MINFS544: Business Network Data Analytics and Applications

Size: px
Start display at page:

Download "MINFS544: Business Network Data Analytics and Applications"

Transcription

1 MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009

2 Stop Contagious Failures in Banking Systems During 2008 financial tsunami, which bank(s) we should inject capital first to stop contagious failures in bank networks? 2

3 Utilize Peer Influence in Online Social Networks Intelligent Advertising, Product Recommendation Who are the most influential people? What are the patterns of product diffusion? 3

4 Develop Strategies to Attack Terrorist Networks A Global Salafi Jihad Terrorist Network Hu et al. JHSEM 2009 How to effectively break down a terrorist network? 4

5 Network-based Business Intelligence Network-based (Modeling and Analysis) Modeling and analyzing various real-world social and organizational networks to understand: the cognitive and economic behaviors of the network actors; and the dynamic processes behind the network evolution Based on the above Business Intelligence (BI) Design network-based BI algorithms and information systems to provide decision support in various application domains Financial Risk Management, Security Informatics, and Knowledge Management, etc. Network Analysis, Simulation of Network Evolution, Data Mining, etc. 5

6 Summary Lecturer: Dr. Daning Hu; Teaching Assistant: Dr. Jiaqi Yan Credits: 3 ECTS credits Language: English Audience: Master and doctoral students Office Hours: Tue 13:00 14:00 PM, Room 2.A.12, Please send s to make appointments. Grading: Course report (term paper) 80% and interaction 20%

7 Grading 1. A full research paper (80%). The format of this paper can be found at: * If possible, get it published in ICIS 2015 and get it cited. This paper should include answers to the following questions: What is the research problem? Why is it interesting and important? Why is it hard? Why have previous approaches failed? What are the key components of your approach? What 1) models, 2) data sets and 3) metrics will be used to validate the approach? 7

8 A Brief History of Network Science 1736 Mathematical foundation Graph Theory 1930 Social Network Analysis and Theories Sociogram: Network visualization Six degree of separation Structural hole: Source of innovation (Physicists) Complex Network Topologies Small-world model (e.g., WWW) Scale-free model ( Rich get richer ) Network Science Economic networks (Agent modeling & simulation) Dynamic network analysis BI applications: product diffusion in social media, recommendation systems? 8

9 Outline Introduction Dynamic Analysis of Dark Networks A Global Salafi Jihad (GSJ) Terrorist Network A Narcotic Criminal Network A Network Approach to Managing Bank Systemic Risk Ongoing Work Conclusion 9

10 Dynamic Network Analysis (DNA) Studying dynamic link formation processes behind network evolution. Nodes forming links Network Evolution What Why How Model the changes in network evolution Temporal changes in network topological measures Dynamic network recovery on longitudinal data Statistical analysis of determinants behind link formation Homophily Preferential attachment Shared affiliations Simulate the evolution of networks Agent-based Modeling and Simulation Examine network robustness 10

11 Research Testbed: A Global Terrorist Network The Global Salafi Jihad (GSJ) network data is compiled by a former CIA operation officer Dr. Marc Sageman terrorists friendship, kinship, same religious leader, operational interactions, etc. geographical origins, socio-economic status, education, etc. when they join and leave GSJ The goal of dynamic analysis gain insights about the evolution of GSJ network develop effective attack strategies to break down GSJ network Sample data of GSJ terrorists 11

12 a 12

13 13

14 Dynamic Network Analysis Studying dynamic processes (i.e., link formation) behind network evolution. Nodes behaviors Network Evolution What Why How Model the changes in network evolution Temporal changes in network topological measures Dynamic network recovery on longitudinal data Statistical analysis of determinants behind link formation Homophily Preferential attachment Shared affiliations Simulate the evolution of networks Agent-based Modeling and Simulation Examine network robustness 14

15 Temporal Changes in Network-level Measures Average Degree <k > 0.24 degree <k> probability of degree Poisson a Fig.1. The temporal changes in the (a) average degree, (b) and (c) degree distribution probability of degree b Degree = number of links a node has c

16 Findings There are three stages for the evolution of the GSJ network: The emerging stage: The network grows in size Accelerated Growth - No. of edges increases faster than nodes Random network topology (Poisson degree distribution) The mature stage: The size of the network reached its peak in 2000 Scale-free topology (Power-law degree distribution) The disintegration stage: Falling into small disconnected components after 9/11 16

17 Temporal Changes in Node Centrality Measures Degree Betweenness Figure.2. Temporal changes in Degree and Betweenness centrality of Osama Bin Laden Degree: No. of links a node has Betweenness of a node i No. of shortest paths from all nodes to all others that pass through node i Measure i s influence on the traffic (information, resource) flowing through it 17

18 Findings and Possible Explanations : A sharp decrease in Bin Laden s Betweenness 1994: Saudi revoked his citizenship and expelled him 1995: Went to Sudan and was expelled again under U.S. pressure 1996: Went to Afghanistan and established camps there : Another sharp decrease in his Betweenness After 1998 bombings of U.S. embassies, Bill Clinton ordered a freeze on assets linked to bin Laden (top 10 most wanted) August 1998: A failed assassination on him from U.S. 1999: UN imposed sanctions against Afghanistan to force the Taliban to extradite him 18

19 Research Testbed: A Narcotic Criminal Network The COPLINK dataset contains 3 million police incident reports from the Tucson Police Department (1990 to 2006). 3 million incident reports and 1.44 million individuals Their personal and sociological information (age, ethnicity, etc.) Time information: when two individuals co-offend AZ Inmate affiliation data: when and where an inmate was housed A Narcotic Criminal Network 19,608 individuals involved in organized narcotic crimes 29,704 co-offending pairs (links) Table 1. Summary of the COPLINK dataset and the Arizona inmate dataset COPLINK Narcotic Data Arizona Inmate Data Overlapped (identified by first name, last name and DOB) Number of People 36, ,540 19,608 Time Span years 19

20 Statistical Analysis of Determinants for Link Formation Proportional hazards model (Cox Regression Analysis) h(t, x 1, x 2, x 3...) = h 0 (t)exp(b 1 x 1 + b 2 x 2 + b 3 x 3...) Homophily in age (group) and race Shared affiliations: Mutual acquaintances (through crimes) Vehicle affiliation (same vehicle used by two in different crimes) Fig.3. Results of multivariate survival (Cox regression) analysis of triadic closure (link formation). 20

21 BI Application: Co-offending Prediction in COPLINK IBM s COPLINK is an intelligent police information system aims to to help speed up the crime detection process. COPLINK calculates the co-offending likelihood score based on the proportional hazards model. A ranked list of individuals based on their predicted likelihood of co-offending with the suspect under investigation. Fig.4. Screenshots of the COPLINK system 21

22 Simulate Attacks on Dark Networks Three attack (i.e. node removals) strategies: Attack on hubs (highest degrees) Attack on bridge (highest betweenness) Real-world Attack (Attack order based on real-world data) Simulate two types of attacks to examine the robustness of the Dark networks Simultaneous attacks (the degree/betweenness of nodes are NOT updated after each removal) Static Progressive attacks (the degree/betweenness of nodes are updated after each removal) Dynamic 22

23 Hub Vs. Bridge Attacks Both hub and bridge attacks are far more effective than realworld arrests Policy implications? Both Dark networks are more vulnerable to Bridge attacks than Hub attacks. Bridge (highest beweenness): Field lieutenants, operational leaders, etc. Hub (highest degree) : e.g., Bin Laden GSJ S and <s> S (Hub attacks) 0.6 S (Bridge attacks) Fraction of nodes removed 23

24 Summary and Contributions We developed a set of Dynamic Network Analysis (DNA) methods that are effective in Linking network topological changes to analytical insights Systematically capturing the link formation processes Examining the determinants of link formation Dark networks are robust against real-world attacks but vulnerable to targeted bridge attacks COPLINK provides real-time decision support for fighting crimes. 24

25 Research Readings and Resources 1. Networks Overview: * Statistical mechanics of complex networks, Section III, VI * Networks, Crowds, and Markets: 2. Networks in Finance: * Financial Networks blog and research databases: WRDS database * Company Board Social Networks 25

26 Research Readings and Resources (cont.) 3. Networks in Marketing: * Sinan Aral s research in networks and marketing Peer influence * Social Media based Marketing: 4. Recommender Systems: 5. Word-of-Mouth Effects in Social Networks: 26

Introduction to Networks and Business Intelligence

Introduction to Networks and Business Intelligence Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

Discovering Determinants of Project Participation in an Open Source Social Network

Discovering Determinants of Project Participation in an Open Source Social Network Association for Information Systems AIS Electronic Library (AISeL) ICIS 2009 Proceedings International Conference on Information Systems (ICIS) 1-1-2009 Discovering Determinants of Project Participation

More information

Social Network Mining

Social Network Mining Social Network Mining Data Mining November 11, 2013 Frank Takes (ftakes@liacs.nl) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics

More information

Course Syllabus. BIA658 Social Network Analytics Fall, 2013

Course Syllabus. BIA658 Social Network Analytics Fall, 2013 Course Syllabus BIA658 Social Network Analytics Fall, 2013 Instructor Yasuaki Sakamoto, Assistant Professor Office: Babbio 632 Office hours: By appointment ysakamot@stevens.edu Course Description This

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Dmitri Krioukov CAIDA/UCSD

Dmitri Krioukov CAIDA/UCSD Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid

More information

Network Analytics in Marketing

Network Analytics in Marketing Network Analytics in Marketing Prof. Dr. Daning Hu Department of Informatics University of Zurich Nov 13th, 2014 Introduction: Network Analytics in Marketing Marketing channels and business networks have

More information

CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi ravi+iitd@andrew.cmu.edu

CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi ravi+iitd@andrew.cmu.edu CSV886: Social, Economics and Business Networks Lecture 2: Affiliation and Balance R Ravi ravi+iitd@andrew.cmu.edu Granovetter s Puzzle Resolved Strong Triadic Closure holds in most nodes in social networks

More information

Network Theory: 80/20 Rule and Small Worlds Theory

Network Theory: 80/20 Rule and Small Worlds Theory Scott J. Simon / p. 1 Network Theory: 80/20 Rule and Small Worlds Theory Introduction Starting with isolated research in the early twentieth century, and following with significant gaps in research progress,

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com> IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration

More information

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 FORMAT OF PRESENTATION Part I SNA overview 10 minutes Part II Sociograms Example

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES

NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES 43 Chapter 4 NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES Chapter Overview This chapter provides an overview for the next six chapters. Based on research conducted at the University of Arizona

More information

A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks P. Part I A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

More information

PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements

PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements Data Analytics (MS) PROGRAM DIRECTOR: Arthur O Connor CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: Arthur O Connor, arthur.oconnor@cuny.edu URL:

More information

Network Analysis Basics and applications to online data

Network Analysis Basics and applications to online data Network Analysis Basics and applications to online data Katherine Ognyanova University of Southern California Prepared for the Annenberg Program for Online Communities, 2010. Relational data Node (actor,

More information

Predictive Analytics Workshop With IBM SPSS Modeler

Predictive Analytics Workshop With IBM SPSS Modeler Predictive Analytics Workshop With IBM SPSS Modeler Introduction What Makes a Smarter City? Objectives Smarter Public Safety with IBM The Power of Predictive Analytics What IBM Strives to Accomplish in

More information

Social Computing: Challenges in Research and Applications

Social Computing: Challenges in Research and Applications Social Computing: Challenges in Research and Applications Huan Liu, Shamanth Kumar, Fred Morstatters Conducting state-of-the-art research in data mining and machine learning, social computing, and artificial

More information

The University of Jordan

The University of Jordan The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S

More information

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies.. The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to and ) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom Router-level topology:

More information

Technology and Trends for Smarter Business Analytics

Technology and Trends for Smarter Business Analytics Don Campbell Chief Technology Officer, Business Analytics, IBM Technology and Trends for Smarter Business Analytics Business Analytics software Where organizations are focusing Business Analytics Enhance

More information

Temporal Dynamics of Scale-Free Networks

Temporal Dynamics of Scale-Free Networks Temporal Dynamics of Scale-Free Networks Erez Shmueli, Yaniv Altshuler, and Alex Sandy Pentland MIT Media Lab {shmueli,yanival,sandy}@media.mit.edu Abstract. Many social, biological, and technological

More information

Exploration and Visualization of Post-Market Data

Exploration and Visualization of Post-Market Data Exploration and Visualization of Post-Market Data Jianying Hu, PhD Joint work with David Gotz, Shahram Ebadollahi, Jimeng Sun, Fei Wang, Marianthi Markatou Healthcare Analytics Research IBM T.J. Watson

More information

Social Media and Digital Marketing Analytics Professor Anindya Ghose Tuesday-Thursday: 2-3:15 pm FALL 2013 aghose@stern.nyu.edu twitter: aghose

Social Media and Digital Marketing Analytics Professor Anindya Ghose Tuesday-Thursday: 2-3:15 pm FALL 2013 aghose@stern.nyu.edu twitter: aghose Social Media and Digital Marketing Analytics Professor Anindya Ghose Tuesday-Thursday: 2-3:15 pm FALL 2013 aghose@stern.nyu.edu twitter: aghose pages.stern.nyu.edu/~aghose Office: KMC 8-94 Overview The

More information

General Network Analysis: Graph-theoretic. COMP572 Fall 2009

General Network Analysis: Graph-theoretic. COMP572 Fall 2009 General Network Analysis: Graph-theoretic Techniques COMP572 Fall 2009 Networks (aka Graphs) A network is a set of vertices, or nodes, and edges that connect pairs of vertices Example: a network with 5

More information

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS

More information

Strong and Weak Ties

Strong and Weak Ties Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66 Outline 1 Repetition 2 Strong and Weak Ties 3 General

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

Network Analysis. BCH 5101: Analysis of -Omics Data 1/34

Network Analysis. BCH 5101: Analysis of -Omics Data 1/34 Network Analysis BCH 5101: Analysis of -Omics Data 1/34 Network Analysis Graphs as a representation of networks Examples of genome-scale graphs Statistical properties of genome-scale graphs The search

More information

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. I m not going to get more money. I m not going to get more cops. I have

More information

DEGREE CURRICULUM BIG DATA ANALYTICS SPECIALITY. MASTER in Informatics Engineering

DEGREE CURRICULUM BIG DATA ANALYTICS SPECIALITY. MASTER in Informatics Engineering DEGREE CURRICULUM BIG DATA ANALYTICS SPECIALITY MASTER in Informatics Engineering Module general information Module name BIG DATA ANALYTICS SPECIALITY Typology Optional ECTS 18 Temporal organization C1S2

More information

KNOWLEDGE NETWORK SYSTEM APPROACH TO THE KNOWLEDGE MANAGEMENT

KNOWLEDGE NETWORK SYSTEM APPROACH TO THE KNOWLEDGE MANAGEMENT KNOWLEDGE NETWORK SYSTEM APPROACH TO THE KNOWLEDGE MANAGEMENT ZHONGTUO WANG RESEARCH CENTER OF KNOWLEDGE SCIENCE AND TECHNOLOGY DALIAN UNIVERSITY OF TECHNOLOGY DALIAN CHINA CONTENTS 1. KNOWLEDGE SYSTEMS

More information

Some questions... Graphs

Some questions... Graphs Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet

More information

Business Intelligence and Process Modelling

Business Intelligence and Process Modelling Business Intelligence and Process Modelling F.W. Takes Universiteit Leiden Lecture 7: Network Analytics & Process Modelling Introduction BIPM Lecture 7: Network Analytics & Process Modelling Introduction

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

Bio-Inspired Anomaly Detection

Bio-Inspired Anomaly Detection Bio-Inspired Anomaly Detection Cyber Security Division 2012 Principal Investigators Meeting 10/11/12 S. Raj Rajagopalan Scientist HP Labs/Honeywell Sraj.raj@gmail.com 908-305-1681 Bio-Inspired Anomaly

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 1-59-561; FAX: 1-59-692;

More information

How To Understand The Network Of A Network

How To Understand The Network Of A Network Roles in Networks Roles in Networks Motivation for work: Let topology define network roles. Work by Kleinberg on directed graphs, used topology to define two types of roles: authorities and hubs. (Each

More information

IBM's Fraud and Abuse, Analytics and Management Solution

IBM's Fraud and Abuse, Analytics and Management Solution Government Efficiency through Innovative Reform IBM's Fraud and Abuse, Analytics and Management Solution Service Definition Copyright IBM Corporation 2014 Table of Contents Overview... 1 Major differentiators...

More information

Smarter Analytics Leadership Summit Content Review

Smarter Analytics Leadership Summit Content Review Smarter Analytics Leadership Summit Content Review Agenda Fraud Point of View IBM Claims Fraud Solution Overview Infinity Insurance: Combating Fraud with IBM Claims Fraud Solution Building the Business

More information

Social Networks and Social Media

Social Networks and Social Media Social Networks and Social Media Social Media: Many-to-Many Social Networking Content Sharing Social Media Blogs Microblogging Wiki Forum 2 Characteristics of Social Media Consumers become Producers Rich

More information

arxiv:1606.02283v1 [physics.soc-ph] 7 Jun 2016

arxiv:1606.02283v1 [physics.soc-ph] 7 Jun 2016 The Formation and Imprinting of Network Effects Among the Business Elite arxiv:1606.02283v1 [physics.soc-ph] 7 Jun 2016 Brian Uzzi 1,2, Yang Yang 1, and Kevin Gaughan 2 1 Northwestern Institute on Complex

More information

Network Analysis For Sustainability Management

Network Analysis For Sustainability Management Network Analysis For Sustainability Management 1 Cátia Vaz 1º Summer Course in E4SD Outline Motivation Networks representation Structural network analysis Behavior network analysis 2 Networks Over the

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

CoolaData Predictive Analytics

CoolaData Predictive Analytics CoolaData Predictive Analytics 9 3 6 About CoolaData CoolaData empowers online companies to become proactive and predictive without having to develop, store, manage or monitor data themselves. It is an

More information

Graduate School of Informatics

Graduate School of Informatics Graduate School of Informatics Admissions Policy '( ) ' ' - Master's Degree Program Major Enrollment Capacity 40 40 Doctor's Degree Program Major Enrollment Capacity 8 1 M. Entrance examination for international

More information

Health Policy and Management Course Descriptions

Health Policy and Management Course Descriptions Health Policy and Management Course Descriptions HPM 500 (2) Introduction to the US Health Care System Fall, spring. Required for all MPH students. Introduces students to the US health care system, both

More information

Predictive Analytics

Predictive Analytics Predictive Analytics How many of you used predictive today? 2015 SAP SE. All rights reserved. 2 2015 SAP SE. All rights reserved. 3 How can you apply predictive to your business? Predictive Analytics is

More information

Social Business Intelligence For Retail Industry

Social Business Intelligence For Retail Industry Actionable Social Intelligence SOCIAL BUSINESS INTELLIGENCE FOR RETAIL INDUSTRY Leverage Voice of Customers, Competitors, and Competitor s Customers to Drive ROI Abstract Conversations on social media

More information

Business Intelligence Turning Data into Profit. By: Ryan Rigby

Business Intelligence Turning Data into Profit. By: Ryan Rigby Business Intelligence Turning Data into Profit By: Ryan Rigby Who am I? 15+ years experience in Business Analysis, Product Management, Project Management and Management Consulting Past President of IIBA

More information

How To Understand The Benefits Of Big Data Analysis

How To Understand The Benefits Of Big Data Analysis Ioana-Brînduşa Bogdan Masterand Faculty of Mathematics and Informatics Spiru Haret University Bucharest, Romania bicuioana@yahoo.com THE BENEFITS OF BIG DATA ANALYTICS Abstract: The wealth of information

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

Social Media and Digital Marketing Analytics ( INFO-UB.0038.01) Professor Anindya Ghose Monday Friday 6-9:10 pm from 7/15/13 to 7/30/13

Social Media and Digital Marketing Analytics ( INFO-UB.0038.01) Professor Anindya Ghose Monday Friday 6-9:10 pm from 7/15/13 to 7/30/13 Social Media and Digital Marketing Analytics ( INFO-UB.0038.01) Professor Anindya Ghose Monday Friday 6-9:10 pm from 7/15/13 to 7/30/13 aghose@stern.nyu.edu twitter: aghose pages.stern.nyu.edu/~aghose

More information

Machine Learning for Display Advertising

Machine Learning for Display Advertising Machine Learning for Display Advertising The Idea: Social Targeting for Online Advertising Performance Current ad spending seems disproportionate Online Advertising Spending Breakdown (2009) Source: IAB

More information

IBM Content Analytics: Rapid insight for crime investigation

IBM Content Analytics: Rapid insight for crime investigation IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from

More information

Sociology and CS. Small World. Sociology Problems. Degree of Separation. Milgram s Experiment. How close are people connected? (Problem Understanding)

Sociology and CS. Small World. Sociology Problems. Degree of Separation. Milgram s Experiment. How close are people connected? (Problem Understanding) Sociology Problems Sociology and CS Problem 1 How close are people connected? Small World Philip Chan Problem 2 Connector How close are people connected? (Problem Understanding) Small World Are people

More information

Social Network Analysis

Social Network Analysis Social Network Analysis Challenges in Computer Science April 1, 2014 Frank Takes (ftakes@liacs.nl) LIACS, Leiden University Overview Context Social Network Analysis Online Social Networks Friendship Graph

More information

KnowledgeSTUDIO HIGH-PERFORMANCE PREDICTIVE ANALYTICS USING ADVANCED MODELING TECHNIQUES

KnowledgeSTUDIO HIGH-PERFORMANCE PREDICTIVE ANALYTICS USING ADVANCED MODELING TECHNIQUES HIGH-PERFORMANCE PREDICTIVE ANALYTICS USING ADVANCED MODELING TECHNIQUES Translating data into business value requires the right data mining and modeling techniques which uncover important patterns within

More information

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime

More information

SAS Fraud Framework for Banking

SAS Fraud Framework for Banking SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction

More information

DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS

DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS Markus Esch, Eric Tobias - University of Luxembourg MOTIVATION HyperVerse project Massive Multiuser

More information

The Big Data Paradigm Shift. Insight Through Automation

The Big Data Paradigm Shift. Insight Through Automation The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.

More information

A TOPOLOGICAL ANALYSIS OF THE OPEN SOURCE SOFTWARE DEVELOPMENT COMMUNITY

A TOPOLOGICAL ANALYSIS OF THE OPEN SOURCE SOFTWARE DEVELOPMENT COMMUNITY A TOPOLOGICAL ANALYSIS OF THE OPEN SOURCE SOFTWARE DEVELOPMENT COMMUNITY Jin Xu,Yongqin Gao, Scott Christley & Gregory Madey Department of Computer Science and Engineering University of Notre Dame Notre

More information

WebFOCUS RStat. RStat. Predict the Future and Make Effective Decisions Today. WebFOCUS RStat

WebFOCUS RStat. RStat. Predict the Future and Make Effective Decisions Today. WebFOCUS RStat Information Builders enables agile information solutions with business intelligence (BI) and integration technologies. WebFOCUS the most widely utilized business intelligence platform connects to any enterprise

More information

Methods for Assessing Vulnerability of Critical Infrastructure

Methods for Assessing Vulnerability of Critical Infrastructure March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks

More information

DOCTORATE OF PHILOSOPHY

DOCTORATE OF PHILOSOPHY DOCTORATE OF PHILOSOPHY ENGINEERING SCIENCE WITH CONCENTRATION IN CONSTRUCTION MANAGEMENT Course Requirements Ph.D. 54 credit hours (with a BS degree) The Construction Management concentration requirements

More information

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS International Scientific Conference & International Workshop Present Day Trends of Innovations 2012 28 th 29 th May 2012 Łomża, Poland DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS Lubos Takac 1 Michal Zabovsky

More information

Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement

Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement white paper Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement»» Summary For business intelligence analysts the era

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

An Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers

An Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers An Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers Frank Yeong-Sung Lin National Tatiwan University, Taiwan yslin@im.ntu.edu.tw Pei-Yu

More information

Evaluate Digital Digital Marketing Strategy

Evaluate Digital Digital Marketing Strategy Evaluate Digital Digital Marketing Strategy Social Media Marketing Course Fall 2012 Lynchburg College School of Business and Economics Dr Ira Kaufman 2011 What is Effective? Determine the reach and effectiveness

More information

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Shudong Jin Department of Electrical Engineering and Computer Science, Case Western Reserve University Cleveland,

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Evolution of a Location-based Online Social Network: Analysis and Models

Evolution of a Location-based Online Social Network: Analysis and Models Evolution of a Location-based Online Social Network: Analysis and Models Miltiadis Allamanis Computer Laboratory University of Cambridge ma536@cam.ac.uk Salvatore Scellato Computer Laboratory University

More information

MEASURING GLOBAL ATTENTION: HOW THE APPINIONS PATENTED ALGORITHMS ARE REVOLUTIONIZING INFLUENCE ANALYTICS

MEASURING GLOBAL ATTENTION: HOW THE APPINIONS PATENTED ALGORITHMS ARE REVOLUTIONIZING INFLUENCE ANALYTICS WHITE PAPER MEASURING GLOBAL ATTENTION: HOW THE APPINIONS PATENTED ALGORITHMS ARE REVOLUTIONIZING INFLUENCE ANALYTICS Overview There are many associations that come to mind when people hear the word, influence.

More information

Interpreting Web Analytics Data

Interpreting Web Analytics Data Interpreting Web Analytics Data Whitepaper 8650 Commerce Park Place, Suite G Indianapolis, Indiana 46268 (317) 875-0910 info@pentera.com www.pentera.com Interpreting Web Analytics Data At some point in

More information

Cross Media Attribution

Cross Media Attribution Cross Media Attribution Building bridges across Paid, Owned and Earned Media to optimize media mix efficiencies and effectiveness May 2012 Lead Contributors Katrin Ribant Data Platforms Havas Media Group

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Graph Mining and Social Network Analysis

Graph Mining and Social Network Analysis Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann

More information

Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures

Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures Workshop on Novel Approaches to Risk and Security Management for Utility Providers and Critical Infrastructures Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures Xiaobing

More information

Enhancing Decision Making

Enhancing Decision Making Enhancing Decision Making Content Describe the different types of decisions and how the decision-making process works. Explain how information systems support the activities of managers and management

More information

Disentangling gonline Social Networking and Decision Support Systems Research Using Social Network Analysis

Disentangling gonline Social Networking and Decision Support Systems Research Using Social Network Analysis EWG DSS LIVERPOOL 2012 WORKSHOP Disentangling gonline Social Networking and Decision Support Systems Research Using Social Network Analysis Francisco Antunes Management and Economics Department, Beira

More information

A comparative study of social network analysis tools

A comparative study of social network analysis tools Membre de Membre de A comparative study of social network analysis tools David Combe, Christine Largeron, Előd Egyed-Zsigmond and Mathias Géry International Workshop on Web Intelligence and Virtual Enterprises

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

Big Data and Social Networks Research How Digital Technologies Shape Collective Behavior and Why it Matters

Big Data and Social Networks Research How Digital Technologies Shape Collective Behavior and Why it Matters COMM-321 Big Data and Social Networks Research How Digital Technologies Shape Collective Behavior and Why it Matters Spring 2015 Tuesday-Thursday, 1:30-3:00 pm, room 224 (Project discussions: Friday 3:00

More information

Collective Behavior Prediction in Social Media. Lei Tang Data Mining & Machine Learning Group Arizona State University

Collective Behavior Prediction in Social Media. Lei Tang Data Mining & Machine Learning Group Arizona State University Collective Behavior Prediction in Social Media Lei Tang Data Mining & Machine Learning Group Arizona State University Social Media Landscape Social Network Content Sharing Social Media Blogs Wiki Forum

More information

UMEÅ INTERNATIONAL SCHOOL

UMEÅ INTERNATIONAL SCHOOL UMEÅ INTERNATIONAL SCHOOL OF PUBLIC HEALTH Master Programme in Public Health - Programme and Courses Academic year 2015-2016 Public Health and Clinical Medicine Umeå International School of Public Health

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

An Overview of the Convergence of BI & BPM

An Overview of the Convergence of BI & BPM An Overview of the Convergence of BI & BPM Rich Zaziski, CEO FYI Business Solutions Richz@fyisolutions.com OBJECTIVE To provide an overview of the convergence of Business Intelligence (BI) and Business

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil

CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil CrimeFighter: A Toolbox for Counterterrorism Uffe Kock Wiil Counterterrorism Research Lab Established in the Spring of 2009 Research goes back to 2003 Research & Development Mathematical models Processes,

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

HISTORICAL DEVELOPMENTS AND THEORETICAL APPROACHES IN SOCIOLOGY Vol. I - Social Network Analysis - Wouter de Nooy

HISTORICAL DEVELOPMENTS AND THEORETICAL APPROACHES IN SOCIOLOGY Vol. I - Social Network Analysis - Wouter de Nooy SOCIAL NETWORK ANALYSIS University of Amsterdam, Netherlands Keywords: Social networks, structuralism, cohesion, brokerage, stratification, network analysis, methods, graph theory, statistical models Contents

More information

Network mining for crime/fraud detection. FuturICT CrimEx January 26th, 2012 Jan Ramon

Network mining for crime/fraud detection. FuturICT CrimEx January 26th, 2012 Jan Ramon Network mining for crime/fraud detection FuturICT CrimEx January 26th, 2012 Jan Ramon Overview Administrative data and crime/fraud Data mining and related domains Data mining in large networks Opportunities

More information