• Title/Summary/Keyword: social centrality

Search Result 474, Processing Time 0.027 seconds

Technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents (헬스케어 특허의 IPC 코드 기반 사회 연결망 분석(SNA)을 이용한 기술 융복합 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.5
    • /
    • pp.308-314
    • /
    • 2022
  • This study deals with the technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents filed in Korea. The relationship between core technologies is visualized using Social Network Analysis. At the subclass level of healthcare patents, 1,155 cases (49.4%) of patents with complex IPC codes were investigated, and as a result of Social Network Analysis on them, the IPC codes with the highest Degree Centrality were A61B, G16H, and G06Q, in that order. The IPC codes with the highest Betweenness Centrality are in the order of A61B, G16H, and G06Q. In addition, it was confirmed that healthcare patents consist of two large technology clusters. Cluster-1 corresponds to related business models centered on A61B, G16H and G06Q, and Cluster-2 is consisting of H04L, H04W and H04B. The technology convergence core pairs of the healthcare patent is [G16H-A61B] and [G16H-G06Q] in Cluster-1, and [H04L-H04W] in Cluster-2. The results of this study can contribute to the development of core technologies for healthcare patents.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

Collaborative Research Network and Scientific Productivity: The Case of Korean Statisticians and Computer Scientists

  • Kwon, Ki-Seok;Kim, Jin-Guk
    • Asian Journal of Innovation and Policy
    • /
    • v.6 no.1
    • /
    • pp.85-93
    • /
    • 2017
  • This paper focuses on the relationship between the characteristics of network and the productivity of scientists, which is rarely examined in previous studies. Utilizing a unique dataset from the Korean Citation Index (KCI), we examine the overall characteristics of the research network (e.g. distribution of nodes, density and mean distance), and analyze whether the network centrality is related to the scientific productivity. According to the results, firstly we have found that the collaborative research network of the Korean academics in the field of statistics and computer science is a scale-free network. Secondly, these research networks show a disciplinary difference. The network of statisticians is denser than that of computer scientists. In addition, computer scientists are located in a fragmented network compared to statisticians. Thirdly, with regard to the relationship between the researchers' network position and scientific productivity, a significant relation and their disciplinary difference have been observed. In particular, the degree centrality is the strongest predictor for the scientists' productivity. Based on these findings, some policy implications are put forward.

Ascertaining the Structure and Content of a National Scholarly Web Space Based on Content Analysis (내용 분석을 통한 한국의 학술적 웹 공간 구조 분석)

  • Chung, Young-Mee;Yu, So-Young
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.3
    • /
    • pp.7-24
    • /
    • 2009
  • Since the Web is dynamic, it is necessary to analyze scholarly Web space with both quantitative and qualitative methods for better understanding of communication characteristics. In this study, we analyzed contents of pages and links to ascertain the characteristics of Korean scholarly Web space in terms of network structure and communication behavior. The result shows that the structure of the original network with all the external links remained is not much different from that of the network with activated external links only. However, the purposes of linking vary among scholarly institutions. The centrality measures correlate more strongly with the clustering coefficient than with the constraint index implying the similar explanatory power of the two types of structural indices.

k-Fragility Maximization Problem to Attack Robust Terrorist Networks

  • Thornton, Jabre L.;Kim, Donghyun;Kwon, Sung-Sik;Li, Deying;Tokuta, Alade O.
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.33-38
    • /
    • 2014
  • This paper investigates the shaping operation problem introduced by Callahan et al., namely the k-fragility maximization problem (k-FMP), whose goal is to find a subset of personals within a terrorist group such that the regeneration capability of the residual group without the personals is minimized. To improve the impact of the shaping operation, the degree centrality of the residual graph needs to be maximized. In this paper, we propose a new greedy algorithm for k-FMP. We discover some interesting discrete properties and use this to design a more thorough greedy algorithm for k-FMP. Our simulation result shows that the proposed algorithm outperforms Callahan et al.'s algorithm in terms of maximizing degree centrality. While our algorithm incurs higher running time (factor of k), given that the applications of the problem is expected to allow sufficient amount of time for thorough computation and k is expected to be much smaller than the size of input graph in reality, our algorithm has a better merit in practice.

Arab Spring Effects on Meanings for Islamist Web Terms and on Web Hyperlink Networks among Muslim-Majority Nations: A Naturalistic Field Experiment

  • Danowski, James A.;Park, Han Woo
    • Journal of Contemporary Eastern Asia
    • /
    • v.13 no.2
    • /
    • pp.15-39
    • /
    • 2014
  • This research conducted a before/after naturalistic field experiment, with the early Arab Spring as the treatment. Compared to before the early Arab Spring, after the observation period the associations became stronger among the Web terms: 'Jihad, Sharia, innovation, democracy and civil society.' The Western concept of civil society transformed into a central Islamist ideological component. At another level, the inter-nation network based on Jihad-weighted Web hyperlinks between pairs of 46 Muslim Majority (MM) nations found Iran in one of the top two positions of flow betweenness centrality, a measure of network power, both before and after early Arab Spring. In contrast, Somalia, UAE, Egypt, Libya, and Sudan increased most in network flow betweenness centrality. The MM 'Jihad'-centric word co-occurrence network more than tripled in size, and the semantic structure more became entropic. This media "cloud" perhaps billowed as Islamist groups changed their material-level relationships and the corresponding media representations of Jihad among them changed after early Arab Spring. Future research could investigate various rival explanations for this naturalistic field experiment's findings.

Principal Component Analysis of Higher-Order Hyperedges in EEG Data (EEG 데이터의 고차원 하이퍼에지에서의 주성분 분석)

  • Kim, Joon-Shik;Lee, Chung-Yeon;Zhang, Byoung-Tak
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.414-416
    • /
    • 2012
  • 고차 주성분 방법으로는 텐서 분석이 있었다. Electroencephalography(EEG) 데이터나 Social Network 데이터에 텐서 분석이 적용되어 주요한 성분들을 찾는 연구들이 있었다. 그러나 텐서 분석은 직관적으로 이해하기에 어려움이 있으며 중요한 노드를 찾는데에는 다소 어려움이 있다. 본 논문에서는 고차 하이퍼에지로 이차원 행렬을 만들고 주성분분석법을 이용하여 중요한 노드를 찾는 새로운 방법론을 제시한다. 데이터로는 Multimodal Memory Game(MMG) 수행시 촬영한 EEG 데이터를 사용하였다. MMG는 TV 드라마 기반의 기억인출게임이다. 베타파의 Power Spectrum Density(PSD)는 각 위치의 채널들의 활성도를 나타내는 지표이다. 우리는 Random Sampling을 바탕으로 PSD 상위 50%의 채널들간의 전이행렬을 구하였다. 그 후 고유치와 고유벡터를 구하였다. 가장 큰 고유치의 고유벡터는 주성분을 나타내며 고유벡터의 각 원소들은 중요도를 나타내는 centrality 이다. 세 명의 피험자에 대한 centrality 상위 30개의 중요한 채널들을 구하였고 세명에 공통적으로 포함되는 채널을 확인하였다.

Emergence of Inter-organizational Collaboration Networks : Relational Capability Perspective (기업 간 협업 네트워크의 창발 : 관계 역량을 중심으로)

  • Park, Chulsoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.4
    • /
    • pp.1-18
    • /
    • 2015
  • This paper proposes relational capability as a main driver of constructing inter-organizational collaboration networks. Based on social network theory and relational view literature, three components of relational capability are constructed and implemented by an agent-based model. The components include organizational capability, structural capability, and trust between a partner and a focal firm. These three components are updated by two micro mechanisms: structural mechanism and relational mechanism. Structural mechanism is a feedback loop in which the relational capability increases structural capability and vice versa. Relational mechanism is a learning-by-doing process in which a focal firm experiences success or failure of collaboration and the experience increases or decreases cumulative trust in a partner firm. Result of agent-based simulation shows that a collaboration network emerges through interactions of firm's relational capabilities and the characteristics of emerged networks vary with the contribution of structural capability and trust to relational capability. Specifically, in case structural capability contributes more to relational capability, the average degree centrality and collaboration proportion increases as time passes and enters into an equilibrium state. In that case, almost every firms participated in the network collaborates each other so that the emerged network becomes highly cohesive. In case trust contributes more to relational capability, the results are reversed. In an equilibrium state, the balance of contribution between structural capability and trust makes an emerged network larger and maximizes average degree centrality of the network.

Big Data Patent Analysis Using Social Network Analysis (키워드 네트워크 분석을 이용한 빅데이터 특허 분석)

  • Choi, Ju-Choel
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.2
    • /
    • pp.251-257
    • /
    • 2018
  • As the use of big data is necessary for increasing business value, the size of the big data market is getting bigger. Accordingly, it is important to apply competitive patents in order to gain the big data market. In this study, we conducted the patent analysis based keyword network to analyze the trend of big data patents. The analysis procedure consists of big data collection and preprocessing, network construction, and network analysis. The results of the study are as follows. Most of big data patents are related to data processing and analysis, and the keywords with high degree centrality and between centrality are "analysis", "process", "information", "data", "prediction", "server", "service", and "construction". we expect that the results of this study will offer useful information in applying big data patent.

Research trends related to childhood and adolescent cancer survivors in South Korea using word co-occurrence network analysis

  • Kang, Kyung-Ah;Han, Suk Jung;Chun, Jiyoung;Kim, Hyun-Yong
    • Child Health Nursing Research
    • /
    • v.27 no.3
    • /
    • pp.201-210
    • /
    • 2021
  • Purpose: This study analyzed research trends related to childhood and adolescent cancer survivors (CACS) using word co-occurrence network analysis on studies registered in the Korean Citation Index (KCI). Methods: This word co-occurrence network analysis study explored major research trends by constructing a network based on relationships between keywords (semantic morphemes) in the abstracts of published articles. Research articles published in the KCI over the past 10 years were collected using the Biblio Data Collector tool included in the NetMiner Program (version 4), using "cancer survivors", "adolescent", and "child" as the main search terms. After pre-processing, analyses were conducted on centrality (degree and eigenvector), cohesion (community), and topic modeling. Results: For centrality, the top 10 keywords included "treatment", "factor", "intervention", "group", "radiotherapy", "health", "risk", "measurement", "outcome", and "quality of life". In terms of cohesion and topic analysis, three categories were identified as the major research trends: "treatment and complications", "adaptation and support needs", and "management and quality of life". Conclusion: The keywords from the three main categories reflected interdisciplinary identification. Many studies on adaptation and support needs were identified in our analysis of nursing literature. Further research on managing and evaluating the quality of life among CACS must also be conducted.