Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Social network analysis

School of Information Studies - Faculty Scholarship

Articles 1 - 2 of 2

Full-Text Articles in Library and Information Science

What Can Social Networks Tell Us About Learning Ecologies?, Caroline A. Haythornthwaite Nov 2016

What Can Social Networks Tell Us About Learning Ecologies?, Caroline A. Haythornthwaite

School of Information Studies - Faculty Scholarship

The ecology metaphor is drawn from the biological sciences and refers to the “scientific study of the distribution, abundance and dynamics of organisms, their interactions with other organisms and with their physical environment” (British Ecological Society, 2016). In recent decades, the metaphor has become useful for tackling the complexity of new information and learning environments, particularly as driven by the increasing quantity of information, the growing number of available media and means of communicating, the extended reach of information technologies, and the new practices arising from these configurations. This paper brings to the discussion of learning ecologies the research and …


Semantic Analysis For Monitoring Insider Threats, Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilmazel, Robert Del Zoppo, Eric Brown Jan 2004

Semantic Analysis For Monitoring Insider Threats, Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilmazel, Robert Del Zoppo, Eric Brown

School of Information Studies - Faculty Scholarship

Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates the results of social network analysis, role-based access monitoring, and semantic analysis of insiders ’ communications as evidence for evaluation by a risk assessor is being tested on an IC simulation. A semantic analysis, by our proven Natural Language Processing (NLP) system, of the insider’s text-based communications produces conceptual representations that are clustered and compared on the expected vs. observed scope. The determined risk level produces an input to a risk analysis algorithm that is merged with outputs …