Social Network Analysis with Applications
| Main Authors: | McCulloh, Ian, Armstrong, Helen, Johnson, A. |
|---|---|
| Format: | Book |
| Published: |
John Wiley & Sons Inc,
2013
|
| Online Access: | http://hdl.handle.net/20.500.11937/20379 |
Similar Items
Organizational risk using network analysis
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Spectral analysis of social networks to identify periodicity
by: McCulloh, Ian, et al.
Published: (2012)
by: McCulloh, Ian, et al.
Published: (2012)
Towards supply chain excellence using network analysis
by: Alexander, Paul, et al.
Published: (2011)
by: Alexander, Paul, et al.
Published: (2011)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Social networks content analysis for peacebuilding application
by: Shaikh, Muniba, et al.
Published: (2015)
by: Shaikh, Muniba, et al.
Published: (2015)
Adapting Advanced Information Technology Network Training for Adults with Visual Impairments
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Remote laboratory access and network simulation tools for students with vision impairment
by: Murray, Iain, et al.
Published: (2009)
by: Murray, Iain, et al.
Published: (2009)
Social Networking Trends: An Analysis Into The Evolution Of The Social Networking Phenomena
by: Ong, Te-Jin
Published: (2003)
by: Ong, Te-Jin
Published: (2003)
Critical Review of Social Network Analysis Applications in Complex Project Management
by: Lee, Cen-Ying, et al.
Published: (2018)
by: Lee, Cen-Ying, et al.
Published: (2018)
Evaluating an IA virtual network education program
by: Armstrong, Helen, et al.
Published: (2007)
by: Armstrong, Helen, et al.
Published: (2007)
Social Network Analysis and Social Work Inquiry
by: Gillieatt, Sue, et al.
Published: (2015)
by: Gillieatt, Sue, et al.
Published: (2015)
The role of social network analysis in social media research
by: Nie, Zhou, et al.
Published: (2023)
by: Nie, Zhou, et al.
Published: (2023)
Nonlinear Mapping Convergence and Application to Social Networks
by: Anderson, B.D.O., et al.
Published: (2018)
by: Anderson, B.D.O., et al.
Published: (2018)
Using meta-networks to identify key intervention points in nuclear WMD development
by: Peiris, W, et al.
Published: (2011)
by: Peiris, W, et al.
Published: (2011)
Identifying DOS attacks using data pattern analysis
by: Salem, Mohammed, et al.
Published: (2008)
by: Salem, Mohammed, et al.
Published: (2008)
Development of social network analysis platform
by: Adnan, Sumayyah, et al.
Published: (2019)
by: Adnan, Sumayyah, et al.
Published: (2019)
Consumer ethnocentrism, market mavenism and social network analysis
by: Cheah, Isaac, et al.
Published: (2018)
by: Cheah, Isaac, et al.
Published: (2018)
The role of social network analysis on participation and placemaking
by: Alvarez, Laura, et al.
Published: (2017)
by: Alvarez, Laura, et al.
Published: (2017)
Detecting influencers in social media using Social Network Analysis (SNA)
by: Mohd Rum, Siti Nurulain, et al.
Published: (2019)
by: Mohd Rum, Siti Nurulain, et al.
Published: (2019)
Modeling forensic evidence systems using design science
by: Armstrong, Colin, et al.
Published: (2010)
by: Armstrong, Colin, et al.
Published: (2010)
Social network Perception Alignment of E-recruiters and Potential Applicants
by: Reiners, Torsten, et al.
Published: (2013)
by: Reiners, Torsten, et al.
Published: (2013)
Development of web application for Muslim traveller with emphasis on social networking
by: Gunawan, Teddy Surya, et al.
Published: (2012)
by: Gunawan, Teddy Surya, et al.
Published: (2012)
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Who Has the Keys to the Vault? Protecting Secrets on Laptops
by: Armstrong, Helen
Published: (2004)
by: Armstrong, Helen
Published: (2004)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
Advanced IT education for the vision impaired via e-learning
by: Armstrong, Helen
Published: (2009)
by: Armstrong, Helen
Published: (2009)
Mapping Social Media Insider Threat Attack Vectors
by: Armstrong, Colin
Published: (2013)
by: Armstrong, Colin
Published: (2013)
Social network analysis visualization: a Facebook case study
by: Shanmugam, Mohana, et al.
Published: (2015)
by: Shanmugam, Mohana, et al.
Published: (2015)
Networks of nurses: A case study in informal networks of advice
by: Armstrong, H., et al.
Published: (2013)
by: Armstrong, H., et al.
Published: (2013)
Social Networking
by: Issa, Tomayess, et al.
Published: (2016)
by: Issa, Tomayess, et al.
Published: (2016)
Social network
by: Othman, Roslina
Published: (2011)
by: Othman, Roslina
Published: (2011)
Social Networking
by: Issa, Tomayess, et al.
Published: (2016)
by: Issa, Tomayess, et al.
Published: (2016)
A social network analysis on organizational commitment in Malaysia
by: Nur Syahidah, Yusoff, et al.
Published: (2012)
by: Nur Syahidah, Yusoff, et al.
Published: (2012)
10 c’s of social networking, interconnections and
the impact on social networking
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
SmilieFace : an innovative affective messaging application to enhance social networking
by: Hengky
Published: (2013)
by: Hengky
Published: (2013)
A 10 C’s of social networking, interconnections and the impact on social networking
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Social relations network in building civilization
an analysis of its significance
by: Berghout, Abdul Aziz, et al.
Published: (2016)
by: Berghout, Abdul Aziz, et al.
Published: (2016)
Privacy threat analysis of mobile social network data publishing
by: Abawajy, Jemal H., et al.
Published: (2018)
by: Abawajy, Jemal H., et al.
Published: (2018)
Multilevel authentication for social network
by: Wu, Zhia Sheng, et al.
Published: (2018)
by: Wu, Zhia Sheng, et al.
Published: (2018)
Similar Items
-
Organizational risk using network analysis
by: Armstrong, Helen, et al.
Published: (2010) -
Spectral analysis of social networks to identify periodicity
by: McCulloh, Ian, et al.
Published: (2012) -
Towards supply chain excellence using network analysis
by: Alexander, Paul, et al.
Published: (2011) -
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010) -
Social networks content analysis for peacebuilding application
by: Shaikh, Muniba, et al.
Published: (2015)