Six Degrees: The Science of a Connected Age. Duncan Watts Columbia University
|
|
|
- Rhoda Natalie Lewis
- 9 years ago
- Views:
Transcription
1 Six Degrees: The Science of a Connected Age Duncan Watts Columbia University
2 Outline The Small-World Problem What is a Science of Networks? Why does it matter?
3 Six Degrees Six degrees of separation between us and everyone else on this planet John Guare, 1990 An urban myth? ( Six handshakes to the President ) First mentioned in 1920 s by Karinthy 30 years later, became a research problem
4 The Small World Problem In the 1950 s, Pool and Kochen asked what is the probability that two strangers will have a mutual friend? i.e. the small world of cocktail parties Then asked a harder question: What about when there is no mutual friend--how long would the chain of intermediaries be? How can one account for clustering bias of social networks Homophily (Lazarsfeld and Merton) Triadic Closure (Rapoport) Too hard
5 The Small World Experiment Stanley Milgram (and student Jeffrey Travers) designed an experiment based on Pool and Kochen s work A single target in Boston 300 initial senders in Boston and Omaha Each sender asked to forward a packet to a friend who was closer to the target The friends got the same instructions
6 Six Degrees of Separation Travers and Milgram s protocol generated 300 letter chains of which 64 reached the target. Found that typical chain length was 6 Led to the famous phrase (Guare) Then not much happened for another 30 years. Theory was too hard to do with pencil and paper Data was too hard to collect manually
7 A New Approach Mid 90 s, Steve Strogatz and I working on another problem altogether Decided to think about this urban myth We had three advantages We didn t know about previous work We had MUCH faster computers Our background was in physics and mathematics Result was that we approached the problem quite differently
8 Small World Networks Instead of asking How small is the actual world?, we asked What would it take for any world at all to be small? Question has three kinds of answers: small-world networks are impossible Either short paths or high clustering,but not both Possible, but conditions are stringent Conditions are easy to satisfy As it turned out, required conditions are trivial Some source of order The tiniest amount of randomness Small World Networks should be everywhere.
9 Online Social Relationships [Isbell et al.]
10 Internet Connections (CAIDA)
11 Power Transmission Grid of Western US
12 C. Elegans
13 Neural network of C. elegans
14 Six years later We (collectively) have a good understanding of how the small world phenomenon works Also starting to understand other characteristics of large-scale networks New theories, better methods, faster computers, and electronic recording all contributing to rapid scientific advance
15 A New Science of Networks? Where do networks arise? Why do they matter?
16 Where do networks Arise? Lots of important problems can be represented as networks Firms, Markets, Economies Friendships, Families, Affiliations Disease transmission, Food webs, Ecosystems Neural, metabolic, genetic regulatory networks Citations, words, characters, historical events In fact, any system comprising many individuals between which some relation can be defined can be mapped as a network Networks are ubiquitous!
17 The Sept 11 Hijackers and their Associates
18 Syphilis transmission in Georgia
19 Corporate Partnerships
20 Why do networks matter? It may be so that lots of problems can be represented as networks But so what? What we really want to know is: How does the network affect behavior? Specially interested in collective behavior: what happens when lots of people, each following their own rules, interact? Interactions are described by the network Hard problem, because normally we think about individual behavior
21 An Example: Making Decisions According to Micro-economics, people are supposed to know what they want and make rational decisions But in many scenarios, either We don t have enough information; or We can t process the information we do have Often there is a premium on coordinated response (culture, conventions, coalitions, coups) Sometimes we don t even know what we want in the first place
22 Social Decision Making Our response is frequently to look at what other people are doing Call this social decision making Often quite adaptive Often, other people do know something (ecologically rational) Also, we won t do any worse than neighbors (social comparison) But sometimes, strange things can happen
23 Information Cascades When everyone is trying to make decisions based on the actions of others, collectives may fail to aggregate information Small fluctuations from equilibrium can lead to giant cascades Bubbles and crashes the stock market Fads and skewed distributions in cultural markets Sudden explosions of social unrest (e.g. East Germany, Indonesia, Serbia) Changes in previously stable social norms Celebrity effect (someone who is famous principally for being well-known)
24 Cascades on Networks If it matters so much that people pay attention to each other Must also matter specifically who is watching whom Nor do we watch everyone equally Structure of this signaling network can drive or quash a cascade
25 Implications of Cascades Dynamics very hard to predict Each decision depends on dynamics/history of previous decisions (which in turn depend on prior decisions) Cascade is a function of globally-connected vulnerable cluster Connectivity matters, but in unexpected ways Vulnerable nodes actually less well connected Opinion leaders / Connectors not the key Group structure may increase vulnerability Successful stimuli are identical to unsuccessful
26 Implications Continued Outcome can be unrelated to either Individual preferences (thresholds), or Attributes of innovation Implies that retrospective inference is problematic Self-reported reasons may be unreliable Timing of adoption may be misleading Conclusions about quality (or even desirability) may be baseless Revealed preferences might be misleading What succeeds may not be what market was looking for
27 Some (philosophical) problems If our actions don t reveal our intrinsic preferences and the outcomes we experience don t reflect our intrinsic attributes, then How do we judge quality, assign credit, etc? In what sense do attributes and preferences define an individual? Networks suggest need for new notion of individuality All decisions are collective decisions, even individual decisions
28 These are hard questions: Can we figure them out? Networks lie on the boundaries of the disciplines Physicists, sociologists, mathematicians, biologists, computer scientists, and economists can all help, and all need help Interdisciplinary work is hard for specialists Jury is still out, but there is hope perhaps the Science of Networks will be the first science of the 21st Century
29 Six Degrees: The Science of A Connected Age (W. W. Norton, 2003) Collective Dynamics Group Small World Project
Network Theory: 80/20 Rule and Small Worlds Theory
Scott J. Simon / p. 1 Network Theory: 80/20 Rule and Small Worlds Theory Introduction Starting with isolated research in the early twentieth century, and following with significant gaps in research progress,
Six Degrees of Separation in Online Society
Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China [email protected]
1 Six Degrees of Separation
Networks: Spring 2007 The Small-World Phenomenon David Easley and Jon Kleinberg April 23, 2007 1 Six Degrees of Separation The small-world phenomenon the principle that we are all linked by short chains
Introduction to Networks and Business Intelligence
Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological
CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi [email protected]
CSV886: Social, Economics and Business Networks Lecture 2: Affiliation and Balance R Ravi [email protected] Granovetter s Puzzle Resolved Strong Triadic Closure holds in most nodes in social networks
Random graphs and complex networks
Random graphs and complex networks Remco van der Hofstad Honours Class, spring 2008 Complex networks Figure 2 Ye a s t p ro te in in te ra c tio n n e tw o rk. A m a p o f p ro tein p ro tein in tera c
IC05 Introduction on Networks &Visualization Nov. 2009. <[email protected]>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
Cutting to the chase What do you need to get accepted to an economics PhD program?
A Guide for UCSB Undergraduates Considering a PhD in Economics Dick Startz An economics PhD can be the portal to a satisfying and rewarding career. In this Guide we tell you a little bit about getting
Network Analysis For Sustainability Management
Network Analysis For Sustainability Management 1 Cátia Vaz 1º Summer Course in E4SD Outline Motivation Networks representation Structural network analysis Behavior network analysis 2 Networks Over the
Option Basics: A Crash Course in Option Mechanics
1 chapter # 1 Option Basics: A Crash Course in Option Mechanics The concept of options has been around for a long time. Ancient Romans, Greeks, and Phoenicians traded options based on outgoing cargoes
What mathematical optimization can, and cannot, do for biologists. Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL
What mathematical optimization can, and cannot, do for biologists Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL Introduction There is no shortage of literature about the
FINDING VALUE IN CHINA S ENVIRONMENT (MCPHILLIPS) 1
FINDING VALUE IN CHINA S ENVIRONMENT (MCPHILLIPS) 1 FINDING VALUE IN CHINA S ENVIRONMENT Munsell McPhillips, Ph.D Author s Biography Munsell McPhillips has participated as a team member in Value Analysis
Chapter 20. The Small-World Phenomenon. 20.1 Six Degrees of Separation
From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World. By David Easley and Jon Kleinberg. Cambridge University Press, 2010. Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
1. Write the number of the left-hand item next to the item on the right that corresponds to it.
1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting
Questions and Answers from EPA s Webinar on Green Power Purchasing Aggregations Table of Contents:
Questions and Answers from EPA s Webinar on Green Power Purchasing Aggregations [a recording and presentations from the webinar are available at: http://www.epa.gov/greenpower/events/28jan10_webinar.htm]
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
Methodological Issues for Interdisciplinary Research
J. T. M. Miller, Department of Philosophy, University of Durham 1 Methodological Issues for Interdisciplinary Research Much of the apparent difficulty of interdisciplinary research stems from the nature
Chapter 2. Graphs. 2.1 Basic Definitions
From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World. By David Easley and Jon Kleinberg. Cambridge University Press, 2010. Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/
Why is Insurance Good? An Example Jon Bakija, Williams College (Revised October 2013)
Why is Insurance Good? An Example Jon Bakija, Williams College (Revised October 2013) Introduction The United States government is, to a rough approximation, an insurance company with an army. 1 That is
How Placing Limitations on the Size of Personal Networks Changes the Structural Properties of Complex Networks
How Placing Limitations on the Size of Personal Networks Changes the Structural Properties of Complex Networks Somayeh Koohborfardhaghighi, Jörn Altmann Technology Management, Economics, and Policy Program
The Clean Power Plan and Reliability
The Clean Power Plan and Reliability PRESENTED TO National Governors Association Jurgen Weiss May 6, 2015 Copyright 2015 The Brattle Group, Inc. Disclaimers and Caveats The views expressed in this presentation
We never talked directly about the next two questions, but THINK about them they are related to everything we ve talked about during the past week:
ECO 220 Intermediate Microeconomics Professor Mike Rizzo Third COLLECTED Problem Set SOLUTIONS This is an assignment that WILL be collected and graded. Please feel free to talk about the assignment with
Sociology 323: Social networks
Sociology 323: Social networks Matthew Salganik 145 Wallace Hall [email protected] Office Hours: Tuesday 2-4 Princeton University, Fall 2007 Introduction This course provides an introduction to social
Applying System Dynamics to Business: An Expense Management Example
Applying System Dynamics to Business: An Expense Management Example Bill Harris Facilitated Systems http://facilitatedsystems.com/ May 17, 2000 Abstract If you re new to system dynamics, it may be hard
Data Mining on Social Networks. Dionysios Sotiropoulos Ph.D.
Data Mining on Social Networks Dionysios Sotiropoulos Ph.D. 1 Contents What are Social Media? Mathematical Representation of Social Networks Fundamental Data Mining Concepts Data Mining Tasks on Digital
ECON4510 Finance Theory Lecture 7
ECON4510 Finance Theory Lecture 7 Diderik Lund Department of Economics University of Oslo 11 March 2015 Diderik Lund, Dept. of Economics, UiO ECON4510 Lecture 7 11 March 2015 1 / 24 Market efficiency Market
Education in Library and Information Science. An overview of Contemporary Librarianship Education
Education in Library and Information Science An overview of Contemporary Librarianship Education Dr. Mircea Regneală Library and Information Science Department, Faculty of Letters, University of Bucharest
SOCIAL PRIVATE CLOUD COMPUTING FOR HIGHER SECURE VIRTUAL PROCESSING
SOCIAL PRIVATE CLOUD COMPUTING FOR HIGHER SECURE VIRTUAL PROCESSING 1 RAYAN JAHA, 2 NAVRATI SAXENA, 3 JAMILAH JAHA 1,2,3 Collage of Information and Communication Engineering, Sungkyunkwan University, Suwon,
A Short Course in Logic Zeno s Paradox
1 Grappling with Good Arguments A Short Course in Logic Zeno s Paradox We ve seen that if we decide that an argument is good then we should be inclined to believe that the ultimate conclusion is true.
Divine command theory
Today we will be discussing divine command theory. But first I will give a (very) brief overview of the semester, and the discipline of philosophy. Why do this? One of the functions of an introductory
Through Proper Testing Techniques. By Perry D. Drake
Through Proper Testing Techniques By Perry D. Drake Seminar Objectives In this lunch session we will discuss how a marketer utilizes a database to ensure maximum return on investment via proper test design
Introduction to life insurance
1 Introduction to life insurance 1.1 Summary Actuaries apply scientific principles and techniques from a range of other disciplines to problems involving risk, uncertainty and finance. In this chapter
The result of the bayesian analysis is the probability distribution of every possible hypothesis H, given one real data set D. This prestatistical approach to our problem was the standard approach of Laplace
Strong and Weak Ties
Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66 Outline 1 Repetition 2 Strong and Weak Ties 3 General
Social Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
Notes on Plagiarism: An Electrical Engineering and Computer Science Perspective
Notes on Plagiarism: An Electrical Engineering and Computer Science Perspective This document supplements the material provided by the Learning Resource Center, available at this URL: http://www.lmu.edu/asset388.aspx
How To Solve The Stable Roommates Problem
THE ROOMMATES PROBLEM DISCUSSED NATHAN SCHULZ Abstract. The stable roommates problem as originally posed by Gale and Shapley [1] in 1962 involves a single set of even cardinality 2n, each member of which
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Opportunities in Computer Science
Opportunities in Computer Science Andrew Mertz William Slough Nancy Van Cleave Eastern Illinois University Department of Mathematics & Computer Science What is Computer Science? Computer science spans
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Social network analysis: A tool for better understanding and managing your cluster
Social network analysis: A tool for better understanding and managing your cluster Neil Reid, Ph.D. Director of the Urban Affairs Center University of Toledo Toledo, Ohio 43606 USA 1 Outline Cluster-based
More on Lesbian and Gay Adoptions
More on Lesbian and Gay Adoptions New article in American Journal of Orthopsychiatry. 2012 Oct;82(4):465 72. doi: 10.1111/j.1939 0025.2012.01176.x. Can gay and lesbian parents promote healthy development
Statistics for BIG data
Statistics for BIG data Statistics for Big Data: Are Statisticians Ready? Dennis Lin Department of Statistics The Pennsylvania State University John Jordan and Dennis K.J. Lin (ICSA-Bulletine 2014) Before
Chapter 7. External Economies of Scale and the International Location of Production. Copyright 2012 Pearson Education. All rights reserved.
Chapter 7 External Economies of Scale and the International Location of Production Preview Types of economies of scale Economies of scale and market structure The theory of external economies External
Stock Market Efficiency and Insider Trading Kris McKinley, Elon College
Stock Market Efficiency and Insider Trading Kris McKinley, Elon College Since the U.S. stock market (NASDAQ, American Stock Exchange, and New York Stock Exchange) is an efficient market, it is impossible
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
To IRB, or Not to IRB? That Is the Question!
To IRB, or Not to IRB? That Is the Question! A presentation by Mary Sapp, Ph.D. Assistant Vice President, Planning & Institutional Research University of Miami and Thomas K. Martin, Ph.D. Associate Vice
The mathematics of networks
The mathematics of networks M. E. J. Newman Center for the Study of Complex Systems, University of Michigan, Ann Arbor, MI 48109 1040 In much of economic theory it is assumed that economic agents interact,
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
DEFINE YOUR SALES PROCESS
DEFINE YOUR SALES PROCESS TO GROW YOUR BUSINESS Internet Marketing 101: How Small Businesses Can Compete with the Big Guys DEFINE YOUR SALES PROCESS TO GROW YOUR BUSINESS A strong and effective sales team
BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS
GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,
Workshop Discussion Notes: Interpretation Gone Wrong
Workshop Discussion Notes: Interpretation Gone Wrong The Social, Cultural & Ethical Dimensions of Big Data March 17, 2014 - New York, NY http://www.datasociety.net/initiatives/2014-0317/ This document
1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
Steve Meizinger. FX Options Pricing, what does it Mean?
Steve Meizinger FX Options Pricing, what does it Mean? For the sake of simplicity, the examples that follow do not take into consideration commissions and other transaction fees, tax considerations, or
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
Obstacles and opportunities for model-based testing. in an industrial software environment
Obstacles and opportunities for model-based testing in an industrial software environment Harry Robinson Test Architect, Enterprise Management Division Microsoft Corporation [email protected] Abstract
A CONTENT STANDARD IS NOT MET UNLESS APPLICABLE CHARACTERISTICS OF SCIENCE ARE ALSO ADDRESSED AT THE SAME TIME.
Environmental Science Curriculum The Georgia Performance Standards are designed to provide students with the knowledge and skills for proficiency in science. The Project 2061 s Benchmarks for Science Literacy
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology
The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology Evidence from the UK Computing Research Committee Definitive. 1 September 2015 The UK Computing Research
In Defense of Kantian Moral Theory Nader Shoaibi University of California, Berkeley
In Defense of Kantian Moral Theory University of California, Berkeley In this paper, I will argue that Kant provides us with a plausible account of morality. To show that, I will first offer a major criticism
SOCIAL MEDIA - A NEW WAY OF COMMUNICATION
Bulletin of the Transilvania University of Braşov Series V: Economic Sciences Vol. 7 (56) No. 2-2014 SOCIAL MEDIA - A NEW WAY OF COMMUNICATION Alexandra TĂLPĂU 1 Abstract: The Internet has a major impact
1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.
MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet
Chap 3 CAPM, Arbitrage, and Linear Factor Models
Chap 3 CAPM, Arbitrage, and Linear Factor Models 1 Asset Pricing Model a logical extension of portfolio selection theory is to consider the equilibrium asset pricing consequences of investors individually
Environmental Science Overview
Overview The standards establish the scientific inquiry skills and core content for all courses in DoDEA schools. The course of study provides students with a basic knowledge of the natural world that
WHAT I LEARNT AS AN INVESTOR
WHAT I LEARNT AS AN INVESTOR BY GUERRIC DE TERNAY We all want to make money by investing our savings but investment seems confusing. We do not know how to organize our investment. Where should we start?
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Social Networks and Social Media
Social Networks and Social Media Social Media: Many-to-Many Social Networking Content Sharing Social Media Blogs Microblogging Wiki Forum 2 Characteristics of Social Media Consumers become Producers Rich
The Top Five. FMLA Compliance Mistakes That Could Land You in Court
The Top Five FMLA Compliance Mistakes That Could Land You in Court A slip of the tongue, a misplaced remark, the wrong job assignment: managers make mistakes every day. When the mistake involves FMLA,
A. Arguments are made up of statements, which can be either true or false. Which of the following are statements?
Critical Thinking University of St Andrews March 2007 Bullet point material is not on the students copies. Feel free to use the material as you see fit, depending on timing, ability, enthusiasm etc. Good
Machine Learning and Data Mining. Fundamentals, robotics, recognition
Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,
Two-Factor Authentication: Tailor-Made for SMS
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor
Analysis of the electricity prices in the Slovak Republic and their impact on the individuals energy security
Analysis of the electricity prices in the Slovak Republic and their impact on the individuals energy security Abstract Martina Mokrišová Department of Finance and Accounting Faculty of Management University
