SlideShare uma empresa Scribd logo
1 de 8
Module: 55-7626-00N-A-20123 – Social Media Use in Organisations (A-2012/3)
Social Network Analysis
of M2M Organisations
Lee James Cox
B0049872
MA in Technical Communication
1
First some definitions
Social Network Analysis (SNA) is the study of structure1. It is the mapping and
measuring of relationships and flows (ties) between members (nodes) within a
network.
Machine to Machine (M2M) refers to the technology that connects:
a. a device (such as a sensor or meter) to capture an event (such as temperature,
inventory level, etc.)
b. which is relayed through a network (wireless, wired)
c. to an application (software program), that translates the captured event into
meaningful information (for example, items need to be restocked).
M2M Organisations include device, network and application providers; as well as:
• Enterprise Customers: provide the services to end-users, e.g. Coca Cola, British Gas
• Platform Providers: equipment and solution providers to operators and others
• System Integrators: build solutions to join up incompatible systems
2
Node Node
Tie
Five things to first consider about SNA
3
1. The first endeavour should always be to define what the Nodes and Ties mean.[2] For
our M2M analysis, the nodes are organisations and ties are contractual relationships.
2. Nodes can have different weightings of importance, e.g.
– Size (revenue/subscribers)
– Geography
– Track record
– Associations
– Other segmentation attributes
3. Ties have characteristics that matter when it comes to identifying things like leadership,
influence and strength e.g.
– Direction (one-way, both)
– Quantity
– Contract date
– Value
– Frequency
4. Matrix, graphs and other visualization tools are important for analysis and measurement.
– Tools like NodeXL will be required for any network of reasonable size
– Considerable time is usually required to capture and keep the data up to date.
– The M2M example in later slides shows just a few of the tens of thousands of Enterprises, 200+ Operators &
300+ Application Providers that Jasper, Vodafone & Ericsson have as M2M partners!
5. The perspective of the analysis can centre on the complete network (socio) or an
individuals personal network (ego).
Social-centric or Ego-centric SNA?
Social-centric (complete network)
a. Allows analysis of nodes and ties in comparison to wider
network, e.g.
– Are Operator relationships tightly bonded, diversified or
constricted?
– Is there density/clustering of contracts within a geography
such as Europe, or are there more cross-continent?
b. Identifies behaviours affected by positions and
connections, e.g.
– Does the number of application provider ties influence the
number of ties a platform provider has?
– Does the distance between application and platform nodes
affect the number of operator relationships?
Ego-centric (personal network)
a. Only ties directly with the focal organisation (Jasper)
plus those Jasper is aware of are included.
b. Perception is reality and opinions count. Subjective
attributes are likely to have weight in many business
matters
4
Figure 1 –Socio-centric view of the sample M2M Eco-System
Figure 2 – Ego-centric view of Jasper M2M Network
Visualization[3] can also reveal positional relationships
• Operators have the highest degree
centrality. AT&T is most central of the
operators and is the longest established
with largest customer base.
• Application Providers have the highest
closeness centrality. They work with
multiple operators but rarely direct with
Enterprise customers.
• Device/SIM and Platform Providers are
structurally equivalent nodes.
• System Integrators are the most peripheral,
having the smallest number of connections.
• Enterprise Customers has the highest
betweeness centrality providing the only
path to System Integrations
• No groups of nodes are connected to each
other (cliques). However if the definition of
ties were extended beyond ‘contractual’
then informal or personal relationships
would show all nodes in this extracted view
as being connected.
Operators
Enterprise Customers
Device/SIM
Application Providers
Platform
System Integrators
5
Benefits & Limitations of SNA
Benefits Limitations
Provides framework to describe any complex
network.
Collecting and maintaining source data can be
difficult
Identifies important individuals and the influence
they have
Does not describe meanings, motives or explain
why actions happen, e.g. why a contract was won.
A typological analysis is more suitable.
Can identify previously unrecognised sub-groups
through visual clusters
Little examination of important attributes such as
attitudes, opinions and behaviours that may be
helping or hindering relationships
Highlights areas for further inquiry and possible
improvement, e.g. gaps
More sensitive to data omissions than other
surveys. >75% sampling is required.[4]
Even weak ties may be revealed as important for
bridging disparate groups
Privacy can be ignored when views of others
contribute to the analysis.
Useful for track changes over time to reveal paths. Visualization can lead to over simplification and
misreading of results. E.g. Network measures such
as density can be easily misrepresented when
networks of different sizes are compared.
6
Other take away learning’s from SNA
1. Social Network Analysis is not necessarily restricted to connections from
tools such as Facebook or LinkedIn. SNA can be applied to a wide range
of network subjects, such as how diseases spread, mapping films and
interaction of characters, influence of language throughout the world,
etc.
2. SNA focusses on relationships rather than attributes of the ‘nodes’ for
their own sake, or the ideation behind the relationship.
3. A Social Network does not in itself encourage co-operation or collective
action. Community tools such as Online Forums lend themselves better
to co-ordination of action.
4. Connections within business networks often reveal companies tied to
competitors. This has implications for trust and potential leaks within a
social network.
7
References
[1] Wellman B, Berkowitz SD (1977). Social structures: a network approach. Greenwich: JAI Press.
[2] Pinheiro, C. (2011). Social Network Analysis in Telecommunications. John Wiley & Sons.
[3] Based on Davies R (2011). Network Visualisation and Analysis, Cambridge.
[4] Borgatti, Carley & Krackhardt (2006).
8

Mais conteúdo relacionado

Semelhante a SNA of M2M Organisations

Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...Claudia Acosta
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network ControlSara Alvarez
 
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...reshma reshu
 
Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network ContextSocial Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network ContextIRJET Journal
 
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...CSEIJJournal
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET Journal
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySusan Cox
 
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IJCSEA Journal
 
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IJCSEA Journal
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
Network Effects
Network EffectsNetwork Effects
Network Effectsa16z
 
MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...Vagner Santana
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...IRJET Journal
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Publishing House
 

Semelhante a SNA of M2M Organisations (20)

Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network Control
 
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
 
Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network ContextSocial Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network Context
 
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
Do4301690695
Do4301690695Do4301690695
Do4301690695
 
Dv31821825
Dv31821825Dv31821825
Dv31821825
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
 
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
 
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 
Booysen machine 2012
Booysen machine 2012Booysen machine 2012
Booysen machine 2012
 
MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 
B1802030511
B1802030511B1802030511
B1802030511
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

SNA of M2M Organisations

  • 1. Module: 55-7626-00N-A-20123 – Social Media Use in Organisations (A-2012/3) Social Network Analysis of M2M Organisations Lee James Cox B0049872 MA in Technical Communication 1
  • 2. First some definitions Social Network Analysis (SNA) is the study of structure1. It is the mapping and measuring of relationships and flows (ties) between members (nodes) within a network. Machine to Machine (M2M) refers to the technology that connects: a. a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) b. which is relayed through a network (wireless, wired) c. to an application (software program), that translates the captured event into meaningful information (for example, items need to be restocked). M2M Organisations include device, network and application providers; as well as: • Enterprise Customers: provide the services to end-users, e.g. Coca Cola, British Gas • Platform Providers: equipment and solution providers to operators and others • System Integrators: build solutions to join up incompatible systems 2 Node Node Tie
  • 3. Five things to first consider about SNA 3 1. The first endeavour should always be to define what the Nodes and Ties mean.[2] For our M2M analysis, the nodes are organisations and ties are contractual relationships. 2. Nodes can have different weightings of importance, e.g. – Size (revenue/subscribers) – Geography – Track record – Associations – Other segmentation attributes 3. Ties have characteristics that matter when it comes to identifying things like leadership, influence and strength e.g. – Direction (one-way, both) – Quantity – Contract date – Value – Frequency 4. Matrix, graphs and other visualization tools are important for analysis and measurement. – Tools like NodeXL will be required for any network of reasonable size – Considerable time is usually required to capture and keep the data up to date. – The M2M example in later slides shows just a few of the tens of thousands of Enterprises, 200+ Operators & 300+ Application Providers that Jasper, Vodafone & Ericsson have as M2M partners! 5. The perspective of the analysis can centre on the complete network (socio) or an individuals personal network (ego).
  • 4. Social-centric or Ego-centric SNA? Social-centric (complete network) a. Allows analysis of nodes and ties in comparison to wider network, e.g. – Are Operator relationships tightly bonded, diversified or constricted? – Is there density/clustering of contracts within a geography such as Europe, or are there more cross-continent? b. Identifies behaviours affected by positions and connections, e.g. – Does the number of application provider ties influence the number of ties a platform provider has? – Does the distance between application and platform nodes affect the number of operator relationships? Ego-centric (personal network) a. Only ties directly with the focal organisation (Jasper) plus those Jasper is aware of are included. b. Perception is reality and opinions count. Subjective attributes are likely to have weight in many business matters 4 Figure 1 –Socio-centric view of the sample M2M Eco-System Figure 2 – Ego-centric view of Jasper M2M Network
  • 5. Visualization[3] can also reveal positional relationships • Operators have the highest degree centrality. AT&T is most central of the operators and is the longest established with largest customer base. • Application Providers have the highest closeness centrality. They work with multiple operators but rarely direct with Enterprise customers. • Device/SIM and Platform Providers are structurally equivalent nodes. • System Integrators are the most peripheral, having the smallest number of connections. • Enterprise Customers has the highest betweeness centrality providing the only path to System Integrations • No groups of nodes are connected to each other (cliques). However if the definition of ties were extended beyond ‘contractual’ then informal or personal relationships would show all nodes in this extracted view as being connected. Operators Enterprise Customers Device/SIM Application Providers Platform System Integrators 5
  • 6. Benefits & Limitations of SNA Benefits Limitations Provides framework to describe any complex network. Collecting and maintaining source data can be difficult Identifies important individuals and the influence they have Does not describe meanings, motives or explain why actions happen, e.g. why a contract was won. A typological analysis is more suitable. Can identify previously unrecognised sub-groups through visual clusters Little examination of important attributes such as attitudes, opinions and behaviours that may be helping or hindering relationships Highlights areas for further inquiry and possible improvement, e.g. gaps More sensitive to data omissions than other surveys. >75% sampling is required.[4] Even weak ties may be revealed as important for bridging disparate groups Privacy can be ignored when views of others contribute to the analysis. Useful for track changes over time to reveal paths. Visualization can lead to over simplification and misreading of results. E.g. Network measures such as density can be easily misrepresented when networks of different sizes are compared. 6
  • 7. Other take away learning’s from SNA 1. Social Network Analysis is not necessarily restricted to connections from tools such as Facebook or LinkedIn. SNA can be applied to a wide range of network subjects, such as how diseases spread, mapping films and interaction of characters, influence of language throughout the world, etc. 2. SNA focusses on relationships rather than attributes of the ‘nodes’ for their own sake, or the ideation behind the relationship. 3. A Social Network does not in itself encourage co-operation or collective action. Community tools such as Online Forums lend themselves better to co-ordination of action. 4. Connections within business networks often reveal companies tied to competitors. This has implications for trust and potential leaks within a social network. 7
  • 8. References [1] Wellman B, Berkowitz SD (1977). Social structures: a network approach. Greenwich: JAI Press. [2] Pinheiro, C. (2011). Social Network Analysis in Telecommunications. John Wiley & Sons. [3] Based on Davies R (2011). Network Visualisation and Analysis, Cambridge. [4] Borgatti, Carley & Krackhardt (2006). 8