Social Networks Analysis: Tools, Measures and Visualization

  • Neveen GhaliEmail author
  • Mrutyunjaya Panda
  • Aboul Ella Hassanien
  • Ajith Abraham
  • Vaclav Snasel


Social Network Analysis (SNA) is becoming an important tool for investigators, but all the necessary information is often available in a distributed environment. Currently there is no information system that helps managers and team leaders monitor the status of a social network. This chapter presents an overview of the basic concepts of social networks in data analysis including social network analysis metrics and performances. Different problems in social networks are discussed such as uncertainty, missing data and finding the shortest path in a social network. Community structure, detection and visualization in social network analysis is also illustrated. This chapter bridges the gap among the users by combining social network analysis methods and information visualization technology to help a user visually identify the occurrence of a possible relationship amongst the members in a social network. The chapter illustrates an online visualization method for a DBLP (Digital Bibliography Library Project) dataset of publications from the field of computer science, which is focused on the co-authorship relationship based on the intensity and topic of joint publications. Challenges to be addressed and future directions of research are presented and an extensive bibliography is also included.


Social Network Social Network Analysis Social Network Site Community Detection Short Path Problem 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Abadie, A., Gardeazabal, J.: Terrorism and the world economy. Eur. Econ. Rev. 52(1), 1–27 (2008)CrossRefGoogle Scholar
  2. 2.
    Antheunis, M.L., Valkenburg, P.M., Peter, J.: Getting acquainted through social network sites: testing a model of online uncertainty reduction and social attraction. Comput. Hum. Behav. 26, 100–109 (2010)CrossRefGoogle Scholar
  3. 3.
    Araujo, F., Ribeiro, B., Rodrigues, L.: A neural network for shortest path computation. IEEE Trans. Neural Netw. 12(5), 1067–1073 (2001)CrossRefGoogle Scholar
  4. 4.
    Boyd, D., Ellison, N.: Social network sites: definition, history and scholarship. J. Comput. Mediat. Commun. 13(1), 210–230 (2007)CrossRefGoogle Scholar
  5. 5.
    Cauvery, N., Viswanatha, K.V.: Routing in dynamic network using ants genetic algorithm. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9(3), 194–200 (2009)Google Scholar
  6. 6.
    Choudhuri, T., Pentland, A.: Sensing and modelling human networks using the sociometer. In: Proceedings of 7th IEEE Symposium on Wearable Computing, New York (2003)Google Scholar
  7. 7.
    Czinkota, M.R., Knight, G.A., Liesch, P.W., Steen, J.: Positioning terrorism in management and marketing: research propositions. J. Int. Manag. 11(4), 581–604 (2005)CrossRefGoogle Scholar
  8. 8.
    De Nooy, W., AMrvar, A., Batagelig, V.: Explorating SNA with pajek. Cambridge University Press, Cambridge/New York (2004)Google Scholar
  9. 9.
    Deng, Y., Tong, H.: Dynamic shortest path algorithm in stochastic traffic networks using PSO based on fluid neural network. J. Intell. Learn. Syst. Appl. 3, 11–16 (2011)Google Scholar
  10. 10.
    Ding, Y.: Community detection: topological vs. topical. J. Informetr. 5(4), 498–514 (2011)Google Scholar
  11. 11.
    Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3–5), 75–174 (2010)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Freeman, L.: Visualizing social network. J. Soc. Struct. 1(1) (2000)Google Scholar
  13. 13.
    Frey, B.S.: How can business cope with terrorism? J. Policy Model. 31(5), 779–787 (2009)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Grace, J., Gruhl, D., et al.: Artist ranking through analysis of on-line community comments. IBM Research technical report (2007)Google Scholar
  15. 15.
    Gutirrez-Muñoz, A., Kandel, A.: Current flows in electrical networks for fuzzy social network analysis (FSNA). Department of Computer Science and Engineering, University of South Florida (2009)Google Scholar
  16. 16.
    Hassan, S., Garmendia, L., Pavon, J.: Introducing uncertainty into social simulation: using fuzzy logic for agent-based modelling. Int. J. Reason. Based Intell. Syst. 2(2), 118–124 (2010)CrossRefGoogle Scholar
  17. 17.
    Horak, Z., Kudelka, M., Snasel, V., Abraham, A., Rezankova, H.: Forcoa.NET: an interactive tool for exploring the significance of authorship networks in DBLP Data. In: Third International Conference on Computational Aspects of Social Networks (CASoN 2011), Salamanca, pp. 261–266. IEEE (2011). ISBN: 978-1-4577-1131-2Google Scholar
  18. 18.
  19. 19. Accessed on 07 Jan 2012
  20. 20.
  21. 21.
  22. 22.
    Jenson, D., Neville, J.: Data mining in networks. In: Symposium on Dynamic Social Network Modelling and Analysis, National Academy of Sciences. National Academy Press, Washington (2002)Google Scholar
  23. 23.
    Koh, W.T.H.: Terrorism and its impact on economic growth and technological innovation. Technol. Forecast. Soc. Change 74(2), 129–138 (2007)CrossRefGoogle Scholar
  24. 24.
    Kollias, C., Messis, P., Mylonidis, N., Paleologou, S.: Terrorism and the effectiveness of security spending in Greece: policy implications of some empirical findings. J. Policy Model. 31(5), 788–802 (2009)CrossRefGoogle Scholar
  25. 25.
    Krebs, V.E.: Uncloaking terrorist networks. First Monday 7 (2002)Google Scholar
  26. 26.
    Kumar, R., Kumar, M.: Exploring genetic algorithm for shortest path optimization in data networks. Glob. J. Comput. Sci. Technol. (GJCST 2010) 10(11), 8–12 (2010)Google Scholar
  27. 27.
    Lertsuwanakul, L., Unger, H.: An improved greedy routing algorithm for grid using pheromone-based landmark. World Acad. Sci. Eng. Technol. 59, 172–176 (2009)Google Scholar
  28. 28.
    Matsuo, Y., et al.: Polyphonet: an advanced social network extraction system from the web. In: www 06, Proceedings of International Conference on World Wide Web, New York, pp. 397–406 (2006)Google Scholar
  29. 29.
    Michlmayr, E.: Ant algorithms for self-organization in social networks. Ph.D. thesis, Vienna University of Technology, Faculty of Informatics (2007)Google Scholar
  30. 30.
    Mitchell, T., wang, S., Huang, Y., Cheyer, A.: Extracting knowledge about users activities from raw workstation contents. In: Proceedings of 21st National confefernce on Artificial Intelligence, AAAI-2006, Boston (2006)Google Scholar
  31. 31.
    Moor, J.H.: Towards a theory of privacy for the information age. In: Spinello, R.A., Tavani, H.T. (eds.) Readings in CyberEthics, 2nd edn., pp. 407–417. Sudbury, MA: Jones and Bartlett (2004)Google Scholar
  32. 32.
    Moustafa, W., Deshpande, A., Namata, G., Getoor, L.: Declarative analysis of noisy information networks. In: Proceedings of IEEE 27th International Conference on Department of Computer Science, Data Engineering Workshops (ICDEW), Hannover, pp. 106–111 (2011)Google Scholar
  33. 33.
    Mukhef, H.A., Farhan, E.M., Jassim, M.R.: Generalized shortest path problem in uncertain environment based on PSO. J. Comput. Sci. 4(4), 349–352 (2008)CrossRefGoogle Scholar
  34. 34.
    Paraskevas, A., Arendell, B.: A strategic framework for terrorism prevention and mitigation in tourism destinations. Tour. Manag. 28(6), 1560–1573 (2007)CrossRefGoogle Scholar
  35. 35.
    Perumbuduru, S., Dhar, J.: Performance evaluation of different network topologies based on ant colony optimization. Int. J. Wirel. Mob. Netw. (IJWMN) 2(4), 141–157 (2010)Google Scholar
  36. 36.
    Prez, I.J., Alonso, S., Cabrerizo, F.J., Herrera-Viedma, E.: A fuzzy linguistic decision support system to aid users in e-commerce activities. In: Proceedings of the 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP 2010). The 2010 International Conference on Artificial Intelligence (ICAI 2010), Las Vegas, 12–15 July 2010Google Scholar
  37. 37.
    Reid, E.F., Chen, H.: Mapping the contemporary terrorism research domain. Int. J. Hum. Comput. Stud. 65(1), 42–56 (2007)CrossRefGoogle Scholar
  38. 38.
    Saint-Charles, J., Mongeau, P.: Different relationships for coping with ambiguity and uncertainty in organizations. Soc. Netw. 31, 33–39 (2009)CrossRefGoogle Scholar
  39. 39.
    Sang, Y., YI, Z.: A modified pulse coupled neural network for shortest path computation. J. Comput. Inf. Syst. 6(9), 3095–3102 (2010)Google Scholar
  40. 40.
    Schrock, A., Examining social media usage: technology clusters and social network relationships. First Monday 14(1–5), January (2009)Google Scholar
  41. 41.
    Shani, G., Chickering, M., Meek, C.: Mining recommendations from the web. In: Proceedings of 2008 ACM Conference on Recommender System, Lausanne, pp. 35–42 (2008)Google Scholar
  42. 42.
    Sheldon, P.: The relationship between unwillingness to communicate and students Facebook use. J. Media Psychol. Theor. Method Appl. 20(2), 67–75 (2008)Google Scholar
  43. 43.
    Shi, C., Yan, Z., Cai, Y., Wu, B.: Multi-objective community detection in complex networks. Appl. Soft Comput. 12(2), 850–859 (2012)CrossRefGoogle Scholar
  44. 44.
    Snasel, V., Harak, Z., Abraham, A.: Understanding social networks using formal concept analysis. In: Web Intelligence and Intelligent Agent Technology, 2008, WI-IAT ’08, Sydney, 390–393 (2008)Google Scholar
  45. 45.
    Snasel, V., Horak, Z., Abraham, A.: Link suggestions in terrorists networks using semi discrete decomposition. In: Sixth International Conference on Information Assurance and Security (IAS), pp. 337–339. IEEE (2010). ISBN 978-1-4244-7408-0Google Scholar
  46. 46.
    Sommer, C.: Approximate shortest path and distance queries in network. Ph.D. thesis, Department of Computer Science Graduate School of Information Science and Technology, The University of Tokyo (2010)Google Scholar
  47. 47.
    Tantipathananandh, C., Breger-wolf, T., Kempe, D.: A framework for community identification in dynamic social network, In: Proceedings of KDD 2007, pp. 717–726. San Jose, California, USA (2007)Google Scholar
  48. 48.
    Thellwal, M.: Social networks, gender and friending, analysis of Myspace profiles. J. Am. Soc. Inf. Sci. Technol. 591(8), 1321–1330 (2008)CrossRefGoogle Scholar
  49. 49.
    Tufekci, Z.: Groming, gossip Facebook and Myspace: what can we learn about these sites from those who wont assimilate? Inf. Commun. Soc. 11(4), 544–564 (2008)CrossRefGoogle Scholar
  50. 50.
    Vindigni, G., Janssen, M.A.: Organic food consumption a multi-theoretical framework of consumer decision making, The current issue and full text archive of this journal is available at Accessed on 20 Mar 2012 (2002)
  51. 51.
    Walther, J., Ander Heide, B., Kim, S. Westerman, D., Tang, S.T.: The role of friends appearance and behaviour on evaluations of individuals on facebook: are we known by the company we keep? Hum. Commun. Res. 34, 28–49 (2008)Google Scholar
  52. 52.
    White, T., Pagurek, B., Oppacher, F.: ASGA: improving the ant system by integration with genetic algorithms. In: Proceedings of the Third Annual Conference, University of Wisconsin, Madison, pp. 610–617 (1999)Google Scholar
  53. 53.
    Wolf, Y., Frankel, O.: Terrorism: toward an overarched account and prevention with a special reference to pendulum interplay between both parties. Aggress. Violent Behav. 12(3), 259–279 (2007)CrossRefGoogle Scholar
  54. 54.
    Wren, C.R., Ivanov, Y.A., Leign, D., Westhues, J.: The MERL motion detector datasets: 2007 Workshop on Massive Datasets. Mitsubishi electric research laboratories tech report, TR-2007-069Google Scholar
  55. 55.
    Yang, W.Z., Ge, Y.H., He, J.J., Liu, B.: Designing a group decision support system under uncertainty using group Fuzzy analytic network process (ANP). Afr. J. Bus. Manag. 4(12), 2571–2585 (2010)Google Scholar

Copyright information

© Springer-Verlag London 2012

Authors and Affiliations

  • Neveen Ghali
    • 1
    Email author
  • Mrutyunjaya Panda
    • 2
  • Aboul Ella Hassanien
    • 3
  • Ajith Abraham
    • 4
  • Vaclav Snasel
    • 5
  1. 1.Faculty of ScienceAl-Azhar UniversityCairoEgypt
  2. 2.Department of ECEGandhi Institute for Technological Advancement (GITA)BhubaneswarIndia
  3. 3.Faculty of Computers and InformationCairo UniversityCairoEgypt
  4. 4.Scientific Network for Innovation and Research ExcellenceMachine Intelligence Research Labs (MIR Labs)AuburnUSA
  5. 5.Faculty of Electrical Engineering and Computer ScienceVSB – Technical University of OstravaOstrava – PorubaCzech Republic

Personalised recommendations