Topics
Key Readings
-
Borgatti
S. 2003. The key player problem. [html]
-
Borgatti, S.P.
2006. Identifying sets of key players in a network.
Computational, Mathematical and Organizational Theory. 12(1):
21-34 [pdf]
-
Moody, James. “Fighting
a Hydra: A Note on the Network Embeddedness of the War on Terror”,
Structure and Dynamics: eJournal
of Anthropological and Related Sciences: 1(2): Article 9. (local
version of the web calculator
here).
-
Krebs, Valdis.
Social Network Analysis of the 9-11 Terrorist Network [html]
Additional Readings
-
Borgatti, S.P., Carley, K., and
Krackhardt, D. 2006. Robustness of Centrality Measures under
Conditions of Imperfect Data. Social Networks 28: 124–136.
[pdf]
|
|
Tutorials
Exercises
Slides
|