Strong and Weak Ties



Similar documents
CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi ravi+iitd@andrew.cmu.edu

Network Analysis For Sustainability Management

Chapter 3. Strong and Weak Ties

Part 2: Community Detection

Extracting Information from Social Networks

Social Media Mining. Graph Essentials

Mining Social-Network Graphs

1. Write the number of the left-hand item next to the item on the right that corresponds to it.

Social Media Mining. Network Measures

Mining Social Network Graphs

Descriptive statistics Statistical inference statistical inference, statistical induction and inferential statistics

Crawling and Detecting Community Structure in Online Social Networks using Local Information

Random Map Generator v1.0 User s Guide

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Analysis of Algorithms, I

! E6893 Big Data Analytics Lecture 10:! Linked Big Data Graph Computing (II)

Nodes, Ties and Influence

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, Chapter 7: Digraphs

Asking Hard Graph Questions. Paul Burkhardt. February 3, 2014

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Introduction to Networks and Business Intelligence

Efficient Crawling of Community Structures in Online Social Networks

Practical Graph Mining with R. 5. Link Analysis

Graph Mining and Social Network Analysis

Business Intelligence and Process Modelling

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

CALCULATIONS & STATISTICS

1 Six Degrees of Separation

Chapter 6: Graph Theory

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Network Analysis Basics and applications to online data

Social Network Mining

Graph Processing and Social Networks

5.1 Bipartite Matching

Groups and Positions in Complete Networks

Problem Set 7 Solutions

An Introduction to The A* Algorithm

Six Degrees of Separation in Online Society

Data Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining

Cluster Analysis: Advanced Concepts

Network Flow I. Lecture Overview The Network Flow Problem

Graph Theory Problems and Solutions

Introduction to Metropolitan Area Networks and Wide Area Networks

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00

Level 2 Routing: LAN Bridges and Switches

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

1 The Brownian bridge construction

Protein Protein Interaction Networks

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

Social Networks and Social Media

Data Mining. Cluster Analysis: Advanced Concepts and Algorithms

Big Graph Processing: Some Background

6.4 Normal Distribution

Cpt S 223. School of EECS, WSU

A Non-Linear Schema Theorem for Genetic Algorithms

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications

II. DISTRIBUTIONS distribution normal distribution. standard scores

Two-sample inference: Continuous data

Cluster detection algorithm in neural networks

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Bioinformatics: Network Analysis

KNIME TUTORIAL. Anna Monreale KDD-Lab, University of Pisa

Internet Control Message Protocol (ICMP)

How To Cluster Of Complex Systems

ALBERTA. Social Network Analysis for the Assessment of Learning UNIVERSITY OF. Osmar R. Zaïane Professor & Scientific Director of AICML

Data Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining

Network Theory: 80/20 Rule and Small Worlds Theory

6.852: Distributed Algorithms Fall, Class 2

(Refer Slide Time: 2:03)

MINFS544: Business Network Data Analytics and Applications

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005

MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS

Midterm Practice Problems

What is Network Mapping?

CMPSCI611: Approximating MAX-CUT Lecture 20

Triangle deletion. Ernie Croot. February 3, 2010

Association Between Variables

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Routing in packet-switching networks

Dynamic Programming. Lecture Overview Introduction

Applied Algorithm Design Lecture 5

6. Vectors Scott Surgent (surgent@asu.edu)

Triangulation by Ear Clipping

4. How many integers between 2004 and 4002 are perfect squares?

Week 4: Standard Error and Confidence Intervals

Transcription:

Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66

Outline 1 Repetition 2 Strong and Weak Ties 3 General principles about structural properties of social networks 4 The Strength of Weak Ties 5 Graph Partitioning and Betweenness Measures Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 2 / 66

Repetition Repetition from previous lectures (1/2) Pivotal Nodes Node k is pivotal for a pair of distinct nodes i and j if k lies on every shortest path between i and j In our example, node B is pivotal for (A,C) and (A,D) However, it is not pivotal for (D,E) Some nodes are more important than the other nodes! Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 3 / 66

Repetition Repetition from last lectures (2/2) Node k is a gatekeeper if, for some other distinct nodes i and j, k lies on every path between i and j A is a gatekeeper because it lies on every path between B and E, or (D,E) Degree of a node is defined by the number of links connected to it - high degree means node is more central and thus more important Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 4 / 66

Strong and Weak Ties Strong and Weak Ties Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 5 / 66

Strong and Weak Ties Motivation: Mark Granovetter Sociologist at Stanford University Best known for his theory The strength of weak ties Theory focuses on spread of information in social networks Strongly influenced by the Milgram experiment on social networks Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 6 / 66

Strong and Weak Ties Ties and Tie Strength (Interpersonal) Ties: Information carrying connections between people in a network, relationships between the nodes 3 types: strong, weak or absent According to Granovetter, strength of ties is a combination of amount of time emotional intensity intimacy (mutual confiding) reciprocal services that characterize the tie For a friendship network, link strength could represent frequency of contact, proximity, length of friendship, or subjective assessment of closeness Strong ties are those with a larger weight (e.g. the friends you see more often or have known for longer) Can you give examples of strong/weak ties? Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 7 / 66

Strong and Weak Ties Granovetter s Experiment Granovetter launched study on job seeking in the 1960ies and 1970ies to investigate usefulness of different types of ties in certain situations: How people find out about new jobs? People find the information through personal contacts But: contacts were often acquaintances (weak ties) rather than close friends (strong ties)! Why acquaintances are most helpful? Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 8 / 66

General principles about structural properties of social networks General principles about structural properties of social networks Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 9 / 66

General principles about structural properties of social networks Strong Triadic Closure Property among three nodes A, B, C, such that if strong tie exists between A-B and A-C, there is a weak or strong tie between B-C Too extreme for real-world networks, but good simplification Useful to understand networks and predict network evolution E.g. Trust networks: If A trusts B and A trusts C, B will probably trust C as well. Figure: Formation of E(B,C), since B and C they have common neighbor A. Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 10 / 66

General principles about structural properties of social networks Triadic Closure Occurs in social networks due to increased opportunity for two nodes with common neighbor to meet and to create at least a weak tie Reasons for triadic closure: Opportunity: B and C have a common friend A so there is an increased chance they will end up knowing each other. Trust: B and C are friends with A. Gives them a basis for trusting each other that an arbitrary pair of unconnected people might lack. Incentive: Node B has incentive to bring A and C together to decrease effort it takes to maintain two separate relationships Networks that fullfil triadic closure are highly connected - thus high clustering coefficient E.g. Bearman and Moody (2004): low clustering coefficiant among teenagers implies higher probability of suicide Implication: low clustering coefficient implies few good friends. Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 11 / 66

General principles about structural properties of social networks Applications for Triadic Closure Principle Can be used to model how networks will evolve Can predict development of ties in network Shows progression of connectivity Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 12 / 66

General principles about structural properties of social networks Measuring the Extent of Triadic Closure Repetition: CC of node A is defined as the probability that two randomly selected friends of A are friends with each other. CC for a node is a measure of the connectedness of its neighbourhood Local CC of a node is a measure how transitive connections are in a network I.e. a friend of a friend is also a friend CC of A = Number of connections between friends of A Possible number of connections between friends of A (1) Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 13 / 66

General principles about structural properties of social networks Repetition: Example for Clustering coefficient (CC) Figure: Clustering Coefficiant computation for node A CC of A = Number of connections between friends of A Possible number of connections between friends of A = 1 6 (2) Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 14 / 66

General principles about structural properties of social networks Example Application for Strong and Weak Ties Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 15 / 66

The Strength of Weak Ties The Strength of Weak Ties Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 16 / 66

The Strength of Weak Ties Usefulness of certain types of ties in certain situations Remember: Weak ties more helpful to find out about new jobs Granovetter: Weak ties can act as a bridge that spans parts of a social network Connect otherwise disconnected social groups Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 17 / 66

The Strength of Weak Ties Bridges and Local Bridges Definition A bridge between node A and node B exists if deleting the bridging edge would cause node A and node B to lie in two different components Figure: Example of a bridge between the nodes A and B Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 18 / 66

The Strength of Weak Ties Local Bridges (1/2) Bridges rare in real-world social networks (Small World Property) Local bridge occurrs when node acts as gatekeeper between 2 neighbors who are otherwise not connected Local bridge: if nodes A and B have NO friends in common, i.e. if deleting the edge between A and B increases distance between A and B to value strictly more than 2 Figure: Edge E(A,B) is a local bridge since A and B have no common friends Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 19 / 66

The Strength of Weak Ties Local Bridges (2/2) Figure: Edge E(A,B) is a local bridge since A and B have no common friends Is there another local bridge in this example apart from E(A,B)? Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 20 / 66

The Strength of Weak Ties Local Bridges (2/2) Figure: Edge E(A,B) is a local bridge since A and B have no common friends Is there another local bridge in this example apart from E(A,B)? No - Local bridges never form the side of any triangle in the network! Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 21 / 66

The Strength of Weak Ties Span of Local Bridges Span of a local bridge is the distance btw its endpoints if the edge is deleted Length of the shortest path between two nodes Local bridges with large span play similar role as bridges since their endpoints provide access to parts of network that would otherwise be far away Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 22 / 66

The Strength of Weak Ties Span of Local Bridges What is the span of the local bridge E(A,B)? Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 23 / 66

The Strength of Weak Ties Span of Local Bridges What is the span of the local bridge E(A,B)? 4 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 24 / 66

The Strength of Weak Ties Remember Granovetter s experiment Why are acquaintances more important? Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 25 / 66

The Strength of Weak Ties Remember Granovetter s experiment Why are acquaintances more important? A, C, D, and E will all tend to be exposed to similar sources of info, while A s link to B offers access to things A otherwise wouldn t necessarily hear about! Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 26 / 66

The Strength of Weak Ties Local bridges and weak ties The relationship between local bridges and weak ties through the strong triadic closure is if a node A satisfies strong triadic closure and is involved in at least two strong ties then any local bridge adjacent to A must be a weak tie Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 27 / 66

The Strength of Weak Ties Local bridges and weak ties Proof by contradiction: Node A satisfies strong triadic closure and is involved in at least 2 strong ties Suppose E(A,B) is a local bridge Strong Triadic Closure says: E(B,C) must exist But since E(A,B) is a bridge, E(B,C) must NOT exist since endpoints of a bridge have no friends in common Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 28 / 66

The Strength of Weak Ties Summary: The Strength of Weak Ties Weak ties (acquaintances) are social ties that connect us to new sources of information Weak ties link together tightly knit communities, each containing a large number of strong ties Local bridge property directly related to their weakness as social ties Dual role of being weak connections but also valuable links to parts of the network that are harder to access - is the strength of weak ties Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 29 / 66

The Strength of Weak Ties Example: Weak Ties Example: Spread of information/rumors in social networks Studies have shown that people rarely act on mass-media information unless it is also transmitted through personal ties [Granovetter 2003, p 1274] Information/rumors moving through strong ties is much more likely to be limited to a few cliques than that going via weak ones, bridges will not be crossed Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 30 / 66

The Strength of Weak Ties Summary Bridges: edges when removed will find their endpoints in different connected components Local bridges: edges whose endpoints are not in triangles 2 types of edges: weak and strong ties Strong triadic closure: Two strong ties imply a third strong / weak tie Local bridges are weak ties Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 31 / 66

The Strength of Weak Ties Real world validation: Onnela et al., 2007 (1/5) Investigated a large cellphone network with 4 millions users Edge between two users if they called each other within the observation time period of 18 months 84% of nodes in a giant component, i.e. a single connected component containing most of the individuals in the network Tie strength: time spent in a phone conversation Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 32 / 66

The Strength of Weak Ties Real world validation: Onnela et al., 2007 (2/5) Extended definition of local bridge to neighbourhood overlap to detect almost local bridges Since only very small fraction of edges in the cell-phone data were local bridges # nodes who are neighbours of both A and B Neighbourhood Overlap = # nodes who are neighbours of at least A or B (3) 0 if E(A,B) is a local bridge Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 33 / 66

The Strength of Weak Ties Real world validation: Onnela et al., 2007 (3/5) # nodes who are neighbours of both A and F Neighbourhood Overlap = # nodes who are neighbours of at least A or F (4) E.g. Neighborhood Overlap of nodes A-F: Denominator determined by B, C, D, E, G, J Nominator: only C is a neighbor of both A and F Result: Neighborhood overlap: 1/6 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 34 / 66

The Strength of Weak Ties Real world validation: Onnela et al., 2007 (4/5) Figure: y-axis: neighborhood overlap O, x-axis: cummulative tie strength P cum (w), i.e. fraction of links with tie strength smaller than w (percentile). Plot shows relation between tie strength and neighborhood overlap Overlap increases as a function of cummulative tie strength When tie strength decreases, overlap decreases, i.e. weak ties become almost local bridges Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 35 / 66

The Strength of Weak Ties Real world validation: Onnela et al., 2007 (5/5) To support the hypothesis that weak ties tend to link together more tightly knit communities, Onnela et al. perform two simulations: Removing edges in decreasing order of tie strength, the giant component shrank gradually Removing edges in increasing order of tie strength, the giant component shrank more rapidly and at some point then started fragmenting into several components Be careful when investigating networks only in respect to structural properties - because one knows relatively little about the meaning or significance of any particular node or edge! Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 36 / 66

The Strength of Weak Ties Strong and weak ties in large social networks: Facebook (1/4) Marlow et al. (2009) investigated 4 types of Facebook networks (usage over a 1-month period): To what extent is each social link actually used for social interaction beyond being listed? All friends Maintained relationships (passive, e.g. following a user) One way communication of a user (e.g. liking content the other user posted) Reciprocal (mutual) communication (e.g. chatting on the wall) Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 37 / 66

The Strength of Weak Ties Strong and weak ties in large social networks: Facebook (3/4) Figure: 4 types of networks on Facebook and their graphs Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 38 / 66

The Strength of Weak Ties Strong and weak ties in large social networks: Facebook (2/4) They found that All networks thin out when links represent stronger ties. As the number of total friends increases, the number of reciprocal communication links levels out at slightly more than 10 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 39 / 66

The Strength of Weak Ties Figure: Active Friendships in Facebook: Users report large number of friends, up to 500. Mutual communication(strong ties) between 10 and 20, maintained communication (weak ties) under 50. Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 40 / 66 Strong and weak ties in large social networks: Facebook (4/4)

The Strength of Weak Ties Passive Engagement The power of media like Facebook: Maintained relationships (weak ties) enable passive engagement Keeping up with others by reading news about them also in absence of communication Weak ties are the middle ground between strong ties (mutual communication) and inactive ties (friends only listed) If only mutual communication allowed - small list of friends Weak ties maintain the social network highly connected: everyone is passively engaged with each other and events/news propagate very quickly Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 41 / 66

The Strength of Weak Ties Strong and weak ties in large social networks: Twitter (1/2) Huberman et al. (2009) investigated weak ties on Twitter: Dataset: Followers graph (directed) Strong ties of user A: users to whom A directly communicates through tweets Weak ties of A: users that A follows without direct communication Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 42 / 66

The Strength of Weak Ties Strong and weak ties in large social networks: Twitter (2/2) Figure: Total number of user s strong ties as function of number of followees on Twitter Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 43 / 66

Graph Partitioning and Betweenness Measures Graph Partitioning and Betweenness Measures Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 44 / 66

Graph Partitioning and Betweenness Measures Objectives Define densely connected regions of a network - Graph partitioning algorithm to identify densely connected regions breaks a network into a set of nodes densely connected with each other with edges sparser interconnections between the regions Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 45 / 66

Graph Partitioning and Betweenness Measures Example Figure: Co-authorship network of physicists and applied mathematicians. Weak ties seem to link together groups of tightly-knit nodes, each group containing a large number of strong ties How can we find these groups, aka communities? Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 46 / 66

Graph Partitioning and Betweenness Measures Why are communities interesting? For example to: Detect clusters of customers with similar interests and use them to personalize recommendation systems Study relationships among nodes to detect nodes that connect communities and thus act as information brokers Identification of clusters in networks can be exploited e.g. to improve PageRank... Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 47 / 66

Graph Partitioning and Betweenness Measures Another Example One carate club splits into two after a conflict, network structure shows that both are still heavily interconnected Are there edges between the clubs that occur at lower density than edges within the clubs? Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 48 / 66

Graph Partitioning and Betweenness Measures Dividing graph into nested regions Larger regions containing several smaller ones Divisive methods: Repeatedly identify and remove edges connecting densely connected regions. Example: break first at the 7-8 edge, and then the nodes into nodes 7 and 8 Agglomerative methods: Repeatedly identify and merge nodes that likely belong in the same region Merge 4 triangles and then pairs of triangles (via nodes 7 and 8) Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 49 / 66

Graph Partitioning and Betweenness Measures Divisive removal of Bridges Idea: remove bridges and local bridges Both form part of the shortest path between pairs of nodes in different parts of the network However: which when several? Which if none exist? Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 50 / 66

Graph Partitioning and Betweenness Measures Generalize the Role of Bridges and Local Bridges Look for the edges that carry the most of traffic in a network Without the edge, paths between many pairs of nodes may have to be re-routed a longer way These edges tend to link different densely-connected regions Good candidates for removal in a divisive method So, for each edge, we compute the total amount of flow it carries to find the ones with max traffic Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 51 / 66

Graph Partitioning and Betweenness Measures Traffic in a Network: Edge Betweenness For nodes A and B connected by a path assume 1 unit of flow Divide flow evenly along all possible shortest paths from A to B if k shortest paths from A and B, 1/k units of flow pass along each E.g. 7 total units flow over 7-8 to get from 1 to nodes 8-14 7 x 7 = 49 total units flow over 7-8 from nodes 1-7 to 8-14 Edge betweenness of E(7-8) = 49 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 52 / 66

Graph Partitioning and Betweenness Measures Exploiting Edge Betweeness For Community Detection Divisive: Remove edges with high betweenness Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 53 / 66

Graph Partitioning and Betweenness Measures Girvan-Newman Method Based on successively deleting edges of high betweenness as they are the most important edges for connecting networks Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 54 / 66

Graph Partitioning and Betweenness Measures Example Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 55 / 66

Graph Partitioning and Betweenness Measures Girvan-Newman Method Algorithm is divisive and recursive Tries to find an optimal way of cutting the graph into two pieces, and then it does the same on the pieces. Each time it finds a way to split a graph into two optimal pieces, it calls itself on the pieces. Terminates when it is given a graph with only one node. Returns list of all the components it has found Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 56 / 66

Graph Partitioning and Betweenness Measures Challenges when computing betweenness According to definition: consider all the shortest paths between all pairs of nodes ( sum of the fraction of all-pairs shortest paths that pass through E(A,B) ) Computationally intensive! One solution: Method based on Breadth-first Search (BFS) Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 57 / 66

Graph Partitioning and Betweenness Measures Repetition: Breadth-first search A graph traversal algorithm: find each node that is reachable from the source and compute its distance from the source Begin at a given node i in the network All neighbors of i are at distance 1 Then find all neighbors of these neighbors (not counting nodes that are already neighbors of i) and they are distance 2 Then find all neighbors of the nodes from the previous step (not counting nodes already found at distance 1 and 2) and they are at distance 3 Continue and search in next layers at next distance until no new nodes can be found Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 58 / 66

Graph Partitioning and Betweenness Measures Edge Betweenness with BFS Consider graph from perspective of one node at a time; for each given node, compute how the total flow from that node to all others is distributed over the edges. Do this for every node, and then simply add up the flows from all of them to get the betweennesses on every edge. For each node A: BFS starting at A Count the number of shortest paths from A to every other node Based on these numbers, determine the amount of flow from A to all other nodes that use each edge Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 59 / 66

Graph Partitioning and Betweenness Measures Example Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 60 / 66

Graph Partitioning and Betweenness Measures Computing Betweenness Compute betweenness by working up the tree: If there are multiple paths count them fractionally Each node in the first layer has only 1 shortest path from A The number of shortest paths to each other node is the sum of the number of shortest paths to all nodes directly above it Avoid finding the shortest paths themselves Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 61 / 66

Graph Partitioning and Betweenness Measures Determining Edge Flow Values Start with node K: Single unit of flow arrives at K, 2 shortest paths from A to K through nodes I and J. Split flow evenly over the two incoming edges (1/2 on both edges) Total amount of flow arriving at I is equal to the one unit actually destined for I plus the half-unit passing through to K, for a total of 3/2. Two shortest paths from A through F, 1 through G - thus, 1 on F, 1/2 on G. 1 + 0.5 paths to J split 1:2 Continue upwards until finished Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 62 / 66

Graph Partitioning and Betweenness Measures Computing Edge Betweenness For each node N in the graph Perform breadth-first search of graph starting at node N Determine the number of shortest paths from N to every other node Based on these numbers, determine the amount of flow from N to all other nodes that use each edge Sum up flow values of each edge in all BFS structures to get its betweenness value and divide sum of flow of all edges by 2 (since sum includes flow from A to B and B to A, etc. ) Use these betweenness values to identify edges of highest betweenness for purposes of removing them using the Girvan-Newman method Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 63 / 66

Graph Partitioning and Betweenness Measures Girvan-Newman method Result: Dendogram - how to select optimum number of clusters? Modularity Q: how well a network is partitioned into communities k Q = (e ii ai 2 ) (5) e ii... probability that edge is in module i...probability that a random edge would fall into module i i=1 ai 2 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 64 / 66

Graph Partitioning and Betweenness Measures Summary We have learned about: Tie strength: Strong and weak ties Strong triadic closure Bridges and local bridges The strength of weak ties Weak ties and communities - edge betweenness (Girvan Newman Method) Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 65 / 66

Graph Partitioning and Betweenness Measures Thanks for your attention - Questions? elisabeth.lex@tugraz.at Slides use figures from Chapter 3 of Networks, Crowds and Markets by Easley and Kleinberg (2010) Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 66 / 66