Skip to main content

Network Science (2005) / Chapter Skim
Currently Skimming:

Appendix D Questionnaire Data
Pages 65-92

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 65...
... Content of the Questionnaire 1Katy Börner, associate professor, Indiana University, "Mapping the Box D-1 contains the complete online text of the resultexpertise and social network of network science researchers," briefing to ing questionnaire, which was posted as a National Acadthe committee on April 13, 2005. emies of Science (NAS)
From page 66...
... Biochemistry Organizations theory Biology Physics Chemistry (other Political science
From page 67...
... Management Transportation Mathematics Utilities Others (please specify) : Medicine Operations research 1d.
From page 68...
... Please briefly describe specific projects under which you are pursuing these interests. Use either the structured entries below and/or the unstructured text field labeled "Other projects".
From page 69...
... 3d. What are the key research challenges?
From page 70...
... Please indicate using the structured entries below and/or the unstructured text field labeled "Other people to invite". Contact information Name: (website or email)
From page 71...
... the recipient to forward the announcement to other research The committee followed several ancillary processes to ers who might be interested. The solicitation process was offset the limitations of snowball instituted coverage by then continuously iterated, drawing on the responses to iden bringing in additional sources of names throughout the sotify more people -- collaborators, project principal investiga licitation process: literature citation studies, sequential tractors, and so on -- to receive a solicitation.
From page 72...
... came from people stable across all responses obtained when they are partitioned who had been directly invited during the snowballing proby such factors as when in the solicitation process the re- cess; the remaining spontaneous responses are believed to sponse was received, whether the response was directly so- have largely been induced by individuals forwarding the solicited or not, whether a solicitation was generated by snow- licitation note and by its dissemination in online mailing lists balling or from the ancillary sources, which research (see Figure D-1)
From page 73...
... . Analysis of the free-form there is an identifiable field of network science, and of those text entries describing these other fields shows great diverproviding definitions, interests, application, and challenges sity, with the most numerous being engineering, geosciences, were closely comparable.
From page 74...
... . Portugal 2 0.3 Russia 2 0.3 South Africa 1 0.2 DISSENTING VOICES Spain 8 1.3 Sweden 3 0.5 The questionnaire analysis demonstrates that there is a Switzerland 3 0.5 widespread but not universal belief among the respondents United States 497 78.5 Unknown 4 0.6 that there is an identifiable field of network science.
From page 75...
... For example, "The · The term is unclear or has no coherent core. For ex- interesting questions arise from function, rather than ample, "Network science combines two words such topology." These answers agree that there is work that that the resulting pair specifies less information than can be called network science but disagree that devel either individual word alone." oping it as a discipline science will benefit the many · The term reflects a field that is still emerging, so it is other application domains that refer to networks in too early to tell if it will bear substantive results.
From page 76...
... What derived properties or insights arise from overstated in its claims and overused as a justification for the input attributes of the networks being studied? Here other work.
From page 77...
... Mapping is needed in both directions: Information technology 186 32.7 5.28 determining the output properties that arise from specific Internet 178 31.3 5.32 Other 159 28.0 3.91 input attributes, and determining the input attributes that Math 137 24.1 5.51 could be designed into a new network or achieved by interBiology 136 23.9 4.51 vening in an existing network to realize particular output Physics 103 18.1 4.88 properties. If network science is to meaningfully be said to Telecom 98 17.3 5.50 exist, these techniques must be effective throughout many Operations research 90 15.8 5.90 Organization theory 86 15.1 6.21 application domains, with well-understood means to apply Sociology 80 14.1 5.68 the general methods to specific domains.
From page 78...
... nodes only interact through direct link- Ecology 75 95 4 5 0 0 Economics 83 99 1 1 0 0 age; for brevity, these attributes are designated "connectiv Internet 183 96 7 4 0 0 Information technology 196 96 9 4 0 0 Management 74 94 5 6 0 0 Math 149 97 4 3 1 1 Medicine 44 98 1 2 0 0 TABLE D-5 Respondent Affiliations Operations research 106 99 1 1 0 0 Organization theory 94 98 1 1 1 1 Organization Type Responses Other 169 94 9 5 1 1 Physics 110 97 3 3 0 0 University 455 Political science 51 98 0 0 1 2 Other nonprofit 38 Psychology 38 97 1 3 0 0 Industry 46 Public health 43 100 0 0 0 0 Private consultant 18 Public policy 69 99 1 1 0 0 Military 12 Sociology 81 96 2 2 1 1 Other governmental 30 Telecommunications 107 99 1 1 0 0 Other 20 Transportation 41 98 1 2 0 0 TOTAL 619 Utilities 21 91 2 9 0 0
From page 79...
... The structural attributes include the current snapshot of the underlying graph: which nodes are linked to which others. Structural attributes also Unclear, no core Emerging Other field(s)
From page 80...
... depending on which resource exchanges are of interest, so that, for example, the same system might be analyzed as an electrical power distribution network when the resource of Exchange interest is electricity and as a telecommunications network The connection topology exists in order to transport one when the resource is information encoded as bits distributed or more classes of resource between nodes; indeed, a link is over the electric lines. A given network may carry multiple represented as existing between two nodes if and only if re- classes of resource, whose differences are reflected in the sources of significance to the network domain can be di- constraint models that characterize and interrelate the rectly transported from one of the nodes to the other without network's attributes (see below)
From page 81...
... these may be broadly classified as constraint models and In particular, all networks reflect the dynamic conse- problem dimensions. quences of locality, yielding phenomena that appear across the many application domains of network science, such as Constraint Models wavefront effects in the spread of resources and feedback and stability issues due to control delays.
From page 82...
... "Cost" is an abstract term nisms are those exploiting signaling explicitly carried or measuring consumption of resources or decrease in value; implied by components of the resources exchanged. while engineered networks may have cost models that out- Note that the existence of constraint models is an inherent put actual dollar costs (among other penalty factors)
From page 83...
... A social network, for math. When viewed at a level high enough to allow identifi TABLE D-11 Summary Decomposition of the Problem Dimensions of Networks Dimension Structure Dynamics Complexity A high number of nodes, links, resource classes, or rules in High numbers of internal states and transition rules for the the cost models and benefit models.
From page 84...
... cation of shared concerns, the current driving applications Because so few responses were received from outside proved to be closely related to the description of the major academia, no useful conclusions can be drawn about the inresearch challenges (covered in the next section)
From page 85...
... Network science is being applied to distribution Information sharing and discovery channel behavior, such as interpersonal ties within a market Telecommunications or interorganizational ties in a value chain. Smaller but still Biological Public health and disease transmission significant numbers of responses mentioned organization Ecosystem modeling Systems biology models and political applications, ranging from disrupting terrorist networks to supporting prodemocracy organizations Social sciences Social network analysis under authoritarian regimes.
From page 86...
... Many problems involve much larger networks. Examples of members of the committee and respondents to the such networks include cell regulatory networks in questionnaire cited the need to define common con biology, social and economic networks, and computer cepts across the disparate disciplines and applications communication networks (including military com- that are part of network science.
From page 87...
... In the committee's judgment, therefore, the Chapter 6 on the empirical state of the proposed field of pattern constitutes objective evidence that network science network science: is a field that is distinctly interdisciplinary, with research concerns that support multiple application domains. Finding 6-7.
From page 88...
... Hence, these links help to grow the social network of network science researchers locally. Colleagues reported that they tried to "invite" people who were not yet in the data set.
From page 89...
... No. of times mentioned Node label Scholar ID Link color Orange = collaborators Green = invited FIGURE D-2-2 Network science researchers network.
From page 90...
... 90 APPENDIX D BOX D-2 Continued FIGURE D-2-3 Researchers with high BC values (in black) and low BC values (in gray)
From page 91...
... As the field of network science matures, subareas devoted to the study of specific research fields are likely to emerge, and many of the separate components will exhibit collaboration links, weak or strong and temporary or stable. FIGURE D-2-4 Largest component of the NSRN.
From page 92...
... Invite key network science researchers to identify and label the main research groups key shown in Figure D-2-2. ·Bibliometric analysis of networkscience publications, patents, and funding data.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.