The last part of this assignment is an open-ended project. Choose a sociologically interesting question about either the CAVIAR network or the facebook or twitter network from the recitation notebook section (for the social network data, go to and , or update (Oct 27) any other publicly available network data set, e.g. those at .
Try to answer your own question using the data. You can subset the data in whichever way you desire as long as it is (sociologically) meaningful. For example, in the case of a cooffending network, you could group nodes by attributes such as sex, group edges such as repeat/non-repeating cooffenses, use the weighted or unweighted co-offending networks, focus on the largest connected component, etc. Think of how you may want to subset the data in the context of the CAVIAR or the social networks, or the publicly available network data set you have chosen.
Note (October 20): The original intention of this project was to analyze a cooffending network, and the suggestions and examples are in that context. We may release the cooffending network data at a later date and you may attempt these ideas on that network then for your own interest. For the grades and upcoming due date of this analysis, please use the CAVIAR network or social network data mentioned above, or other publicly available network data set.
Clearly states a sociological question which is interesting and relevant to the data. The question must be sociologically motivated: for example, Compare the network structure in 2003 vs 2009″ is not a good question, without further context. If you have some reason to believe that the network structure changes in those years, then you should make that your central question: for example, Did crimes involving youth offenders become more organized and structured over the years” is a better question, from which comparing the structure in different years becomes part of the methodology to answer the question. More examples of possible questions for cooffending networks are provided below.
(2 points) Describes methodology for network analysis.
(2 points) Grader is convinced that the methodology makes sense for the question to be answered. Grader is convinced that no additional methodology within the bounds of techniques taught and discussed in this module could be applied beyond what was described. The grader should only consider additional methodology that adds meaningfully to the answer for the question: additions that simply repeat or confirm the presented results should not be considered by the grader. If a justification is provided for why a particular method was not used, the grader should be convinced by that argument.
(2 points) Presents results, including figures and/or statistics, which address the question of interest.
(2 points) The described methodology has been applied in complete and the results shown (that is, the author did not forget to include anything they discussed in the methodology.)
Adequately discusses the results obtained.
(2 points) Question does not need to be successfully answered, but the grader should be convinced that the author has answered the question to the best ability of the methodology presented.
(1 point) Provides commentary on what was discovered, what were the limitations of the methods, what may have been surprising to discover, etc.
(1 point) Award this point if the question was successfully answered to the grader’s satisfaction.
The following are possible suggestions for projects if you were using cooffending network data. Please come up with questions on your own for the CAVIAR network or the social networks from the recitation.
Possible suggestions for projects using the CAVIAR network:
Make use of centrality measures to identify concrete and quantifiable aspects of the criminal network that has changed over time, If possible, you could support them with a test of statistical significance. Then, provide a coherent explanation that provides examples using specific datapoints.
How has the immediate network of central criminal figures evolved in response to the police operations?
Consider the starting links as well as the new connections that arise throughout phases. Of the four network models discussed (Erdos-Renyi, configuration, preferential attachment, and small-world), which one(s) are the most realistic? Provide statistical tests if/when appropriate.
Consider the clustering problem and algorithm as discussed in the Spectral Clustering” lecture, and implement this procedure to the CAVIAR networks. What are some changes that you would notice on either the clustering quality (i.e. modularity) or the output clusters, over time? (You may feel free to perform the algorithm on an appropriate subset of the graph, say by excluding certain nodes.)
Possible suggestions for projects using the Facebook/Twitter network:
Which attributes of the social network are assortative? Are there any disassortative attributes?
Pick one or both of the social media network graphs, and study select features of the graph such as the degree distribution, clustering, and centrality metrics. To what extent does the power-law distribution hold, and examine how these statistics can be used to select a candidate model among the four network models discussed (Erdos-Renyi, configuration, preferential attachment, and small-world)?
Formulate several hypotheses on how the Facebook and Twitter network graphs could differ, based on features or quantities discussed throughout the module. Then, devise a methodology to test for whether the difference is statistically significant, and carry out the analysis.
Consider the nodes that have the most connections (in Facebook) and who are followed by the most other accounts (on Twitter). Then, consider the subgraphs that consist of each of these nodes’ followers. Formulate any interesting questions based on these subgraphs or their properties.
The following are possible suggestions for projects if you were using cooffending network data. Since you will not be using this data set, this is just to give you further ideas of what is expected:
A common question in co-offending networks is the stability of relationships over time: do offenders commit crime with the same people over time, or do they choose new people to co-offend with as time passes? You may wish to investigate individual nodes to see how their neighborhoods change over time.
There are other potential examples of time-based studies. For example, is there a concept of seasonality in the structure of the data? Do crime networks become more clustered during certain months or seasons?
One can choose groups of nodes and consider homophily/assortativity, that is, how these nodes interact. For example, one can ask how females interact with males in the network: does one of the two sexes tend to have higher centrality in the network? One can also extend this to time-varying studies: for example, does the influence of females increase in more recent years?
The CAVIAR data involved an organized crime ring. Is there organized crime in the data? How does this network compare with the organized crime in the CAVIAR network?
How does the type of crime impact the network? Are there certain local structures, such as cliques or star graphs, that are associated with different types of crime? Can you identify different types of crime by the structure of a co-offending relationship alone?
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more