What is Network Mapping?

Size: px
Start display at page:

Download "What is Network Mapping?"

Transcription

1 Network Mapping Module #8: Systems Change Methods What is Network Mapping? Is a process for visualizing and interpreting connections within a group Can strengthen the effectiveness of the group Can help a group explore adapting to a changing environment Connections, strengths, weaknesses are made visible 1

2 Source: Exploring Key Questions through Networks Are the right connections in place? Are any key connections missing? Who are playing leadership roles in the community? Who is not, but should be? Who are the experts in process, planning and practice? Who are the mentors that others seek out for advice? Who are the innovators? Are ideas shared and acted upon? Are collaborative alliances forming between local businesses? Which businesses will provide a better return on investment both for themselves and the community they are embedded in? 2

3 Nodes and Links A network map shows the nodes and links in the network. Nodes can be people, groups or organizations. Links can show relationships, flows, or transactions. A link can be directional. A network map is an excellent tool for visually tracking your ties and designing strategies to create new connections. Network maps are also excellent talking documents visual representations that support conversations about possibilities. A Simple Network Map 3

4 Network Analysis Considerations Degree Centrality Betweeness Centrality Closeness Centrality Network Centralization Network Reach Network Integration Boundary Spanners Peripheral Players Degree Centrality Social network researchers measure network activity for a node by using the concept of degrees -- the number of direct connections a node has. In the kite network example, Diane has the most direct connections in the network, making hers the most active node in the network. She is a 'connector' or 'hub' in this network. Common wisdom in personal networks is "the more connections, the better." This is not always so. What really matters is where those connections lead to -- and how they connect the otherwise unconnected! Here Diane has connections only to others in her immediate cluster -- her clique. She connects only those who are already connected to each other. 4

5 Betweeness Centrality While Diane has many direct ties, Heather has few direct connections -- fewer than the average in the network. Yet, in may ways, she has one of the best locations in the network -- she is between two important constituencies. She plays a 'broker' role in the network. The good news is that she plays a powerful role in the network, the bad news is that she is a single point of failure. Without her, Ike and Jane would be cut off from information and knowledge in Diane's cluster. A node with high betweenness has great influence over what flows -- and does not -- in the network. Heather may control the outcomes in a network. That is why I say, "As in Real Estate, the golden rule of networks is: Location, Location, Location." Closeness Centrality Fernando and Garth have fewer connections than Diane, yet the pattern of their direct and indirect ties allow them to access all the nodes in the network more quickly than anyone else. They have the shortest paths to all others -- they are close to everyone else. They are in an excellent position to monitor the information flow in the network -- they have the best visibility into what is happening in the network. 5

6 Network Centralization Individual network centralities provide insight into the individual's location in the network. The relationship between the centralities of all nodes can reveal much about the overall network structure. A very centralized network is dominated by one or a few very central nodes. If these nodes are removed or damaged, the network quickly fragments into unconnected sub-networks. A highly central node can become a single point of failure. A network centralized around a well connected hub can fail abruptly if that hub is disabled or removed. Hubs are nodes with high degree and betweeness centrality. A less centralized network has no single points of failure. It is resilient in the face of many intentional attacks or random failures -- many nodes or links can fail while allowing the remaining nodes to still reach each other over other network paths. Networks of low centralization fail gracefully. Network Reach Not all network paths are created equal. More and more research shows that the shorter paths in the network are more important. Noah Friedkin, Ron Burt and other researchers have shown that networks have horizons over which we cannot see, nor influence. They propose that the key paths in networks are 1 and 2 steps and on rare occasions, three steps. The "small world" in which we live is not one of "six degrees of separation" but of direct and indirect connections < 3 steps away. Therefore, it is important to know: who is in your network neighborhood? Who are you aware of, and who can you reach? 6

7 Network Integration Network metrics are often measured using geodesics -- or shortest paths. They make the (erroneous) assumption that all information/influence flows along the network's shortest paths only. But networks operate via direct and indirect, shortest and nearshortest paths. We often hear interesting things from various sources in the network. Different interpretations arrive via different paths. Therefore, it is important to be on many efficient paths in networks that reach out to various parts of the extended network. Those well integrated in the network of paths have both local and distant information, along with several flavors of it! Boundary Spanners Nodes that connect their group to others usually end up with high network metrics. Boundary spanners such as Fernando, Garth, and Heather are more central in the overall network than their immediate neighbors whose connections are only local, within their immediate cluster. You can be a boundary spanner via your bridging connections to other clusters or via your concurrent membership in overlappping groups. Boundary spanners are well-positioned to be innovators, since they have access to ideas and information flowing in other clusters. They are in a position to combine different ideas and knowledge, found in various places, into new products and services. 7

8 Peripheral Players Most people would view the nodes on the periphery of a network as not being very important. In fact, Ike and Jane receive very low centrality scores for this network. Since individuals' networks overlap, peripheral nodes are connected to networks that are not currently mapped. Ike and Jane may be contractors or vendors that have their own network outside of the company -- making them very important resources for fresh information not available inside the company! Source: Monitor Institute 8

9 Patterns of Effective Networks 1. Birds of a feather flock together: nodes link together because of common attributes, goals or governance. 2. Diversity is also important. Though clusters form around common attributes and goals, vibrant networks maintain connections to diverse nodes and clusters. A diversity of connections is required to maximize innovation in the network. 3. Robust networks have several paths between any two nodes. If several nodes or links are damaged or removed, other pathways exist for uninterrupted information flow between the remaining nodes. 4. Some nodes are more prominent than others they are either hubs, brokers, or boundary spanners. They are critical to network health. 5. Most nodes in the network are connected by an indirect link in the network. The average path length in the network tends to be short. There are very few long paths in the network that lead to delay and distortion of information flow and knowledge exchange. Steps to Building the Network First Level Network: Scattered Fragments: small emergent clusters organized around common interests or goals usually are isolated from each other and small groups of 1-5 people or organizations that have connected out of necessity Second Level Network: Single Hub-and-Spoke - Network weavers begin with a hub and spoke network, with the weaver as the hub. The weaver has the vision, the energy, and the social skills to connect to diverse individuals and groups, start information flowing to and from them and have external links outside of the community to bring in information and ideas. This is a critical phase for community building because everything depends on a weaver who is the hub in the network. However, if multiple weavers are working in the same community, we may get multiple hub and poke networks, with some overlap between them. 9

10 Steps to Building the Network (2) Third Level Network : Multi-Hub Small-World Network - As the weaver connects to many groups, information is soon flowing into the weaver about each group s skills, goals, successes and failures. An astute weaver can now start to introduce clusters that have common goals/interests or complementary skills/experiences to each other. As clusters connect, their spokes to the hub can weaken, freeing up the weaver to attach to new groups. Although the spoke links weaken, they never disappear they remain weaker, dormant ties, able to be re-activated whenever necessary. In order to accommodate new connections, the weaver must teach others how to weave their own network. Training in network building is important at this juncture. Network mapping reveals the progress and identifies emerging network weavers. Steps to Building the Network (3) Forth Level Network: Core/Periphery - The end-goal for vibrant, sustainable community networks is the core/periphery model. This topology emerges after many years of network weaving by multiple hubs. It is a stable structure that can link to other well-developed networks in other regions. The network core in this model contains the key community members, including many who are network weavers, and have developed strong ties between themselves. The periphery of this network contains three groups of nodes that are usually tied to the core through looser ties: 1) Those new to the community and working to get to the core 2) Bridges to diverse communities elsewhere 3) Unique resources that operate outside of the community, and may span many communities 10

11 InMap InMap is an interactive visual representation of your professional universe, based on the relationships between your connections. We use information about how people in your network are connected to you and each other to create your personalized map. Groups like colleagues, people you went at school with, or friends are separated into color-coded clusters, as people within these groups are also interconnected with each other. With your InMap, you can visually understand how to better leverage your professional network to help pass along job opportunities, seek professional advice, or gather insights. 11

12 Building a Low Tech Social Network Name Organization Key Evaluation Interest/Expertise Additional Resources What is Network Mapping Health Nexus - ml Building Strong Communities through Network Weaving - Networks.pdf/ LinkedIn Labs InMap - HC Link Network Mapping at a Glance - workmapping.pdf 12

Building Sustainable Communities through Network Building by Valdis Krebs and June Holley

Building Sustainable Communities through Network Building by Valdis Krebs and June Holley Building Sustainable Communities through Network Building by Valdis Krebs and June Holley Communities are built on connections. Better connections usually provide better opportunities. But, what are better

More information

Building Smart Communities through Network Weaving

Building Smart Communities through Network Weaving Building Smart Communities through Network Weaving by Valdis Krebs and June Holley Communities are built on connections. Better connections usually provide better opportunities. But, what are better connections,

More information

In This Issue. From The Editor

In This Issue. From The Editor December 2000 Volume 3, Number 4 A Quarterly Technical Publication for Internet and Intranet Professionals From The Editor In This Issue From the Editor...1 The Trouble with NAT...2 The Social Life of

More information

Introduction to social network analysis

Introduction to social network analysis Introduction to social network analysis Paola Tubaro University of Greenwich, London 26 March 2012 Introduction to social network analysis Introduction Introducing SNA Rise of online social networking

More information

How To Understand The Network Of A Network

How To Understand The Network Of A Network Roles in Networks Roles in Networks Motivation for work: Let topology define network roles. Work by Kleinberg on directed graphs, used topology to define two types of roles: authorities and hubs. (Each

More information

What is SNA? A sociogram showing ties

What is SNA? A sociogram showing ties Case Western Reserve University School of Medicine Social Network Analysis: Nuts & Bolts Papp KK 1, Zhang GQ 2 1 Director, Program Evaluation, CTSC, 2 Professor, Electrical Engineering and Computer Science,

More information

CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi ravi+iitd@andrew.cmu.edu

CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi ravi+iitd@andrew.cmu.edu CSV886: Social, Economics and Business Networks Lecture 2: Affiliation and Balance R Ravi ravi+iitd@andrew.cmu.edu Granovetter s Puzzle Resolved Strong Triadic Closure holds in most nodes in social networks

More information

White paper. network analysis. in organizational change. Your business technologists. Powering progress

White paper. network analysis. in organizational change. Your business technologists. Powering progress White paper Susing social network analysis in organizational change Your business technologists. Powering progress Using Social Network Analysis in Organizational Change When a company goes through an

More information

OVERVIEW. Instructions:

OVERVIEW. Instructions: OVERVIEW This is a tool for assessing the health of your network, and exploring actions to take to develop or strengthen it. This tool is intended for use by individuals working within or through social

More information

A Comparison of Frontier and Emerging Capital Market Networks Margaret Moten Daniel Evans

A Comparison of Frontier and Emerging Capital Market Networks Margaret Moten Daniel Evans A Comparison of Frontier and Emerging Capital Market Networks Margaret Moten Daniel Evans Network Science Center daniel.evans@usma.edu www.netscience.usma.edu Why Capital Market Networks? Developed capital

More information

What is Social Network Analysis and How Do We Use It

What is Social Network Analysis and How Do We Use It What is Social Network Analysis and How Do We Use It Partnership & Community Collaboration Academy Managing by Network July 24-26, 2012 Liz Madison, Instructor Liz Madison Consulting SOCIAL NETWORKS: THE

More information

SOCIAL NETWORK ANALYSIS

SOCIAL NETWORK ANALYSIS SOCIAL NETWORK ANALYSIS Understanding your communities Some Common SNA Terms Centrality is a measure of the degree to which a single person is connected to others in the network Closeness is a measure

More information

It is an honor to serve as the new social media manager for the

It is an honor to serve as the new social media manager for the ASIS&T s Social Media Presence: Where Do We Go from Here? by Diane Rasmussen Pennington Bulletin of the Association for Information Science and Technology December/January 2015 Volume 41, Number 2 EDITOR

More information

Net and Nodes: Social Network Analysis and PR

Net and Nodes: Social Network Analysis and PR Net and Nodes: Social Network Analysis and PR James L. Horton A PR practitioner doesn t have to work for long before confronting a scenario like the following. Hank, a general manager, wants to gain compliance

More information

Adventures in Insurance Land: Weaknesses in Risk Pricing & Alternatives

Adventures in Insurance Land: Weaknesses in Risk Pricing & Alternatives Adventures in Insurance Land: Weaknesses in Risk Pricing & Alternatives SESSION ID: GRC-W01 Tim West Senior Consultant Accuvant Advisory Services @west_tim Jamie Gamble Principal Consultant Accuvant LABS

More information

Change Management in Higher Education: Using Model and Design Thinking to Develop Ideas that Work for your Institution

Change Management in Higher Education: Using Model and Design Thinking to Develop Ideas that Work for your Institution Change Management in Higher Education: Using Model and Design Thinking to Develop Ideas that Work for your Institution By Michael P. Meotti Ed Policy Group Introduction Change and innovation are hot topics

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

Harnessing the Potential of. The ABCs of using social network approaches to design and evaluate health & development programs.

Harnessing the Potential of. The ABCs of using social network approaches to design and evaluate health & development programs. Harnessing the Potential of The ABCs of using social network approaches to design and evaluate health & development programs Social Networks Overview 1. What is social network analysis (SNA)? 2. SNA and

More information

Best Practices in Release and Deployment Management

Best Practices in Release and Deployment Management WHITEPAPER Best Practices in Release and Deployment Management Mark Levy Through 2016, a lack of effective release management will contribute up to 80% of production incidents in large organizations with

More information

White Paper. Finding the Right Contract Management System. What are my options?

White Paper. Finding the Right Contract Management System. What are my options? White Paper Finding the Right Contract Management System What are my options? One of the most confusing aspects of selecting a contract management system is the variety of solutions to choose from. Perhaps

More information

Integrated IP Address Management Solution WHITEPAPER. Top 10 Reasons NetMRI Adds More Value than Basic Configuration and Change Management Software

Integrated IP Address Management Solution WHITEPAPER. Top 10 Reasons NetMRI Adds More Value than Basic Configuration and Change Management Software Integrated IP Address Management Solution WHITEPAPER Top 10 Reasons NetMRI Adds More Value than Basic Configuration and Change Management Software WHITEPAPER Introduction When evaluating different tools

More information

Training Programs for Enterprise-Wide Change

Training Programs for Enterprise-Wide Change Training Programs for Enterprise-Wide Change Top Five Requirements for Programs that Deliver Prepared by VisionCor, Inc. 1 Contents Summary... 3 Before We Get Started... 3 Program Principles... 4 Business

More information

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Data Drives IT Intelligence We live in a world driven by software and applications. And, the

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

Strong and Weak Ties

Strong and Weak Ties Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66 Outline 1 Repetition 2 Strong and Weak Ties 3 General

More information

TOOL 2.1 WHO SHOULD USE THIS TOOL EMPLOYER ENGAGEMENT TOOLKIT TOOL 2.1 IDENTIFYING EMPLOYERS IN YOUR INDUSTRY

TOOL 2.1 WHO SHOULD USE THIS TOOL EMPLOYER ENGAGEMENT TOOLKIT TOOL 2.1 IDENTIFYING EMPLOYERS IN YOUR INDUSTRY EMPLOYER ENGAGEMENT TOOLKIT TOOL 2.1 IDENTIFYING EMPLOYERS IN YOUR INDUSTRY TOOL 2.1 Rather than using a pre-existing contact list of employers in your industry, take the time to develop your own. This

More information

WHITEPAPER. Top 10 Reasons NetMRI Adds More Value than Basic Configuration and Change Management Software

WHITEPAPER. Top 10 Reasons NetMRI Adds More Value than Basic Configuration and Change Management Software WHITEPAPER Top 10 Reasons NetMRI Adds More Value than Basic Configuration and Change Management Software Introduction When evaluating different tools to automate network configuration, change, and compliance

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Network Theory: 80/20 Rule and Small Worlds Theory

Network Theory: 80/20 Rule and Small Worlds Theory Scott J. Simon / p. 1 Network Theory: 80/20 Rule and Small Worlds Theory Introduction Starting with isolated research in the early twentieth century, and following with significant gaps in research progress,

More information

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,

More information

Innovation Toolbox Networking

Innovation Toolbox Networking Innovation Toolbox Networking PREPARED BY: Australian Institute for Commercialisation Queensland Department of Employment, Economic Development and Innovation and Jan 2010 Version 1.0 TABLE OF CONTENTS

More information

Creative Shorts: The business value of Release Management

Creative Shorts: The business value of Release Management Creative Shorts: The business value of Release Management Quality management for deployment and delivery A Creative Intellect Consulting Shorts Report Series (ALM) In this report, from our Creative Shorts

More information

Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding

Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding A project from the Social Media Research Founda8on: h:p://www.smrfounda8on.org About Me Introduc8ons

More information

Attacks on neighbor discovery

Attacks on neighbor discovery Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

The Impact of PaaS on Business Transformation

The Impact of PaaS on Business Transformation The Impact of PaaS on Business Transformation September 2014 Chris McCarthy Sr. Vice President Information Technology 1 Legacy Technology Silos Opportunities Business units Infrastructure Provisioning

More information

HIGH AVAILABILITY LINUX ARCHITECTURE FOR MISSION CRITICAL WORKLOADS

HIGH AVAILABILITY LINUX ARCHITECTURE FOR MISSION CRITICAL WORKLOADS HIGH AVAILABILITY ARCHITECTURE FOR MISSION CRITICAL WORKLOADS HIGH AVAILABILITY ARCHITECTURE FOR MISSION CRITICAL WORKLOADS (LF422) A high availability cluster capable of withstanding a data center outage

More information

Fortune 500 Medical Devices Company Addresses Unique Device Identification

Fortune 500 Medical Devices Company Addresses Unique Device Identification Fortune 500 Medical Devices Company Addresses Unique Device Identification New FDA regulation was driver for new data governance and technology strategies that could be leveraged for enterprise-wide benefit

More information

Relationship management is dead! Long live relationship management!

Relationship management is dead! Long live relationship management! XRM: From Fragmentation to Integration Executive Summary Relationship management is dead! Long live relationship management! But it s not just about customers anymore. The value chain has grown so long

More information

Proposal by Eric Jones Medical Decision Logic April 2012

Proposal by Eric Jones Medical Decision Logic April 2012 Abstract and Specific Aims Dynamic Adaptation for Improved Health Care Delivery Proposal by Eric Jones Medical Decision Logic April 2012 Despite considerable knowledge generated in organizational studies

More information

How To Find Out If A Health Care Coalition Has A Diverse Network

How To Find Out If A Health Care Coalition Has A Diverse Network Paul C. Erwin, MD, DrPH Danielle Varda, PhD Victoria Mills, BA Denise Bates, PhD coalitions are interorganizational, cooperative and synergistic working alliances. The word 'coalition', itself, is derived

More information

The key to success: Enterprise social collaboration fuels innovative sales & operations planning

The key to success: Enterprise social collaboration fuels innovative sales & operations planning Manufacturing The key to success: Enterprise social collaboration fuels innovative sales & operations planning As the sales and operations planning leader, you have a few principal responsibilities: setting

More information

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 FORMAT OF PRESENTATION Part I SNA overview 10 minutes Part II Sociograms Example

More information

5 Steps to Choosing the Right BPM Suite

5 Steps to Choosing the Right BPM Suite 5 Steps to Choosing the Right BPM Suite BPM Suites can deliver significant business benefits and a fast ROI but only if you choose the right one By Laura Mooney, Metastorm Copyright 2009, Metastorm Inc.

More information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information Royal Borough of Kensington and Chelsea Data Quality Framework ACE: A Framework for better quality data and performance information March 2010 CONTENTS FOREWORD 2 A CORPORATE FRAMEWORK FOR DATA QUALITY

More information

Network Analysis of Research Collaborations

Network Analysis of Research Collaborations Network Analysis of Research Collaborations Franco Malerba KITeS-Cespri Bocconi University Conference Framework Programme Evaluation: Taking Stock and Moving Forward Brussels, 18 June 2009 Network analysis

More information

The Top FIVE Metrics. For Revenue Generation Marketers

The Top FIVE Metrics. For Revenue Generation Marketers The Top FIVE Metrics For Revenue Generation Marketers Introduction It s an old cliché but true: you manage what you measure. One implication is that when a business changes, measures should change as well.

More information

Understanding Sociograms

Understanding Sociograms Understanding Sociograms A Guide to Understanding Network Analysis Mapping Developed for Clients of: Durland Consulting, Inc. Elburn, IL Durland Consulting, Inc. Elburn IL Copyright 2003 Durland Consulting,

More information

Integrated Sales and Operations Business Planning for Chemicals

Integrated Sales and Operations Business Planning for Chemicals Solution in Detail Chemicals Executive Summary Contact Us Integrated Sales and Operations Business Planning for Chemicals Navigating Business Volatility Navigating Volatility Anticipating Change Optimizing

More information

Enterprise Service Bus 101

Enterprise Service Bus 101 Enterprise Service Bus 101 Marty Wasznicky Director, Product Business Development Neudesic Copyright 2010 Neudesic, LLC. All rights reserved. Table of Contents Abstract... 3 Understanding the Enterprise

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

ILA Strategic Plan 2012 2017

ILA Strategic Plan 2012 2017 ILA Strategic Plan 2012 2017 If you practice, study, or teach leadership; If you seek a community of people who share your passion for leadership; We invite you to be a vital part of the continued growth

More information

Take the right steps 9 principles for building the Risk Intelligent Enterprise

Take the right steps 9 principles for building the Risk Intelligent Enterprise Take the right steps 9 principles for building the Risk Intelligent Enterprise Contents 9 principles for building a Risk Intelligent Enterprise 2 The Risk Intelligent Framework 4 1. Is risk a threat or

More information

Evaluation of Networks

Evaluation of Networks Evaluation of Networks Developed for the Annie E. Casey Foundation April 2010 Introduction The philanthropic and nonprofit communities have been paying increasing attention to the potential of networks

More information

Next Generation Compliance: Strategic Plan 2014 2017

Next Generation Compliance: Strategic Plan 2014 2017 Next Generation Compliance: Strategic Plan 2014 2017 U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance Washington, DC 20460 October 2014 US Environmental Protection Agency

More information

Grant Thorton Case Study

Grant Thorton Case Study Grant Thorton Case Study GRANT THORTON is one of the world s leading organizations of independent assurance, tax and advisory firms. Over 31,000 Grant Thornton people, across 100 countries, are focused

More information

Project Practice Success In a Box Organizing and Executing Successful Trunk Shows

Project Practice Success In a Box Organizing and Executing Successful Trunk Shows Project Practice Success In a Box Organizing and Executing Successful Trunk Shows What is a Practice Success In a Box? A Vision Source Practice Success In a Box Project is an accelerated approach to increasing

More information

August 2009. Page 1 PSA-2014-00177

August 2009. Page 1 PSA-2014-00177 August 2009. Page 1 Page 2 Citizens' Services (Kim Henderson) Introduction to Employee Engagement Engagement Scores at a Glance Your work unit Your organization 76 72 Employee engagement is a concept that

More information

Sociology and CS. Small World. Sociology Problems. Degree of Separation. Milgram s Experiment. How close are people connected? (Problem Understanding)

Sociology and CS. Small World. Sociology Problems. Degree of Separation. Milgram s Experiment. How close are people connected? (Problem Understanding) Sociology Problems Sociology and CS Problem 1 How close are people connected? Small World Philip Chan Problem 2 Connector How close are people connected? (Problem Understanding) Small World Are people

More information

SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND CONTENTS INTRODUCTION................................ 3 UNDERSTAND YOUR CURRENT SITUATION............ 4 DRAW

More information

WHITE PAPER Speech Analytics for Identifying Agent Skill Gaps and Trainings

WHITE PAPER Speech Analytics for Identifying Agent Skill Gaps and Trainings WHITE PAPER Speech Analytics for Identifying Agent Skill Gaps and Trainings Uniphore Software Systems Contact: info@uniphore.com Website: www.uniphore.com 1 Table of Contents Introduction... 3 Problems...

More information

OUR daily life relies on the operations of supply chains,

OUR daily life relies on the operations of supply chains, 1 Analyzing the Resilience of Complex Supply Network Topologies against Random and Targeted Disruptions Kang Zhao, Member, IEEE, Akhil Kumar, Member, IEEE, Terry P. Harrison, and John Yen, Fellow, IEEE.

More information

Family Development Program

Family Development Program Family Development Program - A Center for Excellence in Early Learning Partnering for School Success Begins at Birth An Early Childhood COLLABORATIVE LEADERSHIP Framework Family Development Program Early

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Utilizing Network Analysis to Transform a Community Collaborative

Utilizing Network Analysis to Transform a Community Collaborative Utilizing Network Analysis to Transform a Community Collaborative By Sara Tscheschke Dr. Danielle Varda-First Reader; Dr. Kathie Novak Second Reader; Tashmesia Mitchell- Third Reader, Earth Force- Director

More information

GE Capital. Driving change and continuous process improvement. how-to

GE Capital. Driving change and continuous process improvement. how-to Driving change and continuous process improvement Process improvement or PI involves applying tools and techniques to help a company achieve its goals Characteristics Aligned around what customers value

More information

Social Networks and Social Media

Social Networks and Social Media Social Networks and Social Media Social Media: Many-to-Many Social Networking Content Sharing Social Media Blogs Microblogging Wiki Forum 2 Characteristics of Social Media Consumers become Producers Rich

More information

LEARNING. Cloud Computing: An Evolving Infrastructure for Learning THINK TANK EXECUTIVE

LEARNING. Cloud Computing: An Evolving Infrastructure for Learning THINK TANK EXECUTIVE INSIGHTS Cloud Computing: An Evolving Infrastructure for Learning Six Important Considerations to Examine Before Moving to The Cloud Discussion April 20, 2011 Learning Executive Think Tank Best Practices

More information

How To Cluster Of Complex Systems

How To Cluster Of Complex Systems Entropy based Graph Clustering: Application to Biological and Social Networks Edward C Kenley Young-Rae Cho Department of Computer Science Baylor University Complex Systems Definition Dynamically evolving

More information

Purpose of this Guidance

Purpose of this Guidance Purpose of this Guidance The Local Better Regulation Office commissioned RAND Europe to produce the Outcomes and Impacts toolkit, which helps regulators in local authorities and elsewhere clarify and quantify

More information

1 Executive Onboarding Reward vs. Risk

1 Executive Onboarding Reward vs. Risk 1 Executive Onboarding Reward vs. Risk Gerard F. McDonough and Becky Choi, J.D. LEADFIRST LEARNING SYSTEMS, LLC Challenging Transitions It would seem that as professionals become more advanced in their

More information

Faster Development Through Virtualization

Faster Development Through Virtualization SAP Brief SAP Extensions SAP Service Virtualization by HP Objectives Faster Development Through Virtualization Remove the obstacles that slow down application delivery Remove the obstacles that slow down

More information

A Case for the Network Approach Strategies for monitoring and showing the impact of working as a network

A Case for the Network Approach Strategies for monitoring and showing the impact of working as a network A Case for the Network Approach Strategies for monitoring and showing the impact of working as a network Amanda Welsh & Anne Whatley June 3, 2015 Have you ever had this experience working with others?

More information

BUILDING, VISUALIZING AND ACTIVATING SOCIAL CAPITAL: DIGITAL TOOLS FOR MAKING THE MOST OUT OF THE UNDERGRADUATE RESEARCH EXPERIENCE

BUILDING, VISUALIZING AND ACTIVATING SOCIAL CAPITAL: DIGITAL TOOLS FOR MAKING THE MOST OUT OF THE UNDERGRADUATE RESEARCH EXPERIENCE BUILDING, VISUALIZING AND ACTIVATING SOCIAL CAPITAL: DIGITAL TOOLS FOR MAKING THE MOST OUT OF THE UNDERGRADUATE RESEARCH EXPERIENCE Heather Haeger, Ph.D. Natasha Oehlman, M.A. Colin Gremillion Overview

More information

Introduction to Networks and Business Intelligence

Introduction to Networks and Business Intelligence Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological

More information

Lesson 5-3: Border Gateway Protocol

Lesson 5-3: Border Gateway Protocol Unit 5: Intradomain and Interdomain Protocols Lesson 5-3: Gateway Protocol At a Glance The Gateway Protocol (BGP) is an interdomain routing protocol used in TCP/IP internetworks. BGP was created to allow

More information

Open Source Software Developer and Project Networks

Open Source Software Developer and Project Networks Open Source Software Developer and Project Networks Matthew Van Antwerp and Greg Madey University of Notre Dame {mvanantw,gmadey}@cse.nd.edu Abstract. This paper outlines complex network concepts and how

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

THE DEFINITIVE GUIDE TO PASSENGER INFORMATION SYSTEMS

THE DEFINITIVE GUIDE TO PASSENGER INFORMATION SYSTEMS WHITEPAPER THE DEFINITIVE GUIDE TO PASSENGER INFORMATION SYSTEMS Passenger information systems come in many different forms. They are comprised of direct methods of communication, such as websites and

More information

Improving Employee Satisfaction in Healthcare through Effective Employee Performance Management

Improving Employee Satisfaction in Healthcare through Effective Employee Performance Management Improving Employee Satisfaction in Healthcare through Effective Employee Performance Management Introduction The following quotes are comments made by HR professionals from U.S. healthcare providers who

More information

Redundancy in enterprise storage networks using dual-domain SAS configurations

Redundancy in enterprise storage networks using dual-domain SAS configurations Redundancy in enterprise storage networks using dual-domain SAS configurations technology brief Abstract... 2 Introduction... 2 Why dual-domain SAS is important... 2 Single SAS domain... 3 Dual-domain

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

Smith, Steven B. Money for Life Success Planner A 12-Week Companion to Achieve Financial Fitness. Dearborn Trade Publications, 2004.

Smith, Steven B. Money for Life Success Planner A 12-Week Companion to Achieve Financial Fitness. Dearborn Trade Publications, 2004. Laying the Foundation for Success: Take the Financial Fitness Quiz. Have you ever heard the statement, I can t see the forest for the trees? This statement has much to do with the reason many of us struggle

More information

MINFS544: Business Network Data Analytics and Applications

MINFS544: Business Network Data Analytics and Applications MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in

More information

Using Integrated Recruitment and Support

Using Integrated Recruitment and Support Using Integrated Recruitment and Support TO BUILD A STRONG POOL OF FOSTER, ADOPTIVE, AND KINSHIP FAMILIES What do we mean by integrated recruitment and support? In many child welfare systems, recruitment

More information

IBM i2 Analyst s Notebook Social Network Analysis

IBM i2 Analyst s Notebook Social Network Analysis IBM i2 Analyst s Notebook Social Network Analysis Contents 1 Introduction 2 Who should read this white paper 2 The Background of Social Network Analysis 2 Why use Social Network Analysis? 2 Social Network

More information

Nodes, Ties and Influence

Nodes, Ties and Influence Nodes, Ties and Influence Chapter 2 Chapter 2, Community Detec:on and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. 1 IMPORTANCE OF NODES 2 Importance of Nodes Not

More information

QLIKVIEW GOVERNANCE DASHBOARD 1.0

QLIKVIEW GOVERNANCE DASHBOARD 1.0 QLIKVIEW GOVERNANCE DASHBOARD 1.0 A QlikView Technical Brief April 2013 qlikview.com Table of Contents About the QlikView Governance Dashboard 3 What s New Since Beta 2? 4 Summary Sheet 4 File Details

More information

A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks P. Part I A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

Six Degrees of Separation in Online Society

Six Degrees of Separation in Online Society Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China zhanglei@sz.tsinghua.edu.cn

More information

Finding the Right Fit in a CEO Peer Group

Finding the Right Fit in a CEO Peer Group CEO Global Network: The Benefits of CEO Peer Groups! www.ceoglobalnetwork.com Finding the Right Fit in a CEO Peer Group Seven Key Factors to Consider when Choosing a CEO Peer Group An Executive White Paper

More information

Application-Centric Analysis Helps Maximize the Value of Wireshark

Application-Centric Analysis Helps Maximize the Value of Wireshark Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and

More information

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012)

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012) UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES Approved by SBA General Faculty (April 2012) Introduction In 1926, we embarked on a noble experiment the creation

More information

Using Sage to Model, Analyze, and Dismember Terror Groups. In dismembering a Terrorist network in which many people may be involved it is

Using Sage to Model, Analyze, and Dismember Terror Groups. In dismembering a Terrorist network in which many people may be involved it is Kevin Flood SM450A Using Sage to Model, Analyze, and Dismember Terror Groups In dismembering a Terrorist network in which many people may be involved it is important to understand how a social network

More information

Big Data Integration: A Buyer's Guide

Big Data Integration: A Buyer's Guide SEPTEMBER 2013 Buyer s Guide to Big Data Integration Sponsored by Contents Introduction 1 Challenges of Big Data Integration: New and Old 1 What You Need for Big Data Integration 3 Preferred Technology

More information

Network Management by Karen Stephenson

Network Management by Karen Stephenson Network Management by Karen Stephenson Reprinted from Focus no. 20, Zurich Insurance Group Many companies consist of networks that cross over many cultures, languages and identities. This article is an

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

A New Age of Selling:

A New Age of Selling: A New Age of Selling: Work Like a Network to Grow Your Business Published: July 2014 For the latest information, please visit http://aka.ms/microsoftsalesproductivity 1 Table of Contents Executive Summary

More information

The Worker of the Future

The Worker of the Future Managing the 21st Century Organization The Worker of the Future By Row Henson By Valdis Krebs, orgnet.com IF KNOWLEDGE IS POWER,WHAT IS CONNECTED KNOWLEDGE? Our knowledge economy operates on the complexities

More information

ERP vs. PLM: What s the Difference?

ERP vs. PLM: What s the Difference? ERP vs. PLM: What s the Difference? By JW Yates July 21, 2011 New York City, New York Business Management Systems 330 West 38th Street Suite 705 New York, NY 10018 (800) 266-4046 info@bmsystems.com www.bmsystems.com

More information