What is Network Mapping?



Similar documents
Building Sustainable Communities through Network Building by Valdis Krebs and June Holley

Introduction to social network analysis

How To Understand The Network Of A Network

What is SNA? A sociogram showing ties

CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi ravi+iitd@andrew.cmu.edu

What is Social Network Analysis and How Do We Use It

Change Management in Higher Education: Using Model and Design Thinking to Develop Ideas that Work for your Institution

Technology White Paper Capacity Constrained Smart Grid Design

Best Practices in Release and Deployment Management

Training Programs for Enterprise-Wide Change

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience

Social Media Mining. Network Measures

Strong and Weak Ties

TOOL 2.1 WHO SHOULD USE THIS TOOL EMPLOYER ENGAGEMENT TOOLKIT TOOL 2.1 IDENTIFYING EMPLOYERS IN YOUR INDUSTRY

WHITEPAPER. Top 10 Reasons NetMRI Adds More Value than Basic Configuration and Change Management Software

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Network Theory: 80/20 Rule and Small Worlds Theory

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Innovation Toolbox Networking

Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding

The Impact of PaaS on Business Transformation

HIGH AVAILABILITY LINUX ARCHITECTURE FOR MISSION CRITICAL WORKLOADS

Fortune 500 Medical Devices Company Addresses Unique Device Identification

Relationship management is dead! Long live relationship management!

Proposal by Eric Jones Medical Decision Logic April 2012

The key to success: Enterprise social collaboration fuels innovative sales & operations planning

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00

5 Steps to Choosing the Right BPM Suite

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information

The Top FIVE Metrics. For Revenue Generation Marketers

Understanding Sociograms

Integrated Sales and Operations Business Planning for Chemicals

Enterprise Service Bus 101

Scalable Source Routing

ILA Strategic Plan

Take the right steps 9 principles for building the Risk Intelligent Enterprise

Grant Thorton Case Study

August Page 1 PSA

SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

WHITE PAPER Speech Analytics for Identifying Agent Skill Gaps and Trainings

OUR daily life relies on the operations of supply chains,

Protein Protein Interaction Networks

Utilizing Network Analysis to Transform a Community Collaborative

GE Capital. Driving change and continuous process improvement. how-to

Social Networks and Social Media

How To Cluster Of Complex Systems

1 Executive Onboarding Reward vs. Risk

Introduction to Networks and Business Intelligence

Lesson 5-3: Border Gateway Protocol

Open Source Software Developer and Project Networks

Introduction to LAN/WAN. Network Layer

Improving Employee Satisfaction in Healthcare through Effective Employee Performance Management

Redundancy in enterprise storage networks using dual-domain SAS configurations

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

MINFS544: Business Network Data Analytics and Applications

Using Integrated Recruitment and Support

IBM i2 Analyst s Notebook Social Network Analysis

Nodes, Ties and Influence

QLIKVIEW GOVERNANCE DASHBOARD 1.0

A discussion of Statistical Mechanics of Complex Networks P. Part I

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Six Degrees of Separation in Online Society

Application-Centric Analysis Helps Maximize the Value of Wireshark

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012)

Big Data Integration: A Buyer's Guide

Level 2 Routing: LAN Bridges and Switches

ERP vs. PLM: What s the Difference?

Transcription:

Network Mapping Module #8: Systems Change Methods What is Network Mapping? Is a process for visualizing and interpreting connections within a group Can strengthen the effectiveness of the group Can help a group explore adapting to a changing environment Connections, strengths, weaknesses are made visible 1

Source: http://beth.typepad.com/beths_blog/2009/05/which-social-networking-analysis-term-best-describesvirgin-america.html Exploring Key Questions through Networks Are the right connections in place? Are any key connections missing? Who are playing leadership roles in the community? Who is not, but should be? Who are the experts in process, planning and practice? Who are the mentors that others seek out for advice? Who are the innovators? Are ideas shared and acted upon? Are collaborative alliances forming between local businesses? Which businesses will provide a better return on investment both for themselves and the community they are embedded in? http://www.networkweaver.com/wp-content/uploads/2011/12/buildingnetworks.pdf 2

Nodes and Links A network map shows the nodes and links in the network. Nodes can be people, groups or organizations. Links can show relationships, flows, or transactions. A link can be directional. A network map is an excellent tool for visually tracking your ties and designing strategies to create new connections. Network maps are also excellent talking documents visual representations that support conversations about possibilities. http://www.networkweaver.com/wp-content/uploads/2011/12/buildingnetworks.pdf A Simple Network Map http://www.orgnet.com/sna.html 3

Network Analysis Considerations Degree Centrality Betweeness Centrality Closeness Centrality Network Centralization Network Reach Network Integration Boundary Spanners Peripheral Players Degree Centrality Social network researchers measure network activity for a node by using the concept of degrees -- the number of direct connections a node has. In the kite network example, Diane has the most direct connections in the network, making hers the most active node in the network. She is a 'connector' or 'hub' in this network. Common wisdom in personal networks is "the more connections, the better." This is not always so. What really matters is where those connections lead to -- and how they connect the otherwise unconnected! Here Diane has connections only to others in her immediate cluster -- her clique. She connects only those who are already connected to each other. 4

Betweeness Centrality While Diane has many direct ties, Heather has few direct connections -- fewer than the average in the network. Yet, in may ways, she has one of the best locations in the network -- she is between two important constituencies. She plays a 'broker' role in the network. The good news is that she plays a powerful role in the network, the bad news is that she is a single point of failure. Without her, Ike and Jane would be cut off from information and knowledge in Diane's cluster. A node with high betweenness has great influence over what flows -- and does not -- in the network. Heather may control the outcomes in a network. That is why I say, "As in Real Estate, the golden rule of networks is: Location, Location, Location." Closeness Centrality Fernando and Garth have fewer connections than Diane, yet the pattern of their direct and indirect ties allow them to access all the nodes in the network more quickly than anyone else. They have the shortest paths to all others -- they are close to everyone else. They are in an excellent position to monitor the information flow in the network -- they have the best visibility into what is happening in the network. 5

Network Centralization Individual network centralities provide insight into the individual's location in the network. The relationship between the centralities of all nodes can reveal much about the overall network structure. A very centralized network is dominated by one or a few very central nodes. If these nodes are removed or damaged, the network quickly fragments into unconnected sub-networks. A highly central node can become a single point of failure. A network centralized around a well connected hub can fail abruptly if that hub is disabled or removed. Hubs are nodes with high degree and betweeness centrality. A less centralized network has no single points of failure. It is resilient in the face of many intentional attacks or random failures -- many nodes or links can fail while allowing the remaining nodes to still reach each other over other network paths. Networks of low centralization fail gracefully. Network Reach Not all network paths are created equal. More and more research shows that the shorter paths in the network are more important. Noah Friedkin, Ron Burt and other researchers have shown that networks have horizons over which we cannot see, nor influence. They propose that the key paths in networks are 1 and 2 steps and on rare occasions, three steps. The "small world" in which we live is not one of "six degrees of separation" but of direct and indirect connections < 3 steps away. Therefore, it is important to know: who is in your network neighborhood? Who are you aware of, and who can you reach? 6

Network Integration Network metrics are often measured using geodesics -- or shortest paths. They make the (erroneous) assumption that all information/influence flows along the network's shortest paths only. But networks operate via direct and indirect, shortest and nearshortest paths. We often hear interesting things from various sources in the network. Different interpretations arrive via different paths. Therefore, it is important to be on many efficient paths in networks that reach out to various parts of the extended network. Those well integrated in the network of paths have both local and distant information, along with several flavors of it! Boundary Spanners Nodes that connect their group to others usually end up with high network metrics. Boundary spanners such as Fernando, Garth, and Heather are more central in the overall network than their immediate neighbors whose connections are only local, within their immediate cluster. You can be a boundary spanner via your bridging connections to other clusters or via your concurrent membership in overlappping groups. Boundary spanners are well-positioned to be innovators, since they have access to ideas and information flowing in other clusters. They are in a position to combine different ideas and knowledge, found in various places, into new products and services. 7

Peripheral Players Most people would view the nodes on the periphery of a network as not being very important. In fact, Ike and Jane receive very low centrality scores for this network. Since individuals' networks overlap, peripheral nodes are connected to networks that are not currently mapped. Ike and Jane may be contractors or vendors that have their own network outside of the company -- making them very important resources for fresh information not available inside the company! Source: Monitor Institute 8

Patterns of Effective Networks 1. Birds of a feather flock together: nodes link together because of common attributes, goals or governance. 2. Diversity is also important. Though clusters form around common attributes and goals, vibrant networks maintain connections to diverse nodes and clusters. A diversity of connections is required to maximize innovation in the network. 3. Robust networks have several paths between any two nodes. If several nodes or links are damaged or removed, other pathways exist for uninterrupted information flow between the remaining nodes. 4. Some nodes are more prominent than others they are either hubs, brokers, or boundary spanners. They are critical to network health. 5. Most nodes in the network are connected by an indirect link in the network. The average path length in the network tends to be short. There are very few long paths in the network that lead to delay and distortion of information flow and knowledge exchange. Steps to Building the Network First Level Network: Scattered Fragments: small emergent clusters organized around common interests or goals usually are isolated from each other and small groups of 1-5 people or organizations that have connected out of necessity Second Level Network: Single Hub-and-Spoke - Network weavers begin with a hub and spoke network, with the weaver as the hub. The weaver has the vision, the energy, and the social skills to connect to diverse individuals and groups, start information flowing to and from them and have external links outside of the community to bring in information and ideas. This is a critical phase for community building because everything depends on a weaver who is the hub in the network. However, if multiple weavers are working in the same community, we may get multiple hub and poke networks, with some overlap between them. 9

Steps to Building the Network (2) Third Level Network : Multi-Hub Small-World Network - As the weaver connects to many groups, information is soon flowing into the weaver about each group s skills, goals, successes and failures. An astute weaver can now start to introduce clusters that have common goals/interests or complementary skills/experiences to each other. As clusters connect, their spokes to the hub can weaken, freeing up the weaver to attach to new groups. Although the spoke links weaken, they never disappear they remain weaker, dormant ties, able to be re-activated whenever necessary. In order to accommodate new connections, the weaver must teach others how to weave their own network. Training in network building is important at this juncture. Network mapping reveals the progress and identifies emerging network weavers. Steps to Building the Network (3) Forth Level Network: Core/Periphery - The end-goal for vibrant, sustainable community networks is the core/periphery model. This topology emerges after many years of network weaving by multiple hubs. It is a stable structure that can link to other well-developed networks in other regions. The network core in this model contains the key community members, including many who are network weavers, and have developed strong ties between themselves. The periphery of this network contains three groups of nodes that are usually tied to the core through looser ties: 1) Those new to the community and working to get to the core 2) Bridges to diverse communities elsewhere 3) Unique resources that operate outside of the community, and may span many communities 10

http://www.kstoolkit.org/social+network+analysis InMap InMap is an interactive visual representation of your professional universe, based on the relationships between your connections. We use information about how people in your network are connected to you and each other to create your personalized map. Groups like colleagues, people you went at school with, or friends are separated into color-coded clusters, as people within these groups are also interconnected with each other. With your InMap, you can visually understand how to better leverage your professional network to help pass along job opportunities, seek professional advice, or gather insights. 11

Building a Low Tech Social Network Name Organization Key Evaluation Interest/Expertise Additional Resources What is Network Mapping Health Nexus - http://www.healthnexus.ca/our_programs/hprc/networkdevelopment.ht ml Building Strong Communities through Network Weaving - http://www.networkweaver.com/ideasandnetworks/documents/building Networks.pdf/ LinkedIn Labs InMap - http://inmaps.linkedinlabs.com/ HC Link Network Mapping at a Glance - http://www.hclinkontario.ca/images/uploaded_files/2011/ataglance_net workmapping.pdf 12