Healthcare and the Senate Finance Committee

Late last month, the NY Times had an article about the debate over healthcare legislation taking place in the Senate Finance Committee. Coincidentally, around that time, the folks over at LittleSis, the “free database detailing the connections between powerful people and organizations,” were kind enough to give me early access to their API (thanks Kevin and Matthew!).

So from NY Times:

To LittleSis:

namedHealthcareColoredLean

Of the named members in the photo, neither Tom Barthold nor Phil Ellis existed at the time in the LittleSis database, but it’s still showing a pretty networked bunch.

I’d like to see someone do this one better, and include donors.

Mahalo: Violating Network Trust for Fun and Profit?

I occasionally get Twitter replies to random questions I put out there from people I’m not following, but this one had a surprise:

answersNot only did @answers respond, but also included more info. Intriguing. I followed the link. That’s when I furrowed my brow.

The page it took me to demonstrated what I perceive to be a grave violation of network trust: impersonation.

mahellno

The website has a post, in their forum, ostensibly from me — and not just in name only. They refer back to my post where I asked the question.

I don’t want anyone to act in my name without my permission. Creating an account with my name, and referring back to a legitimate source with the same name, sure sounds like impersonation to me. Am I over reacting?  Or is Mahalo violating network trust?

Astroturfing Censured by NY Attorney General

While not networking exactly, this does touch on our predilection to believe others we do not know, if there are enough of them.

New York Attorney General Andrew Cuomo has settled with a plastic surgery company, alleging the firm published phony positive testimonials and Web sites. Lifestyle Lift, associated with Michigan-based Scientific Image Center Management, agreed to pay $300,000 to New York State and stop posting false endorsements of its facial cosmetic surgery services.

[whole story]

I wonder how long until marketers create entire networks of fake people to promote products.  Anyone seen this on Facebook, Myspace, or anywhere?

Statistics::SocialNetworks Perl mod is live!

camelbookStatistics::SocialNetworks has just been uploaded to CPAN, and as it percolates through the system I put forward the question, “What are we going to do with it?”

My goal in getting a module into CPAN is easy access, and a starting point to where we can decide what tools we want, and not have to reinvent them every single time.  There’s good work beginning in R, Python, and probably lots of others, but I’m a Perl-guy and I’d like this to be an open and ongoing discussion.

Included so far, are measurements of the Burt Constraint, and the Coleman-Theil disorder index.

What would you like to see?

P.S. SNA of Iranian Gov’t

Election Influence by 527’s: Browsable Map

I wanted to put out what’s been done so far on making yesterday’s post more interactive. There’s an awful lot that could be better about this map. Particularly legibility of labels in the core (it’s just too dense). If you want to see names, I suggest looking at the edges of the map.

Michael Bommarito is looking into better layouts for legibility. And while you are waiting, I suggest getting your fill of everything he’s ever written.

The data was collected from OpenSecrets.org.

[21-Apr-2009: You should see a flash image above, but am having an awful time getting this to render on a Mac.  Works great on Linux (Red Hat Enterprise Linux).]

Influencing Elections: Network of Expenditures by 527s

OpenSecrets.org is offering free access to their collected data about political contributions, and in that vein, I’ve created a network of expenditures by 527’s*.  I am looking for a way to make this more detailed for your ease of exploration, so please stay tuned.

expends527

*Groups whose primary purpose is to influence elections are exempt from taxation under Section 527 of the Internal Revenue Code.  From NP Action.

Network Analysis Application to Game Theory (with Software)

When will network analysis provide additional insight into game theory? In a word: inequality.

There must be some form of quantifiable inequality in the game: access, strength of relationships, goals, etc.  This difference creates opportunities for the individual players to use information (or resource) asymmetries and broker to their benefit.

unequalrelationships1

On the left all of the arrows representing the relationships have the same weight, representing the same value, in both directions and between all nodes.  On the right, the arrows have different weights between nodes. The greater the inequality, the more effective the application of network analysis.

The relationships depicted could be import/export pairs ($ or volume), contract frequency, or even strength of social relationships. Do not underestimate the potential utility in measuring based on qualitative values, such as strength of relationships. Using them can not only be quite effective, but they can often be much easier to calculate than one might suspect at the onset.  Here’s why.

The analysis method I suggest looks at all of the weights relative to the originating node.  It does not matter whether you can accurately value A’s relationship to B versus B’s relationship to A, as long as you can compare A’s relationship to B versus A’s relationship to C.  From the point of data collection, even an intuitive estimation these comparative values will provide insight. Thus knowing A wants something from B more than A wants the alternative from C, is often sufficient.

Looking at the perspective of access, this is represented in the shape of the network as “holes” or gaps.  There are technical definitions, but it’s usually quicker to understand through an image. Compare:

locationlocationlocationFrom the perspective of the two darker nodes A and B, they clearly have different opportunities to act as brokers based on the holes (or lack thereof) in the network.

Using the two of these together has shown some promising results.

Here is a simplified version of one of the tools I wrote to calculate the opportunity to act as broker based on the value of relationships and the network.  The TAR file contains the simplified program written in Perl, and two sample CSV network files: one similar to each network in the second image. The program relies on a module not yet indexed by CPAN, but is available there.

The calculation is called the network constraint, after Ronald Burt’s work.  The lower the constraint, the larger the opportunity to act as a broker, i.e. perform well in the game based on network structure.

I am in the process of requesting CPAN to host the Perl module, in registered space, so stay tuned.

[for an older version of the code, with some egregious bugs, but all in one place and no extra downloading, get it here]