scholarly journals A systematic metadata harvesting workflow for analysing scientific networks

2021 ◽  
Vol 7 ◽  
pp. e421
Author(s):  
Bilal H. Butt ◽  
Muhammad Rafi ◽  
Muhammad Sabih

One of the disciplines behind the science of science is the study of scientific networks. This work focuses on scientific networks as a social network having different nodes and connections. Nodes can be represented by authors, articles or journals while connections by citation, co-citation or co-authorship. One of the challenges in creating scientific networks is the lack of publicly available comprehensive data set. It limits the variety of analyses on the same set of nodes of different scientific networks. To supplement such analyses we have worked on publicly available citation metadata from Crossref and OpenCitatons. Using this data a workflow is developed to create scientific networks. Analysis of these networks gives insights into academic research and scholarship. Different techniques of social network analysis have been applied in the literature to study these networks. It includes centrality analysis, community detection, and clustering coefficient. We have used metadata of Scientometrics journal, as a case study, to present our workflow. We did a sample run of the proposed workflow to identify prominent authors using centrality analysis. This work is not a bibliometric study of any field rather it presents replicable Python scripts to perform network analysis. With an increase in the popularity of open access and open metadata, we hypothesise that this workflow shall provide an avenue for understanding scientific scholarship in multiple dimensions.

2019 ◽  
Vol 24 (2) ◽  
pp. 88-104
Author(s):  
Ilham Aminudin ◽  
Dyah Anggraini

Banyak bisnis mulai muncul dengan melibatkan pengembangan teknologi internet. Salah satunya adalah bisnis di aplikasi berbasis penyedia layanan di bidang moda transportasi berbasis online yang ternyata dapat memberikan solusi dan menjawab berbagai kekhawatiran publik tentang layanan transportasi umum. Kemacetan lalu lintas di kota-kota besar dan ketegangan publik dengan keamanan transportasi umum diselesaikan dengan adanya aplikasi transportasi online seperti Grab dan Gojek yang memberikan kemudahan dan kenyamanan bagi penggunanya Penelitian ini dilakukan untuk menganalisa keaktifan percakapan brand jasa transportasi online di jejaring sosial Twitter berdasarkan properti jaringan. Penelitian dilakukan dengan dengan mengambil data dari percakapan pengguna di social media Twitter dengan cara crawling menggunakan Bahasa pemrograman R programming dan software R Studio dan pembuatan model jaringan dengan software Gephy. Setelah itu data dianalisis menggunakan metode social network analysis yang terdiri berdasarkan properti jaringan yaitu size, density, modularity, diameter, average degree, average path length, dan clustering coefficient dan nantinya hasil analisis akan dibandingkan dari setiap properti jaringan kedua brand jasa transportasi Online dan ditentukan strategi dalam meningkatkan dan mempertahankan keaktifan serta tingkat kehadiran brand jasa transportasi online, Grab dan Gojek.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Hakimeh Hazrati ◽  
Shoaleh Bigdeli ◽  
Seyed Kamran Soltani Arabshahi ◽  
Vahideh Zarea Gavgani ◽  
Nafiseh Vahed

Abstract Background Analyzing the previous research literature in the field of clinical teaching has potential to show the trend and future direction of this field. This study aimed to visualize the co-authorship networks and scientific map of research outputs of clinical teaching and medical education by Social Network Analysis (SNA). Methods We Identified 1229 publications on clinical teaching through a systematic search strategy in the Scopus (Elsevier), Web of Science (Clarivate Analytics) and Medline (NCBI/NLM) through PubMed from the year 1980 to 2018.The Ravar PreMap, Netdraw, UCINet and VOSviewer software were used for data visualization and analysis. Results Based on the findings of study the network of clinical teaching was weak in term of cohesion and the density in the co-authorship networks of authors (clustering coefficient (CC): 0.749, density: 0.0238) and collaboration of countries (CC: 0.655, density: 0.176). In regard to centrality measures; the most influential authors in the co-authorship network was Rosenbaum ME, from the USA (0.048). More, the USA, the UK, Canada, Australia and the Netherlands have central role in collaboration countries network and has the vertex co-authorship with other that participated in publishing articles in clinical teaching. Analysis of background and affiliation of authors showed that co-authorship between clinical researchers in medicine filed is weak. Nineteen subject clusters were identified in the clinical teaching research network, seven of which were related to the expected competencies of clinical teaching and three related to clinical teaching skills. Conclusions In order to improve the cohesion of the authorship network of clinical teaching, it is essential to improve research collaboration and co-authorship between new researchers and those who have better closeness or geodisk path with others, especially those with the clinical background. To reach to a dense and powerful topology in the knowledge network of this field encouraging policies to be made for international and national collaboration between clinicians and clinical teaching specialists. In addition, humanitarian and clinical reasoning need to be considered in clinical teaching as of new direction in the field from thematic aspects.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Yi-Chun Chang ◽  
Kuan-Ting Lai ◽  
Seng-Cho T. Chou ◽  
Wei-Chuan Chiang ◽  
Yuan-Chen Lin

PurposeTelecommunication (telecom) fraud is one of the most common crimes and causes the greatest financial losses. To effectively eradicate fraud groups, the key fraudsters must be identified and captured. One strategy is to analyze the fraud interaction network using social network analysis. However, the underlying structures of fraud networks are different from those of common social networks, which makes traditional indicators such as centrality not directly applicable. Recently, a new line of research called deep random walk has emerged. These methods utilize random walks to explore local information and then apply deep learning algorithms to learn the representative feature vectors. Although effective for many types of networks, random walk is used for discovering local structural equivalence and does not consider the global properties of nodes.Design/methodology/approachThe authors proposed a new method to combine the merits of deep random walk and social network analysis, which is called centrality-guided deep random walk. By using the centrality of nodes as edge weights, the authors’ biased random walks implicitly consider the global importance of nodes and can thus find key fraudster roles more accurately. To evaluate the authors’ algorithm, a real telecom fraud data set with around 562 fraudsters was built, which is the largest telecom fraud network to date.FindingsThe authors’ proposed method achieved better results than traditional centrality indices and various deep random walk algorithms and successfully identified key roles in a fraud network.Research limitations/implicationsThe study used co-offending and flight record to construct a criminal network, more interpersonal relationships of fraudsters, such as friendships and relatives, can be included in the future.Originality/valueThis paper proposed a novel algorithm, centrality-guided deep random walk, and applied it to a new telecom fraud data set. Experimental results show that the authors’ method can successfully identify the key roles in a fraud group and outperform other baseline methods. To the best of the authors’ knowledge, it is the largest analysis of telecom fraud network to date.


2015 ◽  
Vol 2015 ◽  
pp. 1-20 ◽  
Author(s):  
Jae-wook Jang ◽  
Jiyoung Woo ◽  
Aziz Mohaisen ◽  
Jaesung Yun ◽  
Huy Kang Kim

As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich this effort and by capitalizing on ideas from the social network analysis domain, we build a tool that can help classify malware families using features driven from the graph structure of their system calls. To achieve that, we first construct a system call graph that consists of system calls found in the execution of the individual malware families. To explore distinguishing features of various malware species, we study social network properties as applied to the call graph, including the degree distribution, degree centrality, average distance, clustering coefficient, network density, and component ratio. We utilize features driven from those properties to build a classifier for malware families. Our experimental results show that “influence-based” graph metrics such as the degree centrality are effective for classifying malware, whereas the general structural metrics of malware are less effective for classifying malware. Our experiments demonstrate that the proposed system performs well in detecting and classifying malware families within each malware class with accuracy greater than 96%.


Target ◽  
2017 ◽  
Vol 29 (1) ◽  
pp. 7-38 ◽  
Author(s):  
Ziyun Xu

As the discipline of Translation and Interpreting Studies (TIS) has continued to expand rapidly over the past twenty years, scientometric research has been applied increasingly often to analyse its trends and patterns. Drawing inspiration from Social Network Analysis (SNA), this study aims to quantify academic research impact and identify patterns of influence at an institutional level in Chinese Interpreting Studies (CIS), by seeking answers to the following questions: Which are the most influential publications? Which institutions carry the most weight? How have their respective levels of influence evolved over time? By analysing a near-exhaustive corpus of 59,303 citations from CIS literature, the study reveals that the majority of influential publications are monographs and theoretical in nature, though many Chinese textbooks on interpreting are also highly influential. It also finds that an institution’s ranking in research productivity does not necessarily translate into high academic influence.


Author(s):  
Elly Kirwa ◽  
Rajkumar Josmee Singh

Aims: This study uses Social Network Analysis (SNA) to investigate the social interaction that shape student collaborative problem solving activity when undergoing Design Thinking (DT) to improvise Climate Smart Agricultural Practices (CSAPs). Place and Duration of Study: The study was conducted at the three Colleges of Agriculture (CoAs) under Central Agricultural University, Imphal at Manipur viz., the (1) CoA, Imphal at Manipur, (2) CoA, Pasighat at Arunachal Pradesh; and (3) CoA, Kyrdemkulai at Meghalaya. The study was conducted between November 2019 and February 2020. Methodology: A sample of 28 respondents who constituted fifty percent of population of final year B.Sc. (Agriculture) students was selected through simple random sampling without replacement from the three CoAs. SNA of respondent-students was analyzed using Gephi 0.9.2 software with the following attributes to understand the student community viz., average degree, modularity, average clustering coefficient and average path length. Results: The network for CoA, Imphal displayed the following characteristic as ‘Average Degree’ of 5.69, ‘Modularity’ of 0.149, ‘Average Clustering Coefficient’ of 0.468 and ‘Average Path Length’ of 1.57. In case of CoA, Pasighat, the attributes of social network were as ‘Average Degree’ of 3.63, ‘Modularity’ of 0.513, ‘Average Clustering Coefficient’ of 0.099 and ‘Average Path Length’ of 1.52j; while for the case of CoA, Kyrdemkulai, it had ‘Average Degree’ of 3.86, ‘Modularity’ of 0.024, ‘Average Clustering Coefficient’ of 0.650 and ‘Average Path Length’ of 1.360. Conclusion: For meaningful improvising of CSAPs using DT, the efficiency of social network was more functional on smaller collaborative working groups as information flow was found to be high in small groups leading to development of more ideas on DT.


2020 ◽  
Author(s):  
Wasim Ahmed ◽  
Francesc López Seguí ◽  
Josep Vidal-Alaball ◽  
Matthew S Katz

BACKGROUND During the COVID-19 pandemic, a number of conspiracy theories have emerged. A popular theory posits that the pandemic is a hoax and suggests that certain hospitals are “empty.” Research has shown that accepting conspiracy theories increases the likelihood that an individual may ignore government advice about social distancing and other public health interventions. Due to the possibility of a second wave and future pandemics, it is important to gain an understanding of the drivers of misinformation and strategies to mitigate it. OBJECTIVE This study set out to evaluate the #FilmYourHospital conspiracy theory on Twitter, attempting to understand the drivers behind it. More specifically, the objectives were to determine which online sources of information were used as evidence to support the theory, the ratio of automated to organic accounts in the network, and what lessons can be learned to mitigate the spread of such a conspiracy theory in the future. METHODS Twitter data related to the #FilmYourHospital hashtag were retrieved and analyzed using social network analysis across a 7-day period from April 13-20, 2020. The data set consisted of 22,785 tweets and 11,333 Twitter users. The Botometer tool was used to identify accounts with a higher probability of being bots. RESULTS The most important drivers of the conspiracy theory are ordinary citizens; one of the most influential accounts is a Brexit supporter. We found that YouTube was the information source most linked to by users. The most retweeted post belonged to a verified Twitter user, indicating that the user may have had more influence on the platform. There was a small number of automated accounts (bots) and deleted accounts within the network. CONCLUSIONS Hashtags using and sharing conspiracy theories can be targeted in an effort to delegitimize content containing misinformation. Social media organizations need to bolster their efforts to label or remove content that contains misinformation. Public health authorities could enlist the assistance of influencers in spreading antinarrative content.


Sign in / Sign up

Export Citation Format

Share Document