it is then the longer and not the shorter
itself part of the circuit. ring that matters for marriage decisions. Nor does
the formation of a reducible circuit presuppose the
previous formation of some irreducible circuit
Circuit intersection and composition (see note 17).
The definition of an induced circuit (or ring) The study of irreducible matrimonial circuits is
rules out circuits whose vertices are connected by closely related to the idea of a cycle basis in gen-
extra lines. It does not, however, exclude circuits eral graph theory. A cycle basis for a graph is a
whose vertices are connected by extra chains minimal set of circuits from which all circuits of
(consisting of more than one line). Consider, for a graph can be composed by a circuit union.
example, Figure 35.5, in which a man marries his Different sets of circuits can constitute a cycle
MMBDD, while his own mother is his father’s basis. However, the number of circuits in the
FFZD.20 basis (also called the circuit rank or cyclomatic
The chains 1-8-9-5 and 2-8-9-5 “shorten” the number of the graph) is invariant: we can compute
outer circuit 1-2-3-4-5-6-7-1 (of type MMBDD), it from the numbers of its arcs, edges, and compo-
forming two inner rings of type FFZD: 8-9-5-4-3- nents by means of a simple formula (see below).
2-8 and 1-8-9-5-6-7-1. But note that the outer In order to find a cycle basis for a kinship
circuit also constitutes a ring: as the vertices 8 and network, it is reasonable to concentrate on irre-
9 do not belong to it, neither of the inner rings is ducible circuits. Note, however, that the cycle
included in it.21 However, it intersects with the basis may well be smaller than the set of irreduc-
two inner rings in the sense that it has one or more ible circuits: if a man marries three sisters, we
lines in common with them (for a further discus- have three irreducible circuits, but the circuit
sion of circuit intersection, see below). Moreover, rank is only two (as two circuits are sufficient to
the entire outer ring can be composed from the compose the third).
two inner rings and the parental triangle 1-2-8-1
by taking their union and deleting all lines that Two circuits intersect if they have lines in common.
form part of more than one circuit (an operation They intersect matrimonially if they have mar-
called circuit union). A circuit that in this manner riage edges in common.
can be entirely decomposed into circuits shorter The union of two circuits is the graph that has the
union of their line (vertex) set as its line (vertex)
set. The circuit union of two intersecting circuits
consists in taking their union and deleting the
4 lines they have in common.
A circuit is irreducible if it cannot be composed by
3 5 a circuit union from a set of circuits that are all
shorter than itself.
A cycle basis of a graph is a minimal set of circuits
whose union contains all the circuits of the
2 9 6 graph.
The cyclomatic number or circuit rank of a graph is
8 the number of circuits constituting its cycle basis
(which is equivalent to the number of lines one
has to remove from a graph to make it acyclic).
1 7 For a graph with e lines, v vertices, and c compo-
nents, it is calculated as

Figure 35.5 Circuit intersection and γ=e–v+c


composition

5605-Scott-Chap35.indd 541 4/15/2011 5:05:04 PM


542 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Counting circuits: The matrimonial 1 and depth 3, circuits of order 2 and depth 2, and
census circuits of order 3 and depth 1.

A matrimonial census provides an exhaustive list


of all matrimonial circuits of specified properties
in a given kinship network, and it counts the NETWORK REPRESENTATIONS OF
occurrences of every distinct circuit type (which
may or may not be aggregated into broader CIRCUIT STRUCTURES
classes).
A circuit search usually has to be restricted to a The set of matrimonial circuits thus obtained can
limited set of circuit types. Even if the total in turn be studied with genuine network-analytic
number of circuits in a finite network is not infi- tools.
nite, it is usually so high that an unbounded search One of these tools is to construct the network
exceeds the capacities of the most advanced per- that the circuits compose; this gives us a subnet-
sonal computers. For exploratory analysis, it is work of the original kinship network. A second
recommended to restrict matrimonial circuit tool consists of constructing the network of the
search by criteria that are as neutral as possible, structural relations between the circuits them-
such as maximal order and depth of circuits. Do selves; this gives us a second order network in
not just count first-cousin marriages in order to which the circuits represent the vertices and their
decide whether you are dealing with “generalized structural interrelations are represented by lines.
exchange,” “arab marriage,” and so on – a look at In the following section, we shall discuss one
higher degree consanguineous marriages, and at network of the first type, the matrimonial net-
marriages between affines, may change the entire work, and one of the second type, the circuit
picture! Kinship structures constitute a whole and intersection network.
can only be understood if one considers them as
such; they cannot be characterized by the fre-
quency of this or that circuit type but only by the Networks derived from circuit sets:
relative proportions and the interdependency of The matrimonial network
these frequencies. A matrimonial census must
therefore be comprehensive in order to provide the A matrimonial network is a subgraph of a kinship
basis for further analysis and interpretation, even network resulting from the union of a set of mat-
if subsequent circuit searches may be more rimonial circuits, as, for instance, the circuits
restricted and refined. It is clear that, even for found by the matrimonial census in Table 35.1.
small networks, such a task cannot be accom- Note that this is not equivalent to the subgraph
plished without computer support. induced by this set: for an arc or edge to be in the
Circuit searches can be undertaken on the subgraph, it is not enough that each of its end-
entire network or restricted to certain subsets of points is in some circuit – the arc or edge must
vertices. This restriction does not imply that all itself be part of a circuit. The matrimonial network
vertices of the matrimonial circuit have to belong derived from a set of matrimonial circuits found in
to the subset (if, for example, we are interested in a kinship network is thus simply the network com-
consanguineous marriages concluded between posed of these circuits. It consists, in other words,
people born after 1800, we, of course, allow con- of the matrimonially “interesting” regions of the
sanguineous chains to pass through ancestors born original kinship network. The components of the
before 1800). Subsets may be defined according matrimonial network (which we call matrimonial
to “exogenous” criteria recorded for the individu- components) are connected subnetworks of matri-
als in the network (dates of birth, death, or monial circuits, which may be studied from vari-
marriage, residence, occupation, etc.) but also ous perspectives. On the one hand, we may
according to “endogenous” criteria deriving suppose that the frequent occurrence of particular
from the kinship network itself (e.g., sibling group matrimonial patterns is correlated with other prop-
size, number of known ascendants, number of erties of the network region concerned (e.g., social
spouses, etc.). Such restrictions are not only con- class, geographical region, or historical period);
venient for comparative analysis and tests of rep- we may then apply several partitions to the net-
resentativity, but they may also be helpful in work in order to evaluate the degree to which
determining the optimal network to work with partition clusters correspond to matrimonial com-
(see below). ponents. On the other hand, we may interpret the
Table 35.1 presents excerpts from a matrimo- density of circuits as an effect of self-reinforcing
nial circuit census produced by the software Puck social mechanisms (behavior transmission, imita-
(infra) of a kinship network collected among the tion, or the presence of rules) or as a simple net-
Watchi of Togo,22 restricted to circuits of order work effect (circuits combining to compose other

5605-Scott-Chap35.indd 542 4/15/2011 5:05:04 PM


KINSHIP NETWORK ANALYSIS 543

circuits) that we did not consider when defining monial bicomponents: both are line-biconnected
the criteria for our initial circuit search. (two distinct line series link each vertex to every
The concept of a matrimonial network is also other), but matrimonial bicomponents have the
meaningful in and of itself, independent of any additional feature of being vertex-biconnected as
particular circuit set. Even in cases where it is not well (the two interconnecting line series never run
possible to precisely identify all matrimonial cir- through the same vertex).
cuits (without limits of size) that may exist in a In the kinship network represented in
kinship network, it is possible to determine which Figure 35.6, for example, the shaded individuals
part of the network is composed of matrimonial and their interconnections within the bold bounda-
circuits (of whatever length). The result – the ries constitute the nucleus, which is composed of
largest possible matrimonial network – is the two matrimonial components (A and B) and three
nucleus of the kinship network, the union of all matrimonial bicomponents (1, 2, and 3), two of
existing circuits in the network (see Grange and which overlap (one individual is included in both
Houseman, 2008). 1 and 2).
The concept of the nucleus can be more strictly
delineated by introducing the concept of a matri- Given a set of circuits R in a kinship network K,
monial bicomponent, that is, a maximal subgraph the matrimonial network derived from R is the
in which every two vertices form part of a matri- subgraph of K resulting from the union of the
monial circuit (note that this is a stricter condition circuits of R. In other words, it is a subgraph in
than that of simply forming part of a circuit, as is which every line belongs to some matrimonial
required for the more general notion of a bicom- circuit of R. The components of a matrimonial
ponent). The nucleus is simply the union of all network are called the matrimonial components
matrimonial bicomponents.23 of K with respect to R. Matrimonial components
As a result, matrimonial components (consist- are line-biconnected but not necessarily vertex-
ing only of circuits) are closely related to matri- biconnected.

Matrimonial
bicomponent 2
Matrimonial
bicomponent 3
Matrimonial
bicomponent 1

Matrimonial
component B

Matrimonial
component A

Figure 35.6 Matrimonial components and bicomponents

5605-Scott-Chap35.indd 543 4/15/2011 5:05:05 PM


544 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

A matrimonial bicomponent is a subgraph of K in The matrimonial intersection of two circuit types


which every pair of vertices (no matter how A and B is the set of all marriage edges belong-
distant) belongs to a matrimonial circuit (hence ing simultaneously to a circuit of type A and to a
no pair of vertices can be separated by removal circuit of type B.
of a single intermediary vertex). In P-graph rep- The circuit intersection network corresponding to
resentation, every bicomponent is a matrimonial a set of circuit types T is a valued graph G,
bicomponent. such that
The nucleus of a kinship network is the network
resulting from the union of all matrimonial 1 each vertex of G corresponds to a circuit
circuits in K. The nucleus is equivalent to the type of T, and the value (size) of the vertex
union of all matrimonial bicomponents of the is proportional to the frequency of the cor-
kinship network. The largest of these matrimo- responding circuit type
nial bicomponents constitutes the kernel of the 2 each edge between two vertices corresponds
kinship network. to a nonempty matrimonial intersection of
the corresponding circuit types, and the
weights of the edges correspond to the sizes
of the intersections.
Networks of circuits: The circuit
intersection network
Circuit graphs are tools for analyzing the interde-
pendence of matrimonial circuits. A simple exam- ALLIANCE NETWORKS
ple is the circuit intersection network, where
circuit interdependence is measured by the fre- All matrimonial structures hitherto discussed have
quency of shared marriage edges. been defined in terms of filial and marriage rela-
It is often the case that a given marriage forms tions between individuals. But kinship also has to
part of two or several matrimonial circuits. Such do with relations between groups derived from
overdetermination poses problems of sociological relations between individuals. One convenient
interpretation: if a man has married a woman who tool of analyzing these relations is the alliance
is at the same time his father’s sister’s daughter, network.
his maternal aunt, and his sister-in-law, should we The alliance network corresponding to a given
say that he married his cousin, his aunt, or his kinship network (real or simulated) is a network
sister-in-law? And how shall we interpret such a composed of vertices representing groups of indi-
situation if, for instance, it is considered to be very viduals and arcs representing marriage frequen-
good to marry one’s cousin but bad to marry one’s cies between the groups, where the value of an arc
aunt? Under such circumstances, it is clearly from A to B indicates the number of marriages of
insufficient to simply count the frequency of a woman of A with a man of B. One can think of
maternal aunts that are spouses and affirm the alliance networks as resulting from “shrinking”
presence of a high number of “bad” marriages, the kinship network with respect to some parti-
without considering the fraction of such aunts tion, after having transformed marriage edges into
who are at the same time cousins and thus repre- arcs that point in the husband’s direction, that is,
sent “good” spouses. But there is a further reason from the group of “wife-givers” to the group of
for wanting to determine the frequencies of circuit “wife-takers.” The clusters of the partition are
intersection: if a father’s sister’s daughter is at those collectivities related by the marriages
the same time a maternal aunt, such a configura- between their respective members. The partition
tion mathematically implies that the husband’s used may be exogenous to kinship (e.g., if we
father has married his sister’s daughter. We shall are dealing with residential units, professional
therefore necessarily find a high number of niece categories, or social classes), but it may also be
marriages in our network, and if we did not yet derived from the kinship network itself. Thus, for
search for them, such a finding will prompt us to example, clusters may represent the components
do so. of the agnatic or uterine subnetwork, that is,
Circuit intersection networks are an easy and “lineages” within the kinship network.
intuitive way to approach these questions. In these Alliance networks no longer have the particu-
networks, vertices represent circuit types, the size larities of kinship networks. They are simple
(or vector value) of vertices represents circuit valued digraphs. Circuits in alliance networks
frequencies, and the values of the lines connecting may be called connubial circuits in order to distin-
two vertices represent the number of marriages guish them from matrimonial circuits in kinship
that are simultaneously part of a circuit of the two networks, and the connubial circuit structure of an
corresponding types. alliance network can be represented by its matrix

5605-Scott-Chap35.indd 544 4/15/2011 5:05:05 PM


KINSHIP NETWORK ANALYSIS 545

(the alliance matrix). In exogamous systems, the checking possible errors and biases but may be
alliance matrix will have only zero values in its an interesting datum in itself, for instance, to
diagonal; in a perfect system of balanced bilateral appraise genealogical memory.
marriage alliances (designated by Lévi-Strauss • Document missing data; indicate if the spouses
[1949 (1967)] as “restricted exchange”) it will be and children you have noted for a given individ-
symmetric; in a system having a single directed ual are, according to your knowledge, complete.
Hamiltonian cycle (“generalized exchange”), it • In case of contradictory data, keep records
will be asymmetric and contain only one nonzero regarding alternative items of information (and
value in each line and column. Note, however, that their origin) and on the reasons for your choices.
real-world alliance structures are not as clear-cut. • Try to avoid biases from the start by always fol-
On the one hand, several circuit patterns may be lowing both male and female lines; do not record
superimposed, such that, for example, the result- only those kinship ties that are easily given but
ing cumulative pattern may appear symmetrical make an effort to search those that are missing,
even if partial patterns are asymmetric. On the even if this may be costly in the case of an exten-
other hand, the structure of alliance networks is sive matrimonial area.
highly sensitive to the definition of wife-giving • If you are interested in the kinship relations
and wife-taking groups, connubial circuit struc- between two individuals, do not be content to
tures being in general not continuous with respect ask how they are related but try to establish their
to changes in the level of group aggregation. Thus, entire pedigrees within given bounds – you will
what may appear to be endogamous unions on one surely find quite a number of additional ties your
level may be exogamous on another, with combi- informants did not mention spontaneously!
nations of endogamy and balanced exchange on • Try to determine the relative order of births and
one level giving rise to asymmetrical patterns on marriages (in particular in the case of polygamy),
another (for an example, see Gabail and Kyburz, even if absolute dates are not available. In inter-
2008). preting marriages with affines or overlapping
matrimonial circuits, this may turn out to be very
The alliance network corresponding to a partitioned important.
kinship network K is a digraph G where • Keep an account of the research method used
and specify the purpose for which the corpus
1 each vertex of G corresponds to a partition (or part of the corpus) is established.
cluster of K
2 each arc between two vertices of G corre-
sponding to two clusters A and B corresponds Storing data without a computer
to the existence of a marriage of a woman Data are not only a result but also a means of data
of A with a man of B, and the weight of collection. They should be easily accessible in
the arcs corresponds to the number of such order to guide your research and to cross-check
marriages. informant answers. When dealing with archives,
this is often fairly simple: you can take a computer
A connubial circuit is a circuit in an alliance with you. But in many fieldwork situations this is
network. not possible. However, noting kinship “by hand”
can be extremely fast and efficient, if some basic
principles are observed.

• Always use a compact medium, such as a note-


APPLICATION ISSUES book. Do not use filesheets or loose papers. You
cannot easily use them during interviews, and
Data collection and saving there is a high risk of losing some of them.
• Separate graphics and text. A good method is
Orientations of data collection to use a notebook with the left page for draw-
Of course, the way kinship data collection is ori- ing genealogies, the right page for listing the
ented depends largely on what one wants to find. individuals and their properties, and numbers
However, in order to minimize biases and to allow for identifying these individuals (if numbers get
the data to be used by others, there are some large, it is recommended to use, in addition,
criteria that every corpus of kinship data should initial letters to prevent identification problems
fulfill, regardless of the specific purpose of the in case of numbering errors).
collection: • Attribute an identity number to each individual
and never attribute that number to another
• Document the dates and informant(s) for every individual. If you have “duplicates,” make a link
part of the data set; this is not only useful for from the redundant to the original number but

5605-Scott-Chap35.indd 545 4/15/2011 5:05:05 PM


546 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

do not re-assign it. Gaps in the series of numbers A related problem concerns the delimitation of
do not cause any damage, but ambiguities in the network to be used for analytic purposes. To
identity numbers cause much damage and are begin with, it is important that results relating to
extremely difficult to detect. unconnected components of the matrimonial net-
• Do not use identity numbers as codes. Identity work not be combined indiscriminately, as each
numbers serve to identify individuals and noth- component represents an autonomous matrimo-
ing else (except, perhaps, to recall the order in nial universe whose patterning may not obey the
which you have entered them and to document same rules. This also applies, to a lesser degree, to
the history of your corpus). If you want to convey matrimonial bicomponents. However, even when
information on individuals’ gender, clan affilia- analysis is limited to the largest matrimonial
tion, residence, and so on, do not use identity bicomponent (kernel) of the kinship network,
numbers for that purpose. additional restrictions are often necessary. Because
• Never forget to make copies and store them bicomponents contain matrimonial circuits of any
in different places. This holds for all data, but length, depth, and order, including those that
especially for kinship data, due to the network incorporate very distant ties whose sociological
properties of kinship: one lost notebook may relevance is questionable, it is helpful to confine
render all other notebooks useless. analysis to subnetworks formed by matrimonial
circuits of a certain maximal depth or order. It is
not always easy to determine the optimal criteria
for such restricted matrimonial networks, choices
Data interpretation being largely guided by two contrary principles.
On the one hand, the resulting subnetwork should
It is necessary to know the biases, gaps, and limits be as large as possible so as to be sufficiently
of a genealogical corpus. In some cases, this may representative of the wider kinship network from
lead one to conclude that certain analyses simply which it is drawn. On the other hand, in order to
cannot reasonably be made. For instance, it makes avoid redundancies and to keep the number of
little sense to search for consanguineous marriage circuits and circuit types at manageable propor-
circuits in a corpus with very shallow genealogies. tions, it is essential that the latter be kept to a
Here, as in all cases, knowledge of the basic minimum.
qualities of the corpus is essential for interpreting
the findings.
In particular it is important to keep in mind that Determining representativity and significance
kinship networks are virtually infinite. Every Once a delimited data set has been chosen and
corpus is necessarily only a part of a larger whole, first results obtained, another difficulty arises: to
and incomplete both with regard to individuals what extent do the regularities observed in the
and with regard to the links that connect them. corpus provide information on the organization of
Choices pertaining to the delimitation and compo- the real social network? This, of course, is a gen-
sition of genealogical corpuses arise not only eral problem in network analysis; however,
during fieldwork but also prior to analysis as because issues of incompleteness are so omnipres-
a means of reducing the collected data to a ent in genealogical research, questions regarding
meaningful core. the representativity of kinship networks are
particularly pressing.
One central question concerns the extent to
Choosing bases and boundaries which a corpus’s boundaries correspond to endog-
The usefulness of exogenous reductions bringing enously definable subnetworks of the real kinship
sociological, geographical, and demographical network. Another, related question concerns the
criteria into play is fairly self-evident. However, over- and underrepresentation of persons belong-
the value of endogenous reductions based on ing to certain kinship categories. These issues
structural features of the network itself is perhaps apply not only to the individuals (vertices) that
less so, and depends on what one is trying to show. make up the corpus, but to the relations (lines)
For example, one cannot first eliminate all unmar- between them. Kinship networks are often biased
ried individuals if one later wants to compare in that they favor some types of relations over
matrimonial circuit frequencies with those of kin- others (agnatic over uterine relations, for example,
ship relations (e.g., White, 1999). This applies not for a population with patrilocal residence). It
only to endogenous reductions but also to endog- might be possible to adjust one’s findings so as to
enous augmentations of the network, such as the eliminate such biases. However, these biases may
creation of fictive individuals in order to preserve themselves be a function of matrimonial behavior:
information on full siblingship in those cases kinship ties that form part of matrimonial circuits
where one or both parents are unknown. may be more easily remembered than others.

5605-Scott-Chap35.indd 546 4/15/2011 5:05:05 PM


KINSHIP NETWORK ANALYSIS 547

The stronger this correlation between network used by many French historians; Alliance Project,
structure and collective memory, the more diffi- developed by S. Sugito and S. Kubota in Japan
cult it is to do away with the biases concerned. (Sugito, 2004), is widely used by Australian
The problem of network biases is directly anthropologists; Kinship Editor, written by
related to issues of significance: are the observed M. Fischer, a key element of the European Kinship
regularities indicative of a behavioral pattern, or and Social Security (KASS) project, allows both
are they simply due to chance? In order to treat for systematic data collection and the modeling of
this question by means of a comparison with kinship phenomena such as terminological usage.
random kinship networks, it is necessary to simu- There are also additional software tools developed
late a network that not only reproduces the demo- by demographers or historians for managing
graphic features of the concerned population but records and calculating demographic and other
also the biases of the corpus itself. Because of variables on the basis of empirical genealogical
this, random permutation (see White, 1999; White, data (e.g., CASOAR [Hainsworth and Bardet,
this volume) or explicit simulation of the data 1981]). None of these programs, however, allow
collection process (virtual fieldwork) may prove for an in-depth analysis of kinship networks as
more useful than conventional demographic such.
simulation. Such analyses may be undertaken using general
purpose social network analysis tools. Perhaps the
software most used in this way is the network
Interpretation of results analysis and visualization program Pajek, devel-
If “interesting” regularities appear in analysis for oped by V. Batagelj and A. Mrvar (de Nooy et al.,
which the known norms and institutions of the 2005; Batagelj and Mrvar, 2004, 2008; Mrvar and
society do not provide a straightforward account, Batagelj, 2004). A number of kinship-centered
one is immediately tempted to take them as indi- macros have been developed for Pajek by the
cators of some hidden norm or institution. The authors and by others (e.g., Tip4Pajek pack by
most important thing in kinship data analysis is K. Hamberger).
to resist this temptation. Before formulating a Finally, certain programs have been specifi-
sociological hypothesis, one must always check cally developed for the analysis of kinship net-
the following: works (including matrimonial circuit censuses).
First attempts, such as Gen-Par by Selz (1987; see
• First, does the “interesting” structural feature also Héritier, 1974) and Pgraph by White (1997;
simply reflect a bias of the corpus? (e.g., high White et al., 1999), have since given way to more
incidences of patrilateral marriages in a corpus flexible and easier-to-use software such as Genos
where uterine genealogies are shallow). by Barry (2004) and, more recently, Puck by
• Second, is the structural feature, if it does not Hamberger et al. (2009).
correspond to any known rule, the result of a An open depository of kinship networks from
combination of known rules? (e.g., in a society historical and anthropological sources, controlled
where uterine nieces are preferred spouses and by a scientific board, is hosted at the site of the
maternal aunts are avoided, patrilateral cross- kinsources project (http://kinsource.net).
cousins have a greater chance of being at the
same time maternal aunts and therefore avoided,
even if no rule states that they should be avoided
as such). NOTES
• Finally, remember that a sociological hypothesis
is not validated by the simple fact that no other 1 We are grateful to Isabelle Daillant and
interpretation can account for the structural fea- Vladimir Batagelj as well as to the editors Peter
ture observed. Sociological hypotheses often can Carrington and John Scott for helpful comments and
be validated only in the field. discussions.
2 We are talking of individuals and not of classes.
An individual may well belong to one’s parent’s
parent’s marriage class, as in Australian alternating
Resources
generation models.
A wide variety of commercial software (Brother’s 3 In digraphs, the notions “path” and “cycle” are
Keeper, Family Tree Maker, Legacy, Kith and often restricted to oriented paths and cycles, whereas
Kin, etc.) and noncommercial programs (Personal the terms “semipath” and “semicycle” are used if
Ancestral File, Gramps, etc.) exist for entering, arcs are not consistently oriented. Because we are
storing, and outputting genealogical data. Some talking of mixed graphs (containing edges as well as
of them are particularly flexible and are used arcs), we use “path” and “cycle” as the general
extensively by social scientists: Généatique is terms (as in the case of undirected graphs) and

5605-Scott-Chap35.indd 547 4/15/2011 5:05:05 PM


548 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

specify them as “oriented” if all of their lines are arcs alliance relations rather than as consanguineous mar-
pointing in the same direction. riages (Dumont, [1953] 1975), counting all MBWDs,
4 The terms “chain” and “circuit” are equivalent whether they are or are not also MBDs, would make
to “path graph” and “cycle graph” in graph- good sense.
theoretic literature. Note, however, that these terms 17 For instance, if two brothers marry two sisters,
are also sometimes used with a different meaning, one brother dies, and the remaining brother marries
namely, as synonyms for “walk” (open and closed, the widow, the fact that the longer circuit (of type
respectively). BWZ) includes two shorter ones (of types BW and
5 Named after the Scandinavian mathematician WZ) does not in the least make it sociologically less
Oystein Ore (1960). The representation of marriages relevant: the BWZ marriage clearly precedes the BW
by edges has been introduced by the computer (and WZ) marriage (we are grateful to Isabelle
program Pajek (see Batagelj and Mrvar, 2008). Daillant for this example).
6 Note that the weakly acyclic property of kinship 18 The distinction between circuits and rings
networks holds for remarriage cycles because a cycle (induced circuits) is a rather recent one. Much of
consisting entirely of edges is not an oriented cycle. what has been said regarding matrimonial rings in
7 Kinship networks that incorporate adoptive, Hamberger et al. (2004) refers to matrimonial circuits
godparent, or co-genitor relations often have to in general, while rings in White (2004) refers to
allow for the possibility of more than one parent of a induced circuits.
given gender (multiple descent). 19 Note, however, that this restriction may not
8 A vertex x is arc-adjacent to another vertex y if mean the same thing in P-graph and in Ore-graph
the arc goes from x to y. It is arc-adjacent from y if representation. The subgraph induced by the vertices
the arc goes from y to x. of a circuit changes meaning according to whether
9 The upper and lower vertices of the P-graph vertices are defined as individuals (Ore-graph) or as
and bipartite P-graph are reversed in Figure 35.3 marriages (P-graph). For instance, a marriage with
compared to the Ore-graph. This is because their an MMBDD who is at the same time an MBD consti-
arrows run in reverse, from children to parents, usu- tutes a ring in Ore-graph but not in P-graph repre-
ally as a unique function mapping a child to a unique sentation. If the context is not clear, one should
parental couple. The inverse of this function gives the therefore speak of Ore-rings and P-rings to avoid
relation of parents to children. ambiguities.
10 The “P” stands for parenté (French for 20 This example holds in a P-graph as well as in
“kinship”). Ore-graph representation: in both cases, the outer
11 From the French homme (man) and femme circuit is a ring. In general, Ore-rings are not always
(woman). P-rings (see note 19).
12 This positional notation may also be used, 21 This is equally true in P-graph representation,
within limits, to represent complex kinship relations, where the two individuals 8 and 9 are represented by
by leaving the parentheses empty (or by putting two two lines forming an extra chain between the verti-
letters in it) if the relation entails kinship paths that ces (representing marriages) of the outer circuit.
pass through apical ancestors of both genders. For 22 See http://kinsource.net/kinsrc/bin/view/
instance, the MBD (mother’s brother’s daughter) KinSources/Watchi.
relation is represented as HF()HF, the ZH (sister’s 23 Every line of a matrimonial bicomponent is by
husband) relation as H()F.H. definition in some matrimonial circuit. On the other
13 Original P-graph notation (White and Jorion, hand, every matrimonial circuit is either a matrimo-
1992) used letters G and F (from the French garçon nial bicomponent in itself or forms part of some
(boy) and fille (girl). In its present version, P-graph larger matrimonial bicomponent. The concept of the
notation uses the same letters as positional Ore- nucleus is a restriction of the definition of the core by
graph notation (but applies them to lines while Ore- White and Jorion (1996; cf. Houseman and White,
graph notation applies them to vertices). 1996) as the union of all matrimonial bicomponents
14 This is a variant of the ahnentafel genealogical and their single-link connections (equating with
numbering system. 2-core as defined by Seidman, 1983). Neither is
15 In the case of consanguineous kinship rela- necessarily connected.
tions, length is also called roman (or civil) degree,
whereas depth is also called german (or canonic)
degree (these terms derive from the history of
European kinship). In the case of linear kinship rela- REFERENCES
tions, roman and german degrees are identical, and
we can simply speak of its degree. Barry, L. (2004) ‘Historique et spécificités techniques du pro-
16 For example, in the case of a Dravidian kinship gramme Genos’, École Collecte et traitement des données
network from southern India, where cross-cousin de parenté, http://llacan.vjf.cnrs.fr/SousSites/EcoleDonnees/
marriages may be considered as redoublings of extras/Genos.pdf.

5605-Scott-Chap35.indd 548 4/15/2011 5:05:05 PM


KINSHIP NETWORK ANALYSIS 549

Batagelj, V. and Mrvar, A. (2004) ‘Analysing large genealogi- Methodology and Statistics (Ljubljana), 1: 407–18, http://
cal networks with Pajek’, paper presented at Sources et mrvar.fdv.uni-lj.si/pub/mz/mz1.1/mrvar.pdf.
Resources pour les Sciences Sociales, Paris, EHESS, de Nooy, W., Mrvar, A. and Batagelj, V. (2005) Exploratory
December 9–11, 2004, http://vlado.fmf.uni-lj.si/pub/ Social Network Analysis with Pajek. New York: Cambridge
networks/doc/seminar/Geneo04.pdf. University Press.
Batagelj, V. and Mrvar, A. (2008) ‘Analysis of kinship Ore, O. (1960) ‘Sex in graphs’, Proceedings of the American
relations with Pajek’, Social Science Computer Review, Mathematical Society, 11: 533–39.
26(2): 224–46, http://ssc.sagepub.com/ cgi/content/ Seidman, S.B. (1983) ‘Network structure and minimum
abstract/26/2/224. degree’, Social Networks, 5: 269–87.
Dumont, L. ([1953] 1975) ‘Le vocabulaire de parenté dravidien Selz, M. (1987) ‘Parenté et Informatique‘, Mathématiques
comme expression du mariage’, in Dravidien et Kariera, et Sciences Humaines, 97: 57–66.
l’alliance de mariage dans l’Inde du Sud et en Australie. Sugito, S. (2004) ‘Possibility of genealogical study in popula-
Paris/La Haye: Mouton. pp. 85–100 and 145–46. tion study’, Journal of Population Studies, 34: 23–29
Gabail, L. and Kyburz, O. (2008) ‘Hurons chez les Touregs’, (in Japanese).
Annales de Démographie Historique, 116:197–232. White, D.R. (1997) ‘Structural endogamy and the Graphe de
Grange, C. and Houseman, M. (2008) ‘Objets d’analyse pour Parenté’, Mathématiques et sciences humaines, 137:
l’étude des réseaux de parenté‘, Annales de Démographie 107–25.
Historique, 116: 105–44. White, D.R. (1999) ‘Controlled simulation of marriage sys-
Hainsworth, M. and Bardet, J.-P. (1981) ‘Logiciel C.A.S.O.A.R.: tems’, Journal of Artificial Societies and Social Simulation,
Calculs et analyses sur ordinateur appliqués aux reconstitu- 2(3), http://www.soc.surrey.ac.uk/JASSS/2/3/5.html.
tions’, Cahier des Annales de Démographie Historique, White, D.R. (2004) ‘Ring cohesion in marriage and social
1: 1–175. networks’, Mathématiques et sciences humaines, 168(4):
Hamberger, K. (forthcoming) ‘Matrimonial circuits in kinship 59–82.
networks: Calculation, enumeration and census’, Social White, D.R., Batagelj, V. and Mrvar, A. (1999) ‘Analyzing
Networks. large kinship and marriage networks with Pgraph and
Hamberger, K. and Daillant, I. (2008) ‘L’analyse de réseaux de Pajek’, Social Science Computer Review, 17(3): 245–74.
parenté: concepts et outils’, Annales de Démographie White, D.R. and Jorion, P. (1992) ‘Representing and comput-
Historique 116: 13–52. ing kinship: A new approach’, Current Anthropology,
Hamberger, K., Houseman, M., Daillant, I., White, D.R. and 33(4): 454–62.
Barry, L. (2004) ‘Matrimonial ring structures’, White, D.R. and Jorion, P. (1996) ‘Kinship networks and dis-
Mathématiques et Sciences humaines, 168 (Les réseaux crete structure theory: Applications and implications’,
sociaux, ed. Alain Degenne), pp. 83–119. Social Networks, 18: 267–314.
Hamberger, K., Houseman, M. and Grange, C. (2009)
‘La parenté radiographiée: Un nouveau logiciel pour
l’analyse des réseaux matrimoniaux’, L’Homme, 189: Software
107–137. Alliance Project: http://study.hs.sugiyama-u.ac.jp/e/
Harary, F. (1969) Graph Theory. Reading, MA: Addison- Brother’s Keeper: http://www.bkwin.org/
Wesley. Family Tree Maker: http://www.familytreemaker.com/
Harary, F. and White, D.R. (2001) ‘P-systems: A structural Généatique: http://www.cdip.com/
model for kinship studies’, Connections 24(2): 35–46. Gramps: http://gramps-project.org/wiki/index.php?title=
Héritier, F. (1974) ‘Systèmes Omaha de parenté et alliance. Main_Page
Etude sur ordinateur du fonctionnement réel d’une société Kinship Editor: http://era.anthropology.ac.uk/Kinship/
africaine’, in P.A. Ballonoff (ed.), Genealogical Mathematics. Kith and Kin: http://www.spansoft.org/
Paris-La Haye: Mouton. Legacy: http://www.legacyfamilytree.com/
Houseman, M. and White, D.R. (1996) ‘Structures réticulaires Pajek: http://pajek.imfm.si/doku.php
de la pratique matrimoniale’, L’Homme, 36(139): 59–85. Personal Ancestral File: http://www.familysearch.org/eng/paf/
Lévi-Strauss, C. ([1949] 1967) Les structures élémentaires de Pgraph: http://eclectic.ss.uci.edu/~drwhite/pgraph/pgraph.
la parenté. 2nd ed. Paris/La Haye: Mouton. html
Mrvar, A. and Batagelj, V. (2004) ‘Relinking marriages in Puck: http://kintip.net/
genealogies’, Metodološki zvezki – Advances in Tip4Pajek: http://kintip.net/, http://intersci.ss.uci.edu/wiki/

5605-Scott-Chap35.indd 549 4/15/2011 5:05:05 PM


36
Large-Scale Network
Analysis
Vladimir Batagelj

INTRODUCTION by 150. The studies by Bernard, Killworth et al.


gave a limit around 290 for social networks
The interest in analysis of large networks (McCarty et al., 2001).
started to rise in the mid-1990s as a result of
the development of personal computers (with
color graphics, larger working memories and
disks, and the Internet) and the availability of BASIC NOTIONS
large data sets from which large networks could
be derived. A network is based on a nonempty set of vertices
In computer science the problems, for which (units, actors, nodes) V. Pairs of vertices can be
algorithms of polynomial (time) complexity exist, linked by lines (links, ties) determining the set of
are considered easy or tractable. The main lines L. Lines can be either directed, called arcs,
observation when dealing with large data sets or undirected, called edges. For vertices u, v ∈ V
(millions of data elements) is that already and line p ∈ L we write:
algorithms with quadratic complexity are too
slow. In the analysis of large data sets we are • p(u : v): the line p links vertices u and v; u and v
limited to concepts for which fast, subquadratic are endpoints of line p;
algorithms exist. • p(u, v): the line p leads from vertex u to vertex v;
Several algorithms were developed in the if p is an arc, u is its initial and v is its terminal
twentieth century in graph theory and related vertex (endpoint).
fields: different kinds of connectivity, minimum
spanning tree, shortest paths, maximal flow, A line with both its endpoints being equal is called
Pathfinder, CPM (Critical Path Method), topo- a loop.
logical sort, planarity testing, and so forth (Knuth, The number of vertices is usually denoted
1993; Ahuja et al., 1993; Cormen et al., 2001; by n = |V|, and the number of lines is shown
Brandes and Erlebach, 2005). by m = |L |.
The second observation about large networks is The number of lines that have the vertex
that they are usually sparse. Often there is an u ∈ V as their endpoint is called the degree of
upper bound on capacity of “regular” units (actors) the vertex u and is denoted by deg(u). The
to link to other units. In sociology such a bound is maximum degree is denoted by Δ = max{deg(v):
known as Dunbar’s number (Hill and Dunbar, v ∈V}. The number of lines that lead into
2002). It represents a cognitive limit to the number vertex u ∈ V is called the indegree of the vertex
of people with whom one can maintain stable u and is denoted by indeg(u). The number of
social relationships. Usually it is approximated lines that lead out from vertex u ∈ V is called the

5605-Scott-Chap36.indd 550 4/6/2011 12:13:15 PM


LARGE-SCALE NETWORK ANALYSIS 551

outdegree of the vertex u and is denoted by • In a multirelational network the set of lines is a
outdeg(u). union of disjoint subsets L1, L2, …, Ls.
The set of vertices V and set of lines L form a • In a temporal network each vertex and line has
graph G = (V, L). It describes the structure of a additional information attached, which is about
network. In a network N = (V, L, P, W) additional the time points intervals in which it is active
properties P of vertices or weights W on lines (present).
are often known. Network N′ = (V′, L′, P′, W′)
is a subnetwork of network N if V′ ⊆ V, L′ ⊆ L,
P′ ⊆ P, W′ ⊆ W, and all endpoints of lines from L′
belong to V′. N′ is a spanning subnetwork of N
if V′ = V. APPROACHES
A sequence of vertices and lines v0, p1, v1,
p2, v2, p3, …, vk–1, pk, vk, where pi(vi–1, vi), for
The details of large data sets cannot be grasped in
i = 1, 2, …, k, is called a walk from v0 to vk of
their totality. The standard approach to get an
length k. If only pi(vi-1 : vi) holds, for i = 1, 2, …, k,
overall view about a given (large) data set is to
it is called a semi-walk from v0 to vk. Note that the
determine its different (statistical) characteristics
reversed sequence determines a semi-walk from
and use them in analyses:
vk to v0. A walk with all its vertices different is a
path. A walk is closed if its initial vertex v0 and its
• Searching for (cor)relations between measured
terminal vertex vk are equal. A closed walk with all
variables and structural variables. A classic
internal vertices different is a cycle. A network is
example is Pitts’s (1978) analysis of the trade
acyclic if it does not contain any cycle. For acyclic
network on medieval Russian rivers.
networks some very efficient algorithms exist.
• In the 1970s and 1980s detailed research was
Vertices u and v are (weakly) connected if there
done on describing networks on the basis of their
is a semi-walk from u to v; and they are strongly
triadic spectrum (Holland and Leinhardt, 1981;
connected if there is a walk from u to v and a walk
Batagelj and Mrvar, 2001).
from v to u. Weak and strong connectivities are
• In the second half of the 1990s a characterization
both equivalence relations on the set of vertices.
of networks based on their degree (and other)
Vertices u and v are biconnected if they lie on
distributions was imported from physics. This
the same cycle. The biconnectivities determines
approach is best known as “scale-free networks”
an equivalence relation on the set of lines.
(Watts and Strogatz, 1998; Albert and Barabási,
A connected network is vertex/line k-connected
2002; Newman, 2003; Newman et al., 2006;
if we have to remove at least k vertices/lines
Dorogovtsev and Mendes, 2003; Li et al., 2005).
to disconnect it or to reduce it to a one-vertex
• Probabilistic models of network evolution (Frank
network. In a k-vertex/line-connected network,
and Strauss, 1986; Robins et al., 2007).
each pair of vertices is connected with k vertex/
line disjoint paths.
In this chapter we will not deal further with statis-
Let U be a finite set of units. Its nonempty
tical approaches (see also Kolaczyk, 2009). We
subset C is called a cluster; ∅ ⊆ C ⊆ U; and a
shall discuss in details the other approach that
set of clusters C = {C1, C2, …, Ck} is called a
tries to uncover the overall structure of network,
clustering. Generally, the clusters of the clustering
identify important elements and parts of networks,
C need not be pairwise disjoint; yet the clustering
and analyze the position of a selected element or
theory and practice mainly deal with clusterings
group of elements in the network.
that are the partitions of U (∪i Ci = U and i ≠ j ⇒
The structure of large networks can be revealed
Ci ∩ Cj = ∅). Each partition determines an
by partitioning them into smaller parts that are
equivalence relation on U, and vice versa. We
easier to handle. These parts can be either extracted
denote the set of all partitions of U into k clusters
and analyzed separately or shrunk into a smaller
by ∏k(U).
structure describing connections among parts.
Clustering C is a hierarchy if Ci ∩ Cj ∈ {∅, Ci,
Cj}, in words, two clusters from the hierarchy are
either disjoint or one is contained in the other.
Hierarchy C is complete if ∪ C = U and is basic
if for all v ∈ ∪ C also {v} ∈ C. NETWORK DECOMPOSITIONS
There are some special types of networks:
The basic decomposition of graphs is to (weakly)
• In a two-mode network the set of vertices is a connected components: the partition of vertices
union of two disjoint subsets V1 and V2 and every (and links). The weak connectivity identifies
line has one endpoint in the set V1 and the other the connected parts of the network. Most of the
endpoint in the set V2. problems on networks can be solved by first

5605-Scott-Chap36.indd 551 4/6/2011 12:13:15 PM


552 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

solving them for each weak component and after- an O(m + n.log n) algorithm for determining MST
ward combining the obtained solutions into a (Cormen et al., 2001: 561–79).
solution for the network. A fast O(m) algorithm The Pathfinder algorithm was proposed in the
exists for determining weak components (Cormen 1980s (Schvaneveldt, 1990; Schvaneveldt et al.,
et al., 2001: 499–501). 1988, 1989) for simplification of weighted
The decomposition into biconnected compo- networks. It removes from the network all lines
nents provides us with an additional internal that do not satisfy the triangle inequality – if
structure of connected components. It is very a shorter path exists that can connect a line’s
important in the analysis of genealogies: in the endpoints then the line is removed.
p-graph of a genealogy the nontrivial (having at The original matrix-based Pathfinder algorithm
least two vertices) weak biconnected components has the complexity O(qn³), with q being the
correspond exactly to the relinking marriages. The neighborhood size parameter. Therefore, it can be
biconnected components can be determined in applied only to relatively small (up to some
O(m) time (Cormen et al., 2001: 558–59). hundred vertices) networks. Interest for Pathfinder
For directed graphs the fundamental decompo- transformation was renewed around the year
sition results can be found in Harary et al. (1965). 2000 by Chen (1998).
If in a directed graph we shrink every strong com- The first improvement based on fast power
ponent into a vertex, we obtain an acyclic graph. computation was proposed by Guerrero-Bote
For generalizations of this result to symmetric et al. (2006) and reduced complexity to O(n³log q).
connectivity, see Doreian et al. (2000) and for When q ≥ n – 1, the Pathfinder network can be
short cycle connectivity, see Batagelj and Zaveršnik determined by Fletcher’s (1980) algorithm over
(2007). The strong components can be determined the Pathfinder semiring. This improvement was
in O(n+m) time (Cormen et al., 2001: 552–56). proposed by Quirin et al. (2008b) and reduces
In real-life large directed networks, such as complexity to O(n³). Additional improvement can
Web networks, a large strong component usually be made for undirected networks in the case
exists. With respect to this strong component of q ≥ n – 1 and r = ∞. In this case the Pathfinder
the set of vertices of the corresponding weak network is the union of all minimal spanning
component can be decomposed to: strong, incom- trees of N. It can be obtained using an adapted
ing, outgoing, bypassing, and tendrillic – the bow version of Kruskal’s minimal spanning tree
tie decomposition (Kleinberg et al., 1999). algorithm as described in Quirin et al. (2008a).
In the 1970s and 1980s Matula (1977) studied The complexity of this algorithm is O(m.log n).
different types of connectivities in graphs and For sparse networks generally there is still
structures they induce. In most cases the algorithms some space for improvements – for each vertex
are too demanding to be used on larger graphs. we have to compute only the values of the
A recent overview of connectivity algorithms was shortest paths to all their neighbors (Batagelj and
made by Esfahanian (2008). Vavpetič, 2010). This algorithm can be applied on
Efficient algorithms were developed also for sparse networks with hundreds of thousands of
modular decomposition (Habib and Paul, 2009; vertices.
Papadopoulos and Voglis, 2006) and split decom- A kind of skeleton is also a core. Among differ-
position (Joeris et al., 2009). ent notions that were introduced in graph theory to
describe a dense group (Wasserman and Faust,
1994) only k-cores can also be efficiently deter-
mined. The notion of a core was introduced by
Seidman (1983).
SKELETONS In graph G = (V, L) a subgraph Hk = (C, L | C)
induced by the set C is a k-core or a core of
An approach to get insight into the structures of order k if for all v ∈ C: degH(v) ≥ k, and Hk is the
large network is also to reduce a large network to maximum subgraph with this property. The core
its skeleton by removing less important lines and of maximum order is also called the main core.
vertices. Two such methods for weighted net- The core number of vertex v is the highest order
works are the minimum spanning tree and of a core that contains this vertex. The cores are
Pathfinder algorithms. Both methods preserve nested: i < j ⇒ Hj ⊆ Hi and are not necessarily
connectivity. connected subgraphs. An efficient, O(m), algo-
The minimum spanning tree in connected rithm for determining the core’s decomposition
weighted network N = (V, L, w), w > 0 is its exists (Batagelj et al., 1999; Batagelj and
subnetwork T = (V, LT, w) such that its value Zaveršnik, 2003).
w(T) = ∑{w(e) : e∈LT} is minimal over all con- The notion of the core can be generalized
nected spanning subnetworks of N. There exists to networks (V, L, p), where p is a vertex

5605-Scott-Chap36.indd 552 4/6/2011 12:13:16 PM


LARGE-SCALE NETWORK ANALYSIS 553

property function. It was shown that for the CUTS AND ISLANDS
local monotone vertex property functions the
corresponding cores can be determined in Suppose that in our network we are able to express
O(m . max(Δ, log n)) time (Batagelj and Zaveršnik, the importance of each vertex by its property p, or
2002). the importance of each line by its weight w.
Using cores, we can identify the densest parts From a network N = (V, L, p) we can get for a
of a graph (Alvarez-Hamelin et al., 2005, 2009). threshold t a subnetwork N(t) = (Vt, Lt, w), where
For revealing the internal structure of the main
core we can use standard clustering procedures on Vt = {v ∈ V : p(v) ≥ t} and
dissimilarities between vertices or blockmodeling. Lt = {e(u,v) ∈ L : u, v ∈ Vt}
Cores can be used also to localize and speed up
the search for some computationally more – a vertex cut at level t.
demanding substructures. Similarly, from a network N = (V, L, w) we
can get for a threshold t a subnetwork N(t) =
(Vt, Lt, w), where

Lt = {e ∈ L : w(e) ≥ t} and
MEASURES OF IMPORTANCE Vt = {v ∈ V : degN(t)(v) > 0}

– a line cut at level t.


The usual approach to identify important elements From vertex/line cut N(t) we can get a clustering
(vertices or lines) in a network is to express our C(t) with connected components as clusters. For dif-
intuitive notion of importance with an appropriate ferent thresholds these clusterings form a hierarchy.
measure (property or weight) of importance of There are some problems with the cuts
elements. This measure can be either measured approach: we have to select an appropriate thresh-
when collecting the network data (e.g., frequency old value t, and the components in the obtained
of interactions) or computed from them. It is very cut can be too large or too small. These problems
important that it is congruent with our goal were partially resolved by introducing islands.
(Roberts, 1976: 473–502). Using it we identify the A vertex island of size [k, K] is a weakly con-
important elements by identifying a selected nected subnetwork of size in the interval [k, K],
number of elements with the largest values. Many where vertices inside the island have larger values
such measures of importance were proposed. of the property p than their neighbors outside the
Very popular properties of vertices are: island.
degree – direct contacts of vertex in network; A line island of size [k, K] is a weakly
betweenness – control over communications connected subnetwork of size in the interval
in network (Anthonisse, 1971; Freeman, [k, K], where arcs linking vertices of the island to
1979; Brandes, 2001); closeness – overall com- their neighbors outside the island have weights w
munication centrality (Sabidussi, 1966); eigenvec- lower than are the values of arcs of a spanning tree
tor centrality (Bonacich, 1987); hubs and inside the island.
authorities – two eigenvector-based importance Very efficient, O(max(n.log n, m)) for vertex
measures (user, provider) for directed networks islands and O(m.log n) for line islands, algorithms
(Kleinberg, 1998); and clustering coefficient – exist for determining the islands hierarchy
local density (Watts and Strogatz, 1998). (Zaveršnik and Batagelj, 2004).
There are also several popular weights of lines: Cuts and islands are very general and efficient
Jaccard’s coefficient – the relative overlap of approaches to determine the important subnetworks
endpoints neighborhoods, cosine similarity, and in a given network as connected subnetworks
edge betweenness (Melançon and Sallaberry, (clusters) with stronger internal cohesion relatively
2008). Lines that belong to locally dense parts of to its neighbors. To use them we only have to
networks also belong to several short semicycles express the goals of our analysis with a related
called 3-rings and 4-rings (Ahmed et al., 2007; property of the vertices or weight of the lines. An
Batagelj and Zaveršnik, 2007; Schank and Wagner, important property of islands is that they identify
2005; Latapy, 2008). locally important subnetworks on different levels.
In acyclic networks (genealogies, citations) an Therefore, they can detect also emerging groups.
indicator of importance of an element is the
number of different paths from some initial vertex,
indeg(v) = 0, to some terminal vertex, outdeg
(v) = 0, which contain the element (Hummon and PATTERNS
Doreian, 1990; Batagelj, 2003). The CPM (Critical
Path Method) from operations research can be If a selected pattern or fragment (also called
used for their analysis. motif, Milo et al., 2002), determined by a given

5605-Scott-Chap36.indd 553 4/6/2011 12:13:16 PM


554 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

small graph, does not occur frequently in a sparse For some “nonstandard” such descriptions, see
network the straightforward backtracking algo- Moody (2001) and Harel and Koren (2001).
rithm applied for pattern searching finds all When clustering the vertices according to their
appearances of the pattern very fast even in the properties we can consider the network structure
case of very large networks (Batagelj, 1989; also as a relational constraint – the obtained
Batagelj and Mrvar, 1997). clusters should induce connected subnetworks
Pattern searching was successfully applied to of selected types (Ferligoj and Batagelj, 1983;
searching for patterns of atoms in molecula Batagelj and Ferligoj, 2000). Recently we devel-
(carbon rings) and searching for relinking oped an efficient hierarchical clustering algorithm
marriages in genealogies (Batagelj and Mrvar, for large networks (Batagelj et al., 2010). To
2008). obtain an efficient algorithm for large networks
we compute the dissimilarities between units
(vertices of network) only for endpoints of exist-
ing links (of constraining relation), define the
dissimilarities between clusters based only on the
CLUSTERING AND BLOCKMODELING dissimilarities of the corresponding links, and
derive the update relations. We also show that for
The clustering problem (Φ, P) can be expressed as selected dissimilarities between clusters, the
follows: Bruynooghe (1977) reducibility property holds.
This allows us to speed up the hierarchical cluster-
Determine the clustering C* ∈ Φ for which ing procedure by using the reciprocal nearest
P(C*) = min {P(C): C ∈Φ}. neighbors approach (Murtagh, 1985).
Clustering of networks is an important
where C is a clustering, Φ is a non-empty set of topic also in other disciplines such as numerical
feasible clusterings, and P: Φ → » +0 is a criterion mathematics and bioinformatics (Karypis and
function. Because in a graph G = (V, L) we have Kumar, 1999; Demmel, 1996). Physicists prefer
two kinds of objects – vertices and links – we can the term “community detection.” A recent detailed
speak about clustering of vertices and clustering of overview of results was prepared by Fortunato
links. Usually, we deal with clustering of vertices. (2010).
Because the set of units U is finite, the set of Not all clustering problems can be expressed
feasible clusterings is also finite. Therefore, the by a simple criterion function. In some applica-
set Min(Φ, P) of all solutions of the problem (opti- tions a general criterion function of the form
mal clusterings) is not empty. We denote the value
of the criterion function for an optimal clustering P(C) = ⊕{q(C1,C2): (C1,C2) ∈C×C},
by min(Φ, P). In theory the set Min(Φ, P) can be q(C1,C2) ≥ 0
determined by the complete search. Unfortunately,
the number of feasible clusterings grows very fast is needed. We shall use it in blockmodeling. The
with n = |U|. For example, card(Πk) = S(n, k), goal of blockmodeling is to reduce a large, poten-
where S(n, k) is the Stirling number of the second tially incoherent network to a smaller comprehen-
kind. For this reason the complete search algo- sible structure that can be interpreted more
rithm is only of theoretical interest – up to 15 to readily.
20 units. Although there are some special cluster- A clustering C partitions also the lines L into
ing problems of polynomial complexity it seems blocks L(Ci, Cj) = {e(u, v) ∈ L : u ∈ Ci ∧ v ∈ Cj}.
that they are mainly NP-hard (Brücker, 1978; Each such block consists of vertices belonging to
Garey and Johnson, 1979). clusters Ci and Cj and all lines leading from cluster
Joining the individual units into a cluster C we Ci to cluster Cj . If i = j, a block L(Ci, Ci) is called
make a certain “error,” we create certain “tension” a diagonal block.
among them – we denote this quantity by p(C). A blockmodel consists of structures obtained
The criterion function P(C) combines these by identifying all units from the same cluster of
“partial/ local errors” into a “global error” P(C) = the clustering C. For an exact definition of a
⊕{p(C): C∈C}, where ⊕ denotes operations such blockmodel we have to be precise also about
as + or max. which blocks produce an arc in the reduced or
In standard clustering methods, the “cluster image network and which do not, of what type is
error” function p(C) is usually based on an it, and what its value is. The set of allowed types
appropriate dissimilarity between vertices. determines the type of the equivalence (for details,
The usual approach is to define a vector see Doreian et al., 2005; Batagelj and Ferligoj,
description [v] = [t1, t2, …, tm] of each vertex 2000; Žiberna, 2007).
v ∈ V, and then use some standard dissimilarity δ The obtained optimization problem can be
on » m to compare these vectors d(u, v) = δ([u], [v]). solved by local optimization. Also, blockmodeling

5605-Scott-Chap36.indd 554 4/6/2011 12:13:16 PM


LARGE-SCALE NETWORK ANALYSIS 555

problems are NP-hard (Roberts and Sheng, VISUALIZATION


2001). Efficient approximative blockmodeling
algorithms for large networks are still to be Visualization of a network is an important tool for
developed. exploring its structure but also for communicating
the obtained results of analyses (Freeman, 2000).
Unfortunately, we get clear pictures only for
smaller sparser networks. Therefore, we often
visualize only selected important parts of the
TWO-MODE NETWORKS network or its blockmodel.
For not too large, denser networks quite inform-
A two-mode network N = (V1, V2, L, w) can ative visualizations can be obtained using matrix
be represented by a matrix A = [auv]V1×V2, representation with an appropriate ordering of
where auv = w(u, v) if (u, v) ∈ L, and auv = 0 vertices (Batagelj et al., 1999; Henry and Fekete,
otherwise. 2006). The ordering is usually determined by
Let N1 = (V1, V2, L1, w1) and N2 = (V2, V3, clustering or blockmodeling.
L2, w2) be two compatible (the second set of In the graph drawing community several
vertices of N1 is the same as the first set of vertices algorithms for visualization of large networks
of N2) networks. Then we can multiply the corre- were proposed (Hu, 2005; Hachul and Jünger
sponding matrices in the standard way. The 2007; Brandes and Pich, 2009) that reveal the
network N3 = (V1, V3, L3, w3) determined by the overall network structure if it exists.
product matrix is called a product network of
networks N1 and N2. A problem with network
product is that the product of two sparse networks
needs not be sparse itself. Fortunately, in many Pajek
important cases the sparsity can be guaranteed.
Most of the described procedures are implemented
For example in genealogies we can use the
in the Pajek program for analysis and visualiza-
network multiplication to compute from basic
tion of large networks (de Nooy et al., 2005;
kinship relations (parent, gender, and marriage)
Batagelj and Mrvar, 2003). It is freely available,
all other kinship relations: brother, uncle, grand-
for noncommercial use, at http://pajek.imfm.si.
mother, and so on (Batagelj and Mrvar, 2008).
Two-mode networks appear in many applica-
tions (e.g., papers, authors; people, events; board
members, companies). Essentially we can
transform any table units × properties into corre- REFERENCES
sponding two-mode networks (units, propertyi),
where the vertices in the second set are (intervals Ahmed, A., Batagelj, V., Fu, X., Hong, S-H., Merrick, D. and
of ) values of propertyi. Since the transpose of Mrvar, A. (2007) ‘Visualisation and analysis of the Internet
network (units, propertyi) is compatible with Movie Database’, Proceedings of the Asia-Pacific
the network (units, propertyj), we can, using the Symposium on Visualisation. New York: IEEE. pp. 17–24.
network product, compute the derived network Ahuja, R.K., Magnanti, T.L. and Orlin, J.B. (1993) Network
(propertyi, propertyj). Flows: Theory, Algorithms, and Applications. New Jersey:
A traditional approach to analysis of two-mode Prentice-Hall.
networks is to multiply the network with its Albert, R. and Barabási, A.-L. (2002) ‘Statistical mechanics of
transpose and then analyze the obtained one-mode complex networks’, Reviews of Modern Physics, 74:
network. 47–97.
There also are some direct methods for analyz- Alvarez-Hamelin, J.I., Dall’Asta, L., Barrat, A. and Vespignani,
ing two-mode networks. The Kleinberg (1998) A. (2005) ‘k-core decomposition: A tool for the visualiza-
hubs and authorities can be straightforwardly tion of large scale networks’, arXiv: cs.NI/0504107.
extended to two-mode networks. To adapt the Alvarez-Hamelin, J.I., Gastón, B.M. and Busch, J.R. (2009)
notion of cores for two-mode networks we define ‘Understanding edge-connectivity in the Internet through
a (p, q)-core as the maximal subset (V′1, V′2), such core-decomposition’, arXiv: cs.DM/0912.1424v1.
that in the induced subnetwork each vertex from Anthonisse, J.M. (1971) ‘The rush in a directed graph’,
V′1 has degree at least p and each vertex from V′2 Technical Report BN 9/71, Stichting Mathematisch
has degree at least q. A very efficient algorithm Centrum, Amsterdam.
exists for determining (p, q)-cores. For determin- Batagelj, V. (1989) ‘Similarity measures between structured
ing dense parts in a two-mode network we objects’, in A. Graovac (ed.), Proceedings of International
compute the 4-rings weights (there is no 3-ring) Course and Conference on the Interfaces between
and afterward apply the islands algorithm on them Mathematics, Chemistry and Computer Science, Dubrovnik,
(Ahmed et al., 2007). 20–25 June 1988, Vol. 63. Amsterdam: Elsevier. pp. 25–40.

5605-Scott-Chap36.indd 555 4/6/2011 12:13:16 PM


556 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Batagelj, V. (2003) ‘Efficient algorithms for citation network de Nooy, W., Mrvar, A. and Batagelj, V. (2005) Exploratory
analysis’, arXiv: cs/0309023. Social Network Analysis with Pajek. New York: Cambridge
Batagelj, V. and Ferligoj, A. (2000) ‘Clustering relational University Press.
data’, in W. Gaul, O. Opitz, and M. Schader (eds), Data Doreian, P., Batagelj, V. and Ferligoj, A. (2000) ‘Symmetric-
Analysis. Berlin: Springer. pp. 3–15. acyclic decompositions of networks’, Journal of
Batagelj, V., Ferligoj, A. and Mrvar, A. (2010) ‘Hierarchical Classification, 17(1): 3–28.
clustering with relational constraints of large data sets’, Doreian, P., Batagelj, V. and Ferligoj, A. (2005) Generalized
paper presented at IFCS’09, Dresden. Blockmodeling. New York: Cambridge University Press.
Batagelj, V. and Mrvar, A. (1997) ‘Pajek 0.14: Fragments, Dorogovtsev, S.N. and Mendes, J.F.F. (2003) Evolution of
June 15, 1997’, http://pajek.imfm.si/doku.php?id=history. Networks: From Biological Nets to the Internet and WWW.
Batagelj, V. and Mrvar, A. (2001) ‘A subquadratic triad census New York: Oxford University Press.
algorithm for large sparse networks with small maximum Esfahanian, A-H. (2008) ‘On the evolution of graph connectiv-
degree’, Social Networks, 23: 237–43. ity algorithms’, in Robin Wilson and Lowell Beineke (eds),
Batagelj, V. and Mrvar, A. (2003) ‘Pajek – Analysis and Selected Topics in Graph Theory. New York: Cambridge
visualization of large networks’, in M. Jünger and University Press.
P. Mutzel (eds), Graph Drawing Software. Berlin: Springer. Ferligoj, A. and Batagelj, V. (1983) ‘Some types of clustering
pp. 77–103. with relational constraints’, Psychometrika, 48(4):
Batagelj V. and Mrvar A. (2008) ‘Analysis of kinship relations 541–52.
with Pajek’, Social Science Computer Review – SSCORE, Fletcher, J.G. (1980) ‘A more general algorithm for computing
26(2): 224–46. closed semiring costs between vertices of a directed graph’,
Batagelj, V., Mrvar, A. and Zaveršnik, M. (1999) ‘Partitioning CACM, pp. 350–51.
approach to visualization of large graphs’, in Jan Kratochvíl Fortunato, S. (2010) ‘Community detection in graphs’, Physics
(ed.), Proceedings of 7th International Symposium on Reports, 486: 75–174; also arXiv: 0906.0612.
Graph Drawing, September 15–19, 1999, Štiřín Castle, Frank, O. and Strauss, D. (1986) ‘Markov graphs’, Journal of
Czech Republic. Berlin: Springer. pp. 90–97. the American Statistical Association, 81: 832–42.
Batagelj, V. and Vavpetič, A. (2010) ‘Fast Pathfinder algorithm Freeman, L.C. (1979) ‘Centrality in social networks: A concep-
for large sparse networks’, submitted paper. tual clarification’, Social Networks, 1: 211–13.
Batagelj, V. and Zaveršnik, M. (2002) ‘Generalized cores’, Freeman, L.C. (2000) ‘Visualizing social networks’, Journal of
arXiv: cs.DS/0202039. Social Structure, 1(1).
Batagelj, V. and Zaveršnik, M. (2003) ‘An O(m) algorithm for Garey, M.R. and Johnson, D.S. (1979) Computers and
cores decomposition of networks’, arXiv: cs/0310049. Intractability. San Francisco: Freeman.
Batagelj, V. and Zaveršnik, M. (2007) ‘Short cycle connectiv- Guerrero-Bote, V.P., Zapico-Alonso, F., Espinosa-Calvo, M.E.,
ity’, Discrete Mathematics, 307(3–5): 310–18. Crisóstomo, R.G. and de Moya-Anegón, F. (2006)
Bonacich, P. (1987) ‘Power and centrality: A family of meas- ‘Binary Pathfinder: An improvement to the Pathfinder
ures’, The American Journal of Sociology, 92(5): 1170–82. algorithm’, Information Processing and Management,
Brandes, U. (2001) ‘A faster algorithm for betweenness 42(6): 1484–90.
centrality’, Journal of Mathematical Sociology, 25(2): Habib, M. and Paul, C. (2009) ‘A survey on algorithmic
163–77. aspects of modular decomposition’, arXiv: cs.
Brandes, U. and Erlebach, T. (eds) (2005) Network Analysis: DM/0912.1457v2, 8 Dec 2009.
Methodological Foundations. Berlin: Springer. Hachul, S. and Jünger, M. (2007) ‘Large-graph layout
Brandes, U. and Pich, C. (2009) ‘An experimental study on algorithms at work: An experimental study’, JGAA, 11(2):
distance-based graph drawing’, in Proceedings of the 16th 345–69.
International Symposium on Graph Drawing. Berlin: Harary, F., Norman, R.Z. and Cartwright, D. (1965) Structural
Springer. pp. 218–29. Models: An Introduction to the Theory of Directed Graphs.
Brücker, P. (1978) ‘On the complexity of clustering problems’, New York: John Wiley.
in R. Henn, B. Korte, and W. Oettli (eds), Optimization and Harel, D. and Koren, J. (2001) ‘On clustering using random
Operations Research, Proceedings, Bonn 1977, Vol. 157. walks’, in LNCS 2245. Berlin: Springer-Verlag. pp. 18–41.
Berlin: Springer. Henry, N. and Fekete, J.D. (2006) ‘MatrixExplorer: A dual-
Bruynooghe, M. (1977) ‘Méthodes nouvelles en classification representation system to explore social networks’, IEEE
automatique des données taxinomiques nombreuses’, Transactions on Visualization and Computer Graphics,
Statistique et Analyse des Données, 3: 24–42. 12(5): 677–84.
Chen, C. (1998) ‘Generalised similarity analysis and Hill, R.A. and Dunbar, R.I.M. (2002) ‘Social network size in
Pathfinder network scaling’, Interacting with Computers, humans’, Human Nature, 14(1): 53–72.
10(2): 107–28. Holland, P.W. and Leinhardt, S. (1981) ‘An exponential
Cormen, T.H., Leiserson, C.E., Rivest, R.L. and Stein, C. (2001) family of probability distributions for directed graphs’,
Introduction to Algorithms. Cambridge, MA: MIT Press. Journal of the American Statistical Association, 76(373):
Demmel, J. (1996) ‘U.C. Berkeley CS267: Applications of 33–50.
parallel computers/graph partitioning, part 1 and part 2’, Hu, Y.F. (2005) ‘Efficient and high quality force-directed graph
http://www.eecs.berkeley.edu/demmel/cs267/. drawing’, Mathematica Journal, 10: 37–71.

5605-Scott-Chap36.indd 556 4/6/2011 12:13:16 PM


LARGE-SCALE NETWORK ANALYSIS 557

Hummon, N.P. and Doreian, P. (1990) ‘Computational meth- Papadopoulos, C. and Voglis, C. (2006) ‘Drawing graphs
ods for social network analysis’, Social Networks, 12: using modular decomposition’, in LNCS (GD’05) 3842.
273–88. Berlin: Springer. pp. 343–54.
Joeris, B.L., Lundberg, S. and McConnell, R.M. (2009) ‘O(m Pitts, F.R. (1978) ‘The medieval river trade network of Russia
log n) split decomposition of strongly-connected graphs’, in revisited’, Social Networks, 1: 285–92.
Proceedings Graph Theory, Computational Intelligence and Quirin, A., Cordón, O., Guerrero-Bote, V.P., Vargas-
Thought, Haifa, September 2008, LNCS 5420. Berlin: Quesada, B. and Moya-Anegón, F. (2008a) ‘A quick
Springer. pp. 158–71. MST-based algorithm to obtain Pathfinder networks (∞,
Karypis, G. and Kumar, V. (1999) ‘A fast and high quality n–1)’, Journal of the American Society for Information
multilevel scheme for partitioning irregular graphs’, SIAM Science and Technology, 59(12): 1912–24.
Journal on Scientific Computing, 20(1): 359–92. Quirin, A., Cordón, O., Santamaria, J., Vargas-Quesada, B.
Kleinberg, J. (1998) ‘Authoritative sources in a hyperlinked and Moya-Anegón, F. (2008b) ‘A new variant of the
environment’, Proceedings of the 9th ACM-SIAM Pathfinder algorithm to generate large visual science
Symposium on Discrete Algorithms. maps in cubic time’, Information Processing and
Kleinberg, J., Kumar, R., Raghavan, P., Rajagopalan, S. and Management: An International Journal Archive, 44(4):
Tomkins, A. (1999) ‘The Web as a graph: Measurements, 1611–23.
models and methods’, in Proceedings of the 5th Roberts, F.S. (1976) Discrete Mathematical Models. Englewood
International Computing and Combinatorics Conference, Cliffs, NJ: Prentice-Hall.
pp. 1–17 Roberts, F.S. and Sheng, L. (2001) 'How hard is it to determine
Knuth, D.E. (1993) The Stanford GraphBase: A Platform for if a graph has a 2-role assignment?’ Networks, 37(2):
Combinatorial Computing. New York: ACM Press. 67–73.
Kolaczyk, E.D. (2009) Statistical Analysis of Network Data: Robins, G.L., Snijders, T.A.B., Wang, P., Handcock, M. and
Methods and Models. Springer Series in Statistics. Berlin: Pattison, P.E. (2007) ‘Recent developments in exponential
Springer. random graph (p*) models for social networks’, Social
Latapy, M. (2008) ‘Main-memory triangle computations for Networks, 29(2): 192–215.
very large (sparse (power-law) graphs’, Theoretical Sabidussi, G. (1966) ‘The centrality index of a graph’,
Computer Science, 407(1–3): 458–73. Psychometrika, 31(4): 581–603.
Li, L., Alderson, D., Tanaka, R., Doyle, J.C. and Willinger, W. Schank, T., and Wagner, D. (2005) ‘Finding, counting and
(2005) ‘Towards a theory of scale-free graphs: listing all triangles in large graphs, an experimental study’,
Definition, properties, and implications’, arXiv: cond-mat/ in Workshop on Experimental and Efficient Algorithms
0501169. (WEA). LNCS 3503. Berlin: Springer, pp. 606–9.
Matula, D.W. (1977) ‘Graph theoretic techniques for Schvaneveldt, R.W. (ed.) (1990) Pathfinder Associative
cluster analysis algorithms’, in J. Van Ryzin (ed.), Networks: Studies in Knowledge Organization. Norwood,
Classification and Clustering. New York: Academic Press. NJ: Ablex.
pp. 95–127. Schvaneveldt, R.W., Dearholt, D.W. and Durso, F.T. (1988)
McCarty, C., Killworth, P.D., Bernard, H.R. and Johnsen, E.C. ‘Graph theoretic foundations of Pathfinder networks’,
(2001) ‘Comparing two methods for estimating network Computers & Mathematics with Applications, 15(4):
size’, Human Organization, 60(1): 28–39. 337–45.
Melançon, G. and Sallaberry, A. (2008) ‘Edge metrics Schvaneveldt, R.W., Durso, F.T. and Dearholt, D.W. (1989)
for visual graph analytics: A comparative study’, in 12th ‘Network structures in proximity data’, in G. Bower (ed.),
International Conference on Information Visualisation, IV. The Psychology of Learning and Motivation: Advances in
610–15. Research and Theory, Vol. 24. New York: Academic Press.
Milo, R., Shen-Orr, S., Itzkovitz, S., Kashtan, N., Chklovskii, D. pp. 249–84.
and Alon, U. (2002) ‘Network motifs: Simple building Seidman, S.B. (1983) ‘Network Structure and Minimum
blocks of complex networks’, Science, 298(5594): Degree’, Social Networks, 5: 269–87.
824–27. Wasserman, S. and Faust, K. (1994) Social Network Analysis:
Moody, J. (2001) ‘Peer influence groups: Identifying dense Methods and Applications. Cambridge: Cambridge
clusters in large networks’, Social Networks, 23: 261–83. University Press.
Murtagh, F. (1985) ‘Multidimensional clustering algorithms’, Watts, D.J. and Strogatz, S. (1998) ‘Collective dynamics of
Compstat lectures, 4. Vienna: Physica-Verlag. ‘small-world’ networks’, Nature, 393: 440–42.
Newman, M.E.J. (2003) ‘The structure and function of Zaveršnik, M. and Batagelj, V. (2004) ‘Islands’, slides
complex networks’, SIAM Review, 45: 167–256. from Sunbelt XXIV, Portorož, Slovenia, 12–16 May 2004.
Newman, M.E.J., Barabási, A-L. and Watts, D. (2006) http://vlado.fmf.uni-lj.si/pub/networks/doc/sunbelt/islands.
The Structure and Dynamics of Networks. Princeton pdf
Studies in Complexity. Princeton, NJ: Princeton University Žiberna, A. (2007) ‘Generalized blockmodeling of valued
Press. networks’, Social Networks, 29: 105–26.

5605-Scott-Chap36.indd 557 4/6/2011 12:13:16 PM


37
Network Visualization
Lothar Krempel

INTRODUCTION and database technologies, the development of


efficient algorithms has become a technological
With the spread of the network paradigm to many driver in the last 20 years. While matrix algebra
disciplines from sociology and ethnology to com- was the formal language that allowed many con-
puter science, biology, physics, and economics, cepts of social network analysis to be formalized
many computer programs have become available previously (Wasserman and Faust, 1994), it is not
that allow networks to be represented visually. well suited to programming computers today,
While graphical representations of network data because large networks are typically sparse
are easier to produce than ever before, the quick (Brandes and Erlebacher, 2005). All this allows
dissemination of these new technologies has not us to analyze huge networks and large amounts
unlocked their potential as of yet. The knowledge of data that can hardly be overseen in numeri-
of how to improve visual representations requires cal form. These days, the analysis of network
a much more active understanding of these new data is typically accompanied with visualiza-
exploratory tools. tions, which allow us to view the overall system
This chapter seeks to contribute to a more general easily.
understanding of visualization technologies. The While computers became available after the
aim is to set out some of the basic principles 1950s, the early computing technology deployed
of network visualization and to disseminate was especially suited to numerical computations.
knowledge about how the efficiency of network Graphical display devices were expensive, and
visualizations can be enhanced. How and why the computing power was limited. Low-resolution
visualizations have the potential to supplement the graphical devices for small computers did not
numerical analysis of networks with a more explor- appear before the mid-1980s, and color output
atory approach needs to be better understood. devices were not available before the early
Collecting network data was for a long time 1990s. Today, graphical depictions provide the
cumbersome – even for small networks. The means to examine networks of some thousands
Internet has changed all this. Today, vast amounts of nodes visually, which is not possible for
of information have become available and allow numerical data.
us to analyze the interplay of thousands or Advances in the field are driven by different
even millions of individuals, technical units, or communities: the social networks community is
semantic units, linked into large systems. often motivated by substantive and methodologi-
Progress in network research has been driven cal questions, the mathematical Graph Drawing
by several developments that have eased access to Community studies all sorts of mappings to 2D
ever larger network data in recent decades. Besides and 3D space under various constraints,1 and the
the tremendous increase in computing power information visualization community is especially

5605-Scott-Chap37.indd 558 4/6/2011 4:52:28 PM


NETWORK VISUALIZATION 559

concerned with interfaces that enable us to gain Especially rich graphs describe the interrelations
additional insights into network data. A fourth of numerous concepts. Network text analysis (NTA),
group is the statistical graphics community which seeks to represent the content of natural lan-
(Wilkinson 2005, 2008; Chen et al., 2008), which guage by formal graph grammars (Diesner and
actively strives to integrate many of the new visual Carley, 2004a, b), results in rich relational data
options to enhance more traditional statistical sets that describe relations among n different sets
diagrams. Motivated by the fascination of dynamic of nodes. Graphs that represent text through vari-
systems and the possibilities of digital visualiza- ous instances, such as actors, places, resources,
tion, artists, too, have turned their attention to the institutions, and so on, are n-mode graphs.
analysis and depiction of data flows and network
topologies (Ars Electronica, 1994).

MAPPING NETWORKS

NETWORKS AS MATHEMATICAL GRAPHS The most important task in mapping networks is


to determine the 2D or 3D locations of the nodes
Networks are composed of nodes that are linked to from the links of a graph. Such a layout encodes
each other. Nodes are entities of the real world: certain features of a network that maintain as
individuals, organizations, nations, and technical much information as possible relating to the
or logical instances that are connected by links. embeddedness of the nodes.
See Figure 37.1.2 While higher dimensional spatial representa-
Links can be of various kinds: contact, friend- tions have greater degrees of freedom, a factor
ship, control, command, exchange, investment, that allows them to disentangle more of the
trade, or information. Links can also describe co- complexities of a network in the image space,
occurrences, co-authorships, citations, and much intuitive navigation interfaces are needed to
more. explore such orderings in greater detail. Additional
The formal definition of a mathematical graph transformations are also needed to explore
describes observations as a set of nodes that are 3D representations through a 2D window by
linked by relations. The links (pairs of nodes) perspective projections.
are a subset of all possible pairs, the Cartesian Some mappings of network data result in land-
product of the node set. scapes in which proximity in the image corre-
Links can be undirected or directed. If links in sponds to the strength of the observed linkages.
a network have different strengths, the graph is Entities linked up in networks are typically repre-
deemed to be valued. When nodes are connected sented as points or rings, and linkages are repre-
by different types of links, it is a multigraph. sented as straight lines between the nodes. In
Graphs connecting two distinct sets of nodes contrast to geographical maps, proximity in net-
are referred to as bipartite or two-mode graphs works is defined by functional references: who is
(Borgatti and Everett, 1997). strongly connected to whom, or who is connected

Carol

Andre Fernando

Diane Heather Ike Jane

Beverly Garth

Ed

Figure 37.1 A schematic network drawing

5605-Scott-Chap37.indd 559 4/6/2011 4:52:28 PM


560 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

in the same way to whom. Proximity in ordered Algorithms


social networks describes spheres of influence,
potential scopes of action, and contexts of entities Various planar encodings of network data can
that are mutually significant. Their significance carry different messages. Figure 37.2 depicts the
varies with the type of relationship (i.e., friend- capital ties of the largest hundred German compa-
ship, contact, communication, cooperation, nies in 1996 with the help of a spring embedder
exchange, commerce, transference of information, (Höpner and Krempel, 2004). Visualizing the
energy flows, or food chains). capital ties in this way produces a layout in which
Assigning nodes to coordinates in planar space companies are placed close when company A
was for a long time performed by trial and error. holds shares in B. A second layout of the same
Today, we employ algorithms that are capable of data in Figure 37.9b encodes status differences
moving connected nodes close to each other, and displays these with a radial layout. Companies
while nodes connected by indirect paths or uncon- with a high status are found at the center of the
nected nodes are mapped at a distance. Various drawing, while the distance to companies on the
kinds of spring embedders are currently the most periphery corresponds to their status differences,
used algorithms, whereas multivariate statistical with the result that strongly linked companies are
procedures such as factor analysis, correspon- not necessarily placed close to each other.
dence analysis, and SVD (singular values decom- Additionally, the location of companies with a
position) are other tools employed to produce similar status (same distance from the center) is
spatial embeddings (Freeman, 2000, 2005). optimized so that companies with ties are placed
closely together.
The invention of statistical procedures to repre-
sent similarities and distances in statistical and
Network maps network data goes back to the pioneering work of
Torgerson (1958) and Kruskal (1964) at Bell Labs
For centuries the humanities had a very distant in the 1960s and 1970s. In light of observations on
relationship to any form of graphic representation similarities or distances, they designed algorithms
of scientific knowledge, and cartography was that allowed them to embed observations in metric
among the first sciences to represent information space (Kruskal and Wish, 1984). Inconsistencies
in visual form. Cartographic maps inform us in the distance data were resolved by a type of
about “what is where.” least squares procedure. This statistical treatment
Cartographers in the sixteenth century knew follows many of the ideas on how cartographers
how to use triangulations to represent places in map geographical distance into 2D maps. The fit
maps. In the plane, the distance from location A to of these mappings can be inspected with the
location C can be computed by measuring the Torgerson diagram, which relates the distances in
distance between AB and the angles of the lines the image to the data distances.
connecting A and B to C. Mapping streets, ship- Today, the placement problem is typically
ping routes, trade networks, and movements solved by employing various kinds of spring
between places with graphical symbols has proved embedders (Eades, 1984; Fruchterman and
to be a very informative way of proceeding, which Reingold, 1991; Kamada and Kawai; 1989), which
has many uses in social life. arrange the nodes of a graph by translating links
Because many social phenomena exhibit a into mechanical forces that are counterbalanced
more or less strong dependence on physical dis- by repulsive forces that mimic the repulsion of
tance, geographical space is a natural frame of “electrical fields” to enforce a minimal distance
reference for social networks. Trade networks around each of the nodes. The repulsive forces can
have been mapped into geographical maps for be scaled, which leads to smaller or larger dis-
more than 200 years (Playfair, 1807; see also tances in the image: close neighbors are spread,
Friendly, 2008); mobility patterns are another while large distances are shrunk. The scaling does
form of information that has been extensively not affect the readability of a layout as long as the
studied by geographers, mapping their flows to neighborhoods around the nodes are preserved.
geographical space (Tobler, 1987, 2004). Central nodes are found at the center of such
The comparison of geographical and network drawings, while nodes with low or only local
mappings has much potential for helping us under- connectivity are placed at the periphery.
stand how social activities change the world by While the algorithm of Fruchterman and
overcoming geographical distance by means of Reingold draws networks using direct links, the
modern communication and transport technologies. Kamada and Kawei algorithm requires distance
Surprisingly, the field has not been intensively stud- data. Typically the geodesic distances, the shortest
ied, though it seems to offer a great opportunity for paths connecting any pair of nodes, are used to
understanding human behavior in a changing world. compute the layout. Depending on the weights of

5605-Scott-Chap37.indd 560 4/6/2011 4:52:28 PM


NETWORK VISUALIZATION 561

Deutsche Bahn R+V Versicherung


DG Bank
Henkel

Bosch Victoria Degussa Lufthansa BayerischeLB


Bosch-Siemens BMW

Bilfinger+Berger AGIV EVS


Siemens AMB

Wacker-Chemie
Bayer Bayerische Hypo Hamburger Gesellschaft
Schering Dresdner
Mˆ…nchener Bank
Rˆ…ck Hoechst
BASF

Allianz Buderus
Vereinte
Beiersdorf VIAG Colonia
Bayerische Vereinsbank
Bewag
VEAG
MAN
Metallgesellschaft
Volkswagen RWE Continental Bankgesellschaft Berlin

Daimler-Benz VEBA NordLB


Linde Deutsche Bank
VEW Preussag
Thyssen
RAG
Commerzbank
Deutz
Holzmann WestLB
Gerling
Sˆ…dzucker Karstadt Krupp
Deutsche Babcock
Ruhrgas
Mannesmann

Figure 37.2 A spring-embedded layout of German capital ties for 1996

the links, a single strong link can outperform sampled, there is no information about how any
many weak links attached to a node that moves units are linked.
strongly linked nodes closer to each other. Relational data, however, describe connections
The relative attractiveness of spring embedders between observed units. A mapping that preserves
results from their ability to achieve very different the local environments of the linked units allows
representations. Layouts can approach metric us to trace who is connected to whom: friends are
space but also achieve gridlike layouts when the placed closer to each other than to friends of
repulsing forces are increased. The main charac- friends. Direct influences can be read by examining
teristic of the embedders’ layouts is, however, that close nodes that are directly linked.
spring algorithms provide information about the To view the systemwide potential of social
local connectivities, that is, who is linked to action, network metrics, such as centralities
whom and the strength of this linkage. Connected (closeness or betweenness) or status measures, are
nodes are typically placed close to each other. needed. These measures evaluate not only the
direct links but also the indirect links to access the
potential global impact of social action. This shifts
Many more planar spaces the focus of the analysis from bilateral action to
a system perspective: actors occupying higher
Because spatial embeddings are the most effective ranks in a distribution are considered to be more
graphical means to map network metrics, many influential.
approaches seek to use planar space to convey The Graph Drawing Community explores
network properties. mathematical graphs with algorithms that produce
Traditional statistical displays map bivariate planar, orthogonal, grid-based, hierarchical, or
relations as scatter plots. The x and y coordinates circular layouts. Other types are graphs with
in the image depict two attributes of an observed curved or orthogonal lines. These algorithmic
unit measured on a sequential (metric) scale. approaches seek to explore meaningful represen-
These scales determine the spacing of the x or y tations under all sorts of different constraints.
axis and the location of the observed instance in a Aesthetics that are known to enhance the overall
drawing. As observations in statistical surveys are readability of a visual representation such as

5605-Scott-Chap37.indd 561 4/6/2011 4:52:28 PM


562 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

crossing minimizations are additionally performed Encoding


at certain stages of the algorithms.
Drawings can be simplified if the image space Efficient map making is described by Bertin
is confined to a number of equidistant points (1983) as the encoding of numerical data into
defining a grid in 2D or 3D space. Reducing the elementary perceptual tasks. Applying the “natu-
resolution of an image by means of grids produces ral orders” of human perception makes visual
rank orders of connectivity. Dense centers are communication almost automatic. If universal
spread while large distances are shrunk. Such codes are used, the graphic language becomes
transformations, however, limit the visibility of instantaneous and international. If there are strict
links when dense graphs are displayed. translation rules that enforce a bijective mapping
A layout that approaches hierarchies in net- (so that a visual representation maintains the order
works is the layered map: the y axis is used to and the relations between the observations), visual
convey information about actor status, while signs can be decoded into human impressions that
nodes are placed on the x axis so that connected exactly match the information that is contained in
nodes are positioned close (Brandes et al., 2002). the numerical data.
Centrality maps are radial orderings that group Human impressions of visual stimuli have been
nodes around the center of a drawing, where the studied in psychology for more than a hundred
distance from the center reflects difference in years. Psycho-physical scaling and psychometric
centrality, authority, or other network metrics. functions describe how physical dimensions of
Nodes with lower values are placed on more dis- visual stimuli are related to human impressions
tant concentric circles. Given these constraints, (Stevens, 1975). To efficiently encode information
links between the units can still be optimized so into visual signs it is necessary to know how
that connected nodes on different circles are posi- observers can read (decode) given graphical infor-
tioned close. mation. Apart from the depiction of lines, most of
these functions are nonlinear.

VISUAL LAYERS OF NETWORK Decoding


ATTRIBUTES Visualizations are more effective if they can be
interpreted more quickly, enable us to discern
Translating numerical information visually does more distinctions, and offer fewer errors than
not just provide a researcher with a more complete alternative presentations. Rules that allow an
multivariate view, enabling them to observe how observer to retrieve the encoded visual informa-
actors are embedded in the global structure and tion very fast make visualizations effective. As has
facilitating communication of structural findings been noticed from the reports of many practitio-
to scientific and nonscientific audiences. As ners, certain visual encodings can be read almost
Jacques Bertin (a French cartographer) notes in instantaneously (Tufte, 1983, 1990), while others
his “Semiology of Graphics” (1983), the advan- create visual puzzles.
tage of using the visual system is that it permits That certain perceptual tasks can be read
several pieces of numerical information to be extremely fast is explained by the fact that the
communicated simultaneously, whereas numbers, human brain processes elementary perceptual
mathematical formulae, and written language tasks in parallel through specialized centers. Pre-
have to be read sequentially. attentive perception needs less time than the
From a more general perspective, visualiza- movement of the human eye (less than 200 milli-
tions translate numerical information into the seconds). Complex graphical symbols, however,
visual sign system. Encoding numerical informa- which may combine several pieces of information
tion into visual layers is best thought of as using as icons or use metaphors, are typically much less
independent communication channels, each of efficient. Their meaning is also limited to specific
which transmits a separate piece of information. cultural domains, while elementary perceptual
Choosing various visual modes to map network tasks are not.
properties allows properties of the network to
be studied with respect to the ordering principles
of a given layout. Efficient data visualization
requires knowledge of both computer graphics
(how to encode information) and properties of VISUAL ALPHABET FOR NETWORKS
human visual perception (how humans decode
graphical information) and when this decoding is Nodes and lines can be of different sizes, can have
very fast. different colors or textures, and can be rendered

5605-Scott-Chap37.indd 562 4/6/2011 4:52:28 PM


NETWORK VISUALIZATION 563

with 2D or 3D cues. Most of these are already Lines


found in Bertin’s list of elementary perceptual
tasks (locations, sizes, textures, colors, shapes, Lines can have different sizes (widths), which can
directions, angles). A more complete list, as iden- easily lead to overlapping if graphs are dense.
tified by more recent vision research, identifies This can be compensated for to a certain degree if
2D versus 3D cues, movement and flicker, which lines are arranged by size, so that strong (short)
are read pre-attentively. Combinations of several lines are drawn on top of weak (long) links.
of these tasks, however, are not pre-attentive but Color-coded lines can be derived from node
need a longer time to be decoded. attributes of the source or target nodes, but they
can also represent attributes of the links them-
selves. If links have quantitative attributes, it is
possible to use quantitative color schemes that
Sizes assign equidistant colors to numerical ranges.

How depictions of graphical signs are translated


into sense impressions has been the subject of
research in psycho-physics for more than 100 Color
years. Stevens (1975) proposed a general relation- Encoding attributes with color is a very complex
ship between the magnitude of a physical stimulus topic, which can hardly be sketched in this article,
and its perceived intensity or strength, which is but it has enormous potential. Even today color
described as a power law: f(I) = kIa, where I is the perception is only understood at very basic levels.
magnitude of the physical stimulus, f(I) is the Colors can be used to create distinguishable and
psycho-physical function relating to the subjective ordered impressions. On higher levels of color
magnitude of the sensation evoked by the stimu- perception, colors are also related to aesthetical
lus, a is an exponent that depends on the type of impressions, cultural meanings, and physiological
stimulation, and k is a proportionality constant reactions.
that depends on the type of stimulation and the Human color impressions are organized accord-
units used. This permits many kinds of physical ing to three dimensions: hue, lightness, and satu-
stimuli and how they are related to corresponding ration. This provides three layers to communicate
impressions to be explored. information. Each of these visual cues can carry
While the human impression of lines is linear its own signal.
(and has an exponent of 1), the “visual area” of a Although there are many perception-oriented
marker is related to the physical area scaled by an color systems that differentiate colors according
exponent of 0.7 – a rule that has been indepen- to tone, brightness, and saturation, almost all of
dently discovered in cartographic praxis and is these systems fail to describe uniformly perceived
regularly applied when depicting the sizes of gradations. The Munsell color system in Figure
cities on a map. 37.3 is considered to be perceptually uniform.
Today’s psychometric colors “unbeknownst to
many” have already gained entry into our every-
day life. In 1976 these colors were introduced as
Shapes and symbols
international standards (CIE Lab). They are the
Classes of nodes can be rendered onto a layout results of not only decades of quantification by an
using shapes, icons, or symbols. Color codes are ambitious group of colorimetricians but also the
an alternative. Elementary shapes such as circles, identification of mathematical functions by means
triangles, quadrangles, stars, or 3D elements such of which the psychometric Munsell System can be
as cubes or cones are shapes that can be used to applied to the physical model of colors.
communicate different classes of nodes. Symbols Colorimetricians have been exploring color
and trademarks are other ways of marking entities phenomena since the beginning of the twentieth
in network representations, but their meaning is century and have succeeded in mapping the
limited to specific cultural domains. physical properties of light (red, green, blue) into
Pictograms are used today in many public sign human color sensations (hue, lightness, and satu-
systems to communicate information. Such signs ration). After a century’s effort, they have identi-
originated with the Vienna school of image statis- fied complex formulae that describe how
tics and the work of Otto Neurath and Gerhard combinations of physical light waves are related
Arntz in the 1920s, who developed simplified to (barely) noticeable differences in human color
symbols (“isotypes”), signs designed to provide perception (Wyszecki and Stiles, 1982).
everyday people with insight into complex social To make things more complicated, the appear-
phenomena (Neurath, 1936, 1937; Hartmann, ance of single colors is modified by additional
2002). variables, most importantly by the contrast to the

5605-Scott-Chap37.indd 563 4/6/2011 4:52:28 PM


564 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Figure 37.3 The Munsell System differentiates between nine levels of lightness and 10 hues,
which are organized radially on each of the vertical levels. Colors with identical saturation
(chroma) are equidistant to the center. It is a perceptually uniform color system

background of a drawing. The impressions of a Cynthia Brewer (1994, 1999), a geographer at


color scheme vary greatly in their contrast to the Penn State who has put much effort into devising
surrounding background (Jacobson and Bender, color schemes for geographical maps that are very
1996). A dark background lets color appear well informed about the potential of modern
brighter, while white backgrounds dim the appear- color systems. Not only has she developed color
ance of the same color scheme. Communicating schemes that allow qualitative, sequential, or
information with colors is thus highly dependent diverging distributions of attributes but she also
on the overall composition of a drawing, and the use addresses special topics such as color blindness.
of hue, lightness, and saturation contrasts as well as Her color schemes are a good starting point when
the contrast to the background of a drawing. quantities or distributions of exogenous data
Psychometric color systems describe levels of have to be mapped onto layouts of networks
color that are perceived in the human brain as (cf. Figure 37.4).
equidistant. They are the key to using color to The requirements for encoding statistical infor-
communicate ordered and quantitative informa- mation into color schemes have been spelled out
tion. Modern perceptually equidistant color sys- by Rogowitz and Treinish (1996): to encode
tems like CIE Lab have been international nominal classes, colors should not be too dissimi-
standards since 1976 and allow grades of hues, lar. For rank orders, colors should be perceived as
saturation, and lightness to be chosen so that the ordered. To encode quantitative information, color
values encoded appear equidistant to human gradients are needed where the different levels
beings. This enables color schemes to be devel- appear equidistant.
oped that communicate nominal, ordinal, and
even metric information. HSB and HSV are
related standards that display color in similar
dimensions but do not scale the dimensions in a MAPPING GRAPH PROPERTIES
perceptual way.
If attributes are to be communicated with A second type of picture emerges when the effort
colors, it is worth taking a look at the work of is made to depict the special qualities of a

5605-Scott-Chap37.indd 564 4/6/2011 4:52:28 PM


NETWORK VISUALIZATION 565

27 217 117 231 102 230 166 102


158 95 112 41 166 171 118 102
119 2 179 138 30 2 29 102

0.448 0.475 0.474 0.426 0.517 0.667 0.48 0.4

179 253 203 244 230 255 241 204


226 205 213 202 245 242 226 204
205 172 232 228 201 174 204 204

0.821 0.846 0.831 0.852 0.924 0.934 0.894 0.8

247 222 198 158 107 66 33 8 8


251 235 219 202 174 146 113 81 48
255 247 239 225 214 198 181 156 107

0.981 0.911 0.842 0.75 0.62 0.5 0.378 0.264 0.166

255 254 253 253 253 241 217 166 127


245 230 208 174 141 105 72 54 39
235 206 162 107 60 19 1 3 4

0.968 0.919 0.848 0.746 0.649 0.534 0.422 0.321 0.241

158 213 244 253 254 255 230 171 102 50 94


1 62 109 174 224 255 245 221 194 136 79
66 79 67 97 139 191 152 164 165 189 162

0.216 0.428 0.568 0.742 0.877 0.972 0.903 0.783 0.64 0.455 0.363

103 178 214 244 253 247 209 146 67 33 5


0 24 96 165 219 247 229 197 147 102 48
31 43 77 130 199 247 240 222 195 172 97

0.134 0.283 0.507 0.724 0.89 0.968 0.879 0.723 0.503 0.349 0.158

Figure 37.4 Color schemes for the communication of qualitative, sequential, and divergent
distributions (Cynthia Brewer, www.colorbrewer.org)

5605-Scott-Chap37.indd 565 4/6/2011 4:52:29 PM


566 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Carol Degree Carol Closeness


centrality centrality

Andre Fernando Andre Fernando

Ike Jane
Diane Heather Diane Heather Ike Jane

Beverly Garth Beverly Garth

Ed Ed

(a) (b)

Betweenness Carol Eigenvector


centrality centrality
Andre
Fernando Andre Fernando

Ike Jane
Diane Heather Ike Diane Heather

Beverly Garth Beverly Garth

Ed

(c) (d)

Figure 37.5 Using size to different centralities makes it easy to compare their
distributions (compare to Figure 37.1). (a) Degree; (b) Closeness; (c) Betweenness;
(d) Eigenvector centrality

network, its component entities, or certain subsys- Figures 37.5 a–d map different centralities onto
tems in the form of additional graphic features. the schematic layout of Figure 37.1 through the
This necessitates the use of additional graphic sizes of the nodes. This permits us to analyze their
attributes: sizes, colors, or forms that graphically distributions in detail and to read which actors are
ascribe these characteristics to the layout of the considered important by means of a specific type
network. In this way, graphical-theoretical qualities of centrality.
derived from the linkages are integrated into the Mapping graph properties as a second layer of
depiction and can thus be read simultaneously. information onto the planar layout of a network
If the centrality of the particular entities is por- produces information-rich landscapes, which
trayed by means of the size of the symbols, then a allow us to explore the layout in greater depth.
reading of the graphic representation provides They provide orientation in a similar way to
additional information about who is involved in an geographical maps. The fascinating thing about
especially large number of relationships (degree), these charts is that they fit together a multitude of
who can reach many agents via particularly short observations, like pieces of a jigsaw puzzle, into a
paths (closeness), and who controls an especially picture of the system as a whole. The human
large number of the shortest linkages to an adja- eye can discover particular patterns in them with
cent network (betweenness). Coding node proper- relative ease.
ties using the sizes of the symbols makes for a Of special interest are all intermediate levels of
simple way to study global and local positions. social structures. Dense areas are subsets of nodes

5605-Scott-Chap37.indd 566 4/6/2011 4:52:29 PM


NETWORK VISUALIZATION 567

that are closely connected. A zoo of concepts areas that only contain members of a specific set
exists that can be applied to identify cohesive (cf. Johnson and Krempel, 2004). Mapping the
subsets in networks (components, cores, cliques, blocks for the Southern Women data set yields
n-cliques, clans, and clubs). Figure 37.7b. In this case, we find that the spring
To demonstrate how various network metrics embedder layout has positioned all blocks in sepa-
can be mapped simultaneously onto the layout of rate areas of the drawing. Reading the pie charts
a network, we use the classic “Southern Women” of the women also allows us to discover that
network data set (Davis et al., 1941). This data set Dorothy and Pearl are both connected to the cen-
describes the interaction patterns of 18 women tral block of events only and therefore hold a
participating in 14 informal events over a period distinct position in the network (cf. Doreian et al.,
of nine months. This bipartite graph has often 2005: 257–65).
been used to demonstrate the usefulness of new Whereas visual approaches to single networks
network algorithms in the literature (Breiger, allow us to examine the complete distributions of
1974; Freeman, 2003). Figures 37.6 and 37.7 the nodes and their properties in a layout, com-
demonstrate how various properties of this well- parisons of different networks need additional
studied graph can be mapped with different normalizations, correcting for the number of
graphical layers onto the layout, which has been nodes or lines. Comparisons of different networks
produced with the help of a spring embedder. typically make heavy use of traditional statistical
Figure 37.6a displays the two types of nodes methodologies. Exceptions to this are dynamic
(women and events) using two different colors (in networks that trace network changes over time.
the original version, yellow and blue) and maps If the focus is to compare systems, a whole
the degrees of the women and events with sizes. range of statistics can be used. Graphs can be
Positions and roles describe sets of structurally compared on the system level by their density,
equivalent actors, that is, actors who have similar their degree, their transitivity and clustering, and
profiles of connections and certain comparative the number of dense areas or positions.
advantages: high levels of autonomy or competi-
tion. As long as intermediate structures such as
cores or blocks are used to detect subgraphs, the
nodes are decomposed into nonoverlapping sub-
sets (partitions). To display these classes, it is MAPPING EXPLANATIONS
sufficient to use different hues. A computation of
a two-mode block model for the Southern Women A third class of “analytical graphics” emerges if,
dataset yields three structurally equivalent blocks in similar fashion, external information about the
for the events and two for the women. Mapping component units or their interrelationships (e.g.,
the block membership with colors (in the original theoretical classifications or independently gath-
version, dark green, yellow, and dark blue for ered data) is introduced into the representation. In
the events; light green and light blue for the mapping explanations, typically color schemes
women) onto the layout of Figure 37.6a results in are used.
Figure 37.6b. Attributes of the links can greatly help to under-
Pie charts allow the connections of the women stand how relations between different subsets of
to the different event blocks to be viewed in external classes of actors (“catnets” as defined by
greater detail. They depict the number of links to White, 2008) are organized. Color codes of parti-
different blocks and reveal which women are con- tions and color schemes derived from these exter-
nected to a particular event block. Figure 37.7a nal classifications can be used to display who is
shows that all women are only connected to two of connected to whom and to what extent.
the event blocks (in the original version, either the Mapping exogenous attributes onto the layout
yellow/blue or yellow/green). The yellow events of a graph makes it possible to explore how actors
are central and are visited by both groups. of a certain kind interact in the network and how
Another graphical element is the convex hull, a given pattern of external attributes relates to the
which is useful for identifying sets of actors in a layout of a graph (Figure 37.8). Again, correla-
given layout. A convex hull is a concept from tions will appear as local patterns that may allow
computational geometry and is used here to us to understand the possible causes of emergent
observe how partitions of the nodes are distributed social processes.
in a network layout. A hull wraps all nodes of a In an analysis of equity capital interrelation-
given class by identifying the area that is covered ships, for example, classifying firms as industrial
by these nodes. If hulls are computed for all node enterprises, banks, and insurance companies, and
sets of a classification, their intersections identify selecting a different color for each category facili-
areas where members of different sets are placed tates recognition of particular concentrations in
close to each other, while indicating exclusive the network, with any preponderance of units

5605-Scott-Chap37.indd 567 4/6/2011 4:52:30 PM


568 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Charlotte
E4
DGG: Southern women
E1 E3 spring embedding
E5 Brenda
Eleanor
Laura

E2 Theresa
Evelyn
Frances

E7
Ruth E6
Verne
E8 Sylvia
E13
Nora
Pearl Katherine

E9 Helen E14

E12
Dorothy Myrna

E10

E11
Flora Olivia

(a)

Charlotte
E4
DGG: Southern women
E1 E3 two−mode blockmodel
E5 Brenda
Eleanor
Laura

E2 Theresa
Evelyn
Frances

E7
Ruth E6
Verne
E8 Sylvia
E13
Nora
Pearl Katherine

E9 Helen E14

E12
Dorothy Myrna

E10

E11
Flora Olivia

(b)

Figure 37.6 A bipartite graph: Davis Southern Women. (a) Layout, degrees and sets;
(b) A two-mode blockmodel: two women and three event blocks

5605-Scott-Chap37.indd 568 4/6/2011 4:52:30 PM


NETWORK VISUALIZATION 569

Charlotte
E4
DGG: Southern women
E1 E3 two−mode blockmodel
E5 Brenda
Eleanor
Laura

E2 Theresa
Evelyn
Frances

E7
Ruth E6
Verne
E8 Sylvia
E13
Nora Katherine
Pearl
E9 Helen E14

E12
Dorothy Myrna

E10

E11
Flora Olivia

(a)

Charlotte
E4
DGG: Southern women
E1 E3 two−mode blockmodel
E5 Brenda
Eleanor
Laura

E2 Theresa
Evelyn
Frances

E7
Ruth E6
Verne
E8 Sylvia
E13
Nora
Katherine
Pearl
E9 Helen E14

E12
Dorothy Myrna

E10

E11
Flora Olivia

(b)

Figure 37.7 A block model: Southern Women. (a) Pie charts as node symbols;
(b) Using convex hulls

5605-Scott-Chap37.indd 569 4/6/2011 4:52:30 PM


570 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Two sets of nodes

Color scheme for links


Finance
within and between
classes

Industry Finance Industry

Financial volumes Finance

A
Industry
B

Figure 37.8 Mapping external attributes

of the same color displayed indicating internal dominant positions, while the industrial cluster
interrelationships. can be detected in the north-north-west of the
These can be examined more closely by means outer circles.
of lines in a derivative color scheme: the extent to
which such investments are held exclusively by
banks and industrial enterprises or whether the
majority of the interrelationships consists of equity COMPLEX AND LARGE DRAWINGS
capital interpenetration by banks and industrial
enterprises. In this case, utilizing different colors Networks of several thousands of nodes are not
projects a theoretically significant classification easily displayed, even if large output formats are
onto the arrangement of a network. used. The analysis of large networks has to use
The depiction makes it possible to ascertain formal or substantial strategies that illuminate
whether the theoretical process of differentiation processes in the overall structure.
exhibits systematic patterns in the optimized A common strategy is to apply some sort of
arrangement of the network. In contrast to a filtering, which reduces networks to the most con-
purely statistical treatment, weak local intercon- nected nodes or most dominant lines. The idea is
nections also emerge in networks. They indicate to discern some sort of backbone to the overall
the structure’s potential for development. structure. Node-cuts or line-cuts are two strategies
The spring embedder solution reveals a central that can help to identify the most important parts
core formed of cross-linked banks, which (in the of a network. A node-cut results from a decision to
original color version of this image) appear as a keep only nodes that surpass a certain threshold –
yellow pattern in the center of the drawing and a for instance, nodes with a certain degree or
second (dark) industrial cluster in the north-east of centrality. The subgraph will contain only lines
the drawing (Figure 37.9a). between the selected elements. If, however, we
In the radial drawing (Figure 37.9b), which is impose a threshold for the lines (line-cut), the
based on the same data, status differences are subgraph is defined by all nodes that are con-
encoded. Such a drawing rests on the assumption nected by lines that surpass a certain threshold.
that the bilateral control rights that are affiliated Only nodes that are linked by at least one of the
with a capital link go beyond direct control. Here selected lines are contained in the subgraph.
the insurer Allianz holds the most dominant posi- Another approach is to select dense areas that
tion in the center, whereas the other cross-linked surpass a certain threshold of connectedness.
banks appear on the semi-periphery (i.e., they Cores are node sets that are linked by a certain
have lower status). Looking at the color patterns, number of ties. While many definitions of dense
it is easy to see that the banks hold the most clusters generate overlapping cliques, cores are

5605-Scott-Chap37.indd 570 4/6/2011 4:52:31 PM


Kapitalverflechtungen in Deutschland 1996

Mannesmann Ruhrgas
Deutsche Babcock
Südzucker Karstadt Krupp
Gerling

Holzmann WestLB
Deutz
Commerzbank
RAG
Thyssen
VEW Preussag
Linde Deutsche Bank
Daimler−Benz VEBA NordLB

Volkswagen RWE Continental Bankgesellschaft Berlin


MetallgesellschaftMAN
VEAG
Bewag
Bayerische Vereinsbank
Beiersdorf VIAG Colonia
Vereinte Allianz
Buderus

Schering BASF Münchener Rück Hoechst


Bayer Bayerische Hypo Hamburger Gesellschaft
Wacker−Chemie
Dresdner Bank
Siemens AMB

Bilfinger+Berger AGIV EVS

Bosch−Siemens BMW
Degussa Lufthansa BayerischeLB
Bosch Victoria

Henkel
DG Bank
Deutsche Bahn R+V Versicherung

(a)

(b)

Figure 37.9 Capital ties and attributes. (a) Attributes and spring layout; (b) A radial layout
of status differences (Baur et al., 2008) (Capital Ties and Attributes: A Radial Layout of Status
Differences. Baur, Brandes and Wagner)

5605-Scott-Chap37.indd 571 4/6/2011 4:52:31 PM


572 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

nested hierarchically, which results in nonoverlap- alternative if sequences of drawings are used,
ping network partitions. when there is only a small turnover in the popula-
Blockmodeling is the traditional approach to tion over time.
analyzing social networks and allows graphs to be Structural growth processes represent simple
reduced to block structures (partitions of the cases, where a growing number of relations
nodes), which provides information on who is reshape a population of nodes over time. Links
connected to similar actors in the system. attach to an early core and produce snowflake-like
Structural equivalence seeks to identify positions growth. New links (that do not decay) connect an
(sets of the nodes) that are connected to (identical) increasing number of nodes over time. Looking at
actors. Social positions need not be densely con- the development of collaborations among graph-
nected; they describe actors that are engaged in drawing scientists, Graphael (Forrester et al.,
the same contacts. Aggregating nodes and ties 2004) present a network that has developed around
for blocks yields a reduced graph (simplified an initial core.
structure and image) that describes interrelations To trace networks diachronically, sequences of
between positions (Krempel, 2005). drawings can be used. However, if the layout
Multigraphs are composed of different kinds of changes too much between single points in time,
links. In such a case, a peeling approach is it becomes too difficult to trace what happens. The
advised. Which type of link achieves the highest Graph Drawing Community deals with this prob-
levels of connectivity? Which type of link contrib- lem by implementing algorithms that preserve
utes to the overall connectivity once the most mental maps, limiting changes to the nodes
dominant ties have been removed? between different points in time in the overall
Temporal networks are one of the frontiers of layout (Purchase et al., 2006). One strategy is to
today’s network research and visualization. compute the layout for the supergraph (the union
of all graphs in sequence) and to display only
The combined use of timing and relational infor- active elements at certain points.
mation is usually named “Dynamic Network Skye Bender-deMoll and McFarland (2006)
Analysis.”. . . Confusingly, the term “dynamic present various ways of how to visualize network
network” is often used in the literature to describe processes as sequences of images or as films. The
various specific subclasses: authors use smoothing techniques such as moving
averages that aggregate network information in
• Networks in which the edge and node sets larger time frames, or the interpolation of layouts
remain fixed, but values of attributes on nodes between discrete points in time, to achieve easier
and edges may vary in time (transmission readable results.
models) A temporal extension of radial drawings can be
• Networks in which edges are added or deleted found in GEOMI (Ahmed et al., 2006).
over time (computer networks, friendship
relations) The 2.5 D method is one of the solutions to repre-
• Networks in which the weights of edges sent temporal network data. In such a method, a
change over time (neural networks, exchange graph snapshot at a particular time is placed on a
networks) 2D plane, in which a layout algorithm can be
• Networks in which nodes are added or removed applied; a series of such planes are stacked
in time (ecological food webs, organizations) together following time order to show the changes.
In order to identify a particular node in a different
Clearly these categories are not exclusive (Bender- time plane, same nodes in different planes are
deMoll et al., 2008). connected by edges. Combined with navigation
tools in GEOMI, users can trace the change of each
Many real-world problems, however, exhibit more individual node’s relationship to others and also
complicated dynamics: if we trace capital ties can evaluate the evolution of the whole network
between companies over time, we find that new in general.
firms emerge, companies cease to exist, pairs of
companies merge into new legal entities, while As an example, Figure 37.11 shows the email con-
others split or spin off into new companies. nections of a certain research group. Each plane
Temporal networks, which describe graph represents one month, while each node is one
changes diachronically, are attracting growing person. The edges between nodes on the same
research interest in their analysis (Moody et al., plate depict the e-mail traffic between persons.
2005, de Nooy, 2008). As time adds an additional In addition, degree centrality is mapped to node
dimension to the data, there is also a tendency to size, while node color represents betweenness
use 3D drawings. 2D representations can be an centrality.

5605-Scott-Chap37.indd 572 4/6/2011 4:52:32 PM


(a)

(b)

Figure 37.10 Visualizing the comparative static development of the German company
system (1996–2006). (a) 1966; (b) 2000
(Continued)

5605-Scott-Chap37.indd 573 4/6/2011 4:52:32 PM


574 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

(c)

(d)

Figure 37.10 Cont’d (c) 2002; (d) 2006

5605-Scott-Chap37.indd 574 4/6/2011 4:52:32 PM


NETWORK VISUALIZATION 575

If relational observations are ordered according


to systematic rules and additional external infor-
mation is pictorially projected onto these orderings
in a way that takes psycho-physiological principles
into consideration, then the results are highly
optimized, graphical information landscapes –
artificial worlds that fit together manifold descrip-
tions of the same objects and reconstruct these
objects. This makes it possible to view local, mul-
tidimensional patterns and to study the positioning
of the elements that have been multiply described
in this way within the system as a whole.
The use of colors in particular expands the pos-
sibilities of discovering within these structures
concentrations of characteristics that identify
multivariate linkages. Both the technologies for
automatically generating colors and the facility
for utilizing different technologies to evoke simi-
lar color impressions on the part of different
people are based upon an enormously improved
understanding of the human perception of color.
Although the use of these color technologies has
quickly become very widespread in our everyday
lives, the scientific use of colors in the investiga-
tion of complex issues is still pretty much in its
formative phase.
The extent to which we are able to better under-
Figure 37.11 Geomi: Emails between stand and apply these rules will determine how
scientists over time (emails between well we can exploit the natural attributes of human
Scientists Over Time: A Temporal Extension perception for scientific purposes. To this end,
of Radial Drawings can be Found in GEOMI, ergonomically optimized graphics use the particu-
GEOMI) Image courtesy Seok-Hee Hong lar capabilities of human perception in a system-
atic way. This makes it possible to combine the
potential of automatic procedures with the special
capacities of human perception.
SUMMARY The historical concern that visual mappings
create artifacts can be overcome if we apply sys-
The potential of such “visual statistics” is strongly tematic encoding rules to represent numerical infor-
dependent upon the resolution of a series of addi- mation and choose encodings that can be almost
tional questions. How can quantitative informa- automatically decoded. Along with procedures that
tion be communicated? In what cases can let us map social space into meaningful planar
depictions of manifold information be interpreted representations, a new world of scientific images
especially easily and quickly? French cartogra- becomes available. If done well, these images are
pher Jacques Bertin already provided an important bijective mappings that depict nothing else but the
key to understanding such fundamental problems information that is encoded in the numerical data.
of information processing in his 1983 work “The If this is the case, the researcher can move back
Semiology of Graphics.” and forth between the numerical data and their
What distinguishes visual symbols from other visualizations, making comparisons that offer
systems of signs (writing, language, and music) many new insights. Combining more traditional
is their ability to simultaneously communicate statistical exploration with exploratory visual
different types of information. Converting numer- inspection is especially promising when it comes
ical information is a process of translation into to generating new knowledge.
elementary graphic signs. With the elementary Visualizations can supplement statistical proce-
graphic attributes of size, color, and form, multi- dures to capture local events, which are typically
ple sets of information can be communicated undetected in statistical analysis because the
independently of each other and at the same time. observed local regularities only result in medium
If the natural categories of human perception are effects if computed on a systemwide scale. The
exploited in doing this, then the translation is potential of visualizations is that they can identify
especially effective. local combinations of external attributes, which

5605-Scott-Chap37.indd 575 4/6/2011 4:52:33 PM


576 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

are linked into clusters that are forerunners of Borgatti, S. and Everett, M.G. (1997) ‘Network analysis of
emerging social processes. Visualizations of multi- 2-mode data’, Social Networks, 19: 243–69.
dimensional network data are more sensitive than Brandes, U. and Erlebacher, T. (eds) (2005) Network Analysis:
traditional statistical approaches: while linear Methodological Foundations. Heidelberg: Springer.
statistics identifies causalities by revealing all the Brandes, U., Raab J. and Wagner, D. (2002) ‘Exploratory net-
instances of certain combinations of exogenous work visualization: Simultaneous display of actor status
variables, the visual layers disclose maximal con- and connections’, JOSS Journal of Social Structure, 2(4).
nected local patterns that are homogeneous for a Breiger, R.L. (1974) ‘The duality of persons and groups’, Social
specific combination of external variables. Such Forces, 53: 181–90.
patterns need more attention because they are Brewer, C.A. (1994) ‘Guidelines for use of the perceptual
candidates for emerging social processes – pro- dimensions of color for mapping and visualization’, in J.
cesses that are currently not completely under- Bares (ed.), Color Hard Copy and Graphic Arts III,
stood because our knowledge and information is Proceedings of the International Society for Optical
too limited. Visualizations can hint at where addi- Engineering (SPIE), San José, Vol. 2171. pp. 54–63.
tional information is needed and help to direct our Brewer, C.A. (1999) ‘Color use guidelines for data representa-
attention to domains that need further exploration. tion’, Proceedings of the Section on Statistical Graphics,
Mapping network data provides a starting point American Statistical Association, Baltimore. 55–60.
for all sorts of inquiries, no matter whether they Chen, C., Härdle, W. and Unwin, A. (eds) (2008) Handbook of
are quantitative or qualitative. Data Visualization. Berlin: Springer-Verlag.
Davis, A., Gardener, B.B. and Gardener, M.R. (1941) Deep
South. Chicago: University of Chicago Press.
Diesner, J. and Carley, K. (2004a) ‘AutoMap 1.2 Extract, ana-
lyze, represent, and compare mental models from texts’,
NOTES CASOS Technical Report, January 2004 CMU-ISRI-04–100.
Diesner, J. and Carley, K. (2004b) ‘Revealing social structure
1 A large number of publications are referenced from texts: Meta-matrix text analysis as a novel method
under http://www.graphdrawing.org. for network text analysis’, in Causal Mapping for
2 Color versions of the figures in this chapter Information Systems and Technology Research: Approaches,
are available from http://www.mpifg.de/people/lk/ Advances, and Illustrations. Harrisburg, PA: Idea Group
downl_de.asp. Publishing.
Dorein, P., Vladimir, B. and Ferligoj, A. (2005) Generalized
Blockmodeling. Cambridge University Press.
Eades, P. (1984) ‘A heuristic for graph drawing’, Congressus
Numerantium, 42: 149–60.
REFERENCES Forrester, D., Kobourov, S., Navabi, A., Wampler, K. and Yee, G.
(2004) ‘Graphael: A system for generalized force-directed
Ahmed, A., Dwyer, T., Forster, M., Fu, X., Ho, J., Hong, S.-H., layouts’, Department of Computer Science, University of
Koschützki, D., Murray, C., Nikolov, N.S., Taib, R., Tarassov, Arizona, http://graphael.cs.arizona.edu.
A. and Xu, P. (2006) ‘GEOMI: GEOmetry for maximum Freeman, L.C. (2005) ‘Graphic techniques for exploring social
insight’, In P. Healy and Eades (eds), Proceedings on Graph network data’, in Peter J. Carrington, John Scott, and
Drawing. Springer Verlag. pp. 468–79. Stanley Wasserman (eds), Models and Methods in Social
Ars Electronica. (2004) ‘Language of networks’. Conference Network Analysis. pp. 248–69.
and exhibition on networks, curated by Gerhard Dirmoser, Freeman, L.C. (2003) ‘Finding social groups: A meta-analysis
Lothar Krempel, Ruth Pfosser, and Dietmar Offenhuber, of the Southern Women data’, in Ronald Breiger, Kathleen
http://www.aec.at/en/festival2004/programm/LON_ Carley and Philippa Pattison (eds), Dynamic Social Network
folder_lowres.pdf. Modeling and Analysis. Washington, DC: National
Baur, M., Ulrik B. and Dorothea W. (2008) ‘Attribute-based Academies Press, 2003.
visualization in Visone’, at the 15th International Freeman, L.C (2000) ‘Visualizing social networks’, JOSS
Symposium on Graph Drawing, Sydney, Australia, Journal of Social Structure, 1(1).
September 2007. Friendly, M. (2008) ‘Milestones in the history of thematic
Bender-deMoll, S., Morris, M. and Moody, J. (2008) ‘Prototype cartography, statistical graphics, and data visualization’,
packages for managing and animating longitudinal net- http://www.math.yorku.ca/SCS/Gallery/milestone/
work data: Dynamic networks and RSonia’, Journal of milestone.pdf.
Statistical Software, 24(7), http://www.jstatsoft.org. Fruchterman, T.M.J. and Reingold, E.M. (1991) ‘Graph draw-
Bender-deMoll, S. and McFarland, D.A. (2006) ‘The art and ing by force directed placement’, Software-Practice and
science of dynamic network visualization’, JOSS Journal of Experience, 21(11): 1129–64.
Social Structures, 7(2). Hartmann, F. and Bauer, E.K. (eds) (2002): Bildersprache,
Bertin, J. (1983) Semiology of Graphics. Diagrams Networks Otto Neurath: Visualisierungen. Vienna: WUV
Maps: The University of Wisconsin Press. Universitätsverlag.

5605-Scott-Chap37.indd 576 4/6/2011 4:52:34 PM


NETWORK VISUALIZATION 577

Höpner, M. and Krempel, L. (2004) ‘The politics of the German a dynamic graph layout algorithm’, in Proceedings of
company network’, Competition and Changem, 8(4): 14th International Symposium on Graph Drawing,
339–56. Karlsruhe, Germany, September 2006.
Jacobson, N. and Bender, W. (1996) ‘Color as a determined Rogowitz, B.E. and Treinish, L.A. (1996) ‘Why should
communication’, IBM Systems Journal, 36(3 and4): 526–38. engineers and scientists be worried about color?’
Johnson, J.C. and Krempel, L. (2004) ‘Network visualization: http://www.research.ibm.com/people/l/lloydt/color/color.
The “Bush team” in Reuters news ticker 9/11–11/15/01’, HTM.
JOSS Journal of Social Structure, 5(1). Scott, J. (2000) Social Network Analysis. London: Sage.
Kamada, T. and Kawai, S. (1989) ‘An algorithm for drawing Spence, I. and Wainer, H. (1997) ‘Who was Playfair?’ Chance,
general undirected graphs’, Information Processing Letters, 10: 35–37.13
31(1): 7–15. Stevens, S.S. (1975) Psychophysics. Introduction to Its
Krempel, L. (2005) Visualisierung komplexer Strukturen. Perceptual, Neural, and Social Prospects. New York:
Grundlagen der Darstellung mehrdimensionaler Netzwerke. John Wiley.
Frankfurt: Campus. Tobler, W. (2004) ‘Movement mapping’, http://csiss.ncgia.
Kruskal, J.B. and Wish, M. (1978) Multidimensional Scaling. ucsb.edu/clearinghouse/FlowMapper.
Beverly Hills, CA: Sage. Tobler, W. (1987) ‘Experiments in migration mapping by
Kruskal, J.B. (1964) ‘Nonmetric multidimensional scaling: computer’, American Cartographer.
A numerical method’, Psychometrika, 29(2): 115–29. Tufte, E.R. (1990) Envisioning Information. Cheshire, CT:
Moody, J., McFarland, D.A. and Skye Bender-deMoll. (2005) Graphics Press.
‘Dynamic network visualization: Methods for meaning with Tufte, E.R. (1983) The Visual Display of Quantitative
longitudinal network movies?’ American Journal of Information. Cheshire, CT: Graphics Press.
Sociology, 110: 1206–41. Torgerson, W.S. (1958) Theory and Methods of Scaling.
Neurath, O. (1937) Basic by Isotype. London: K. Paul, Trench, New York: John Wiley.
Trubner. Wasserman, S. and Faust, K. (1994) Social Network Analysis:
Neurath, O. (1936) International Picture Language: the First Methods and Application. Cambridge: Cambridge University
Rules of Isotype. London: K. Paul, Trench, Trubner. Press.
de Nooy, W., Mrvar, A. and Batagelj, V. (2005) Exploratory White, H. (2008) Identity and Control. How Social
Social Network Analysis with Pajek. Structural Analysis in Formations Emerge. 2nd ed. Princeton, NJ: Princeton
the Social Sciences. New York: Cambridge University Press. University Press.
de Nooy, W. (2008) ‘Signs over time: Statistical and visual Wilkinson, L. (2008) ‘Graph-theoretic graphics’, in C. Chen,
analysis of a longitudinal signed network’, Journal of Social W. Härdle, and A. Unwin (eds), Handbook of Data
Structure, 9(1). Visualization. Berlin: Springer-Verlag. pp. 122-–50.
Playfair, W. (1807) An Inquiry into the Permanent Causes of Wilkinson, L. (2005) The Grammar of Graphics. New York:
the Decline and Fall of Powerful and Wealthy Nations Springer Science and Business Media.
London: W. Marchant for Greenland and Norris. Wyszecki, G. and Stiles, W. S. (1982) Color Science. Concepts
Purchase, H., Hoggan, E. and Görg, C. (2006) ‘How important and Methods, Quantitative Data and Formulae. 2nd ed.
is the “mental map”? – an empirical investigation of New York: John Wiley.

5605-Scott-Chap37.indd 577 4/6/2011 4:52:34 PM


38
A Reader’s Guide to SNA
Software
Mark Huisman and Marijtje A.J. van Duijn

INTRODUCTION general sense on the usefulness of particular


packages for their own research (Erickson, 2005;
Where can I find a comprehensive list of software Butts, 2007). We have provided the reader with
applications for social network analysis? This an overview of 56 selected programs and toolkits
seems a likely question, especially for a researcher for SNA.
who is new to social network analysis (SNA) or The selection of software is based on the
who is not familiar with software for SNA. The two comprehensive lists mentioned before: the
answer to the question of whether such a list INSNA list and the Wikipedia list, leaving out
exists1 is not a simple yes or no. Yes, there the programs merely aimed at visualization and
are several lists available in the literature and, highly specialized programs not directly suitable
more importantly, on the Internet, but no, none of for the analysis of social networks. Searching the
these lists are complete or comprehensive. Internet, we found software that was suitable for
Two good starting points in the search for SNA review but not mentioned in the two lists. We
software can be found, however: the comprehen- stress at this point that our list is probably not
sive collection of SNA tools publicly available on complete either, as it is a selection of available
the software pages on the International Network software (i.e., software we were able to find up
for Social Network Analysis (INSNA) Web site to January 2010) to analyze (certain aspects of)
and the software articles about social network social networks. However, we do think that it
analysis in Wikipedia. And, with this chapter, we contains the most prominent and important
hope to have created a third starting point: The list programs in the field.
of programs and toolkits reviewed here are also We will not review programs in detail, but we
available on an accompanying Web site (http:// give a global description and categorization of
www.gmw.rug.nl/~huisman/sna/software.html; their characteristics, highlight new developments,
URLs of all Web sites mentioned in the text are and make general comparisons between packages.
provided in Table 38.5 in the references). The focus is on social network analysis, although
Making an overview of software is a seemingly we do inspect visualization routines in analysis
hopeless task in a fast-changing field of research. tools. Network visualization is the topic of inves-
By definition, a software list becomes outdated tigation of Krempel’s chapter (this volume).
soon if not immediately after publication. Still, we Applications for social networking like Facebook,
feel the need for information on software pack- Twitter, or LinkedIn (boyd and Ellison, 2007) are
ages, in such a way that readers may obtain a not discussed either.

5605-Scott-Chap38.indd 578 4/19/2011 5:06:11 PM


A READER’S GUIDE TO SNA SOFTWARE 579

Table 38.1 Major SNA packages reviewed in the last 20+ years. Reviews by Freeman (1988),
Wasserman and Faust, (1994), Degenne: and Forsé (1999), Scott (2002), Huisman and van
Duijn (2005a), and Loscalzo and Yu (2008) and Kirschner (2008)
Program F WP DP S HvD LY,K
1988 1994 1999 2002 2005 2008

SONIS M
SONET M
GRADAP M M M m
STRUCTURE M M P M M
SNAP M m
NEGOPY/FATCAT/MultiNet M M M M
UCINET M M P M M M
KrackPlot M m m
Pajek M M m
NetMiner M M
StOCNET M m
Other packages 1 19 17

M = considered a major package in the corresponding review.


m = considered a minor package in the corresponding review.
P = considered a popular package in the corresponding review.
Italics indicate no change in the program with respect to previous review.

For ordering the selected software we chose the In the early 1990s (and in the 1980s), GRADAP
three general introductory texts on social network and STRUCTURE were major programs like
analysis, by Wasserman and Faust (1994), Degenne UCINET, but their position was taken over by the
and Forsé (1999), and Scott (2002). The three programs Pajek and NetMiner. MultiNet should
books together give a brief review of seven com- be positioned between the early programs (it
puter programs for social network analysis (see emerged from the even older programs NEGOPY
also Scott, 1996). These seven programs, which and FATCAT) and the recent developments, and it
can be considered the major SNA programs of the had its peak around 2006. This classification of
1990s, are listed in Table 38.1.2 programs is supported by the number of (soft-
Table 38.1 almost presents a brief history of ware) workshops organized at the INSNA Sunbelt
SNA software (Freeman, 1988, gives a history of conferences on social networks since 2000. All 11
tools up to 1988; Hummon and Carley, 1993, Sunbelt conferences (including the one in 2010)
present a history of major events in SNA, includ- featured workshops on UCINET and SIENA (one
ing software packages, up to 1990) and contains of the main programs in the StOCNET package).
four extra programs besides the seven mentioned Pajek workshops have been organized for the last
in the textbooks: the older, and by now discarded, nine years, starting in 2002, and MultiNet work-
programs SONIS and SONET (reviewed by shops were held in four years (2000, 2003, 2005,
Freeman in 1988), and the two more recently 2006). The workshop schedules also reveal two
developed packages NetMiner and StOCNET emerging major software packages: statnet/sna
(reviewed in 2005 by Huisman and van Duijn, and (workshops since 2006), and ORA (2009, 2010).
in 2008 by Loscalzo and Yu and Kirschner). Most
programs are general programs containing many
routines and analysis methods, with two excep-
tions: KrackPlot, one of the first graph-drawing AN OVERVIEW OF SNA PACKAGES
programs, and StOCNET, aimed at statistical
modeling of cross-sectional and longitudinal net- The 56 software packages selected for our review
work data. Three of the major general programs are presented in Tables 38.2 and 38.3. Most of
were no longer updated in 2002 (GRADAP and these packages are listed on the INSNA Web site
STRUCTURE) or 2005 (SNAP). Only one pro- and in the articles about social network analysis in
gram, UCINET, is present in all reviews, is still Wikipedia. Table 38.2 lists 42 standalone software
regularly updated, and can be considered the most programs, and Table 38.3 contains 14 software
prominent SNA package of the last 20+ years. toolkits and libraries. Both tables describe the

5605-Scott-Chap38.indd 579 4/19/2011 5:06:11 PM


580

5605-Scott-Chap38.indd 580
Table 38.2 Overview of programs for social network analysis: objectives, version number, data format (type, input format)}, functionality
(visualization, analysis methods), and support (availability, help)
Data Functionality Support
a b c
Package Objective Version Type Input Vis. Analyses Avail. Helpd
General packages
Agna Applied graph/network analysis 2.1.1e c m Yes d,sl Free h,m
Blue Spider Network analysis 0.8.2 c,e m, ln Yes d,sl Com
DyNet (SE/LS) Knowledge visualization 1.1 c,e ln Yesi dc,d,sl,rp Comk h,m,t
GRADAP Graph definition and analysis 2.0e f c ln No d,sl,dt Com m
GUESS Visual exploration 1.0.3 c ln Yesi d,sl Freem m,t,u
InFlow Analysis and visualization 3.1 c,e,a,l In, n Yes d,sl,rp Com h,m,t
MDLogix solutions Analysis and visualization −g c,e m, ln Yes dc,d,sl,rp Com h,m
MuitiNet Contextual and network analysis 5.24 c,l In Yes d,sl,rp,dt,s Free h,m,t
NetMiner 3 Visual exploration and analysis 3.4.0 c,e,a m, ln Yes d,sl,rp,dt,s,dy Comk h,m,u
NetVis Dynamic visualization 2.0e c,e,a m, ln Yes d,sl Freem, n h,t
Network Workbench Analysis, modeling, visualization 1.0.0 c,e m, ln Yes d,sl Freem h,m,t,u
ORA Dynamic network analysis 1.9.5 c,e,a,l m, ln Yesi dc,d,sl,rp,dt,dy Free h,m,t,u
Pajek Network analysis and visualization 1.26 c,a,l m, ln Yesi d,sl,rp,dt,dy Free m,t,u
Sentinel Visualizer Link analysis and visualization 4.0 c,e In Yesi sl,dt Comk h.m
SocNetV Analysis and visualization 0.6 c,c m, ln Yes d,sl Freem h,m
STRUCTURE Structural analysis 4.2e f c,a m No sl,rp Free m
UCINET 6 (+NetDraw) Network analysis and visualization 6.220 c,e,a,l m, ln Yes d,sl,rp,dt,s Comk h,m,t,u
visone Analysis and visualization 2.4 c,e,a,I m, ln Yes d,sl,rp,dt Free m,u

4/19/2011 5:06:11 PM
5605-Scott-Chap38.indd 581
Specialized packages
CID-ABM Propagation of information 1.0 c m,ln NOJ dy Free m
C-IKNOW Knowledge networks − e,l n Yes dc,d,sl Free h,m

Commetrix Dynamic network visualization 1.4 c,e,l In Yesi dc,d,sl,dt,dy Comkl h


MetaSight Knowledge and email networks 4.16 c,e,a,l In Yes dc,d,sl Com h
Referral Web Exploration of Internet networks 2.0e e,l In Yes dc,d Free h,m
SONIVIS Virtual information spaces 0.8 c,a In Yesi dc,d,sl,dy Freem h,m,t,u
UNISoN Message networks 1.0 c,e,l ln Yes dc Free m
CiteSpace Citation networks 2.2 e In Yesi d,sl,dy Freen h,t,u
E-Net Egocentric network analysis 0.022 c,e m,ln Yes d,sl Free
Ego Net Egocentric networks − c,e m NoJ dc,sl Freem u
VennMaker Actor-centered network analysis 0.9 c,e m Yes dc,d Free m,t
Financial Network Analyzer Statistical analysis of financial data 1.2 c In No d,sl Freem h,m
e
PGRAPH Marriage network analysis 2.7 c In Yes d,rp Free mo
Puck Analysis of kinship data 0.7 c In No dc,d,sl,rp Freem h,m

(continued )
581

4/19/2011 5:06:11 PM
582

Table 38.2 (Continued)

5605-Scott-Chap38.indd 582
Data Functionality Support
a b c
Package Objective Version Type Input Vis. Analyses Avail. Helpd
Blanche Network evolution 4.8.1 c m Yesi s,dy Free h,m
PermNet Permutation tests 0.94e c m No dt,s Free h
PNet Exponential Random Graph Models 1.0 c,a,e m No s,dy Free m,t
Snowball Hidden populations −e f e m No s Freem m
StOCNET (+SIENA) Advanced statistical analysis 1.8 c m,ln No d,dt,s,dy Freem h,m,t,u
CFinder Dense groups and visualization 2.0.1 c,l ln Yes sl Free h,m
KeyPlayer Identifying nodes for interventions 1.45h c,e m,ln Noj sl Free h,m
KliqFinder Cohesive subgroups 0.11 C m,ln Noj sl,s Freem m,t
Network Genie Design and manage network surveys − c,e m,ln,n No dc Comn h,m,t
ONA surveys Organizational network surveys − c,e m,ln,n No dc Comk, n m,t
a
c = complete, e = ego-centered, a = affiliation, l = large networks (>10k nodes).
b
m = matrix, ln = link-node list, n = node list.
c
dc = data collection, d = descriptives, sl = structure/location, rp = roles/positions, dt = dyadic/triadic methods, s = statistical models, dy = dynamics.
d
h = build-in help function, m = manual, t = tutorial/demo, u = user group/mailing list.
e
Version number has not changed since previous review of 2005.
f
MS-DOS program.
g
Collection of several stand-alone programs.
h
KeyPlayer 1; there are two versions, see section on UCINET.
i
Supports visualization of network evolution.
j
Uses or calls on other paclcages for network visualization.
k
An evaluation/demonstration/trial version is available.
l
Free research collaboration: free software for a limited set of research projects.
m
Open-source software.
n
Internet program/Webstart available.
o
Manual is available after registration and payment of administration costs.

4/19/2011 5:06:11 PM
5605-Scott-Chap38.indd 583
Table 38.3 Overview of software toolkits and libraries for social network analysis: objective, language/environment version number, data
format (type, input format), functionality (visualization, analysis methods), and support (availability, help)
Data Functionality Support
a b c
Package Objective Environment Version Type Input Vis. Analyses Avail Helpd

NodeXL Analysis and visualization Excel/.NET 1.0.1 c,e In Yes dc,sl Freeh h,u
MatMan Matrix manipulation and analysis Excel 1.1e c m No d,sl,s Com h,m
SNAP Social network analysis Gauss 2.5e c m No d,sl,rp,dt,s,dy Com m
f h
JUNG Modeling, analysis, visualization Java 2.0 c m,ln Yes d,sl,rp,dt Free m,t,u
yFiles Network visualization Java/.NET 2.6/3.2 c,e In Yesf d,sl Comi m,t
LibSNA Social network analysis Python 0.32 c,l In No sl Freeh
NetworkX Complex networks Python 0.99 c,a ln Yes d,sl Freeh m,t,u
UrINet Web mining for networking data Python 0.83 c,e In Nog dc Freeh m
igraph Creating and manipulating graphs R/Python/C 0.5.1 c,e,l In Yes d,sl,rp.dt Freeh h,m,t,u
latentnet Latent position aud cluster models R 2.2.3 c m,ln Yes d,s Freeh h,m
RSiena Evolution of network and behavior R 4.0 c m,In No d,s,dy Freeh h,m,t,u
sna Social network analysis R 2.0 c,e,a,l m,In Yes d,sl,rp,dt,s Freeh h,m,t
statnet Statistical modeling of networks R 2.2 c,e,a,l m,ln Yes d,s,dy Freeh h,m,t,u
tnet Weighted and longitudinal data R 0.1.0 c In No d,sl Freeh h,m
a
c = complete, e = ego-centered, a = affiliation, l = large networks (>10k nodes).
b
m = matrix, ln = link-node list, n = node list.
c
dc = data collection, d = descriptives, sl = structure/location, rp = roles/positions, dt = dyadic/triadic methods, s = statistical models, dy = dynamics.
d
b = build-in help function, m = manual, t = tutorial, u = user group/mailing list.
e
Version number has not changed since previous review of 2005.
f
Supports visualization of network evolution.
g
Uses or calls on other packages for network visualization.
h
Open-source software.
i
An evaluation/demonstration/trial version is available.
583

4/19/2011 5:06:11 PM
584 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

main objective or characteristic of each program, Table 38.3 presents 14 toolkits and libraries,
the current version number (and whether it was without a distinction between general and special-
updated since 2005), and for toolkits and libraries ized. The packages are grouped according to their
the environment for which they are developed. environment (software packages/development
The data format distinguishes the types of data environment or programming language).
the program can handle and the input format. References of all programs can be found in the
Next, functionality is presented: availability of references section. URLs of individual packages
network visualization options and information on are not listed in the references. Instead, the Web
the type(s) of network analysis featured in the sites and URLs of all packages in Tables 38.2 and
program. Based on the network terminology 38.3 are presented on a Web site accompanying
and categorization of Wasserman and Faust this chapter. The Web site also lists software
(1994), we defined the following types of analysis aimed at network visualization and some pro-
(cf. Huisman and van Duijn, 2005a): grams for the analysis of specific applications
other than social network data, such as network
• data collection (e.g., survey design or Web text analysis.
searches); In the following subsections we briefly discuss
• descriptive measures (for both links and nodes); the three types of packages presented in Tables
• structure and location (approaches to groups 38.2 and 38.3. In each case, we refer to the review
and subgroups, for example, centrality or of 2005 (Huisman and van Duijn, 2005a) with
cliques); respect to the number of packages that were taken
• roles and positions (notions of social role, status, into account. Even though neither list is complete,
and position, for example, structural equivalence the comparison serves to illustrate the increase in
or blockmodeling); the sheer number of packages during the last 5 to
• dyadic and triadic methods; 10 years.
• statistical probability models (for example, QAP
or exponential random graph models);
• network dynamics (models for network evolution General packages
and longitudinal network data).
In the review of 2005, 22 programs were
The final property of the programs listed in the presented,4 of which 12 were general packages.
tables is the amount of support: the availability of The current list of general programs displayed in
the package (free or commercial, not listing Table 38.2 contains 10 of them. Two programs are
prices) and the type of help available (built-in help not listed because they are unavailable (both the
functions, manuals, tutorials, user/mailing lists).3 program and Web site were unavailable) or embed-
In Table 38.2, two types of programs are distin- ded in a newer package and no longer updated as
guished: general and specialized packages. We a separate program. Eight new general programs
define packages as general if they contain ample are presented. The major programs listed before in
procedures for general exploration and analysis of Table 38.1 (except those before 1994) are included
network data. General packages are not designed in this overview, although two, GRADAP and
merely to perform some specialized analysis, STRUCTURE, are no longer updated. The pack-
although some of them were originally developed ages MultiNet, NetMiner, Pajek, and UCINET are
for network visualization (e.g., visone) or suc- among the programs with the largest number of
ceeded (older) specialized programs (e.g., different SNA procedures (column functionality in
MultiNet). Table 38.2 lists 18 general programs, Table 38.2), making them the most comprehensive
which are presented in alphabetical order. In addi- programs. Another program with a comprehensive
tion, 24 specialized programs are distinguished. analysis list is ORA, which is new in the overview
Packages are categorized as specialized if they (developed after 2004).
contain a few distinctive procedures for network All programs (except GRADAP and
analysis (for example, KliqFinder to find cohesive STRUCTURE) contain visualization routines.
subgroups), or a range of analysis procedures to Almost all use link-node input files, especially the
perform a specific type of analysis (for example , more recent packages, which is not surprising
StOCNET for statistical analysis). The packages considering the need for software capable of ana-
are (roughly) grouped according to specialization: lyzing large networks (for example, as available
communication networks (knowledge/information/ via the Internet). Considering functionality, the
message), citation networks, egocentric networks, more recent packages often include routines and
financial networks, kinship networks, statistical functions that facilitate data collection or network
methods, analysis of subgroups, and network sur- dynamics (often also including visualization of
veys. Within specializations, the programs are network dynamics or evolution). Because of this
ordered alphabetically. increased functionality, the number of different

5605-Scott-Chap38.indd 584 4/19/2011 5:06:12 PM


A READER’S GUIDE TO SNA SOFTWARE 585

types of analysis is larger in some of the newer Web-based data. Almost all packages are freely
packages, although within a certain type of analy- available.
sis the number of measures may be reduced com- Table 38.3 contains an overview of software
pared to the older programs. Approximately half toolkits and libraries. Five of the 14 packages
of the programs are freely available, and some were already included in the 2005 review. Most
kind of support (in the form of a manual or built-in new developments are libraries with procedures
help) is always available (except for Blue Spider). for Python and R, but collections for Excel and
Table 38.1 shows that the popular, major pro- Java are also available. The R packages especially
grams of the last 5 to 10 years, MultiNet, NetMiner, cover a wide range of analysis methods, where we
Pajek, and UCINET, are still among the most com- consider the statnet suite together with the sna
prehensive programs. This is especially true with package to be a general package for social net-
respect to the number of different routines that are work analysis, and therefore one of the major
included in the programs. In order to compete, the (collection of) packages (as was already indicated
newer packages should at least have routines in all in in the first section, discussing the Sunbelt con-
analysis categories, and preferably they also ference workshops). One of the major statistical
include some new types of analysis. Such a pro- analysis programs, SIENA (in the StOCNET
gram is visone, with strong graphical procedures, package), was recently replaced by the R package
as is DyNet, which includes data collection RSiena, and together with the two packages men-
options. It appears that ORA has specific potential tioned before, sna and statnet, as well as igraph,
to become a major package, because it contains latentnet, and tnet, a comprehensive collection of
routines for data collection and network dynamics, (statistical) analysis procedures for SNA has
coupled with the advantage of being freely avail- become available in R.
able and having strong support functions. Almost all toolkits and libraries in Table 38.3 are
freely available and are open-source software. This
makes them especially useful in a programming
environment (such as Java, Python, or R), where
Specialized packages and toolkits the routines cannot only be freely used but also can
be modified according to a researcher’s interest.
The list contains 24 specialized packages, belong-
ing to one of the following categories: communi-
cation networks, citation networks, egocentric
networks, financial networks, kinship networks,
statistical methods, analysis of subgroups, and GENERAL SNA PROGRAMS: A CLOSER
network surveys. LOOK
Eight of the 10 programs in the 2005 list of
specialized packages appear in the current list
In this section, the separate general packages pre-
whereas two programs are not listed anymore
sented in Table 38.2 are briefly discussed. We start
because they are included in another (collection
the overview with the major programs UCINET,
of) program(s): FATCAT in MultiNet, and SM
Pajek, NetMiner, and MultiNet, which have been
LinkAlyzer in the MDLogix solutions package.
available for many years and were investigated in
Some of the programs have not been updated
detail in the 2005 review (Huisman and van Duijn,
since 2005 but are still available for analysis.
2005a). Next, one more recent program (ORA) is
The columns in Table 38.2 related to function-
presented, and we end with a brief overview of the
ality show that the specialized programs were
other programs listed in Table 38.2. As the pro-
developed to perform specific types of analysis.
grams are comprehensive general packages, they
About half of the programs do not have visualiza-
experience many (and sometimes large) revisions
tion routines, especially those aimed at statistical
on a yearly basis. Fortunately, for all programs
modeling or at network surveys. In the other cat-
detailed overviews of changes and updates can be
egories, where visualization is an important
found, and we mention some major updates when
exploratory tool (for example, for the detection of
deemed appropriate.
subgroups or analysis of egocentric networks),
graph-drawing routines are available or the pro-
gram facilitates visualization through other pack-
ages. As is the case with the general programs, the UCINET
most recently developed programs contain data
collection routines: Network Genie and ONA UCINET 6 (Version 6.220; Borgatti et al., 2002)
Surveys are developed to collect network data via is a comprehensive package for the analysis of
surveys, and most packages in the category com- social network data as well as other one-mode and
munication networks support the collection of two-mode data. It can handle reasonably large

5605-Scott-Chap38.indd 585 4/19/2011 5:06:12 PM


586 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

networks and contains a large number of social Network visualization is supported by the pro-
network analysis methods. In addition, the pro- gram NetDraw. NetDraw has advanced graphic
gram has strong matrix analysis routines. Manuals properties and updates can be downloaded sepa-
and a tutorial (Hanneman and Riddle, 2005) are rately (at the time of writing, version 2.084 was
available, and integrated within UCINET is the the latest). Figure 38.1 shows an example of the
program NetDraw for visualization of social net- NetDraw program presenting the Krackhardt
works. Some other programs are distributed with high-tech managers’ advice network (Krackhardt,
UCINET: KeyPlayer for identifying nodes for 1987; these data were used in Robins’s chapter,
interventions (see Table 38.2), Eicent for extend- this volume). UCINET contains a large amount
ing centrality measures to include node attributes, of analytic routines for the detection of cohesive
and Pajek, which can be launched from within subgroups and regions, (group) centrality meas-
UCINET. Hanneman and Riddle’s chapters (this ures, egocentric networks, and analysis of struc-
volume) give examples of analyses performed tural holes. It contains scaling routines
with UCINET. (multidimensional and two-mode scaling), proce-
UCINET is a menu-driven Windows program dures for cluster analysis, equivalence (structural,
that “is built for speed, not for comfort” (Borgatti role, and regular), and core-periphery models.
et al., 2002). The menus open parameter forms to Although the number of statistical techniques
specify the input for the procedures, and output is (based on probability models) is limited, the
displayed on the screen as well as saved in log program has strong permutation-based testing
files. The program is matrix oriented and data are procedures, especially the QAP procedures.
stored and entered in UCINET (matrix) format. Recent updates include QAP correlation and
For this purpose, the built-in spreadsheet can be regression based on the method of Dekker et al.
used, or the import and export functions, which (2007), of which an example is given in van Duijn
process several types of network formats5 (includ- and Huisman’s chapter (this volume). The pro-
ing the link-node Pajek format). In addition, gram also has a routine for estimating Holland
network generation procedures (e.g., Erdös-Rényi) and Leinhardt’s (1981) p1 model (see Robins,
are available. this volume).

Figure 38.1 NetDraw user interface presenting the graph of the Krackhardt high-tech
managers’ advice network

5605-Scott-Chap38.indd 586 4/19/2011 5:06:12 PM


A READER’S GUIDE TO SNA SOFTWARE 587

Pajek among lines that have one vertex in common,


approximately the same length for lines, and ver-
Pajek (Version 1.26; Batagelj and Mrvar, 1998, tices not too close to lines. All graphs can be
2010) is a program for the analysis and visualization improved by hand, and partitions and vectors rep-
of large networks (Batagelj et al., this volume). resenting attributes of vertices can be included.
Its main goals are to facilitate the reduction of Graphs can be saved in several output formats
large networks into smaller networks that can be (for example, BMP or EPS) by using the export
analyzed using more sophisticated methods, to function.
provide powerful visualization tools, and to imple-
ment a selection of efficient network algorithms
(Batagelj and Mrvar, 1998). The program is freely
available via the Pajek Wiki, which provides
NetMiner 3
news, updates, resources, help, and more. A refer-
ence manual is available, as well as an introduc- NetMiner 3 (Version 3.4.0; Cyram, 2009) is a
tion on exploratory network analysis with Pajek program for exploratory network analysis and
(de Nooy et al., 2005). Because a built-in help visualization of network data. The program allows
function is not available and handling the program users to explore network data interactively, inte-
is sometimes complicated, we find the textbook grating analysis and visualization methods, and it
very useful for novice users. helps to detect underlying patterns and structures
Pajek is developed to analyze very large net- of the network. NetMiner is a commercial product
works (millions of nodes), but it is probably (next to the basic module, specialized modules
best known for its powerful visualization tools. can be purchased separately), but a four-week
The implemented algorithms are based on six dif- evaluation version is available. NetMiner offers
ferent data structures (networks, partitions, per- good support with online help, a user’s manual,
mutations, clusters, hierarchies, and vectors) in and a message board on the Web site.
order to support abstraction by decomposing large NetMiner has adopted a network approach
networks into several smaller ones. The structure that is optimized for integrating analysis and
of the program is entirely based on the data visualization. Data can be entered via the built-
objects and the transitions among the objects. in spreadsheet editor or by opening data sets in
Menu items are ordered according to the data various formats (NetMiner NTF files, Excel
objects, and output of analysis is also often pre- spreadsheets, UCINET data sets), or data can
sented using the data structures so that it can be be simulated using different algorithms. The pro-
easily used as input of further analysis procedures. gram can handle large data sets, with many data
Data are entered using node and link (arcs/edges) manipulation options, a matrix calculator to
lists (for small networks, adjacency matrices can manipulate matrices, and a data manager to track
be used), or they can be simulated or defined the transformation history. It contains procedures
inside the program. Pajek has ample manipulation for the inspection of the connectivity and neigh-
options and descriptive methods for all the borhood structure of networks (e.g., structural
data structures and it facilitates nonstatistical holes, assortativity) and subgraph configurations,
analysis of longitudinal network data. The pro- shortest path routines, and routines to analyze
gram contains procedures for detecting structural cohesion (for example, components, cliques, or
balance and clusterability, hierarchical decompo- clans) and calculate centrality measures.
sition, and blockmodeling. And although it does Procedures for multidimensional scaling, cluster
not contain statistical procedures for networks analysis, matrix decompositions, and blockmode-
(there are some standard procedures for vectors ling are available, as well as routines to explore
and partitions), there is the option to call the the role-set structure of networks (structural, role,
statistical packages R and SPSS from Pajek. If and regular equivalence).
the program is available, Pajek will open it and More than UCINET and Pajek, NetMiner sup-
generate a script or syntax file to open the data ports a reasonably large number of statistical
object (usually networks or vectors) in the selected procedures. Some standard statistical routines are
program. available, like correlation (including autocorrela-
Pajek’s graphical options are advanced. It con- tions), regression analysis (including logistic
tains several layout procedures, ranging from regression), and permutation tests (including
simple layouts (circle, random) to more compli- QAP permutation). Moreover, the p1 model can
cated procedures based on eigenvectors and be fitted to network data, as well as the p* or
spring embedders, for both 2D and 3D visualiza- exponential random graph model (ERGM; see
tions. These procedures create network visualiza- Robins, this volume). This latter routine is based
tions according to the following rules: not too on the procedure implemented in MultiNet and
many crossing lines, not too many small angles uses pseudo-likelihood estimation, which gives

5605-Scott-Chap38.indd 587 4/19/2011 5:06:12 PM


588 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

biased results and can only be approximate at best ORA


(van Duijn et al., 2009). Recent updates of
NetMiner include procedures to fit power law ORA (Version 1.9.5; Carley, 2009) is described as
models (Clauset et al., 2009). “a risk assessment tool for locating individuals or
Like Pajek and NetDraw, NetMiner has groups that are potential risks given social, knowl-
advanced graphical properties. Almost all results edge, and task network information.” It is designed
are presented both textually and graphically. to analyze a large variety of networks including
Network drawing can be based on several spring- social networks, activity networks, knowledge
embedding algorithms or multidimensional scal- networks, communication networks, and more.
ing. Clustered, circular, and simple layouts are The program is capable of analyzing large-scale
also available. The program supports 3D visuali- multimode, multilink network data and can
zations and all visual displays can be manually assess changes in network structure over time, that
improved and saved in a wide variety of formats. is, it is a package for analyzing complex systems
Several other types of (standard) graphical dis- as dynamic social networks. Good support is
plays can be generated, such as pie charts, matrix offered via a comprehensive manual, tutorials, and
diagrams, box plots, scatter plots, or contour a mailing list.
plots. The main unit of input in ORA is the so-called
meta-network, an ecology of interlinked networks
that represents complex systems like organiza-
tions. A meta-network can be opened from ORA-
files (XML) or comma delimited files (CSV; from
MultiNet
Excel), or it can be created by importing networks
MultiNet (Version 5.24; Richards and Seary, of various data formats (including UCINET and
2009) is a program designed for exploratory data Pajek files). Data can also be imported using
analysis of networks. It can handle large data sets CEMAP II, a tool that allows input of data from a
and large numbers of variables. It combines wide and expandable set of real-world data sources
attribute data and structural data into a single (often Web-related, like networks extracted from
model to perform contextual analyses: analyses of emails, but also networks extracted from text
attributes in the context of the structure of the files), or networks can be generated using a vari-
network and vice versa. Results are always pre- ety of models and procedures. The program has a
sented both textually and in interactive visualiza- meta-network manager, and basic information on
tions, and the program has excellent online help. the active meta-network is provided in an editor
MultiNet is freely available and has a comprehen- and tool panel, which allows quick access to three
sive user’s manual (Seary, 2005). important tools: the ORA Visualizer, the reports
Some of the analysis methods and procedures tool, and the chart tool. Analyses are performed on
in MultiNet were originally contained in separate (partitions of) the network data by generating
programs, as was mentioned before. FATCAT reports for the selected meta-networks. Via the
can be used for categorical social network drop-down menu, statistics can be chosen that are
analysis, and PSPAR can fit the p* model for used to generate reports. This abundance of meas-
adjacency matrices (in link-node format) based ures include amongst others (various forms of)
on pseudo-likelihood (like NetMiner). More centrality, clusters, components, congruence, triad
recently NEGOPY, a program for finding cohesive counts, cliques, and key actors. Other types of
subgroups, was embedded in MultiNet. (statistical) analysis available are latent semantic
Like Pajek, MultiNet is designed for the analy- analysis, correspondence analysis, spatial autocor-
sis of large networks. It has routines to calculate relations (Geary’s C and Moran’s I) with randomi-
network descriptives (for example, betweenness, zation tests, and QAP analysis. Moreover, ORA
closeness, triad census for sparse networks), to can (visually) analyze changes in these statistics by
perform categorical network analysis (for exam- performing a “view measures over-time analysis.”
ple, contingency tables), and to analyze the Three types of (standard) charts are available in
structure of networks using eigenspace methods. ORA: bar charts, scatter plots, and histograms.
These eigenprocedures create visual displays of The charts are used to graphically display the
the network such that the location of the actors selected network measures. Next to the usual
reveals the structure of the relationships and options, ORA has some unique graphical proper-
their patterns. A number of standard statistical ties. Measurements and networks can be viewed
analysis (for example, ANOVA) of the links in over time, and network drill-down plots can be
the network are available; these results should made, as well as geospatial networks and node
be interpreted with caution as the assumption of clouds. Visualizations of networks are rendered in
independency of all relations will generally be the interactive ORA Visualizer. Different layouts
violated. can be chosen (amongst others spring-embedded,

5605-Scott-Chap38.indd 588 4/19/2011 5:06:12 PM


A READER’S GUIDE TO SNA SOFTWARE 589

MDS, tree, or circle), and 2D and 3D visualiza- packages with respect to functionality. Right
tions are possible, with good options to (manu- behind these programs are the medium-sized
ally) improve the graphs. The program also has packages, which still have many analysis or
graphical procedures for ego-networks and a graphical procedures. DyNet is one of these
group viewer to separate nodes into distinct medium-sized programs. It is a package for the
groups. Figure 38.2 gives an illustration of the analysis of network data unveiling relations and
ORA Visualizer, presenting the graph of the interconnections via graphical and textual outputs.
Krackhardt high-tech managers’ advice network, The package MDLogix solutions is a medium-
using the spring-embedded layout. sized package containing the programs VisuaLyzer,
to graphically analyze networks; EgoNet, for ego-
centric data; and linkAlyzer, to construct networks
from hidden populations. The program visone is
Other packages developed with the aim to integrate and advance
the analysis and visualization of networks. It has
The five programs described in the previous advanced graphical properties facilitating a wide
sections can be regarded as the major general range of graph layouts, and it contains some

Figure 38.2 ORA Visualizer user interface presenting the graph of the Krackhardt high-tech
managers’ advice network

5605-Scott-Chap38.indd 589 4/19/2011 5:06:12 PM


590 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

standard analysis routines that can be performed the last five years. Some of these programs focus
on multiple networks simultaneously. Moreover, on special types of communication networks, like
the statistical package SIENA is integrated to per- email networks or knowledge networks; others are
form longitudinal network analysis. more general, with the aim to collect data from the
Somewhat smaller packages are GUESS, Web even though they can handle all kinds of
InFlow, and the Network Workbench. GUESS is networks.
an exploratory analysis and visualization tool for One of the most comprehensive programs in
graphs and networks. It supports the export of Table 38.2 is Commetrix, an exploratory analysis
static images and dynamic movies. It is Java- tool for dynamic network data. The program
based open-source software (and it also uses reads all sources of accessible network data via
open-source software like JUNG), has many the Internet but is especially designed to analyze
graphical options, and has an interface to R, which (large) communication networks. It uses SNA
makes the statistical R packages (see Table 38.3) together with dynamic graph visualization to
available for analyses. InFlow is a commercial explore social networks, thus potentially qualify-
program for network mapping, especially aimed ing as a general program with procedures in
at organizational applications. It features some almost all analysis categories in Table 38.2.
descriptive and procedure-based routines, and it The number of different measures and routines
carries out network analysis and visualization Commetrix contains in these categories, however,
simultaneously. Finally, the Network Workbench is (yet) small, with only a few options for identify-
is a toolkit for large-scale network analysis, ing subgroups, eliciting core structures, or analyz-
modeling, and visualization. It is designed to be a ing network dynamics (for example, stability
resources environment to provide an online portal or integration of two networks). The focus is on
for researchers interested in a wide range of net- analyzing evolving patterns of electronic commu-
works, coming from different fields of research, nication like email or discussion lists. Specially
and it supports the integration and dissemination designed dynamic spring embedders are used to
of SNA algorithms. It contains some advanced visualize the large heterogeneous and evolving
analysis and modeling procedures and has contri- networks. Therefore, we consider Commetrix to
butions from JUNG and GUESS for network be a specialized program with which “the detailed
visualization. lifecycle of a communication network of thou-
The DOS-based programs GRADAP and sands of simultaneously changing relationships
STRUCTURE are outdated programs, which have becomes observable” (Trier, 2008).
some unique features that are not or not easily Other programs that analyze Web-based data
available in other software. Agna, Blue Spider, are C-IKNOW, MetaSight, ReferralWeb,
SocNetV, and Sentinel Visualizer are small pro- SONIVIS, and UNISoN. C-IKNOW is the exten-
grams (containing few routines), of which the sion of the older package IKNOW, which maps,
latter two were originally developed for network measures, and, if desired, modifies the knowledge
visualization. NetVis, an open-source Web-based and information flows in networks. It has auto-
tool, is also one of the smaller packages with mated data collection techniques that include
strong visualization options. Web-administered network surveys and proce-
dures to upload publicly accessible network data
from the Web. These data can be analyzed and
mapped, either in the form of egocentric network
SPECIALIZED PACKAGES AND TOOLKITS: visualizations or displays of (parts of) the com-
A CLOSER LOOK plete network. MetaSight is a commercial pack-
age that maps business expertise and relations
using networks generated from email data.
In this section, we briefly discuss the specialized SONIVIS is open-source Java-based software that
packages and toolkits presented in Tables 38.2 and can analyze and visualize so-called virtual infor-
38.3. We present the programs within their spe- mation spaces on the Web. The focus is on wiki-
cialization or environment without the aim to based information spaces (Weblogs and social
compare or rank them, as this depends very much networking sites are also examples of intended
on the purpose the researcher has in mind. virtual spaces), where different kinds of networks
(for example, social, knowledge, information, or
event) are investigated to explore and map all
Communication networks knowledge processes in a wiki. A Java-based
package that can access and analyze messages
A large number of packages for the collection and from usenet, a worldwide-distributed Internet dis-
analysis of (often large-scale) networks and net- cussion system, is UNISoN. After selecting a
work data on the Web have been developed over newsgroup on usenet, messages are downloaded

5605-Scott-Chap38.indd 590 4/19/2011 5:06:12 PM


A READER’S GUIDE TO SNA SOFTWARE 591

and visualized. They can be saved as Pajek net- framework to configure and perform a survey
work data for further analyses. ReferralWeb is the interview. The collected network data can be visu-
oldest program for searching the Web. It is used ally explored, manually altered, or be exported to
for the exploration of researchers’ social networks other programs (for example, Excel or UCINET).
in order to find short referral chains between
the researcher (ego) and others. Information on
the network is obtained from publicly available
documents on the Internet. Statistical methods
CID-ABM is a somewhat different package. It
does not use Internet data but is a package that The field of statistical methods is one in which
allows a researcher to investigate the propagation major developments have taken place in the last
of information through a network, taking into decade (an overview of software for statistical
account the network structure and the actor (agent) network analysis was given by Huisman and van
characteristics. The program uses simulation Duijn, 2005b). This has resulted in a large increase
models that use the network structure and decision in statistical routines and software packages.
models to simulate the transmission of informa- Recent developments are found for p* exponential
tion through the network. random graph models (ERGMs). Starting from
Another program that uses the Web to collect the p1 models of Holland and Leinhardt (1981),
network data is CiteSpace. Listed in Table 38.2 and the Markov random graph models proposed
as a program for citation networks, it is used to by Frank and Strauss (1986), the p* model was
detect and visualize trends and patterns in scien- introduced by Wasserman and Pattison (1996). To
tific literature. It uses the Web of Science as its estimate the models, pseudo-likelihood estimation
primary source of information. Other sources was originally used and implemented in the soft-
can be used as well (for example, PubMed) or ware. This procedure, however, gives biased
are under construction (for example, Scopus). results (van Duijn et al., 2009). New procedures
The networks are visualized and can be decom- based on Markov chain Monte Carlo (MCMC)
posed into mutual exclusive groups by spectral methods were developed, also resulting in new
clustering. model specifications and software tools (for more
details and examples, see Robins, this volume).
There are several programs that have routines
to estimate ERGMs. Of the general packages,
Egocentric networks NetMiner and MultiNet contain (older) proce-
dures to estimate the p* model using pseudo-
Egocentric network data reflect the relations of likelihood. As this method is known to give
one actor (ego) with others (alters), as opposed to incorrect results, we advise not to use these rou-
data on the complete network (full-network data). tines. New estimation methods that give unbiased
For a discussion and analysis methods, see estimates of model parameters and standard errors
Hanneman and Riddle’s chapters (this volume). are implemented in several (newly developed)
Most of the generalized programs can handle ego- packages. The programs SIENA and PNet are
centric data, and there are specialized packages based on the method proposed by Snijders (2002);
as well. the R package statnet uses the method proposed
E-Net is such a program, made by the develop- by Hunter and Handcock (2006). A review of
ers of UCINET and, therefore, it has strong links these programs is given by Robins et al. (2007).
with this package. It uses attribute data of ego and SIENA is a program for the analysis of longitu-
alters, as well as ties among the alters. Measures dinal network data (see Snijders, this volume) that
of composition of the network, heterogeneity, is implemented in the StOCNET package.
homophily, and structural holes are calculated for StOCNET is a package for advanced statistical
all selected egos, and the ego-networks can be analysis of social networks. It was designed to be
visualized. EgoNet is a package for the collection a platform for easy distribution of statistical meth-
and analysis of egocentric network data. It con- ods and allows new routines to be easily imple-
tains routines that facilitate questionnaire devel- mented. Besides SIENA, it contains modules for
opment and data collection, and it calculates stochastic blockmodeling (BLOCKS), estimating
general network measures as a first step in data latent transitive structures using ultrametrics
exploration. For further analysis, the data can be (ULTRAS), determining probability distributions
saved in formats that are readable by other SNA of random graph statistics (ZO), fitting structural
software. VennMaker is a software tool for col- models based on partial algebras (PACNET), and
lecting egocentric network data. One of the main estimating the p2 exponential random graph model
features of the program is questionnaire develop- (P2) and the p* exponential random graph model
ment, using name generators, and providing a (PNet and SIENA). The p2 model is a random

5605-Scott-Chap38.indd 591 4/19/2011 5:06:12 PM


592 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

effects model with the dyadic ties as the depend- set of nodes to keep under surveillance or try to
ent variables (van Duijn et al., 2004). The model influence through an intervention. The program
and software are recently updated with improved uses these node sets to inspect the vulnerability of
MCMC estimation methods (Zijlstra et al., 2009). the network and to identify well-connected nodes
In the chapter by van Duijn and Huisman (this that possess a lot of information. Finally,
volume) some procedures are discussed in more KliqFinder is aimed at identifying subgroups
detail and examples are presented. based on the maximization of the log-odds of ties
SIENA is designed to analyze longitudinal data (connectivity) within the groups and minimization
of networks and behavior (i.e., the co-evolution of of connectivity between groups (Frank, 1995) or
networks and behavior; see the tutorial by Snijders based on structural equivalence. It has recently
et al., 2010). In the StOCNET package, the been updated with an export function to NetDraw
SIENA module can also be used for cross-sec- for visualization of the position of the actors
tional network data to estimate ERGMs. Recently within groups and the distances between actors
SIENA was replaced by the R package RSiena, in and groups.
which only the longitudinal analysis procedures
are implemented. The older version implemented
in StOCNET will not be updated anymore.
PNet is a program for the simulation and esti- Surveys and data collection
mation of exponential random graph (p*) models
(ERGMs). There are six different versions of the In the discussion of the general packages we
program for single networks, multivariate net- already mentioned a trend in new developments:
works, longitudinal analysis, bipartite networks, procedures for data collection are often included
social influence models, and snowball sampling. in new packages. The same was seen in the spe-
There is also a version of PNet that can be run as cialized packages for communication networks.
a module within the StOCNET package. The pro- Almost all programs in this category contain pro-
gram offers simulation of network distributions cedures to collect data, either by designing
(with known ERGM parameter values). Goodness surveys or (most often) by searching the Web
of fit of an estimated model is tested by simulating (almost all programs were developed during the
the network distribution using the parameter last five to six years). There are two packages that
estimates of the model. are developed for data collection via surveys only
Other (older) programs for statistical analyses (not searching the Web). These programs are
are Snowball, a DOS program for estimating the Network Genie and ONA surveys.
size of a hidden population from a one-wave Network Genie is a Web-based package to
snowball sample; PermNet, which provides a set design and manage social network survey projects.
of permutation tests for valued social network It facilitates the design of online survey question-
data (for example, symmetry tests or transitivity naires, including both network items (for exam-
tests); and Blanche, which creates and simulates ple, social ranking, social nomination, or social
models of network dynamics by using nonlinear peer perception) and person-centered items
difference equations that describe the change in (demographics or behavior topics). The question-
the strength of links and the attributes of nodes naires are used to collect network data through the
over time. program. Network Genie distinguishes three types
of data: egocentric, complete networks, and snow-
ball samples. The collected data can be exported
to other network software (for example, UCINET,
Analysis of subgroups MultiNet, or InFlow) for additional analyses or
visualization.
For the analysis of subgroups, three packages are ONA surveys is a program for organizational
listed in Table 38.2. CFinder is a package for find- network analysis. It can be used to design Web-
ing subgroups in large sparse networks. It is based based network surveys and collect and process
on the clique percolation method of Palla et al. survey data. Surveys can be either person-centric,
(2005) to find overlapping dense groups of nodes consisting of a number of questions for each par-
(k-clique communities). The program has several ticipant, or question-centric, to assess relation-
procedures to visualize and explore the (overlap- ships for each question. The approach can be
ping) communities found in the networks. The “bounded,” assessing the relations within a prede-
second program is KeyPlayer, distributed together fined group, or “snowball,” where an initial group
with UCINET for identifying the key actors in a is asked to nominate its contacts, who are then
network. The programs uses two definitions of asked to nominate their contacts. Surveys can be
key actors: (1) the optimal set of nodes that cripple tested and published, and there are export func-
the network if they are removed, or (2) the optimal tions to other software.

5605-Scott-Chap38.indd 592 4/19/2011 5:06:12 PM


A READER’S GUIDE TO SNA SOFTWARE 593

Other specialized programs transform networks and to calculate some


basic SNA measures (for example, betweenness,
Table 38.2 presents two programs to analyze kin- eigenvector centrality, average shortest paths,
ship data. PGRAPH is software for kinship and reciprocity, or eccentricity).
marriage networks that works with so-called
p-graphs, a representation of networks in which
the nodes are the intersections between indivi-
duals (e.g., marriage) instead of the individuals R
themselves (see the chapters by White and
Hamberger et al., this volume). This representa- Over the past few years, the number of packages
tion using p-graphs is also available in Pajek (see for social network analysis available in R has rap-
White et al., 1999). Puck is a program for analyz- idly increased. It all started with sna, a package
ing genealogical and other kinship-related data developed by Carter Butts in S (the precursor of
that can visually explore elements from kinship R; see Butts, 2008b). The R package sna contains
network theory. a wide range of tools and functions for visualiza-
Financial Network Analyzer is an open-source tion and analyses (Figure 38.3 gives an example,
package for the analysis of financial networks. It presenting the Krackhardt high-tech managers’
constructs networks from payment/trade data, advice network). Although it can still be used on
with links that indicate payment/trade between its own, sna has now merged into statnet, which
banks. The program contains options to edit and is built around the function ergm to estimate

Figure 38.3 R Graphics window presenting the graph of the Krackhardt high-tech managers’
advice network made with SNA

5605-Scott-Chap38.indd 593 4/19/2011 5:06:13 PM


594 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

exponential random graph models. The statnet Twitter, Flickr, YouTube, and local email, and it
tutorial (Goodreau et al., 2008) provides a good has strong visualization options.
introduction to estimating ERGMs using the The Java library JUNG provides a common and
package. extendible language for modeling, analysis, and
The suite of software tools for social network visualization of graphs. The routines of this open-
analysis statnet (Handcock et al., 2008) requires source package are used, among others, in GUESS
network (Butts, 2008a), providing the R class and Network Workbench. The other Java library,
for relational data (roughly network data in the yFiles, provides efficient and effective visualiza-
form of adjacency matrices or link-node lists, tion algorithms and has routines for descriptive
with attribute information on links or nodes if analysis. It also provides components for the
available). The network class is related to the .NET platform, as does NodeXL.
graph class also used by the package igraph (see Three packages in Table 38.3 are libraries
Table 38.3). Two more packages related to statnet for Python, a general-purpose programming
through its developers are degreenet (Handcock, language whose design philosophy emphasizes
2003), modeling skewed count distributions (as is code readability. Like other dynamic languages,
typical for degree distributions), and networksis Python is often used as a scripting language.
(Admiraal and Handcock, 2008), for simulating LibSNA is a small general package. NetworkX is
bipartite networks with fixed marginals. developed for the creation, manipulation, and
Another class of statistical models for social exploration of the structure, dynamics, and func-
network analysis is implemented in latentnet, also tions of complex networks. The UrlNet library is
in the statnet suite. It can be used to estimate a intended to provide a powerful, flexible, easy-
type of stochastic blockmodels or latent position to-use, “spider”-like mechanism for generating
models (Hoff et al., 2002; Handcock et al., 2007; networks from the Web.
see also Krivitsky and Handcock, 2008). Two
more recent additions to the R packages are
RSiena and tnet. RSiena is the successor of the
SIENA module in StOCNET, with similar func-
tionality with respect to the longitudinal proce- RECOMMENDATIONS
dures. The package tnet features functions for the
analysis of weighted (or valued), two-mode, and We conclude this chapter with a summary and
longitudinal network data. comparison of some of the packages presented in
Tables 38.2 and 38.3, and we offer some general
recommendations.

Other packages
Some other packages and libraries are available General programs
for Excel, GAUSS, Java, and Python. The GAUSS
package SNAP contains general analysis proce- Comparing the different programs and giving
dures but has not been updated since 2005. This is recommendations are difficult (maybe even impos-
also true for the Excel package MatMan, for social sible) tasks, as the objectives of the packages
dominance and correlational analyses. NodeXL is and therefore their functionalities are often very
a more general template for Excel 2007, which different. Still, we think it worthwhile to make a
has built-in connections to import networks from comparison of the general packages we discussed

Table 38.4 Scores for some general packages


Functionality Support User-friendly

Data Vis. Desc. Proc. Stat. Dyn. Doc. Help

MultiNet +− + +− + − 0 + ++ +
NetMiner 3 ++ ++ ++ ++ +− +− + + ++
ORA ++ ++ + ++ + + + + +−
Pajek + ++ + ++ 0 +− + 0 +−
statnet/sna ++ + ++ ++ ++ + ++ + +−
UCINET + NetDraw ++ ++ ++ ++ + 0 ++ + +

5605-Scott-Chap38.indd 594 4/19/2011 5:06:13 PM


A READER’S GUIDE TO SNA SOFTWARE 595

in more detail: MultiNet, NetMiner 3, ORA, Pajek, for NetMiner. Only the newer packages ORA and
statnet/sna, and UCINET. We scored the software statnet/sna have some good (graphical) routines
on nine criteria:6 (1) data manipulation, (2) net- for network dynamics.
work visualization, (3) network descriptives (for The documentation of statnet/sna is relatively
example, centrality), (4) procedure-based methods strong with the special (tutorial) issue of the
(for example, cluster analysis or eigendecomposi- Journal of Statistical Software and for UCINET
tions), (5) statistical methods (for example, expo- with the step-by-step tutorial by Hanneman and
nential random graph models or QAP procedures), Riddle (2005). It should be noted that the docu-
(6) network dynamics, (7) availability of docu- mentation of the other programs, although in
mentation (manuals, tutorials), (8) online help, and some cases comprehensive, almost always con-
(9) user friendliness. sists of a long list of procedures, which is not
Table 38.4 contains the ratings for the general always instructive or easy to use. Built-in help is
packages. A + is used to indicate that it is good (at strong in MultiNet and absent in Pajek.
least suffcient), ++ that it is very good or strong. Three of the programs score + – on user friend-
A – indicates that the program has shortcomings, liness. For ORA this is due to the complex data
a 0 that the aspect considered is absent, and a + – management using meta-networks. Although
that it is undecided (having both good and bad menu-driven, the program does not allow an intui-
parts). We will explain the ratings per criterion tive finding of procedures and methods. Compared
further below, giving special attention to the with, for instance, NetMiner and UCINET, we
critical (– and + –) scores. find that ORA is not a program suitable for novice
With respect to data manipulation, only users. Pajek scores + – on user friendliness for
MultiNet obtained a score + – because it contains more or less the same reason. The different data
relatively few options. All other programs score + structures for which the program is developed
(good) or ++ (strong). Pajek has many options, but make finding the right procedures and analyzing
its data structures make the program hard to use. data sets difficult (the book by de Nooy et al.,
ORA uses complicated data structures as well, but 2005, is very helpful but is not a tutorial).
it is the only program that supports data collection Compared to the menu-driven general packages,
(by searching the Web). Visualization options are the R packages statnet and sna require a larger
good in all packages. Although MultiNet, again, effort on the part of the user, especially if they are
has the lowest score, it has some unique visualiza- new to R as well. Therefore we rate statnet/sna
tion routines based on eigendecompositions. with a + –. The R package RSiena is an exception,
These are, however, not as strong as the routines because it more or less mimics the interface and
in other packages. statnet/sna requires knowledge stepwise modeling approach used in StOCNET.
of the programming language R and does not have
an interactive user interface for visualizations.
The scores for the descriptive, procedure-
based, and statistical methods are indicative of the Final observations
number of different features. The descriptive
methods are strong in almost all packages. Only From Table 38.4 (functionality) it follows that the
MultiNet contains relatively few methods. All newer packages score + (good) or ++ (strong) on
programs contain many procedure-based meth- all analysis types. This is especially true for ORA,
ods. Statistical methods are strong in statnet, which has procedures for collecting data from the
which has more methods, and more advanced Web and network dynamics. The routines to
methods than the other programs. The statistical search the Internet and collect longitudinal net-
methods in Pajek are so limited that they score a 0 work data, and algorithms for statistical modeling
(although R packages can be called from Pajek). of networks or network dynamics, have only
ORA and UCINET contain some up-to-date become available in the last 5 to 10 years. This is
procedures. NetMiner does contain a number of an advantage for the newer packages, because
statistical methods, but they are presented uncriti- they can develop frameworks in which these new
cally, whereas some warning would definitely be technologies are included. The existing (older)
warranted for the estimation of the p* model and programs were developed in a time when these
QAP regression. The same holds for MultiNet, procedures were scarcely available, making their
whose statistical methods, especially the ANOVA implementation a much harder task.
and p* procedures we advise not to use. Although almost all programs score + (good) or
MultiNet and UCINET contain so few (or no) ++ (strong) on descriptive and procedure-based
procedures for network dynamics that they score methods, this does not imply that all packages
a 0. Pajek offers descriptive analysis of series feature the same summary statistics. Xu et al.
of cross-sectional networks using time indica- (2010) compared the overlap in procedures avail-
tors, but the options are few. This is also true able in six packages, among them Pajek, statnet,

5605-Scott-Chap38.indd 595 4/19/2011 5:06:13 PM


596 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Table 38.5 URLs of all websites mentioned in the text


Website URL

This chapter http://www.gmw.rug.nl/~huisman/sna/software.html


INSNA http://www.insna.org/software/index.html
http://www.insna.org/software/software_old.html
Wikipedia http://en.wikipedia.org/wiki/Social_network_analysis_software
Formats diagram http://mdround.blogs.com/usingnetworks/2009/07/sna-tools-and-formats-diagram-updated.html

and UCINET, and found that the packages com- packages statnet and sna (and all other SNA and
plement each other in the sense that they have non-SNA packages available in R) offer a large
(slightly) different implementations of general range of routines.7
network concepts. A new user should, therefore,
know exactly what kind of analysis or procedure We started this chapter with the question of
he or she wants to perform and should then whether there is a comprehensive list of software
look for the right software. In research areas with for social network analysis. Tables 38.2 and 38.3
specialized applications of social network analy- give such a comprehensive list, but as we already
sis, this choice will be straightforward and can mentioned in the introduction, maintaining such a
therefore easily lead to choosing a specialized list is a difficult task. A suggestion was given on
package. SOCNET, in January 2010, to employ the soft-
Researchers from an area in which social net- ware articles about SNA in Wikipedia to this end,
work analysis is not yet a common method may because the “social network community” would
face a more difficult task. Before embarking on contribute. We support this suggestion to add and
complex analysis methods, we would strongly update the SNA packages on this list to make and
advise them to study the literature, for instance, maintain the comprehensive list of SNA software.
using one of the earlier mentioned textbooks, in Such a list is desirable and useful, maybe even
order to get to know the concepts and applications necessary, because choosing a program to perform
in social network analysis. An important distinc- SNA is not easy or straightforward. It depends to
tion between research areas is the size of the net- a large extent on the type of analysis and data to
work under study. With the increasing availability be analyzed. It will remain difficult to compare
of tools to automatically collect large networks the different packages, as we already pointed out
(for example, Web-based) the software also needs at the beginning of this section. We hope to have
to be able to deal with increasing memory given some useful criteria and advice for making
demands. Xu et al. (2010) found that Pajek espe- a choice, but ultimately we have to leave it to the
cially scored quite well on this aspect, whereas readers of this chapter to decide which software to
UCINET and statnet did not score well at all, use for social network analysis.
probably at least partly due to the programming
language.
Researchers new to social network analysis
who want general and relatively easy-to-learn NOTES
packages are advised to use UCINET or NetMiner.7
NetMiner stands out with respect to user friendli- 1 In January 2010, such a request was actually
ness because of the integration of visualization, posted on SOCNET, the email list-server of INSNA.
data management, and data exploration. To a 2 We will not give references to each software
lesser extent this is true for UCINET, whose package mentioned in the text. All package refer-
menu-driven procedures have the same intuitive ences can be found in the software reference list at
appeal as those of NetMiner, however, without the the end of the chapter.
same visual exploration properties. For research- 3 All developers of the software in Tables 38.2
ers who are more experienced with data analysis and 38.3 were given the opportunity to check the
and different software packages, and maybe less contents of the tables with respect to their packages.
hesitant to spend some (or a lot of) time to learn 4 Not counting NetDraw, as this is a visualization
new programs, the packages ORA and Pajek offer program included in the UCINET package.
many possibilities. For researchers who have 5 Mark Round (2009) gives a comprehensive
experience with programming or who are willing (graphical) overview of data formats in the SNA tools
to invest time in learning the R language, the and formats diagram on his Web site (see Table 38.5).

5605-Scott-Chap38.indd 596 4/19/2011 5:06:13 PM


A READER’S GUIDE TO SNA SOFTWARE 597

6 In the 2005 review, the programs StOCNET Handcock, M.S., Raftery, A.E. and Tantrum, J.M. (2007)
and STRUCTURE were included in the comparison ‘Model-based clustering for social networks. With discus-
using eight of the nine criteria (except network sion’, Journal of the Royal Statistical Society A, 170(2):
dynamics). These two programs are not used in the 301–54.
current comparison because they are not a general Handcock, M.S., Hunter, D.R., Butts, C.T., Goodreau, S.M. and
package (StOCNET) or have become outdated Morris, M. (2008) ‘statnet: Software tools for the represen-
(STRUCTURE). tation, visualization, analysis and simulation of network
7 This advice is shared by Loscalzo and Yu (2008) data’, Journal of Statistical Software, 24(1).
and Kirschner (2008). Hanneman, R.A. and Riddle, M. (2005) Introduction to Social
Network Methods. Riverside: University of California.
http://faculty.ucr.edu/~hanneman/.
Hummon, N.P. and Carley, K. (1993) ‘Social networks as
normal science’, Social Networks, 15(1): 71–106.
REFERENCES Hunter, D. and Handcock, M.S. (2006) ‘Inference in curved
exponential families for networks’, Journal of Computational
Admiraal, R. and Handcock, M.S. (2008) ‘networksis: A pack- and Graphical Statistics, 15(3): 565–83.
age to simulate bipartite graphs with fixed marginals Hoff, P. D., Raftery, A.E. and Handcock, M.S. (2002) ‘Latent
through sequential importance sampling’, Journal of space approaches to social network analysis’, Journal of
Statistical Software, 24(8). the American Statistical Association, 97(460): 1090–98.
Batagelj, V. and Mrvar, A. (1998) ‘Pajek: A program for large Holland, P.W. and Leinhardt, S. (1981) ‘An exponential
network analysis’, Connections, 21(2): 47–57. family of probability distributions for directed graphs’,
boyd, D.M. and Ellison, N.B. (2007) ‘Social network sites: Journal of the American Statistical Association, 76(373):
Definition, history, and scholarship’, Journal of Computer- 33–50.
Mediated Communication, 13(1): article 11. Huisman, M. and van Duijn, M.A.J. (2005a) ‘Software for
Butts, C.T. (2007) ‘Book review: Carrington, P.J., Scott, J., social network analysis’, in P.J. Carrington, J. Scott and
Wasserman, S., 2005’. Models and Methods in Social S. Wasserman (eds), Models and Methods in Social
Network Analysis. Cambridge: Cambridge University Press, Network Analysis. Cambridge: Cambridge University Press.
Social Networks, 29(4): 603–8. pp. 270–316.
Butts, C.T. (2008a) ‘network: A package for managing rela- Huisman, M. and van Duijn, M.A.J. (2005b) ‘Software for
tional data in R’, Journal of Statistical Software, 24(2). statistical analysis of social networks’, in C. van Dijkum,
Butts, C.T. (2008b) ‘Social network analysis with sna’, Journal J. Blasius and C. Durand (eds), Recent Developments and
of Statistical Software, 24(6). Applications in Social Research Methodology, Proceedings
Clauset, A., Shalizi, C.R. and Newman, M.E.J. (2009) ‘Power- of the RC33 Sixth International Conference on Social
law distributions in empirical data’, SIAM Review, 51(4): Science Methodology, August 17–20, 2004, Amsterdam,
661–703. the Netherlands. Leverkusen: Budrich-Verlag.
Degenne, A. and Forsé, M. (1999) Introducing Social Networks. Kirschner, A. (2008) Overview of Common Social Network
London: Sage. Analysis Software Platforms (presentation). San Francisco:
Dekker, D., Krackhard, D. and Snijders, T.A.B. (2007) Monitor Institute.
‘Sensitivity of MRQAP tests to collinearity and autocorrela- Krackhardt, D. (1987) ‘Cognitive social structures’, Social
tion conditions’, Psychometrika, 72(4): 563–81. Networks, 9(2): 104–34.
de Nooy, W., Mrvar, A. and Batagelj, V. (2005) Exploratory Krivitsky, P.N. and Handcock, M.S. (2008) ‘Fitting latent clus-
Social Network Analysis with Pajek. Cambridge: Cambridge ter models for networks with latentnet’, Journal of
University Press. Statistical Software, 24(5).
Erickson, B.H. (2005) ‘Book Review: Carrington, P.J., Scott, J., Loscalzo, S. and Yu, L. (2008) ‘Social network analysis: Tasks
Wasserman, S., 2005. Models and Methods in Social and tools’, in H. Liu, J.J. Salerno and M.J. Young (eds),
Network Analysis. Cambridge: Cambridge University Press’, Social Computing, Behavioral Modeling, and Prediction.
Canadian Journal of Sociology Online Sept.-Oct. New York: Springer. pp. 151–59.
Frank, K.A. (1995) ‘Identifying cohesive subgroups’, Social Palla, G., Derényi, I., Farkas, I. and Vicsek, T. (2005)
Networks, 17(1): 27–56. ‘Uncovering the overlapping community structure of
Frank, O. and Strauss, D. (1986) ‘Markov graphs’, Journal of complex networks in nature and society’, Nature, 345:
the American Statistical Association, 81(395): 832–42. 814–18.
Freeman, L.C. (1988) ‘Computer programs and social network Robins, G.L., Snijders, T.A.B., Wang, P., Handcock, M.S. and
analysis’, Connections, 11(2): 26–31. Pattison, P. (2007) ‘Recent developments in exponential
Goodreau, S.M., Handcock, M.S., Hunter, D.R., Butts, C.T. and random graph (p*) models for social networks’, Social
Morris, M. (2008) ‘A statnet tutorial’, Journal of Statistical Networks, 29(2): 192–215.
Software, 24(9). Round, M.D. (2009) ‘SNA tools and formats diagram’, http://
Handcock, M.S. (2003) ‘degreenet: Models for skewed count mdround.blogs.com/.
distributions relevant to networks’, statnet Project, http:// Scott, J. (1996) ‘A toolkit for social network analysis’, Acta
statnetproject.org/, Seattle, WA. Sociologica, 39(2): 211–16.

5605-Scott-Chap38.indd 597 4/19/2011 5:06:13 PM


598 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

Scott, J. (2002) Social Network Analysis: A Handbook. 2nd ed. CFinder: Adamcsek, B., Palla, G., Farkas, I.J., Derényi, I.
London: Sage. and Vicsek, T. (2006) ‘CFinder: Locating cliques and
Seary, A.J. (2005) ‘MultiNet: An interactive program for ana- overlapping modules in biological networks’, Bioinformatics,
lyzing and visualizing complex networks’, Unpublished 22(8): 1021–23.
Ph.D. thesis, Simon Fraser University. CID-ABM: Elbrit, B. (2009) ‘Competing idea diffusion ABM
Snijders, T.A.B. (2002) ‘Markov chain Monte Carlo estimation (CID-ABM)’, ET Software and Consulting.
of exponential random graph models’, Journal of Social C-IKNOW: Contractor, N. (2009) ‘C-IKNOW cyber-infrastructure
Structure, 3(2), http://zeeb.library.cmu.edu:7850/JoSS/ for inquiring knowledge networks on the Web’. Evanston,
snijders/Mcpstar.pdf. IL: Science of Networks in Communities (SONIC),
Snijders, T.A.B., Steglich, C.E.G. and van de Bunt, Gerhard G. Northwestern University.
(2010) ‘Introduction to actor-based models for network CiteSpace: Chen, C. (2006) ‘CiteSpace II: Detecting and visual-
dynamics’, Social Networks, 32(1): 44–60. izing emerging trends and transient patterns in scientific
van Duijn, M.A.J., Snijders, T.A.B. and Zijlstra, B.J.H. (2004) literature’, Journal of the American Society for Information
‘p2: A random effects model with covariates for indirected Science and Technology, 57(3): 359–77.
graphs’, Statistica Neerlandica, 58(2): 234–54. Commetrix: Trier, M. (2008) Commetrix. Dynamic Visualization
van Duijn, M.A.J., Gile, K. and Handcock, M.S. (2009) ‘A and Analysis. Berlin: Technical University Berlin.
framework for the comparison of maximum pseudo-likeli- DyNet: ATA SpA (2007) DyNet (SE and LS). Lucca, Italy: ATA
hood and maximum likelihood estimation of exponential SpA Advanced Technology Assessment.
family random graph models’, Social Networks, 31(1): EgoNet: EgoNet Development Team (2009) EgoNet. http://
52–62. sourceforge.net/projects/egonet/.
Wasserman, S. and Faust, K. (1994) Social Network Analysis: Eicent: Borgatti, S.P. (2002) Eicent. Attribute-Based
Methods and Applications. Cambridge: Cambridge Partitioning of Centrality. Harvard: Analytic Technologies.
University Press. E-Net: Borgatti, S.P. (2006) E-Net Software Package of Ego-
Wasserman, S. and Pattison, P. (1996) ‘Logit models and Network Analysis. Harvard: Analytic Technologies.
logistic regression for social networks: I. An introduction FATCAT: Richards, W.D. and Seary, A.J. (1993) FATCAT.
to Markov graphs and p*’, Psychometrika, 61(3): Version 4.2. Burnaby: Simon Fraser University.
401–25. Financial Network Analyzer: Soramaki, K. (2010) Financial
White, D.R., Batagelj, V and Mrvar, A. (1999) ‘Analyzing large Network Analyzer v1.2. http://www.financialnetwork
kinship and marriage networks with PGRAPH and Pajek’, analysis.com.
Social Science Computer Review, 17(3): 245–74. GRADAP: Sprenger, C.J.A. and Stokman, Frans N. (1989)
Xu, K., Tang, C., Ali, G., Li, C., Tang, R. and Zhu, J. (2010) ‘A GRADAP: Graph Definition and Analysis Package.
comparative study of six software packages for complex Groningen: iec. ProGAMMA.
network research’, paper presented at the 2010 GUESS: Adar, E. (2006) ‘GUESS: A language and interface for
International Conference on Communication Software and graph exploration’, paper presented at CHI 2006, April
Networks, Singapore, http://cs.scu.edu.cn/~tangchangjie/ 22–28, 2006, Montreal, Canada.
paper doc/2010/XKKcomparision.pdf. igraph: Csérdi, G. and Nepusz, T. (2009) The igraph Project.
Zijlstra, B.J.H., van Duijn, M.A.J. and Snijders, T.A.B. Budapest: Hungarian Academy of Sciences.
(2009) ‘MCMC estimation for the p2 network regression InFlow: Krebs, V.E. (2003) InFlow. Cleveland: Orgnet.com.
model with crossed random effects’, British Journal JUNG: JUNG Framework Development Team (2009) JUNG:
of Mathematical and Statistical Psychology, 62(1): The Java Universal Network/Graph Framework. http://jung.
143–66. sourceforge.net/.
KeyPlayer: Borgatti, S.P. (2003) KeyPlayer. Harvard: Analytic
Technologies.
KliqFinder: Frank. K.A. (1995) ‘Identifying Cohesive Subgroups’,
Social Networks, 17(1): 27–56.
SOFTWARE REFERENCES latentnet: Krivitsky, P.N. and Handcock, M.S. (2008) ‘Fitting
latent cluster models for networks with latentnet’, Journal
Agna: Benta, I. Marius (2003) Agna. Cork: University College of Statistical Software, 24(5).
Cork, Ireland. LibSNA: Usher, A. (2008) libsna: The Library for Social
Blanche: Hyatt, A., Contractor, N. and Jones, P.M. (1996) Network Analysis. Washington, DC: Sharp Ideas LLC.
‘Computational organizational network modeling: MatMan: Noldus (2004) MatMan: Software for Matrix
Strategies and an example’, Computational and Manipulation and Analysis. Wageningen, The Netherlands:
Mathematical Organization Theory, 2(4): 285–300. Noldus Information Technology.
BLOCKS: Nowicki, K. and Snijders, T.A.B. (2001) ‘Estimation MDLogix - EgoNet: mdlogix (2007) EgoNet. Baltimore, MD:
and prediction for stochastic blockstructures’, Journal Medical Decision Logic.
of the American Statistical Association, 96(455): MDLogix - LinkAlyzer: mdlogix (2007) LinkAlyzer. Baltimore,
1077–87. MD: Medical Decision Logic.
Blue Spider: Blue Spider Analytics (2009) Blue Spider. King MDLogix - VisuaLyzer: mdlogix (2007) VisuaLyzer. Baltimore,
George: Blue Spider Analytics. MD: Medical Decision Logic.

5605-Scott-Chap38.indd 598 4/19/2011 5:06:13 PM


A READER’S GUIDE TO SNA SOFTWARE 599

MetaSight: Morphix (2009) MetaSight. Crowthorne, UK: The ReferralWeb: Kautz, H., Selman, B. and Shah, M. (1997)
Morphix Company. ‘The hidden web’, American Association for Artificial
MultiNet: Richards, W.D. and Seary, A.J. (2009) MultiNet Intelligence Magazine, 18(2): 27–36.
for Windows. Burnaby, Canada: Simon Fraser RSiena: Ripley, R.M. and Snijders, T.A.B. (2010)
University. Manual for SIENA Version 4.0. Oxford, UK: University
NEGOPY: Richards, W.D. (1995) NEGOPY. Version 4.30. of Oxford.
Burnaby: Simon Fraser University. Sentinel Visualizer: FMS (2009) Sentinel Visualizer. The Next
NetDraw: Borgatti, S.P. (2002) NetDraw: Graph Visualization Generation of Data Visualization. Vienna, VA: FMS
Software. Harvard: Analytic Technologies. Advanced Systems Group.
NetMiner 3: Cyram (2009) Cyram NetMiner 3. Seoul: Cyram SIENA: Snijders, T.A.B., Steglich, C.E.G, Schweinberger, M.
Co., Ltd. and Huisman, M. (2009) Manual for SIENA Version 3.2.
NetVis: Cummings, J.N. (2009) NetVis Module—Dynamic University of Groningen/ICS, University of Oxford.
Visualization of Social Networks. Cambridge: Massachusetts Snowball: Frank, O. and Snijders, T.A.B. (1994) ‘Estimating
Institute of Technology. the size of hidden populations using snowball sampling’,
Network Genie: Hansen, W.B. and Reese, E.L. (2008) Network Journal of Official Statistics, 10(1): 53–67.
Genie. Greensboro, NC: Tanglewood Research. sna: Butts, C.T. (2008b) ‘Social network analysis with sna’,
Network Workbench: NWB Team (2006) Network Workbench Journal of Statistical Software, 24(6): 51 pp.
Tool. Indiana University, Northeastern University, and SNAP: Friedkin, N.E. (2001) SNAP: Social Network Analysis
University of Michigan. Procedures for GAUSS. Maple Valley, WA: Aptech
NetworkX: Hagberg, A.A., Schult, D.A. and Swart, P.J. Systems, Inc.
(2008) ‘Exploring network structure, dynamics, and SocNetV: Kalamaras, D.V. (2009) SocNetV. http://socnetv.
function using NetworkX’, in G. Varoquaux, T. Vaught sourceforge.net/index.html.
and J. Millman (eds), Proceedings of the 7th Python in SONET: Seidman, S.B. and Foster, B.L. (1980) ‘SONET-1:
Science Conference (SciPy2008), August 2008, Pasadena. 'Social network analysis and modeling system’, Social
pp. 11–15. Networks, 2(1): 85–90.
NodeXL: NodeXL Development Team (2009) NodeXL: Network SONIS: Pappi, F.U. and Stelck, K. (1987) ‘SONIS: Ein
Overview, Discovery and Exploration for Microsoft Excel Datenbanksystem zur Netzwerkanalyse‘, in F.U. Pappi
2007. http://nodexl.codeplex.com/. (ed.), Techniken der empirischen Sozialforschung.
ONA surveys: Optimice (2009) ONA surveys. Sydney: Methoden der Netzwerkanalyse. Munich: Oldenbourg
Optimice Pty. Verlag. pp. 253–66.
ORA: Carley, K. (2009) ORA. The Organizational Risk Analyzer. SONIVIS: SONIVIS:Team (2009) SONIVIS:Tool. http://www.
Pittsburgh, PA: Carnegie Mellon University. sonivis.org/.
P2: Van Duijn, M.A.J., Snijders, T.A.B. and Zijlstra, B.J.H. statnet: Handcock, M. S., Hunter, D. R., Butts, C. T., Goodreau,
(2004) ‘p2: A random effects model with covariates S. M. and Morris, M. (2003) statnet: Software Tools for the
for indirected graphs’, Statistica Neerlandica, 58(2): Statistical Modeling of Network Data. Version 2. Seattle,
234–54. WA: Statnet Project.
PACNET: Pattison, P., Wasserman, S., Robins, G. and Kanfer, StOCNET: Boer, P., Huisman, M., Snijders, T.A.B., Steglich,
A.M. (2000) ‘Statistical evaluation of algebraic constraints C.E.G., Wichers, L.H.Y. and Zeggelink, E.P.H. (2006)
for social networks’, Journal of Mathematical Psychology, StOCNET: An Open Software System for the Advanced
44(4): 536–68. Statistical Analysis of Social Networks. Version 1.8.
Pajek: Batagelj, V. and Mrvar, A. (2010) Pajek—Package for Groningen: ICS, University of Groningen/SciencePlus.
Large Networks. Ljubljana: University of Ljubljana. STRUCTURE: Burt, R.S. (1991) STRUCTURE. Version 4.2.
PGRAPH: White, D.R. and Skyhorse, P. (1997) PGRAPH: New York: Columbia University.
Representation and Analytic Program for Kinship and tnet: Opsahl, T. (2009) tnet. Analysis of Weighted and
Marriage Networks. Irvine: University of California. Longitudinal Networks. London: Queen Mary University of
PermNet: Tsuji, R. (1997) ‘Permutation tests for symmetry and London.
transitivity in real-valued data’, paper presented at JAMS UCINET 6: Borgatti, S.P., Everett, M.G. and Freeman, L.C.
24th Conference, November 10, 1997, Hokkaido University, (2002) UCINET 6 for Windows: Software for Social
Saporro. Network Analysis. Harvard, MA: Analytic Technologies.
PNet: Wang, P., Robins, G. and Pattison, P. (2008) PNet: ULTRAS: Schweinberger, M. and Snijders, T.A.B. (2003)
Program for the Simulation and Estimation of p* Exponential ‘Settings in social networks: A measurement model’, in
Random Graph Models. User manual. Melbourne: University M.E. Sobel (ed.), Sociological Methodology 2003. London:
of Melbourne. Basil Blackwell. pp. 307–41.
PSPAR: Seary, A.J. (1999) PSPAR: Sparse Matrix Version of UNISoN: Leonard, S. (2008) ‘UNISoN: A tool to aid evaluation
PSTAR. Burnaby: Simon Fraser University. of sociability in on-line discussion boards’, unpublished
Puck: Research Group TIP (2007) Puck: Program for the Use MSc thesis. London: City University.
and Computation of Kinship Data. Paris: Centre National UrlNet: Hunscher, D. (2009) UrlNet: A Python Class Library for
de Recherche Scientifique, Research Group TIP (Traitement Generating Networks for Analysis. Ann Arbor: University of
Informatique de la Parenté). Michigan Medical School.

5605-Scott-Chap38.indd 599 4/19/2011 5:06:13 PM


600 THE SAGE HANDBOOK OF SOCIAL NETWORK ANALYSIS

VennMaker: Schoenhuth, M., Gamper, M. and Stark, M. yFiles: yWorks (2009) yFiles Graph Visualization Library.
(2009) VennMaker. Trier, Germany: University of Trier. Tübingen, Germany: yWorks GmbH.
visone: Brandes, U. and Wagner, D. (2004) ‘visone—Analysis ZO: Snijders, T.A.B. (1991) ‘Enumeration and simulation
and visualization of social networks’, in M. Jünger and models for 0–1 matrices with given marginals’,
P. Mutzel (eds), Graph Drawing Software. New York: Psychometrika, 56(3): 397–417.
Springer. pp. 321–40.

5605-Scott-Chap38.indd 600 4/19/2011 5:06:13 PM


Index

0-blocks 354, 429–30 advice networks 48–9, 288, 496, 586, 589, 593
1-blocks 354, 429–30 advocacy coalition framework (ACF) 219
1-covered blocks 438 affiliation 159, 161, 206, 260, 315, 417–18,
2-stars 487, 492–4, 499 426, 583–4
3-cycles 32–3 data 417, 420–2, 424–7, 431–2
3-stars 487, 489, 492, 494 graphs 418, 424–31
9/11 hijacking 263 matrices 200, 338
networks 4, 20, 180, 187, 259, 288, 338, 419
accessibility 103–4, 168, 380 analysis 417–32
accuracy 174–5, 265, 381–2, 411, 414, 526 affiliative relationships 153, 155, 160
ACF see advocacy coalition framework Afghanistan 263, 317
acquaintance networks see acquaintanceship; Africa 215, 312–13, 316, 318–22
networks African Americans 17, 109, 120, 123, 240
acquaintances 21, 41–2, 68–9, 72, 101, 292, 378–9, African elephants 150–3, 157, 159
461–2 age 109, 122–3, 139, 148–52, 155, 158–9, 244–5,
acquaintanceship 28, 44, 283, 378, 460, 462, 496–8
464–7, 469–71 agency 63–4, 80–91, 143–4, 181–2, 204,
degree of 273 206, 426
networks 460, 464–5, 467, 469, 481 and structure 141–2
active intimate ties 102 agents 5, 64, 204, 213, 217, 237, 262, 362
active nonintimate ties 102 Agna 581, 590
activism 223–5, 227 Albania 316–17
activity spread 496–8 Albert, R. 16, 27–8, 30–1, 33, 36, 57, 279–80,
actor attributes 260, 367, 460, 462, 496–8 502–3
actor-based models 459, 503, 505–7, 508–10 algebra, relational see relation algebras
actor centrality 260, 264, 364 algebraic constructions 447, 453, 455–6
actor network theory 91, 228, 410 algebraic models 5, 34, 447
Actor Partner Interdependence Model algebraic operations 449
(APIM) 465 algebras 447–57
actors 216–19, 256–61, 331–4, 336–54, 357–67, partial 452, 455–6, 591
435–41, 447–52, 505–11 algorithms 32–4, 424–6, 435–6, 442–4, 504–5,
central 18, 22, 197, 201, 263–4 507–9, 552–3, 560–2
corporate 196, 203, 206, 211 clustering 436, 438, 554
equivalent 324, 436, 459, 472, 479, 567 greedy 33, 36
groups of 225, 409, 471–2, 480 Pathfinder 552
pairs of 337–8, 342, 346, 366–7, 372, 422, relocation 437–8, 443
436–7, 475–6 alias resolution 173–4, 176
statistical models 459–81 alliance networks 50, 544–5
acyclic graphs 534–5, 552 alliances 88, 139, 150, 158–9, 205–6, 228,
acyclic networks 533, 551, 553 230, 338
adaptation 16–18, 32, 46–51, 87, 134, 189, 508 allies 134–5, 155, 219
adjacency matrices 337, 354–5, 394, 396, 427–31, ‘almost structurally equivalent’ 436
448, 474–6, 587–8 alters 340, 360, 362–3, 365–6, 372–7, 379–84,
adolescents 120, 236, 238, 240, 373–4, 510, 519 409, 591
adults 119–20, 122, 149, 236–7, 242 characteristics 376–7, 383

5605-Scott-Index.indd 601 4/7/2011 5:06:31 PM


602 INDEX

analysis Australia 191, 283, 317


cluster 350, 586–7, 595 Austria 61, 69, 137, 141–2, 292, 317
cohesion 142–3 authority 21, 46, 175, 207, 211, 247, 374, 432
concepts and measures 340–68 authorship 174, 280–1, 417
correspondence 31, 87, 288, 292, 424, 560, 588 autocorrelation 46, 51, 471, 587
crime and social network 236–49 automated social network discovery 169, 175–6
cultural see cultural analysis availability of confidant 378
data 219, 331–9, 392, 405, 408–10, 412–13, axioms 4, 451–2, 455–6, 533
455, 465
dynamic network 261–2, 572 baboons, hamadryas 151, 153, 159
kinship networks 136, 140–1, 144, 533–48 backcloth 44–5, 50
large-scale networks 550–5, 590 Baerveldt, C. 239–40, 516
link 260, 268 balance theory 41, 240, 288
methods 579, 581, 584–5, 588, 591 structural 438, 441
multinetwork 311–25 banks 2, 59, 64, 144, 180–6, 188–9, 191, 570
ancestors, common 129–31, 134–5, 138, 141 centrality 59, 64, 186, 191
animal social networks 148–61 control 184, 201–2
empirical studies 156–60 Barabási, A. 3, 16, 27–8, 30–1, 57–9, 61–4, 272,
parameters of social organization 154–6 279–82
prerequisites 151–4 basic network analysis, concepts and measures 340–68
stylized descriptions of social organization 148–51 Bavelas, A. 27, 34, 48
animal species 148, 151, 154, 159 Bayesian approach 441, 467, 469
ANOVA 465, 471, 588, 595 Bearman, P. 19, 81, 85, 88, 224–5, 229, 293, 295
Ansell, C. 20–1, 86, 90, 226, 228–9 behavioral biologists 160–1
antecedents 40, 43, 125, 324 behaviors 153, 156–9, 236–8, 339–40, 380–2, 508–10,
anthropologists/anthropology 3, 15, 26, 35, 130–1, 514–16, 518–19
286, 460, 462 actual 410–11
ants 149 delinquent 240, 508, 510, 516
APIM see Actor Partner Interdependence Model individual 67, 71–2, 74, 76, 203, 226, 508
approaches, Bayesian 441, 467, 469 political 198, 200–6, 223, 305
Arab lineages 134 social 153, 155, 160, 518
architecture model 46–8, 50 Belgium 56, 61, 69, 184, 186, 317
archival data 229, 262, 405, 410, 412 beliefs 15, 44, 47–8, 51, 61, 132, 216, 291
arcs 436, 448, 496, 498–9, 533–9, 541–2, 544–5, Berkman, L.F. 116, 118–19, 121, 125
547–8 Bernoulli models 372, 389, 391, 393–5, 397, 399,
descent 533, 535 486–7, 491
Asia 133, 157, 215, 228, 312, 316–23, 376 bespoke neighborhoods 306
associates 2, 225, 259, 261–3, 268, 304, 372–3, 380 best friends 106, 239, 375, 514–15, 517, 526
associations 116, 119–21, 148, 150–6, 158–60, 237–8, betweenness 32–4, 49, 171, 239, 263–4, 359,
293–4, 463–4 366–7, 566
business 181, 185, 212 centrality 32, 43, 51, 247, 263–5, 322, 336, 366–8
differential 153–4, 236–43 edge 32–3, 553
preferred 158 flow 263, 366–8
assortativity 149–52, 155, 158, 289, 587 bi-cliques 428
asymmetry 189, 275, 332, 337–8, 342, 436, 467–8, 545 bias 200, 238, 348, 373, 519, 545–7
pairwise 157 selection 290, 517, 521, 524–5
attachment, preferential 16, 59, 281–2, 502 bicomponent scale 131–2
attitudes 44, 47–9, 85, 143, 216, 237–9, 302, 515–16 bicomponents 130–4, 137, 141–3, 354, 543–4, 546
attribute-based approach 11, 13, 17, 22, 313, 496–7 matrimonial 543–4, 546, 548
attribute homophily 497 bilinear models 463, 469–72, 476–7, 481
attributes 11–13, 243, 333–4, 336–7, 496, 498–9, binary attributes 496–7, 499
563–4, 571–2 binary networks 342, 439–40, 498
actor 260, 367, 460, 462, 496–8 binary outcome model 521
binary 496–7, 499 binary relations 366, 417, 448, 450–2, 467
continuous 496, 499 binding 18, 51, 123, 215, 276, 283
external 567, 570, 575 biologists 31, 34–5, 257, 276
international 314 behavioral 160–1
national 313 biology 33, 35, 257, 534, 558
and relations 13 biomedicine 280–1

5605-Scott-Index.indd 602 4/7/2011 5:06:31 PM


INDEX 603

bipartite graphs 418, 424–8, 431, 567–8 Britain see United Kingdom
bipartite networks 498, 592, 594 brokerage 247, 259, 349, 359–60, 362–3
bipartite P-graphs 536–7, 548 roles 5, 227, 362
birds 156, 240 brokers 45, 227, 263, 359, 362–3, 366
Black bears 149–50 Burt, R.S. 15–21, 42–4, 48–9, 85–6, 203–4, 360–1,
Blanche 583, 592 376–7, 435–6
block densities 316, 318, 322, 324, 346–8, 355 business associations 181, 185, 212
block types 438–40 bylines 271–2, 277, 280–1
blockmodeling 15, 86–7, 286, 429–30, 435, 437–45, bystanders 156, 158–9, 161
553–5, 587 see also blockmodels
classic 435–7, 443 C-IKNOW 582, 590
deductive 438 California political donors 355
generalized 324, 435, 437–45 Calvó-Armengol, A. 69, 77, 245, 247, 515
implicit 440 Canada 102, 105–6, 181, 185, 187–8, 190, 245–7, 317
stochastic see stochastic blockmodels canonical kinship networks 535–6, 538–9
blockmodels 86–7, 393, 429–30, 435–45, 453–5, 472, capital 45, 48, 119, 181, 183–5, 189–91, 201, 571
553–5, 568–9 accumulation 183, 189–90
assessment of fits 444 cultural 274, 282, 288
dynamic 445 human 11, 48, 247
empirical 437, 443 political 219
generalized see generalized blockmodeling relations 184, 186, 191–2
K-categorical 393 capitalism 102, 184, 192, 311
stochastic 441, 472, 481, 519, 591, 594 capitalist classes 180–1, 183, 191, 206
a posteriori 471, 477, 479 capitalist societies 182, 198, 206–7
two-mode 567–9 capitalists 191, 197, 199, 206–7
blocks 316–17, 321–4, 339, 346–7, 354–6, 436–40, capitalization 47–8, 50–1, 191
554, 567 careers 59, 189, 247, 288, 407, 432
BLOCKS 472–7, 479–80, 486, 591 Carley, K.M. 21–2, 81, 85, 87, 257, 260–2,
core 316–17, 321–2 265–8, 295
diagonal 339, 436–7, 554 Carroll, J.D. 2, 12, 31, 48, 185–8, 190, 197, 417
matrix 429–30 castes 144, 149, 290
negative 438, 441, 443 categorical vertex variables 392–3, 399
off-diagonal 339, 436–7 catnets 288, 290–1, 567
positive 438, 441, 443 causal relationships 85, 119, 125
blogs 169, 295, 412 causality 17, 43, 89, 91, 576
Blue Spider 581, 585, 590 causation 13, 143
Blumstein, D.T. 154–5, 157, 159 cells 4, 47, 50, 257–8, 337, 373, 429, 448
boards, corporate 180–1, 184–7, 189, 199, 202–4, censuses
417, 420–1 matrimonial 539, 542
Bonacich, P. 28, 34, 43, 46, 240, 365, 424, 454 triad 315, 345, 499, 502, 588
bonds 45, 47, 118–19, 149, 151–2, 158–9, 241–2, central actors 18, 22, 197, 201, 263–4
258–9 central positions 182–3, 215, 411
Borgatti, S. 3–4, 18, 32, 46–8, 50–1, 259–61, 266–8, central subsets 454
428–32 centrality 31–5, 170–1, 200–1, 238–40, 245–8, 363–8,
Bott, E. 1–2, 22, 404 424–8, 566
bottlenose dolphins 150, 154, 157, 159 actor 260, 264, 364
bottom-up approaches 340–1, 356 bank 59, 64, 186, 191
boundaries 12–13, 83, 87, 287, 290, 374–5, 443, 525–6 betweenness 32, 43, 51, 247, 263–5, 322,
group 148, 155, 293, 296 336, 366–8
specification 12, 19, 264–5, 371 closeness 171, 260, 263–4, 365–6, 424, 426, 566
Bourdieu, P. 84–7, 89, 189, 286–8 communication 212, 553
boys 239, 243, 373, 548 degree 27, 201, 247, 260, 263, 265, 364–5, 425–7
Brazil 88, 168, 229, 293, 317, 322 eigenvector 207, 260, 366, 424, 427, 432, 553, 566
breeding, cooperative 149 individual 160, 245
Breiger, R.L. 31–2, 87, 286–7, 292, 314–15, 435–6, measures 4, 46, 59, 201, 227, 261, 426–7, 586–7
448, 453–4 metrics 263–4, 425
bridges 4, 14, 17, 21, 41–3, 51, 86, 110–11 relative 188, 274, 426
bridging 14, 41–2, 64, 81, 86, 158, 226–7, 239–40 and terrorist networks 260–1, 263–8
ties 41–2, 227, 354 centralization 22, 191, 224, 227, 365, 427, 526

5605-Scott-Index.indd 603 4/7/2011 5:06:31 PM


604 INDEX

CFinder 583, 592 co-affiliation 420–5, 431


chains, Markov 398, 400, 503 data 420, 422–4
characteristic numbers 538, 540 matrices 423–4
Chen, K.K. 21, 104, 108, 171, 174, 248, 260, 262–3 co-affinal relinking 136–8
Chicago School 90, 407 co-descendant marriages 135–6, 141, 144
children 43, 118–19, 139, 241, 434–6, 533–5, co-memberships 12, 20–1, 44, 143, 337, 350,
540, 548 417, 421–2
Chile 111, 215, 317 co-occurrences 175, 262, 294, 296, 422, 559
chimpanzees 152–3, 155, 158 co-offending 245, 249, 389
China 102, 111, 225, 316–17, 322, 338 co-parents 535–6
choice, individual 71, 73–4, 77 co-workers 101–2, 106, 110, 118, 122, 167, 173, 451
Christakis, N.A. 48, 118, 501, 514–15, 518, coalitions 86, 155, 159, 211–12, 216, 218, 223, 226
521, 524–5 coauthorship 12, 51, 72, 171–2, 175, 271, 274,
CID-ABM 582, 591 278–83
circles 47, 57, 72–3, 181, 188–9, 202–3, 334–5, 363 networks 274, 282–3
inner 110, 181, 183, 186, 189, 200, 202, 350 cocitation 271, 276–9, 282–3
circuits 47, 89, 534, 539–46, 548 counts 277, 282
induced 540–1, 548 maps 278
intersection 541–2, 544 matrix 277
types 542, 544, 546 networks 277, 279
citations 31, 35–6, 272, 276, 283, 435, 460–4, 474–7 code-switching 82, 291–2, 295
networks 271, 283, 435, 440, 580, 585, 591 cognitive social structures 373–4, 499
ties 275–80 Cohen, S. 16–19, 48, 116, 118, 121, 238, 240, 278
CiteSpace 582, 591 cohesion 14, 19, 134, 143–4, 200–1, 242–3, 293, 341
cities 1–2, 4, 15, 42, 109, 144, 190, 290 analysis 142–3
civil society 81, 83, 129, 213, 218, 226–7, 229–30 elites 181–2
CL see computational linguistics groups 170–1, 182
clandestine networks 258–60, 262, 265–7 see also and kinship networks 129–33
dark networks mechanisms 203–4
clans 144, 154, 290, 350, 567, 587 structural 32, 130–1, 138–9, 143, 354
endoconical 134–5, 142 and structural equivalence 203–5
class hegemony 183, 188, 192 cohesive groups 31, 109, 129, 138, 143, 153, 183, 201
classes 4, 47, 129–45, 183–5, 304, 338–9, 418, cohesive marriages 130–1, 135–6, 141
429–30 cohesive relations 203–6
equivalence 338–9, 356, 368, 454 cohesive subgroups 201, 427, 431, 580, 586, 588
online 171–2, 175 cohesiveness 129, 181, 239, 246–7
classic blockmodeling 435–7, 443 Coleman, J.S. 18–19, 42–3, 48, 67, 70, 87, 204, 372–3
classification 18, 288, 313, 322, 440, 442, 479, 538 Coleman social capital (CSC) 43
classmates 173, 514–15 collaboration 12, 72, 75, 196, 273–5, 280–3,
cliques 33–4, 187, 227, 240, 244–6, 341, 350–1, 384, 406–7
427–8 links 74–6
close friends 41–2, 70, 110–11, 123, 239, 259, networks 74, 289–90, 432
460, 526 scientific 35, 72
closeness 34, 44, 51, 171, 263–4, 280, 426, 566 types of 274
centrality 171, 260, 263–4, 365–6, 424, 426, 566 collective action 18, 169, 212, 214, 216, 218, 223–7,
raw 426, 432 229–30
closure 43, 348, 495–6 models 216
transitive 451–4, 502, 506 and social movements 223–30
clubs 200, 207, 247, 417, 421, 567 and social networks 223–6
cluster analysis 350, 586–7, 595 collective decisions 210, 213, 217, 219
clustering 28, 57, 59, 247, 345–6, 488–9, 551, 553–5 collective efficacy 242–3
algorithms 436, 438, 554 collectivities 45, 50, 88, 151–2, 154, 544
coefficients 28, 263, 281, 289, 346, 499, 553 colleges, invisible 3, 275, 277, 287
hierarchical 32, 36, 429, 439 Collins, J. 81, 105, 108, 226, 274–5, 277–8, 283, 289
local 5, 244–6, 289, 346 color schemes 564–5, 567, 570
problems 437–8, 441, 554 colors 33, 332–4, 424, 472, 476–7, 562–4, 566–7,
clusters 2–4, 16, 33, 201–2, 436–7, 441–2, 575–6
551, 553–4 Commetrix 582, 590
CMC see computer-mediated communication common ancestors 129–31, 134–5, 138, 141

5605-Scott-Index.indd 604 4/7/2011 5:06:31 PM


INDEX 605

common property relationships 175 among groups 346–8


communication 86–8, 103–6, 148–51, 156, 167–74, social 68–72, 173, 176, 385
211–12, 464–71, 590 connectivity 63, 187, 342, 354, 359, 552, 572, 592
centrality 212, 553 local 560–1
channels 167, 185, 562 threat of 256–68
modes 273 consanguineous components 538–9
networks 48, 169–71, 211–12, 265, 471 consensus 2, 48, 87, 238, 240–1, 301, 514
software 580, 585, 588, 590, 592 constitution, mutual 84–5, 290, 292
technologies 105, 112, 167–8, 268 contacts 68–70, 105–6, 307–9, 372–3, 377–9, 381–2,
communities 15–16, 31–4, 42, 101–3, 129–45, 167–9, 515, 525–6
171–2, 303–5 of contacts 382
community question 103–5 frequency of 106, 121, 238, 374–5, 384
detection 131, 442, 554 phone 105, 304
personal 101–12 contagion 47–8, 50–1, 76, 245–6, 289, 471, 521, 524–5
as personal communities 103–5 models 216, 471
scientific 3, 28, 281 reputational 289
structures 1–2, 294 contention 83, 85, 202, 287, 293, 303
companies 59–60, 170, 180–2, 184–5, 188–9, 191, contentious politics 22, 81, 83–5, 91
560, 572 context 75–6, 141–3, 174–6, 184–5, 229, 291–2,
companionship 12, 14, 20, 120–2, 303, 383 304–7, 405
comparability 412, 421, 426, 472 of action 405, 407
competition 14, 19, 75, 137, 141–2, 203–4, 275, 288 local 306–7
complement 449–51, 456 neighborhood 304, 308
complementation 450–2 convergence statistics 491–2, 497
complex causality 241 conversation networks 304–5, 307
complex kinship relations 537, 540, 548 conversations, conversion through 307
complex networks 5, 58–9, 76, 159, 435, 442, 594 conversion approach 431
components 22, 86, 348–9, 354, 359, 504–5, 541–4, conversion through conversation 307
587–8 cooperative breeding 149
connected 197, 535, 551–3 coordination 45–51, 74, 180–1, 188, 196–7, 226,
consanguineous 538–9 258–9, 263–4
strong 354, 359, 444, 552 core blocks 316–17, 321–2
weak 354–5, 359, 444, 552 core members 33, 229, 263, 267
composition 22, 109, 153, 155, 159, 241–2, 431, coreference resolution 173–4, 176
449–52 cores 33–4, 263–5, 272, 312–17, 321, 323–4,
measures 384, 591 356, 552–3
operation 450–2 main 552–3
compound relations 431, 450, 537 outer 110–11
computational linguistics (CL) 173–4 corporate actors 196, 203, 206, 211
computer-mediated communication (CMC) 167, 173–4, corporate attributes 200
176, 229 corporate boards see boards
computer networks 167–8, 572 corporate connections, political dimensions 196–207
computer science 15, 31–4, 58, 62, 171, 257, 267–8, corporate elites 180–92, 197
281 see also software corporate interlocks 35, 183–4, 190, 202–4
concentration 56, 180–1, 187, 197, 201, 204, 214, 365 and capital relations 191
CONCOR 314–16, 324 corporate networks 59–60, 183, 186–7, 189–91, 197,
conditional probabilities 295, 504–6 199–203, 206
conduits 46, 111, 417 American 59, 184, 188, 202
for culture 85 national 198–9
confidants 108, 122, 377–8 corporate politics 196–207
conflicts 2, 43, 74, 139, 158, 172, 228, 307 network mechanisms 201–5
between authors 274–5, 277 network methodology 199–201
connected components 197, 535, 551–3 corporate power 2, 184–5, 189, 192, 197
connected graphs 63, 130, 322, 533–4 corporations 135, 180–4, 186–7, 189–92, 197–207
connectedness 2, 44, 49, 67, 71, 82, 156, 364–5 interlocked 188, 201–2
connections 11, 58–9, 69, 244–7, 331–4, 340–4, 356–9, large 180–1, 188, 199, 201, 207
364–6 politically active 198–9, 203
direct 87, 340, 343, 357 correspondence analysis 31, 87, 288, 292, 424, 560, 588
ego neighborhoods 358–60 cosine similarity 553

5605-Scott-Index.indd 605 4/7/2011 5:06:31 PM


606 INDEX

counterfactuals 516–17, 524 mining 266–8, 412


couples 129–31, 134, 137, 139, 536–8, 540 missing 199, 266–7, 409, 441, 444, 518, 525–6, 545
cousins 137, 141, 303, 544 multiplex 334, 338
covariances 394–5, 397, 465–8 observation 410–11
covariates 459, 466–9, 472, 479–81, 516–17, 519–20, one-mode 20, 315, 442
522, 526 quality 265, 377, 381–4
dyadic 465–7, 471, 476–7, 507 sources 169, 172
CPM see Critical Path Method survey network 370, 381–2, 384
creativity 48, 84–5, 267, 289 two-mode 4, 20, 315, 338, 420, 440, 585
crime 67, 77, 135, 258, 267, 519 valued 315, 343, 354, 360, 424, 440
organized 244, 246, 248–9 daughters 132, 134, 139, 141, 150, 534, 536, 540
and social network analysis 236–49 Davis, J.A. 27
criminal groups 236, 244–6, 248 De Nooy, W. 5, 22, 288, 292, 295, 481, 547, 555
criminal networks 244–8 de Solla Price, D. 28, 36, 275, 277–8, 502
criminology 6, 236, 248 decentralization 6, 138, 227, 257–8
criterion functions 437–8, 441, 444, 554 decomposition 31, 33, 424, 427, 432, 442, 444, 551–2
Critical Path Method (CPM) 550, 553 singular values 560
CSC see Coleman social capital deductive blockmodeling 438
CSS tasks see cognitive social structures degeneracy 457, 491
cultural analysis 286, 290–1, 296 degree 34, 364–5, 396–8, 450–3, 460–1, 487–9,
and duality 291–2 533–4, 566–8
cultural capital 274, 282, 288 centrality 27, 201, 247, 260, 263, 265, 364–5, 425–7
cultural forms 87–8 distributions 30–1, 60, 289, 393–4, 396–7, 486,
cultural markets 288–9 488–9, 494
cultural networks 87, 286–96, 313 of freedom 392–4, 467
cultural production systems 286–7 Dekker, A. 32, 462, 464–5, 586
culture, identity, and boundaries 290–2 delinquency 236–45, 248
field analysis 288 desistance from 241
networks of meaning 294–6 Krohn’s network theory 237–8
organization of cultural markets 288–9 delinquent behaviors 240, 508, 510, 516
shaping of creativity and success 289–90 delinquent groups 244–5
and small world studies 289 delinquent peers 238, 240
use of network theory to find artists 290 democracy 136, 181, 206, 307
cultural processes 83, 85–6, 88, 296 demographic characteristics 12, 153, 155, 507
cultural production systems 286–7 demographic composition 141, 148, 151, 155–6
culture 3, 17–18, 22, 80–91, 132, 286–8, 290–2, 294–6 Denmark 291, 317
via interaction 88–9 density 56–7, 245–8, 263, 315–16, 340–2, 346–8,
popular 49, 86, 293 460–1, 467–70
culture-switching 292–3 parameter 467–8, 486–7, 519
cutpoints 352, 354, 356 relations 321, 323
cuts 553 scores 316, 322
cybercommunities 167–76 dependence 20, 201, 463–5, 485–6, 488, 502–3, 508,
cycle basis 541 519–20
cycles 130–1, 140, 143, 157, 400, 533–5, 547–8, 551 assumptions 485, 487–8
oriented 533–4, 548 Markov 393, 487–8, 499
across ties 503
DAGs see directed acyclic graphs across time 502–3
dark networks 247–9 see also clandestine networks dependencies 40, 48, 157, 260, 316, 323–4, 342, 511
data 21–2, 169, 171, 173, 176, 336, 471–2, 525–7 dependent variables 40, 51, 200–1, 306, 508, 511,
affiliation 417, 420–2, 424–7, 431–2 520, 592
analysis 219, 331–9, 392, 405, 408–10, 412–13, depression 120, 122–4
455, 465 depressive symptoms 122–4
archival 229, 262, 405, 410, 412 descent 130, 138–9, 540
co-affiliation 420, 422–4 arcs 533, 535
collection 21, 49, 169, 370–1, 404–10, 502, 545, 547 graphs 535
software 580, 583–5, 590–2 groups 139–41
formats 339, 510, 580–1, 588, 596 descriptions, thick 408, 413
longitudinal 206, 219, 409, 459, 501, 579–80, 591–2, deviance 238, 240, 466–9
594–5 deviant peers 238, 240–1

5605-Scott-Index.indd 606 4/7/2011 5:06:31 PM


INDEX 607

diagonal blocks 339, 436–7, 554 dyadic relationships 159, 172, 176, 189, 199–200, 344,
differential association 153–4, 236–43 474
differential social organization 242–3 dyads 20–2, 200, 291–2, 344–6, 348, 392–3, 467,
differentiation 62, 258, 266, 312, 570 503–5
diffusion 18, 50, 68, 70–1, 85, 225–6, 287, 515–16 asymmetric 462, 467–8
of innovations 64, 515 independent 392–3, 465, 505
in peer networks 241 mutual 460, 467–9
processes 63, 225–6, 410 dynamic access models 217–18
digital libraries 171, 174 dynamic blockmodels 445
digraphs 502–5, 536, 544–5, 547 dynamic models 74, 502–3, 520–1
direct connections 87, 340, 343, 357 dynamic networks 160, 261–2, 266, 339, 521, 525,
directed acyclic graphs (DAGs) 516 567, 572
directed graphs 332, 340, 354, 392–4, 400–1, 448–9, dynamic policy models 217
502, 552 dynamics 73–4, 80, 82, 85, 109, 132, 501–3, 583–4
extensions for 494–6 network 3, 64, 339, 408–10, 434, 501–11, 580, 595
directed networks 486, 494, 496, 499, 552–3 social 83–4, 125, 154
directors 2, 60, 64, 180–3, 185–9, 197–200, 202–7, 281 DyNet 581, 585, 589
individual 181, 183, 187, 192
directorships 59–61, 81, 138, 180, 186, 189 email 35, 105, 108, 266, 272–3, 275, 304, 572
interlocking 2, 59, 180–2, 184, 186–7, 191, 199–202, E-Net 582, 591
204–5 East Germany 110, 185, 214, 317
disadvantaged neighborhoods 122, 242–3, 524 Eastern Europe 185, 316–21, 323
discovery, automated 169, 175–6 ecologies 89–90, 588
diseases 18, 44, 48, 51, 63, 116–18, 121, 302 ecologists 276
dispersal 148, 150–1, 155–6, 158, 160 economic networks 315, 441
sex-biased 149, 155 economic power 59, 143, 181–2, 184, 197
distance 63, 105, 303–4, 342–3, 426, 464–71, 475, 560 economic sociology 49, 59
definition 477, 479 economics 3–4, 6, 15, 51, 56, 281, 313, 514
geodesic 188, 322, 343, 345–6, 358, 426, 560 social networks in 67–77
geographical 73, 302, 560 economists 3, 59, 67–8, 72, 76, 276, 518
distress, psychological 123 edge betweenness 32–3, 553
distribution edge values 392, 394–5, 397, 401
degree 30–1, 60, 289, 393–4, 396–7, 486, edge variables 392–3
488–9, 494 edges 32–3, 392–4, 436, 486–8, 491–4, 533–5,
probability 5, 141, 390, 392, 398, 441, 485, 505–7 539–42, 572
scale-free 59–61 counts of 393
stationary 400–1 marriage 533, 535, 537–41, 544
diversity 21, 86, 207, 291–2, 307 mutual 393–4, 401–2
division of labor 227, 282 editors 59, 62, 282, 325, 511, 588
documents 70, 168, 173–4, 380, 404–5, 409–12, 435, education 1, 11, 13, 15, 68, 109–11, 122–3, 266
545–6 effective size 245, 360
dolphins 48, 150, 152–4, 157, 159 efficacy, collective 242–3
domain expertise 248, 257, 262 ego neighborhoods 334, 357–60, 362
Domhoff, G.W. 181–2, 186, 197–8, 417 connections 358–60
dominance 34, 142, 152–3, 157, 160, 181 Ego Net 582
hierarchies 153, 155, 158 ego networks 17, 19–20, 42, 224, 262, 288, 334, 356–9
orderings 153, 157–8 see also egocentric networks; egos, networks
pairwise 156–7 data 17, 20–2, 357–8
ranks, inheritance 158 egocentric networks 12, 238, 244, 370, 374–5, 377,
relations 150–1, 156–7 383–5, 406–7 see also ego networks; egos,
dominant classes 181, 183 networks
donations, political 198, 200, 202–5 properties 372, 374, 376–7, 381
Doreian, P. 34, 201, 324, 371, 435–44, 471, 481, 552–4 software 580, 585–6, 591
drug abuse 239, 241 studies 370–1, 374
duality 87, 180, 186–7, 189, 206, 227, 287, 290–1 EgoNet 589, 591
and cultural analysis 291–2 egos 20, 42, 44–6, 102–3, 108–11, 237–8, 356–67,
durability 89–90, 324 537–8
dyadic covariates 465–7, 471, 476–7, 507 networks 20, 106, 359–60, 362, 409 see also
dyadic phenomena, types 44–5 ego networks; egocentric networks

5605-Scott-Index.indd 607 4/7/2011 5:06:31 PM


608 INDEX

EIES (Electronic Information Exchange System) 272, exponential distribution 504, 506, 509, 522
460, 464 exponential random graph models (ERGMs) 5, 22,
data 460–1, 468–9, 471, 475, 480 456–7, 459–60, 484–99, 520, 591–2, 594–5
friendship network 463, 468, 470–8, 480 extensions for directed graphs 494–6
eigenvectors 263, 427, 587 general form 485–6
centrality 207, 260, 366, 424, 427, 432, 553, 566 network building blocks for undirected graphs 486–9
Electronic Information Exchange System see EIES technical issues 489–91
elementary kinship relations 537, 540 undirected graphs example 491–4
elephants 150–3, 157, 159 export functions 586–7, 592
elites 137–8, 141–3, 180–3, 186, 189–90, 197–8, external ties 348
206, 293
cohesion 181–2 f-groups 349–50
corporate 180–92, 197 face-to-face contacts/interactions 72, 102, 105–6, 108,
email 102, 105–6, 108, 112, 168–76, 460, 590 119, 168, 294, 303–5
embassies 315, 319, 321 face-to-face groups 338
embeddedness 32, 71, 90, 223–4, 247, 282, 357, 508 Facebook 67, 101–3, 106, 168, 176, 578
Emirbayer, M. 3, 14, 80–5, 88, 90–1, 223, 286, 313 factions 212, 349, 352, 354–6, 359, 522
emotional support 20, 108, 111–12, 117–18, 120–5, 239 families 22, 110–11, 129–30, 134–9, 150, 237, 380,
employment 2, 68–9, 371 434–5
enclaves 86, 303 nuclear 129, 139, 141
endoconical clans 134–5, 142 family members 104, 108, 238, 241, 379, 383
endogamy 130–4, 136–8, 141, 143, 545 FATCAT 579, 585, 588
endogenous peer effects 515–16 fathers 34, 134, 139, 141, 277, 535, 537, 539
endpoints 534, 542, 550–1, 554 Faust, K. 3, 31, 34, 160, 417, 434, 498, 579
equations 421–3, 426–7, 452–3, 455–6, 485–7, 489, females 139–41, 149–53, 155, 157–8, 238–9, 241, 245,
520, 522 538 see also women
equivalence 140, 324, 429, 436–8, 444, 469, 554, 586 Fennema, M. 2, 180, 182–4, 186, 188
classes 338–9, 356, 368, 454 field homophily 467, 469, 477
regular 34, 314, 324, 430–1, 435, 437–8, 440, 442–4 field similarity 469–70, 477
relations 338, 453, 535, 551 filiation 533–4
structural 5, 19, 34, 85–6, 200–1, 314–15, 428–31, films 16, 19, 30, 290, 432, 572
435–44 finance capital 181, 183–5, 187–8, 197, 201–2
Erdös, P. 57, 62, 274, 389, 486 theorists 197, 201–2
ERGMs see exponential random graph models finance capitalists 181, 183, 190
Erickson, B. 17–18, 21, 49, 81, 107, 109, 111, 291–2 financial aid 108, 110–11, 118, 120–1
estimation 77, 384, 389, 395, 397, 469, 488, 489–91 financial hegemony 183–6, 189, 191
maximum likelihood 486, 508 financial institutions 182, 184–5, 188–9, 191,
methods 394, 441, 508 201–2, 204
estimators, unbiased 390–1, 395–8 financial power 191, 201
ethnicity 109, 129–30, 133, 137, 246, 266, 375 finite populations 390, 392
ethnography 5, 22, 103, 132, 137, 139–41, 290, 410 Finland 61, 317
ethnomethodology 405, 414 firms 68–72, 74–6, 143, 180, 182–4, 186–91,
ethograms 153–4 196, 200–4
ethology 34, 157, 160 entrepreneurial 406, 408
European Union 215, 218 Fischer, C.S. 2, 16–17, 20–1, 102, 106, 108–9,
eusociality 149 375–6, 380
event-participation relationships 175 fixed effects model 521, 526
Everett, M. 32, 34, 46–7, 229, 425, 428–31, 439, 443 Florida scrub jays 149
everyday life 108, 110–11, 168, 345, 563 flow betweenness 263, 366–8
Excel 585, 588, 591, 594 flows 12–13, 18, 43–7, 50–1, 272, 302, 344, 440–1
exchange networks 19, 287, 572 of resources 12, 45, 49
exchange processes 110, 312 focal nodes 20, 356
exclusion 18–19, 51, 134, 168 formal organizations 120, 123, 183, 210, 212, 246,
exogenous variables 243, 520, 576 288, 340
experiments 46, 72, 74, 170, 272, 467–8, 522–3, 527 former Soviet block 316–21, 323
natural 520, 522–3 Fortunato, S. 33, 36
expertise 11, 44, 211, 246, 248, 262, 266, 307 Fowler, J.H. 48, 501, 514–15, 519, 521, 524–5
keywords 174 France 27, 61, 109, 136, 184–6, 210, 213, 317
explanatory variables 464–5 free-recall questions 373

5605-Scott-Index.indd 608 4/7/2011 5:06:31 PM


INDEX 609

freedom 74, 198, 361, 392–4, 467, 520, 559 geographical distance 73, 302, 560
degrees of 392–4, 467 geography 3–4, 6, 167–8, 190, 192, 266, 301–9
Freeman, L.C. 3–4, 21–2, 26–8, 31–2, 34–6, 43–4, GEOMI 572, 575
272–3, 460 Germany 56, 61, 110, 184, 186, 191, 212–15, 317
frequency girls 26, 239, 244–5, 373, 523, 548
of contact 106, 121, 238, 374–5, 384 Girvan, M. 32–3, 36, 131
of religious attendance 120 global interlock network 184–6
of socializing with friends 378 global networks 311, 392, 540
friends 44–5, 105–6, 108–12, 236–8, 303–5, 377–81, global properties 390, 392
517–20, 523–7 global questions 377, 381
best 106, 239, 375, 514–15, 517, 526 global-system arguments 312–13
close 41–2, 70, 110–11, 123, 239, 259, 460, 526 globalization 130, 185–6, 313
delinquent 238, 240 Globenetters 273–4, 276, 282
of friends 20, 28, 31–2, 172, 259, 343, 359, 431 glocalization 104
friendship(s) 12, 88–9, 103–4, 109–10, 282, 370–2, Gluesing, J. 406–7, 409–12, 414
459–61, 510 goodness of fit 354, 491, 494, 511
choices 4, 304 governance 64, 143, 180, 213, 258, 266
formation 445, 518–20, 522 structures 76, 138, 227, 258–9
linking students 35 GRADAP 579–81, 590
networks 18, 20, 49, 110–11, 238–9, 462, 468–9, 501 Granovetter, M. 17–18, 40–3, 48, 50–1, 61, 67–8,
density 377–8 106–9, 239
EIES 463, 468, 470–8, 480 Granovetter graphs 63
in personal communities 110–11 graphs 338–46, 348–9, 354, 425–7, 489–92, 533–4,
front door mechanisms 527 540–1, 551–5
functionality 580–1, 584–5, 589, 594–5 acyclic 534–5, 552
functions affiliation 418, 424–31
criterion 437–8, 441, 444, 554 bipartite 418, 424–8, 431, 567–8
likelihood 519, 521 connected 63, 130, 322, 533–4
minimized criterion 444 directed 332, 340, 354, 392–4, 400–1, 448–9,
objective 475, 505–6, 508–9, 522 502, 552
rate 505, 508–9, 522 Granovetter 63
mathematical 418, 559, 561
Galaskiewicz, J. 3, 48–9, 189, 212, 417 mixed 533, 535, 547
Galois lattices 87, 292–4 ordinary 424–30, 432
game theory 76, 505 random 63, 144, 262, 334, 346, 389, 485, 502
gangs 239, 244–6, 435 theory 4–5, 34, 57, 331, 389, 550, 552
Garfield, E. 277–80 undirected 393, 396, 400, 436, 486–9, 491–4, 547
Gaulin, S.J.C. 31, 36, 153, 157 use to represent social relations 331–6
gender 13, 106–7, 109, 122, 132, 174, 228, 533–8 Greece 69, 136, 317
composition 238–9 greedy algorithms 33, 36
genealogy 89, 133–4, 136–7, 139, 545, 552–5 Greek gods 135–6, 144
General Social Survey (GSS) 105, 229, 293, 374–6, grooming 152–3, 158–9
378, 407 group boundaries 148, 155, 293, 296
general social theory 43, 73–6 group cohesion 170–1, 182
Generalised Axiom of Quality 453, 455–6 group memberships 12–14, 20, 84, 155, 261, 350,
generalized blockmodeling 324, 435, 437–45 459, 472
problems 442–3 group size 148–9, 151, 154–6, 247, 348, 354, 521, 542
recent extensions 439–42 group structure 14, 27, 31, 350, 352
signed networks 441–2 groups
generalized exchange 507, 542, 545 of actors 225, 409, 471–2
generations 27, 55, 62, 86, 89, 137–41, 158, 277–8 cohesive 31, 109, 129, 138, 143, 153, 183, 201
generators criminal 236, 244–6, 248
name 106–9, 371–2, 374–7, 379–84, 412 large 76, 155, 281, 341
position 106–8, 120, 377–9, 381 multiple 13–14, 49, 151
resource 108, 379–80 and networks 13–14
genetics 35, 227, 279 small 1, 70, 76, 150, 155, 224, 244, 462
geodesic distances 188, 322, 343, 345–6, 358, 426, 560 GSS see General Social Survey
geodesic paths 343, 359, 366 GUESS 581, 590, 594
geographers 276, 303, 560, 564 guppies 149, 154, 157

5605-Scott-Index.indd 609 4/7/2011 5:06:31 PM


610 INDEX

hamadryas baboons 151, 153, 159 indegree(s) 275, 364, 393, 402, 460, 462, 496, 502
Handcock, M.S. 144, 441, 444, 476–7, 488–9, 491, India 256, 316–17, 324
525–6, 594 indirect interlocks 204
Harary, F. 1, 4, 27, 41, 129–31, 137–8, 418, 438 individual behavior 67, 71–2, 74, 76, 203, 226, 508
harmonic mean 391 individual centrality 160, 245
health 16, 76, 116–18, 120–2, 124–5, 211–12, 371, 375 individual choice 71, 73–4, 77
health returns, social support 121–4 individual recognition 149, 154, 158
hegemony, financial 183–6, 189, 191 individualism, networked 86, 102, 104
heterogeneity 73, 224–5, 242–3, 293–4, 343, 377, Indonesia 256, 316–17
442, 488–9 induced circuits 540–1, 548
hidden populations 290, 385, 398, 589, 592 induced subgraphs 131, 394–5, 540–1
hierarchical clustering 32, 36, 429, 439 inequality 22, 68–70, 83, 85, 111, 325, 362, 365
hierarchies 34, 324, 344–5, 362, 434–5, 464–7, and personal communities 111
474–5, 551 infectious diseases 294, 302, 515
dominance 153, 155, 158 infiltration 260, 267–8
higher education 109, 215 InFlow 581, 590, 592
hijackers 263–5 influence 203–6, 210–12, 215–18, 236–40, 301–8,
HistCite 279–80 363–6, 508–10, 524–5
histograms 489–91, 493, 588 and power 365
historical processes 81, 87–8, 187, 313 spheres of 59, 64, 560
historiographs 279 informal social control 237, 242–3
Holland, P.W. 373, 392, 441, 456, 463, 467, 502–3, 519 informant accuracy 381, 414, 526
Holland-Leinhardt model 393 information
Homans, G. 2, 5, 56–7, 312 exchanges 216–17, 226, 332, 365, 384
homogeneity 47–8, 50–1, 109, 111, 301–2, 316, flows 12, 40, 43–4, 46, 70, 76, 85, 305–9
393–7, 429 networks 70, 333–4, 341–7, 349–50, 353–4, 356,
blockmodeling 440 362, 364–8
homomorphic images 453–4 transmission 69, 211, 591
homomorphisms 453–4 information and communication technologies (ICTs)
homophily 21, 41, 109, 239–40, 245, 459–60, 105, 108, 167–8, 261, 268
495–9, 519 informational support 118, 120, 383
attribute 497 inheritance 129, 137, 139, 143, 158
field 467, 469, 477 inner circles 110, 181, 183, 186, 189, 200, 202, 350
Houseman, M. 135, 138–9, 144, 543, 548 innovation 11, 21, 47, 55–6, 64, 68, 70, 84–6
Huberman, B.A. 33, 410, 414 networks 406–9
hubs 58–60, 62, 73, 84–5, 135, 257–8, 432, 553 INSNA see International Network for Social Network
Huckfeldt, R. 304, 307–8, 374–5 Analysts
hues 563–4, 567 institutional investors 180, 184–6, 191
human capital 11, 48, 247 institutional logic 291, 294
husbands 135, 139, 141, 536 institutions 67, 74, 85, 90–1, 109–10, 182, 204, 547
hyenas, spotted 151, 154–5 financial 182, 184–5, 188–9, 191, 201–2, 204
hyper-graphs 338–9 instrumental support 111, 118–20, 123
hypernetwork sampling 290 instrumental variables (IVs) 520–2, 526
integration 108, 181, 183, 185, 197, 225, 411, 590
ICTs see information and communication social 2, 116, 118–22, 124, 136, 225, 237, 409
technologies intelligence 257, 260–1, 265, 268
identity 3, 14, 19, 81–3, 86, 286–7, 289–95, 452 intelligence strategies 258, 265
numbers 540, 545–6 interactions 12, 14–16, 44–5, 82–4, 87–8, 148, 151–7,
political 293–4 167–72 see also contacts
from third parties 293 face-to-face 72, 102, 105–6, 108, 168, 294, 305
ignorability 517–18 online 106, 167–8, 172
IGOs see intergovernmental organizations intercitations 3, 275–6, 282
image matrices 338–9, 441 intercorporate networks 180–92
implicit blockmodeling 440 intercorporate ownership 184, 187–8, 190–1
important individuals 158, 160 interdependencies 50, 154, 161, 182, 542
incentives 72–3, 75, 516 interest groups 59, 138, 181, 200–2, 210, 213,
incidence matrices 244, 249, 418, 427, 430–1 215, 217
inclusion probabilities 394–6, 398–401 intergang networks 245–6
incomes 13, 109, 305, 314, 526 intergovernmental organizations (IGOs) 313, 315, 321

5605-Scott-Index.indd 610 4/7/2011 5:06:31 PM


INDEX 611

interlock networks 180, 182–6, 191 Kentor, J. 186, 312, 314, 324–5
duality 186–7 Kenya 149, 317
global 184–6 key players 73, 215, 245, 247, 260, 265
interlocked corporations/firms 188, 201–2 KeyPlayer 583, 586, 592
interlocking directorships 2, 59, 180–2, 184, 186–7, Kick, E.L. 311–17, 321–4
191, 199–202, 204–5 kin 22, 101–2, 106, 108–12, 120, 155, 303–5, 308
interlocks 132, 181–4, 186, 188–92, 201–2, 204, 207 see also kinship
corporate 35, 183–4, 190, 202–4 kinship 2, 12, 109–10, 129–45, 158–60, 377–8, 533–5,
indirect 204 544–6 see also matrimonial circuits
intermediaries 5, 28, 58, 366 alliance networks 544–5
international attributes 314 data 143, 545–6, 593
International Network for Social Net-work Analysts network representations 535–7
(INSNA) 3, 15, 62, 81, 527, 578, 596 networks 22, 110, 135, 139, 143–4, 580, 585
Internet 34–5, 101–2, 104–5, 112, 168–9, 257–8, 262, analysis 136, 140–1, 144, 533–48
304–5 canonical 535–6, 538–9
social network discovery from data on 173–6 and cohesion 129–33
interorganizational networks 183, 213, 218, 229, 501 paths and cycles 533–5
interorganizational relations 189, 211, 214 regular 535–6
interpersonal networks 2, 186–8, 224 standard 535–6
interpersonal relations 103, 213 paths 537–8, 540, 548
interpretation 71, 283, 294, 322, 405–6, 469–71, in personal communities 110–11
479–81, 546–7 relations 120, 159, 534, 537–9, 545–6, 555
interpretive methods 404–5, 409, 412 complex 537, 540, 548
intersection 14, 76, 86–8, 182, 290–1, 449–51, elementary 537, 540
456, 544 linear 538, 548
circuit 541–2, 544 terminology 138–40
operation 450 KliqFinder 580, 583, 592
interventions 158–9, 267, 293, 515, 525, 586, 592 KliqueFinder 472, 475–9, 481
interviews 21, 168, 243, 271, 288, 372, 376, 404–13 Knoke information network 333–4, 341–7, 349–50,
in-depth 407–8, 413 353–4, 356, 362, 364–8
investors, institutional 180, 184–6, 191 directed 357
invisible colleges 3, 275, 277, 287 reciprocity-symmetric 351–2
Iran 102, 317 knowledge 5–6, 45, 48, 75, 151, 171, 405–7,
Iraq 317, 322 438–9
irreducible circuits 541 management 50, 267–8
islands 4, 73, 553 Kochen, M. 27–8, 43
Israel 317, 324 Kogovšek, T. 375–6, 383–4
Italy 61, 69, 184, 230, 295, 317, 523, 527 Krackhardt, D. 48, 183, 244, 348, 373–4, 407,
IVs see instrumental variables 411, 431
KrackPlot 579
Jaccard coefficients 421–3, 553 Krohn’s network theory of delinquency 237–8
Jamaica 82–3, 317
Jang, Y.S. 186, 325 labor 144, 211, 228, 311–12, 322
Japan 102, 124, 186, 191, 212, 217, 317, 547 division of 227, 282
Jeidels, O. 180–1, 184, 188 markets 17, 67–8, 111
Jemaah Islamiyah 263 Lambda sets 349, 354, 356
Jennings, H.H. 1, 26, 30, 159, 456, 499 large corporations 180–1, 188, 199, 201, 207
job searches 71, 111 large networks 102, 336, 345–6, 442–4, 550–2, 554–5,
job vacancies 68–9 583–4, 587–8
jobs 17–18, 26, 42, 68–9, 72, 106, 111, 378–9 analysis 550–5, 590
Johnson, J.L. 50, 73, 84, 216, 373, 411–14, 554, 567 blockmodeling of 444
JUNG 584, 590 social 76, 151, 519, 527
latent space 469–70, 476–7, 479, 481
K-cores 333–4, 348–9, 352, 552 models 476, 480–1, 519
K-plexes 348, 350–3 latentnet 472, 476, 479–80, 594
k-stars 392, 487–8, 492, 494 Latora, V. 33, 36, 264
k-triangles 488–9, 492, 495 lattices 28, 430, 443
k-wave snowballs 398–9 Galois 87, 292–4
Katz, E. 27, 48, 85, 168, 226, 307, 366, 502–3 Lazarsfeld Center 81–3, 91

5605-Scott-Index.indd 611 4/7/2011 5:06:31 PM


612 INDEX

leadership 48, 134–5, 266 market competition 75–6, 181, 515


centrality 247 markets 18–19, 56, 69, 74–7, 90, 196, 244, 246
roles 138, 175 Markov chain Monte Carlo (MCMC) 441, 470, 477,
Leavitt, H.J. 27, 34, 48 520, 522, 591
Leinhardt, S. 6, 373, 392, 438, 456, 463, 467, 502–3 Markov chains 398, 400, 503
Lévi-Strauss, C. 2, 132, 545 Markov dependence 393, 487–8, 499
lgraph 584 Markov models 393–4, 485, 487–9, 491–3, 496,
LibSNA 584, 594 498, 591
life events, undesirable 121, 123–4 Markov processes 502–3, 505
lightness 563–4 marriage 109, 129–35, 137, 139–44, 533–5, 537–40,
likelihood function 519, 521 544–5, 548
liking 12, 44, 118, 436 co-descendant 135–6, 141, 144
Lin, N. 3, 21, 44–5, 107, 109, 111, 116–25, 377–9 cohesive 130–1, 135–6, 141
line networks 363 edges 533, 535, 537–41, 544
lineages 134–5, 137–8, 142, 535, 544 marriage networks see matrimonial networks
Arab 134 mated pairs 149, 152, 155
linear-in-means models 520–1 mathematical graphs 418, 559, 561
linear kinship relations 538, 548 mathematical models 4–5, 140
lines 4, 63, 435–6, 533–4, 536–7, 539–46, 550–4, Matman 584
562–3 matrices 199–200, 207, 277, 315, 325, 331, 374, 464
linkages 63, 70, 107, 119, 159, 189, 312–13, 370–1 adjacency 337, 354, 394, 396, 427, 429–30, 448, 476
LinkedIn 67, 168, 578 affiliation 200, 338
links 30, 58–9, 63–4, 70–5, 84–6, 280–3, 559, 561–3 co-affiliation 423–4
analysis 260, 268 image 338–9, 441
collaboration 74–6 incidence 244, 249, 418, 427, 430–1
formation 72–4 multiplex 337–8
missing 265, 267, 525 square 337
random 28, 57–8 use to represent social relations 336–9
‘little boxes’ 104 matrilines 150–1, 155
lLatentnet 584 matrimonial bicomponents 543–4, 546, 548
lobbying coalitions 211 matrimonial censuses 539, 542
local clustering 5, 244–6, 289, 346 matrimonial circuits 537, 539–40, 542–4, 546, 548
local connectivity 560–1 matrimonial components 542–3
local contexts 306–7 matrimonial networks 542–3, 546, 593
local neighborhoods 346, 358, 360, 366 matrix blocks 429–30
local regularities 455, 575 Matthew effect 16, 59, 64, 502–5, 507
local social networks 242, 302, 306 maximum likelihood method 441, 486, 507–8
locations 308, 378–9, 434, 436, 441, 443, 476–7, MCMC see Markov chain Monte Carlo
559–61 MDLogix solutions 581, 585, 589
natal 149–50, 155 meaning 87–91, 207, 286–7, 293–6, 404–5, 414,
social 88, 109, 377, 405, 411 517, 562–3
logistic regressions 201, 469, 491 networks of 294–6
logit models 521 through relations 287
longitudinal data 206, 219, 409, 459, 501, 579–80, search for 404–5
591–2, 594–5 measurement errors 238, 372–3, 382, 391, 443–4,
518, 525–6
McAdam, D. 83, 86, 223–5, 410, 516 measuring instruments 372–80, 382
McPherson, J.M. 12, 17–18, 41, 90, 109–10, 175, memberships 13–14, 20, 22, 143, 187, 245, 417, 420
223, 417 multiple 227–9
macrosociology 311–12, 323 overlapping 227, 338, 341
Macy, M. 225, 230, 259, 267, 507 mental models 87, 287, 295
Malaysia 316–17 Merton, R. 16, 27, 41, 59, 203, 277–8, 289, 291
male-centered social units 151 messages 170–2, 174–5, 272–3, 342, 344, 460–2,
males 133, 139, 149–51, 238–9, 243, 245, 518, 523 464–5, 590
mapping 87, 131, 186, 412–13, 453–4, 558–61, 563–4, meta-analyses 160, 324
566–7 meta-networks 588, 595
Marchiori, M. 33, 36, 264 metaphors 1–2, 181, 214, 218, 562
marital cohesion 129, 131, 143–4 MetaSight 582, 590
marital relinkings 131, 134–5, 137, 552, 554 method of moments 507–8

5605-Scott-Index.indd 612 4/7/2011 5:06:31 PM


INDEX 613

methodologies 6, 22, 44, 49, 80, 87–8, 157, 159 moieties 138–9, 290
network 198–9, 313, 315 moments, method of 507–8
metrics Moody, J. 88–9, 280, 282, 382, 457, 554, 572
centrality 263–4, 425 Moreno, J.L. 1, 26, 30, 372, 456, 499, 502
network 262, 264, 267, 561–2 Morselli, C. 245–7, 259
Mexico 224, 317 mothers 109, 132, 134, 139, 141, 535, 539, 541
Middle East 133, 226, 312–13, 316–21, 323 movement networks 227–8, 230
migration 56, 105, 129–30, 134, 516 MR-QAP 464–7, 471
minimized criterion function 444 Mrvar, A. 438, 441–3, 547
minimum spanning tree 550, 552 multidimensional scaling 5, 31, 57, 291, 335, 413,
missing data 199, 266–7, 409, 441, 444, 518, 424, 587–8
525–6, 545 MultiNet 22, 579–80, 585, 587–8, 591–2, 594–5
missing links 265, 267, 525 multinetwork analysis 311–25
mixed method designs 413 multiple groups 13–14, 49, 151
Mizruchi, M. 12, 61, 184, 186, 188–9, 197, 200–4, 207 multiple memberships 227–9
mobile phones 101, 104–5, 112, 168, 304 multiple networks 49, 85, 212, 261, 313–14, 324,
mobilization 86, 198–200, 206, 227, 243 454–5, 590
modeling 87, 189, 240, 459, 462, 499, 501–2, 594 multiple regions 491–2
block see blockmodeling multiple relations 20, 84, 89, 158, 203, 293, 337–8,
statistical 511, 514, 579, 585, 595 435–6
ties 462–3 multiple two-paths 495, 497–8
models 72–7, 216–19, 389–94, 463–9, 471–2, 484–99, multiplex data 334, 338
502–11, 514–23 multiplex matrices 337–8
actor-based 459, 503, 505–7, 508–10 multiplexity 21, 159, 168, 212, 237–8, 247, 292, 338
algebraic 5, 34, 447 multirelational networks 551
architecture 46–8, 50 mutual edges 393–4, 401–2
Bernoulli 372, 389, 391, 393–5, 397, 399,
486–7, 491 N-clans 348, 350
block see blockmodels N-cliques 348, 350, 352, 427, 567
collective action 216 N-step neighborhoods 357, 366
degeneracy 491 name generators 106–9, 371–2, 374–7, 379–84, 412
dynamic 74, 502–3, 520–1 name interpreters 106–7, 374–7, 383–4, 412
dynamic access 217–18 questions 374–6, 381
dynamic policy 217 named entities recognition (NER) 173
fixed effects 521, 526 names, personal 172–4
latent space 476, 480–1, 519 narrative networks 295–6
logit 521 narrativity 287, 294–5
Markov 393–4, 485, 487–9, 491–3, 496, 498, 591 national attributes 313
mathematical 4–5, 140 national networks 186, 190, 192
mental 87, 287, 295 national policy domains 212, 217, 219
network access 216–17 nations 171, 212, 214, 280, 311–17, 321–5, 343, 435
network architecture 40, 45–7, 50 natural experiments 520, 522–3
network flow 40, 43–8, 50–1 navigable strong ties 144
probabilistic 245, 249, 390, 392, 502, 551 negative blocks 438, 441, 443
process 216, 503, 508, 527 negative ties 357, 438, 443
random effects 466 NEGOPY 579, 588
random graph 57, 456–7, 460, 463, 469, 484–9, neighborhood effects 301–9, 524
519, 591 and local social context 305–7
social circuit 488–9, 491–3 neighborhood networks 236, 241–4, 309
social influence 216–17, 499, 592 neighborhoods 242–3, 301–2, 304–6, 308, 334, 346,
static 520–1 357–63, 524–5
statistical 5, 159, 339, 390, 502, 511, 583–5, bespoke 306
594–5 disadvantaged 122, 242–3, 524
stochastic 456–7, 480, 503–7, 522 ego 334, 357–60, 362
theoretical 68–9, 161, 408, 413 in 357–8
underlying 40, 42–3, 45, 47, 50–1 local 346, 358, 360, 366
modernization approaches 312, 323 N-step 357, 366
modularity 32–3, 354 one-step 357, 359, 362
Mohr, J. 81, 87, 89, 287, 291–2, 294 out 357–8

5605-Scott-Index.indd 613 4/7/2011 5:06:31 PM


614 INDEX

neighbors 28, 33–4, 70, 242–3, 301–3, 305–6, network properties 40, 50–1, 62, 117, 119, 154, 262,
359–60, 552–3 336
nepotism 158 network research 48–9, 51, 244–5, 259, 404, 406–8,
NER see named entities recognition 410, 412–14
NetDraw 272, 276, 316, 322, 424, 462–3, 476–7, 586 network sampling 371–2, 389, 527 see also sampling
Netherlands 2, 27, 61, 69, 186, 188, 247, 317 network size 119–20, 264–5, 360, 381, 413
NetMiner 460–1, 579–81, 585, 587–8, 591, 594–6 network statistics 392–3, 485, 520, 522
nets 13, 85, 288–9, 291–3, 295–6, 354 network structures 5, 18, 48, 50, 85–6, 110, 144,
NetVis 581, 590 211–12
netwar 268 network surveys 370–1, 373, 384, 389–90, 392, 398,
network access models 216–17 580, 585
network analysis see also analysis; data analysis cognitive considerations 380–1
concepts and measures 340–68 human subject protections 384
kinship 136, 140–1, 144, 533–48 network switching 290–1
network architecture model 40, 45–7, 50 network text analysis (NTA) 559, 580
network change 5, 265, 408–9, 502, 509 network theories 3, 40–51, 237
network composition 83, 109–10, 238–9, 377, 381, 408 goals 47–9
measures 377, 381, 383 network time 464–6, 468
network data 4–5, 19–22, 31, 370–3, 381, 558–60, network visualization see visualization
587–8, 590–2 see also data Network Workbench 581, 590, 594
analysis 21–2 networked individualism 86, 102, 104
collection 19–21 networking 168, 407–8
longitudinal 459, 501, 579–80, 587, 591, 594–5 online 167–76
online 169 networks see also Introductory Note
survey methods 21, 370, 370–84 acquaintance 460, 464–5, 467, 469
templates for 370–1 acyclic 533, 551, 553
network density 19, 238, 240, 268, 342, 367, 486 advice 48–9, 288, 496, 586, 589, 593
network domains 82, 86, 292 affiliation 4, 20, 180, 187, 288, 338
network dynamics 3, 64, 339, 408–10, 434, 501–11, alliance 50, 544–5
580, 595 circuit intersection 542, 544
dynamics of networks and behavior 508–10 citation 271, 283, 435, 440, 580, 585, 591
statistical inference for actor-based models 392, 501, clandestine 258–60, 262, 265–7
507–8 coauthorship 274, 282–3
stochastic models for 503–7 collaboration 74, 289–90, 432
and temporality 187–90 communication 48, 169–71, 211–12, 265, 471
network effects 68, 71–2, 76–7, 88, 161, 216, complex 5, 58–9, 76, 159, 435, 442, 594
225, 497 computer 167–8, 572
identification 71–2, 76 as conduits for culture 85
network evolution 229, 434, 551, 580 conversation 304–5, 307
network exchange 3, 46, 217 corporate 59–60, 183, 186–7, 189–91, 197,
network explanations 12, 18–19 199–203, 206
network exploration 406, 408 criminal 244–8
network flow model 40, 43–8, 50–1 of cultural forms 87–8
network formation 72–3, 75, 77, 218, 291, 408, as culture via interaction 88–9
411, 505 dark 247–9
network forms 12, 144, 176, 226, 244, 383 directed 486, 494, 496, 499, 552–3
Network Genie 583, 585, 592 dynamic 160, 261–2, 266, 339, 521, 525, 567, 572
network homomorphisms 454 economic 315, 441
network members 11–13, 21–2, 108, 110–11, 118–22, ego 17, 19–20, 42, 224, 262, 288, 334, 356–9
125, 169, 217 egocentric 12, 238, 244, 370, 374–5, 377, 383–5,
network methodologies 198–9, 313, 315 406–7
network methodology, corporate politics 199–201 ego’s 20, 106, 359–60, 362, 409
network metrics 262, 264, 267, 561–2 exchange 19, 287, 572
network models see models friendship 18, 20, 49, 110–11, 238–9, 462,
network orientations 406–7, 409–12, 414 468–9, 501
network perspective 15–16, 19, 22, 119, 206, 533 global 311, 392, 540
network positions 13, 17–18, 21, 45–7, 76, 85–6, and groups 13–14
158, 239 innovation 406–9
network practices 406–8, 410–12, 414 intercorporate 180–92

5605-Scott-Index.indd 614 4/7/2011 5:06:31 PM


INDEX 615

intergang 245–6 normalizations 421–3, 426


interlock 180, 182–6, 191 norms 13, 17–19, 48, 119, 144, 345, 359–60, 424
interorganizational 183, 213, 218, 229, 501 novel information 41–2
interpersonal 2, 186–8, 224 NTA see network text analysis
kinship 22, 110, 135, 139, 143–4, 580, 585 nullary relations 451
line 363
matrimonial 542–3, 546, 593 obesity 515, 521, 525, 527
of meaning 294–6 objective function 475, 505–6, 508–9, 522
movement 227–8, 230 observation
multiple 49, 85, 212, 261, 313–14, 324, 454–5, 590 data 410–11
multirelational 551 methods 405, 410–11
narrative 295–6 participant 404, 408–10
national 186, 190, 192 occupations 15, 107, 109, 111, 144, 241, 266, 304
neighborhood 236, 241–4, 309 off-diagonal blocks 339, 436–7
one-mode 4, 20, 372 omitted variable biases 203, 517, 521
peer 238–41, 244, 522 ONA Surveys 583, 592
personal see personal networks one-mode data 20, 315, 442
policy 3, 210–19, 229, 406, 409 one-mode networks 4, 20, 372
real 57–8, 62 one-step neighborhoods 357, 359, 362
scale-free 62, 258, 263, 503, 551 online classes 171–2, 175
scientific and scholarly 271–83 online communities 167, 169, 171
as shaping culture 85–6 online forums 170–2, 176
signed 138, 438, 441–2, 443 online interactions 106, 167–8, 172
small 63, 336, 342, 438, 453, 542, 558, 587 online networking 167–76
small-world 5, 16, 63–4, 73, 84–5 open-ended questions 407, 409, 411
sparse 59, 552, 554–5, 588 open-source software 584–5, 590, 593–4
standard kinship 535–6 operationalization 19, 116, 237, 435–6
star 73, 75–6, 363, 366 ORA 22, 579–81, 585, 588, 595
temporal 551, 572 ordered pairs 358, 374, 448, 450–1, 453, 504–5
terrorist 49, 249, 256–68 ordinary graphs 424–30, 432
trade 311, 313, 551, 560 Ore-graphs 129, 144, 535–6, 538, 548
transnational 104, 230 organizational research 48, 170
two-mode 4, 19–20, 175, 290, 338, 418, 430, 555 organizational structures 48, 246–7, 518
valued 342–3, 439–40, 442, 444, 488, 498, 502, 511 organizations
very large 35, 257, 274, 435, 499, 554, 587 formal 120, 123, 183, 210, 212, 246, 288, 340
whole 19–22, 51, 64, 243–4, 341, 359, 365–6, 370–4 intergovernmental 313, 315, 321
NetworkX 584, 594 nongovernmental 144, 210, 215, 337, 347
new social physics 55, 57–9, 62, 64 organized crime 244, 246, 248–9
New York School 80–4, 88–9 oriented cycles 533–4, 548
New Zealand 241, 317 out neighborhoods 357–8
Newman, M. 32–3, 36, 57, 131, 136, 274, outcomes 46–7, 50–1, 74–6, 123–5, 305–6, 515–17,
279–81, 551 519–22, 524–5
node attributes 336, 496, 563, 586, 592 policy 213–14, 218–19
node discovery 173, 176 potential 516–17
node location 334 outdegree(s) 275, 364, 393, 401–2, 462, 469, 496,
node sets 418, 420, 424–7, 429, 431–2, 448–9, 506–7
457, 502 outliers 316–17, 413
node size 422–3, 462–3, 474, 476–7, 497, 572 outsiders 31, 152, 213, 242–3, 259, 287, 348
Node XL 22 overlapping memberships 227, 338, 341
nodes 11–16, 19–22, 30–4, 41–51, 331–4, 424–32, ownership 139, 181–2, 191–2, 199, 226
485–90, 558–63
focal 20, 356 P-graphs 129–31, 138–40, 144, 536, 538, 548, 552, 593
pairs of 14, 19, 32–3, 130–1, 428, 559–60 bipartite 536–7, 548
NodeXL 584, 594 P-systems 129, 138, 144
nominalism 49 P*/ERGM 22
nonconvergence 491 p* models see also exponential random graph models
nongovernmental organizations 144, 210, 215, p1 model 463, 467–9, 472, 481, 485, 519–20, 586–7
337, 347 p2 model 467–9, 471, 519, 591
nonkin 158, 303–4, 308 PACNET 456, 591

5605-Scott-Index.indd 615 4/7/2011 5:06:31 PM


616 INDEX

pairs PFNET (Pathfinder Network) 277–8, 283


of actors 337–8, 342, 346, 366–7, 372, 422, 436–7, Pgraph 547, 582, 593
475–6 phase transitions 63–4
mated 149, 152, 155 phenomenology 405, 410, 412
of nodes 14, 19, 32–3, 130–1, 428, 559–60 Philippines 106, 316–17
ordered 358, 374, 448, 450–1, 453, 504–5 phones, mobile 101, 104–5, 112, 168, 304
pairwise asymmetry 157 photographers 287–9
Pajek 22, 141, 144, 280, 324, 579–81, 585–8, 593–6 physics 3, 27–8, 30–6, 55–9, 62, 171, 257, 280–1
Pakistan 316–17 social 55–64
parameter estimates 467, 472, 486, 491–3, 497–8, 508, planar spaces 560–1
526, 592 PNet 492, 498–9, 583, 591–2
parental triads 538, 540 poison pills 48, 189, 417
parents 14, 73, 108–9, 120–1, 237–8, 434–6, polarization 301, 306
535–40, 548 policy domains 211–15, 218–19, 371
partial algebras 452, 455–6, 591 policy network analyses 210, 219
participant observation 404, 408–10 policy networks 3, 210–19, 229, 406, 409
partitions/partitioning 32–3, 429–30, 437–45, 535, key concepts 210–12
544, 551, 567, 587–8 policy outcomes 213–14, 218–19
optimal 438, 440, 443–4 policy preferences 211–12, 216–19
partners 44, 46, 74, 122, 143, 189, 211, 228 political attitudes 210, 302, 304, 508
path closure 495–8 political behavior 198, 200–6, 223, 305
Pathfinder 277, 550, 552 political capital 219
Pathfinder Network see PFNET political donations 198, 200, 202–5
paths 16, 43–6, 49–50, 131, 281, 362, 366–7, 551–3 political economy 3, 81
geodesic 343, 359, 366 political identities 293–4
kinship networks 533–5, 537–40, 547 political organizations 87, 181, 226–7
Pattison, P. 5, 86, 229, 293, 338, 448, 453–7, 499 political participation 307
peer effects 514–27 political similarity 200, 203–5
definition and importance 514–16 politically active corporations 198–9, 203
endogenous 515–16 politics 80, 84, 133, 196, 203, 207, 212, 307–8
estimates of 517–19, 525, 527 contentious 22, 81, 83–5, 91
estimation 518, 520, 522–3 corporate 196–207
missing data and measurement error 525–6 popularity 4, 116–17, 238, 493, 495–8, 503–5, 510, 526
models and methods to identify 520–5 population effects 224–5
peer influence 236, 240, 244, 518–19, 521–2 populations 130–1, 150–5, 157–9, 342–8, 362–5,
peer networks 238–41, 244, 522 370–1, 389–91, 395–7
formation 518–20 defining and sampling 371–2
peers 3, 237–8, 240, 274, 280, 289, 514–18, 522–7 finite 390, 392
delinquent 238, 240 hidden 290, 385, 398, 589, 592
deviant 238, 240–1 Portugal 69, 317
peripherality 245 position generators 106–8, 120, 377–9, 381
periphery 33, 136, 275, 312–14, 316–17, 322–3, positional notation 537–8, 548
356, 560 positions 33–4, 157–8, 218, 307, 313–14, 324, 378–9,
PermNet 583, 592 496–8
persistence 103, 186, 287, 321, 526 determination of numbers 444–5
personal communities 101–12 and roles 434–45
characteristics 108–10 social 2, 5, 34, 200, 407, 448, 453, 572
consequences 111–12 positive blocks 438, 441, 443
data collection 106–8 positive ties 291, 357, 438, 441
friendship and kinship in 110–11 potential outcomes framework 514, 516–17
and inequality 111 power
online and offline 105–6 financial 191, 201
and social support 111 and influence 365
personal names 172–4 power elites 138, 181
personal networks 2, 103, 108–9, 243, 303, 407–8, power law 30, 58–60, 62, 281, 563
411, 506–7 power structures 181–4, 197–8, 206, 212, 215
influence on delinquency and crime 236–41 preference signatures 135
personal recommendations 111, 303 preferences 136, 141, 143–4, 210–11, 216–17, 245–6,
personality 123, 266, 294, 307 515, 518–19

5605-Scott-Index.indd 616 4/7/2011 5:06:31 PM


INDEX 617

preferential attachment 16, 59, 281–2, 502 rate function 505, 508–9, 522
preferred associations 158 rationality 17, 73
prestige 4, 180, 184, 287–9, 378–9 RDS see respondent-driven sampling
primary subjects 384 reachability 117, 120, 342, 378, 451
probabilistic models 245, 249, 390, 392, 502, 551 real networks 57–8, 62
probabilities 30, 44, 390–1, 475–6, 485–6, 503–6, 509, realism 49, 81, 83, 90
519–20 receiver effects 463, 465–9, 477, 481
conditional 295, 504–6 receiver variances 466–71
inclusion 394–6, 398–401 reciprocation 382, 486, 502, 504–6, 519
transition 398–402 reciprocity 20–2, 344–5, 351–3, 447, 460–1, 466–9,
probability distribution 5, 141, 390, 392, 398, 441, 496–8, 503–6
485, 505–7 parameters 467–9, 486
process models 216, 503, 508, 527 reciprocity-symmetric Knoke information network
processes 351–2
cultural 83, 85–6, 88, 296 recognition, individual 149, 154, 158
historical 81, 87–8, 187, 313 recommendations, personal 111, 303
Markov 502–3, 505 recruitment 64, 69, 154, 223–6, 245, 261, 263, 399
social 14, 19, 51, 144, 223, 484 Referral Web 582
productivity 27, 72, 275, 279, 283, 516 referrals 68–70
profitability 50, 70, 182, 188–9, 244 regression 5, 51, 201, 282, 439, 464–5, 471, 485
properties logistic 201, 469, 491
egocentric networks 372, 374, 376–7, 381 regular equivalence 34, 314, 324, 430–1, 435, 437–8,
global 390, 392 440, 442–4
network 40, 50–1, 62, 117, 119, 154, 262, 336 regular kinship networks 535–6
small worlds 63–4, 258, 289 regularities, local 455, 575
structural 5, 110, 200, 204, 230, 262, 289, 392 Reichardt, J. 33, 36, 442, 444
proxies 12, 207, 383, 421 relation algebras 431, 436, 447–57
proximity 71, 108, 132, 182, 216, 282, 304, 559–60 comparison 453–4
spatial 44, 148, 153, 225, 259 history 448
proxy reports 238, 375, 380, 383 prospects and challenges 457
psychological distress 123 relation attributes, graphing 332
psychology, social 1, 4, 27, 80, 156, 286, 462 relational algebras see relation algebras
Puck 144, 547, 582, 593 relational events 44–5
Python 585, 594 relational realism 81, 83, 90
relational sociology 3, 80–91, 407, 410, 413
Al Qaeda 247, 258, 263–5 relations
quadratic assignment procedure (QAP) 201, 456, and attributes 13
462–4, 471, 580, 586 binary 366, 417, 448, 450–2, 467
qualitative approaches 5, 189, 404–14 capital 184, 186, 191–2
qualitative data 202, 404–5, 409, 412–13 compound 431, 450, 537
qualitative methods 22, 404–6, 410 density 321, 323
qualitative research 404–6, 408 dominance 150–1, 156–7
quality, data 265, 377, 381–4 interorganizational 189, 211, 214
Quality, Generalised Axiom of 453, 455–6 interpersonal 103, 213
questionnaires 168, 273, 370, 373, 376, 410, 592 meaning through 287
multiple 20, 84, 89, 158, 203, 293, 337–8, 435–6
R 19, 22, 57, 129, 469, 510, 585, 590–6 in relational context 14
random effects 463, 465, 467, 469, 471, 477, 481 structural 210, 213, 216, 295, 542
models 466 relationships 82–90, 119–25, 175–6, 237–40, 287–9,
random graph models 57, 456–7, 460, 463, 469, 484–9, 370–5, 377–85, 409–13
519, 591 affiliative 153, 155, 160
exponential 5, 22, 456–7, 459–60, 484–99, 520, common property 175
591–2, 594–5 event-participation 175
random graphs 63, 144, 262, 334, 346, 389, identification 175
485, 502 social 4, 50, 57, 118, 154–5, 158, 172–3, 371–2
random network models 58, 62, 522 relatives 101, 105, 118–19, 122–3, 142–3, 303, 305,
random variables 390–2, 395, 504, 506, 509, 520 451 see also kin; kinship
range space 390, 392 reliability 5, 265, 376, 381–4, 497–8
Rao-Blackwellisation 399 religion 86, 132–3, 144, 256, 258–9, 266, 295, 515

5605-Scott-Index.indd 617 4/7/2011 5:06:32 PM


618 INDEX

relinkings 130, 133–5, 137–8, 141–2, 144 selection 6, 199, 205–6, 240, 390–1, 508–9,
co-affinal 136–8 517–21, 578
marital 131, 134–5, 137, 552, 554 bias 290, 517, 521, 524–5
representations 4, 32, 87, 322, 448–9, 454–5, and influence 206
561, 593 and peer influence 240
research questions 49–50, 173, 244, 357, 406, probabilities 390, 399
459–60, 462 processes 144, 510
research traditions 47, 196–8 self-citations 275–6
residual permutation methods 464–5 self-reports 382–3, 410–11
residual tie variances 466–7, 470 self-ties 342, 448–9, 451
resource concentrators 257, 261 semigroups 448, 454
resource exchanges 211–14, 216–17, 227, 256 semiperiphery 185, 191–2, 312–14, 316–17, 321–3, 570
resource generators 108, 379–80 sender and receiver effects 463, 465–9, 477, 481
resources 43–6, 48–50, 110–11, 203–4, 211–14, sender variance 466–70
216–19, 226–9, 259–61 Sentinel Visualizer 581, 590
social 118, 197, 377, 379 services 16, 103, 108, 111, 118, 121, 170, 263
respondent-driven sampling (RDS) 290, 385, 398 sex differences 149–51, 155, 158
reversibility 401 SH see structural holes
Robins, G.L. 5, 266–7, 393, 488–9, 491–2, 494–6, shapes 47–8, 73–5, 88, 187, 272, 332, 380, 563
520, 586–7 shared identities 86, 291
roles 2, 46, 67, 84–5, 169–70, 240–2, 260–1, 407–8 shared interests 101, 294
and positions 434–45 shoaling 149
social 33–4, 119, 149, 158–9, 176, 260, 580 shortcuts 51, 63–4, 187, 291, 540
Romania 224, 317 siblings 14, 112, 134, 137, 139, 149, 522, 535–7
roommates 514, 523 sidedness 138–41, 144
RSiena 510, 584–5, 592, 594–5 SIENA 22, 240, 510, 579, 583, 585, 591–2
signed networks 138, 438, 441–2, 443
Sabidussi, G. 34, 553 similarities 12–13, 41, 44, 47–50, 174–5, 200,
Sailer, L.D. 31, 34, 36, 153, 157, 435 334, 436–7
sample surveys 290, 371, 377, 385 field 469–70, 477
sampling 199–201, 239–41, 348, 371–2, 385, 397–401, Simmel, G. 1, 14–15, 17, 56, 227
461, 489–91 simulation(s) 16, 43, 141, 143, 489–90, 507, 524–5, 592
designs 372, 389–92, 394–6, 398 simultaneity 517–18, 520–1, 526
snowball 188, 262, 394, 398–400, 499, 592 single-criterion recognition questions 373
survey 389–402 single name generators 375
vertex 394–7 size 119–20, 154–6, 341–2, 357–60, 421–3, 426–7,
walk 390, 394, 398, 400–1 542–4, 552–3
Sampson, R.J. 242–3, 501, 511, 524 effective 245, 360
saturation 563–4 skeletons 47, 131, 552
scalability 132–3 skills 68, 75–6, 111, 117, 247, 256
scale-free distributions 59–61 Skvoretz, J. 34, 158, 160, 498
scale-free networks 62, 258, 263, 503, 551 small groups 1, 70, 76, 150, 155, 224, 244, 462
scaling 135, 144, 265, 334, 400, 560 small networks 63, 336, 342, 438, 453, 542, 558, 587
multidimensional 5, 31, 57, 291, 335, 413, 424, small-world networks 5, 16, 63–4, 73, 84–5
587–8 small worlds 16, 27–8, 30–1, 43, 62–4, 187–8,
Schijf, H. 180, 182–4, 186, 188 279–81, 288–9
Schweinberger, M. 393, 472, 475, 507–8 properties 63–4, 258, 289
scientific and scholarly networks (S&SNs) 271–83 smokers 515, 517, 524
coauthorship studies 280–2 sna 464–5, 579, 584–5, 593–6
social ties 272–5 SNAP 579, 584, 594
scientific communities 3, 28, 281 Snijders, T.A.B. 5, 20–2, 393, 472, 488–9, 491–2,
scientific status 459, 471, 479–80 505–8, 522
Scott, J. 2–3, 6, 15, 64, 180–6, 190–1, 197, 579 Snowball 583, 592
scrub jays 149 snowball sampling 188, 262, 394, 398–400, 499, 592
search for meaning 404–5 snowballing process 398–9
secondary subjects 384 snowballs 265, 390, 394, 399, 592
sections, and sidedness 138–41 k-wave 398–9
segmentation 227, 230, 239 Snyder, D. 311–17, 321–4
segregation 110, 131, 228, 305 social behaviors 153, 155, 160, 518

5605-Scott-Index.indd 618 4/7/2011 5:06:32 PM


INDEX 619

social capital 2, 40, 42–3, 47, 64, 118–21, 242–3, 247–8 social physics 55–64
and organized crime 246–7 new 55, 57–9, 62, 64
social circuit models 488–9, 491–3 social positions 2, 5, 34, 200, 407, 448, 453, 572
social class 129–30, 136–8, 141, 143, 302, 304, social processes 14, 19, 51, 144, 223, 484
542, 544 social psychology 1, 4, 27, 80, 156, 286, 462
social clubs 181, 200, 207, 422–3 social reality 185, 286, 291, 404–5
social cohesion 116, 118–19, 129, 153, 181–2, 212, social relations 1, 12, 44–5, 67, 156–7, 200, 336–7,
237, 242 447–9
social contexts 109, 120, 148, 156–9, 213, 291, Social Relations Model (SRM) 462–3, 465–7, 469–71
367, 484 social relationships 4, 50, 57, 118, 154–5, 158, 172–3,
social control 104, 111, 200, 203, 237–8, 241–3, 260 371–2
informal 237, 242–3 social resources 118, 197, 377, 379
theory 236–9, 241–2 social roles 33–4, 119, 149, 158–9, 176, 260, 580
social disorganization 223, 242–3 social selection 124, 302, 496, 508
social dynamics 83–4, 125, 154 social spaces 57, 86, 132, 187, 337, 441, 575
social fabric 340, 349, 353 social structure(s) 1–3, 13–15, 72–4, 77, 338–40,
social influence 48, 85, 259, 499, 508, 525, 527 344–6, 367–8, 434–6
models 216–17, 499, 592 and behavior 74
social insects 149 cognitive 373–4, 499
social integration 2, 116, 118–22, 124, 136, 225, consequences 68–72
237, 409 origins 72–3
social interaction 56, 122, 148, 152–4, 156–7, 159, and terrorist networks 260–2
302–4, 306 social support 2, 12, 14, 18, 48, 108, 116–25, 168
social learning 70–1, 236–7, 527 distinction from other network-based concepts
social marine mammals 150 118–21
social media 101, 103 health returns 121–4
social movements 3, 22, 81, 84–6, 129–30, 215, nature and forms 116–21
406–7, 410 and personal communities 111
and collective action 223–30 scales 125, 379
as networks 226 social ties 119, 170, 421
social network analysis (SNA) see also Introductory scientific and scholarly networks 272–5
Note and detailed entries sociality 149–53, 156, 160–1
development 26–36 socioeconomic status 121–2, 383, 414
guiding principles 12–14 sociograms 1, 4–5, 244, 248
introduction 11–23 sociomatrices 4, 156, 244, 460
origins and current state 14–15 sociometric items 372–4, 381–2
Simmelian Roots 14–15 sociometry 1, 26, 30, 156, 244, 286
social network discovery 173–6 SocNetV 581, 590
automated 169, 175–6 software 22, 248, 266–7, 283, 471–2, 481, 547, 578–97
social network dynamics 404, 501 communication networks 580, 585, 588, 590, 592
social network research 15, 27–8, 32, 36, 237, 243, data collection 580, 583–5, 590–2
248, 260 egocentric networks 580, 585–6, 591
centers 27 general packages 579, 580–90, 591–2, 594–5, 597
social network theories 47, 203, 211, 486, 533 open-source 584–5, 590, 593–4
social networking 3, 121, 168, 578 overview 579–85
sites 106, 167–8, 590 recommendations 594–6
social networks see also Introductory Note specialized packages 580, 582, 585, 590–4, 596
animal 148–61 statistical methods 580, 585, 591, 595
data 21–2, 169, 171, 173, 176, 336, 471–2, 525–7 surveys 592
definition 11–12, 434–5 solidarity 19, 46, 86, 88, 111, 203, 211, 340–1
in economics 67–77 solitary mammals 149
large 76, 151, 519, 527 SONET 579
local 242, 302, 306 SONIS 579
and social physics 55–64 SONIVIS 582, 590
spatiality 303–5 South America 316–23
social organization 125, 134, 136, 144, 148–61, 180, South Pacific 317–20, 322
184, 243–4 Southeast Asia 317–20
parameters 154–6 Soviet block, former 316–21, 323
stylized descriptions 148–51 Spain 256, 292, 317

5605-Scott-Index.indd 619 4/7/2011 5:06:32 PM


620 INDEX

sparse networks 59, 552, 554–5, 588 structural equivalence 5, 19, 34, 85–6, 200–1, 314–15,
spatial proximity 44, 148, 153, 225, 259 428–31, 435–44
spatiality 186, 190–1 and cohesion 203–5
social networks 303–5 structural holes 42–3, 45, 48, 50–1, 289, 360–3,
specialties 271, 275, 277–8, 280, 282 494–5, 586–7
spheres of influence 59, 64, 560 structural positions 119–20, 227, 292, 294, 363, 365
spotted hyenas 151, 154–5 structural properties 5, 110, 200, 204, 230, 262,
spouses 45, 106, 123, 139–41, 308, 533, 535–6, 289, 392
544–5 structural regularities 447–8, 453–4
spring embedders 424, 560, 567, 587 structural relations 210, 213, 216, 295, 542
SPSS 22, 587 structural signatures 484–6
square matrices 337 structuralist theories 16
SRM see Social Relations Model STRUCTURE 68, 72, 141, 181, 257, 312, 579–81, 597
S&SNs see scientific and scholarly networks and agency 141–2
stable treatment unit value assumption (STUVA) community 1–2, 294
517–18 organizational 48, 246–7, 518
standard deviation 343, 348, 364, 366, 377, 461–2, power 181–4, 197–8, 206, 212, 215
491, 494 social see social structure(s)
standard error 348, 464, 466–8, 470, 491–3, 497–8, terrorist networks 257–62
508, 591 world-system 313–15, 323
standard kinship networks 535–6 students 12–13, 27, 82–4, 171, 239–40, 341, 515–16,
standardized surveys 409, 411 523–4
star networks 73, 75–6, 363, 366 STUVA see stable treatment unit value assumption
stars 73, 363, 392–4, 397, 451–2, 487, 492–4, 499 subgraphs 22, 131, 350, 354, 394–6, 535,
static models 520–1 540–4, 570
stationary distribution 400–1 induced 131, 394–5, 540–1
statistical analyses 17–18, 268, 510, 551, 575, 580, 592 subgroups 51, 131, 158, 267, 350, 374, 427–8,
statistical inference 392, 501, 507–8 441–2
statistical methods 17, 124, 510 analysis software 580, 585, 592
software 580, 585, 591, 595 cohesive 201, 427, 431, 580, 586, 588
statistical models 5, 159, 339, 390, 502, 511, 583–5, subjects
594–5 primary 384
corporate politics 200–1 secondary 384
ties and actors 459–81 substructures 340, 348–9, 353–4, 356, 363, 368,
statistical procedures 5, 456, 511, 560, 575, 587 484, 553
statistics 281, 393–4, 471–2, 495–6, 504, 506–7, succession 132–4
514, 588 super-populations 391–2
statnet 469, 579, 584–5, 593–6 support
status 18, 69, 160–1, 266–7, 292, 460, 462, 466–9 emotional 20, 108, 111–12, 117–18, 120–5, 239
differences 481, 560, 570–1 informational 118, 120, 383
scientific 459, 471, 479–80 instrumental 111, 118–20, 123
socioeconomic 121–2, 383, 414 social see social support
stochastic blockmodels 441, 472, 481, 519, 591, 594 survey data 71, 381–2, 384
a posteriori 471, 477, 479 survey methods 21, 370, 370–84
stochastic models 456–7, 480, 503–7, 522 survey network data 370, 381–2, 384
actor-oriented 522 survey sampling 389–402
stochastic processes 398, 502–3 surveys
StOCNET 460–1, 468, 470, 473, 579–80, 591–2, software 592
594–5, 597 standardized 409, 411
Stokman, F.N. 2, 183–4, 186, 189, 217–18 SW see small worlds
strangers 103, 150, 154, 167, 450 Sweden 225, 245, 317, 527
Strauss, D. 5, 286, 393, 406, 408, 413, 456, 489 Switzerland 61, 317
Strogatz, S.H. 3, 27–8, 30, 36, 43, 57–8, 279–81, 551 symbols 90, 277, 287, 294, 296, 563, 566
strong components 354, 359, 444, 552
strong ties 18, 41–2, 51, 107, 112, 135, 227, 239 t-ratios 491, 494, 508
navigable 144 Taiwan 109, 317
structural analysis 80, 184, 289, 453 tastes 85–6, 272, 287, 291, 293–4
structural balance theory 438, 441 telephones 104, 106, 273, 304, 378–9, 409
structural cohesion 32, 130–1, 138–9, 143, 354 television 16, 19–20, 64, 105

5605-Scott-Index.indd 620 4/7/2011 5:06:32 PM


INDEX 621

temporal networks 551, 572 triangles 393–4, 484–7, 489–92, 494, 496, 499,
temporality 187–90 520, 540
territories 131, 149–50, 156, 229 triangulation 486, 488–9, 491, 493–4, 560
terrorism 3, 6, 248, 256–68, 277 Trinidad 106, 149, 317
continuum of clandestine networks 258–9 triples 135, 155, 157, 345
domain experts 262–3, 267 trust 18, 68, 76, 111, 119, 246–7, 259, 408
efficiency/security trade-off 259–60 Turkey 317
global threat 257–8 two-mode blockmodels 567–9
local threats 257–8 two-mode data 4, 20, 315, 338, 420, 440, 585
terrorist networks 49, 249, 256–68 two-mode incidence matries 244, 249, 427, 430
and centrality 260–1, 263–8 two-mode networks 4, 19–20, 175, 290, 338, 418,
discovery of structure 257–62 430, 555
and social structure(s) 260–2 signed 442–3
terrorist organisations 257–8, 262 see also Al Qaeda two-paths 486, 488, 502
terrorist plots 257, 261, 265, 267 multiple 495, 497–8
key tasks and roles 261 two-step reach 359
text-mining techniques 172–3, 175–6 typologies 40, 214, 226–7, 304, 413
Thailand 316–17
thick descriptions 408, 413 UCINET 22, 81, 272, 464–5, 579–81, 585–7,
third parties 40, 158–9, 293, 384, 428 591–2, 594–6
three-mode networks 291, 293, 439 ULTRAS 475–6, 479–80, 591
tie discovery 173–4 unbiased estimators 390–1, 395–8
tie formation 16, 40–1, 51, 240, 519 undesirable life events 121, 123–4
tie models 471 undirected graphs 393, 396, 400, 436, 486–9,
tie variables 456, 459, 462, 464, 486–8, 499, 491–4, 547
503–6, 508 unemployment 68–9, 230
ties 16–22, 40–51, 101–12, 223–30, 336–52, 354–61, union operation 450–2
459–67, 469–75 UNISoN 582, 590
active intimate/nonintimate 102 United Kingdom 60–1, 69, 182, 185–6, 191,
bridging 41–2, 227, 354 212–13, 306, 317
dependence across 503 United States 27–8, 61, 68–70, 184–5, 189–91,
external 348 212, 214, 263–4
negative 357, 438, 443 unity 14, 181, 198, 200, 202, 206
positive 291, 357, 438, 441 UrINet 584, 594
social 119, 170, 421 USA see United States
statistical models 459–81 Usenet 169, 171, 590
strong 18, 41–2, 51, 107, 112, 135, 227, 239 Uzzi, B. 17, 71, 86, 289, 406, 408–12, 414, 417
types 20–1, 226–7
weak see weak ties validation 199, 409, 414
Tilly, C. 22, 81, 83–4, 86–7, 91, 130, 229–30, 303 validity studies 381–2
time, network 464–6, 468 valued data 315, 343, 354, 360, 424, 440
tnet 584–5, 594 valued networks 342–3, 439–40, 442, 444, 488,
top-down approaches 341, 348–9, 352, 356 498, 502, 511
trade networks 311, 313, 551, 560 variables
traffic 44, 47, 50, 354 exogenous 243, 520, 576
trafficking 215, 246–7 explanatory 464–5
transitions 82–4, 294, 313, 325, 587 instrumental 520–2, 526
phase 63–4 random 390–2, 395, 504, 506, 509, 520
probabilities 398–402 variances, receiver 466–71
transitive closure 451–4, 502, 506 vectors 192, 216, 336–7, 436, 502, 509, 536, 587
transitivity 5, 40–1, 43, 345, 381, 460–1, 504–5, VennMaker 582, 591
517–19 vertex samples 394–7
transmission 17–19, 45, 51, 69, 85, 111, 275, 302 vertex variables 392–3, 399
information 69, 211, 591 very large networks 35, 257, 274, 435, 499, 554, 587
models 572 visual representations 1, 331, 496, 558, 561–2
transnational networks 104, 230 visualization 272, 274, 555, 558–76, 578, 580–1,
triad censuses 288, 315, 345, 373, 499, 502, 588 583–90, 592–6
triads 63, 205, 345–6, 348, 392–3, 396, 472, 507 VisuaLyzer 589
parental 538, 540 voting 102, 218, 302, 304, 306, 443

5605-Scott-Index.indd 621 4/7/2011 5:06:32 PM


622 INDEX

wage inequality 68–9 whole networks 19–22, 51, 64, 243–4, 341, 359,
wages 68–70, 72 365–6, 370–4
walk sampling 390, 394, 398, 400–1 Wikipedia 274, 283, 578–9, 596
walks 32–3, 372, 394, 450 wives 130, 133–4, 139–41, 263, 450, 536
Warner, W.L 1–2, 26, 59, 137, 242 women 108–9, 134–5, 362, 417–18, 420–1, 423–4,
Wasserman, S. 3, 5, 48–9, 116, 189, 393, 426–7, 567–8
502–3, 505 workshops 81–4, 175, 579
Watts, D.J. 3, 16, 27–8, 36, 57, 62–4, 84–5, world system 311–25, 333
279–81 analysis methodology 315
weak components 354–5, 359, 444, 552 conceptualization issues 313
weak ties 40–2, 51, 76, 86, 107–8, 135, 225–6, 239 world-system, structure 313–15, 323
web pages 12–13, 73, 169, 171–2, 175–6 Wright Mills 197
Weil, A. 2, 27, 139, 144 Wu, F. 32–3, 448
Wellman, B. 2, 6, 14–18, 20, 101–12, 120–1,
167–70, 304–5 yFiles 584, 594
Western Europe 102, 258, 311–12, 316,
318–21, 323 Ziberna, A. 439–40, 554

5605-Scott-Index.indd 622 4/7/2011 5:06:32 PM

Potrebbero piacerti anche