Public Datasets


50 Women

Description

The social network data were collected in the Teenage Friends and Lifestyle Study (West and Sweeting 1995, Michell and Amos 1997, Pearson and Michell 2000, Pearson and West 2003). Friendship network data and substance use were recorded for a cohort of pupils in a school in the West of Scotland. The panel data were recorded over a three year period starting in 1995, when the pupils were aged 13, and ending in 1997. A total of 160 pupils took part in the study, 129 of whom were present at all three measurement points. The friendship networks were formed by allowing the pupils to name up to twelve best friends. Pupils were also asked about substance use and adolescent behavior associated with, for instance, lifestyle, sporting behavior and tobacco, alcohol and cannabis consumption. The question on sporting activity asked if the pupil regularly took part in any sport, or go training for sport, out of school (e.g. football, gymnastics, skating, mountain biking). The school was representative of others in the region in terms of social class composition (Pearson and West 2003).

File Downloads

References

Pearson, M.A., and L. Michell. 2000. Smoke Rings: Social network analysis of friendship groups, smoking and drug-taking. Drugs: education, prevention and policy, 7, 21-37.

How to Cite:

Pearson, M.A. & Michell, L. (2000). Pearson, M.A., and L. Michell. 2000. Smoke Rings: Social network analysis of friendship groups, smoking and drug-taking.. Retrieved from https://sites.google.com/site/ucinetsoftware/datasets/50women


Astrophysics

Description

A collaboration network of scientists posting preprints on the astrophysics archive at www.arxiv.org, 1995-1999, as compiled by M. Newman. The network is weighted, with weights assigned as described in the original papers.

File Downloads

References

  • M. E. J. Newman, The structure of scientific collaboration networks, Proc. Natl. Acad. Sci. USA 98, 404-409 (2001).
  • M. E. J. Newman, Scientific collaboration networks: I. Network construction and fundamental results, Phys. Rev. E 64, 016131 (2001).
  • M. E. J. Newman, Scientific collaboration networks: II. Shortest paths, weighted networks, and centrality, Phys. Rev. E 64, 016132 (2001).

How to Cite:

Newman, M.E.J. (2001). The structure of scientific collaboration networks. Proc. Natl. Acad. Sci., USA 98; 404-409. Retrieved from https://sites.google.com/site/ucinetsoftware/datasets/untitledpost


Attiro

Description

In 1948, American sociologists executed a large field study in the Turrialba region, which is a rural area in Costa Rica (Latin America). They were interested in the impact of formal and informal social systems on social change. Among other things, they investigated visiting relations between families living in haciendas (farms) in a neighborhood called Attiro. The network of visiting ties is a simple directed graph: each arc represents "frequent visits" from one family to another. The exact number of visits was not recorded. Line values classify the visiting relation as ordinary (value one), visits among kin (value two), and visits among ritual kin, i.e., between god-parent and god-child.

File Downloads

References

  • Charles P. Loomis, Julio O. Morales, Roy A. Clifford & Olen E. Leonard, Turrialba. Social Systems and the Introduction of Change (Glencoe (Ill.): The Free Press, 1953): p. 43 (Attiro), 45 and 78 (San Juan Sur).
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 3.

How to Cite:

W. de Nooy, A. Mrvar, & V. Batagelj (2004) Exploratory Social Network Analysis with Pajek. Cambridge: Cambridge University Press, Chapter 3. Retrieved from https://sites.google.com/site/ucinetsoftware/datasets/attiro


Autonomous Systems

Description

A symmetrized snapshot of the structure of the Internet at the level of autonomous systems, reconstructed from BGP tables posted at archive.routeviews.org.

File Downloads

How to Cite:

Newman, M. (2006). Autonomous Systems data set [Data set]. Retreived from http://www-personal.umich.edu/%7Emejn/netdata/


The Bernard & Killworth Fraternity

Description

Bernard & Killworth, later with the help of Sailer, collected five sets of data on human interactions in bounded groups and on the actors' ability to recall those interactions. In each study they obtained measures of social interaction among all actors, and ranking data based on the subjects' memory of those interactions. The names of all cognitive (recall) matrices end in C, those of the behavioral measures in B. These data concerns interactions among students living in a fraternity at a West Virginia college. All subjects had been residents in the fraternity from three months to three years. BKFRAB records the number of times a pair of subjects were seen in conversation by an unobtrusive observer (who walked through the public areas of the building every fifteen minutes, 21 hours a day, for five days). BKFRAC contains rankings made by the subjects of how frequently they interacted with other subjects in the observation week.

File Downloads

References

  • Bernard H, Killworth P and Sailer L. (1980). Informant accuracy in social network data IV. Social Networks, 2, 191-218.
  • Bernard H, Killworth P and Sailer L. (1982). Informant accuracy in social network data V. Social Science Research, 11, 30-66.
  • Romney K and Weller S. (1984). Predicting informant accuracy from patterns of recall among individuals. Social Networks, 6, 59-78.

How to Cite:

Bernard, H., Killworth, P., & Sailer, L. (1980). Informant accuracy in social network data IV. Social Networks, 2, 191-218. Retreived from https://sites.google.com/site/ucinetsoftware/datasets/bernardkillworthfraternity


The Bernard & Killworth Ham Radio

Description

Bernard & Killworth, later with the help of Sailer, collected five sets of data on human interactions in bounded groups and on the actors' ability to recall those interactions. In each study they obtained measures of social interaction among all actors, and ranking data based on the subjects' memory of those interactions. The names of all cognitive (recall) matrices end in C, those of the behavioral measures in B. BKHAMB records amateur HAM radio calls made over a one-month period, as monitored by a voice-activated recording device. BKHAMC contains rankings by the operators of how frequently they talked to other operators, judged retrospectively at the end of the one-month sampling period. A value of 0 meaning no interaction up to a maximum of 9.

File Downloads

References

  • Killworth B and Bernard H. (1976). Informant accuracy in social network data. Human Organization, 35, 269-286.
  • Bernard H and Killworth P. (1977). Informant accuracy in social network data II. Human Communication Research, 4, 3-18.
  • Killworth P and Bernard H. (1979). Informant accuracy in social network data III. Social Networks, 2, 19-46.

How to Cite:

Killworth, B., & Bernard, H. (1976). Informant accuracy in social network data. Human Organization, 35, 269-286. Retrieved from https://sites.google.com/site/ucinetsoftware/datasets/bernardkillworthhamradio


Bernard & Killworth Office

Description

Bernard & Killworth, later with the help of Sailer, collected five sets of data on human interactions in bounded groups and on the actors' ability to recall those interactions. In each study they obtained measures of social interaction among all actors, and ranking data based on the subjects' memory of those interactions. The names of all cognitive (recall) matrices end in C, those of the behavioral measures in B. These data concern interactions in a small business office, again recorded by an "unobtrusive" observer. Observations were made as the observer patrolled a fixed route through the office every fifteen minutes during two four-day periods. BKOFFB contains the observed frequency of interactions; BKOFFC contains rankings of interaction frequency as recalled by the employees over the two-week period. The rankings go from 1 for the most frequent to 39 for the least frequent.

File Downloads

References

  • Killworth B and Bernard H. (1976). Informant accuracy in social network data. Human Organization, 35, 269-286.
  • Bernard H and Killworth P. (1977). Informant accuracy in social network data II. Human Communication Research, 4, 3-18.
  • Killworth P and Bernard H. (1979). Informant accuracy in social network data III. Social Networks, 2, 19-46.

How to Cite:

Killworth, B., & Bernard, H. (1976). Informant accuracy in social network data. Human Organization, 35, 269-286. Retrieved from https://sites.google.com/site/ucinetsoftware/datasets/bernardkillworthoffice


Bernard & Killworth Technical

Description

Bernard & Killworth, later with the help of Sailer, collected five sets of data on human interactions in bounded groups and on the actors' ability to recall those interactions. In each study they obtained measures of social interaction among all actors, and ranking data based on the subjects' memory of those interactions. The names of all cognitive (recall) matrices end in C, those of the behavioral measures in B. These data concern interactions in a technical research group at a West Virginia university. BKTECB contains a frequency record of interactions, made by an observer every half-hour during one five-day work week. BKTECC contains the personal rankings of the remembered frequency of interactions in the same period. The rankings go from 1 for the most frequent up to 36 for the least frequent.

File Downloads

References

  • Killworth B and Bernard H. (1976). Informant accuracy in social network data. Human Organization, 35, 269-286.
  • Bernard H and Killworth P. (1977). Informant accuracy in social network data II. Human Communication Research, 4, 3-18.
  • Killworth P and Bernard H. (1979). Informant accuracy in social network data III. Social Networks, 2, 19-46.

How to Cite:

Killworth, B., & Bernard, H. (1976). Informant accuracy in social network data. Human Organization, 35, 269-286. Retrieved from https://sites.google.com/site/ucinetsoftware/datasets/bernardkillworthtechnical


Camp Datasets

Description

These data were collected by Steve Borgatti, Russ Bernard, Bert Pelto and Gery Ryan at the 1992 NSF Summer Institute on Research Methods in Cultural Anthropology. This was a 3 week course given to 14 carefully selected participants. Network data were collected at the end of each week. These data were collected at the end of the second week. The data were collected by placing each person's name on a card and asking each respondent to sort the cards in order of how much interaction they had with that person since the beginning of the course (known informally as camp). This results in rank order data in which a 1 indicates the most interaction while a 17 indicates the least interaction.

File Downloads

How to Cite:

Borgatti, S., Bernard, R., Pelto, B., & Ryan, G. (1992). Camp92 data set [Data set]. Retreived from https://sites.google.com/site/ucinetsoftware/datasets/camp92


Celegansneural

Description

Describes a weighted, directed network representing the neural network of C. Elegans. The data were taken from the web site of Prof. Duncan Watts at Columbia University, http://cdg.columbia.edu/cdg/datasets. The nodes in the original data were not consecutively numbered, so they have been renumbered to be consecutive. The original node numbers from Watts' data file are retained as the labels of the nodes. Edge weights are the weights given by Watts.

File Downloads

References

  • J. G. White, E. Southgate, J. N. Thompson, and S. Brenner, The structure of the nervous system of the nematode C. Elegans, Phil. Trans. R. Soc. London 314, 1-340 (1986).
  • D. J. Watts and S. H. Strogatz, Collective dynamics of `small-world' networks, Nature 393, 440-442 (1998).

How to Cite:

White J.G., Southgate E., Thompson J.N., and Brenner, S. (1986).The structure of the nervous system of the nematode C. Elegans. Phil. Trans. R. Soc., London 314, 1-340. Retrieved from http://cdg.columbia.edu/cdg/datasets.


Centrality Literature

Description

In 1979, Linton Freeman published a paper which defined several kinds of centrality. His typology has become the standard for network analysis. Freeman, however, was not the first to publish on centrality in networks. His paper is part of a discussion which dates back to the 1940s. The network shows the papers that discuss network centrality and their cross- references until 1979. Arcs represent citations; they point from the cited paper to the citing paper.

File Downloads

References

  • Norman P. Hummon, Patrick Doreian, and Linton C. Freeman, Analyzing the structure of the centrality-productivity literature created between 1948 and 1979 (in: Science Communication, 11 (1990), 459-480).
  • W. de Nooy, A. Mrvar, and V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 11.

How to Cite:

Hummon, N.P., Doreian, P., and Freeman, L.C. (1990). Analyzing the structure of the centrality-productivity literature created between 1948 and 1979. Science Communication, 11; 459-480. Retrieved from https://sites.google.com/site/ucinetsoftware/datasets/centralityliteraturenetwork


World Cities and Global Firms

Description

This data consists of the distribution of offices for 46 'global' advanced producer service firms over 55 world cities. Global firms are defined by having offices in at least 15 different cities. World cities are from the GaWC inventory of world cities (see GaWC Research Bulletin 6). Service values for a firm in a city are given as 3, 2, 1 or 0 as defined in Data Set 4.

File Downloads

How to Cite:

ACKNOWLEDGEMENT: The data was created by P.J. Taylor and D.R.F. Walker as part of their project World City Network: Data Matrix Construction and Analysis and are based on primary data collected by J.V. Beaverstock, R.G. Smith and P.J. Taylor (ESRC project The Geographical Scope of London as a World City (R000222050)). They constitute Data Set 6 of the Globalization and World Cities (GaWC) Research Network http://www.lboro.ac.uk/gawc/ publication of inter-city data.


Cond Mat

Description

Collaboration network of scientists posting preprints on the condensed matter archive at www.arxiv.org, 1995-1999, as compiled by M. Newman.

File Downloads

References

  • M. E. J. Newman, The structure of scientific collaboration networks, Proc. Natl. Acad. Sci. USA 98, 404-409 (2001).
  • M. E. J. Newman, Scientific collaboration networks: I. Network construction and fundamental results, Phys. Rev. E 64, 016131 (2001).
  • M. E. J. Newman, Scientific collaboration networks: II. Shortest paths, weighted networks, and centrality, Phys. Rev. E 64, 016132 (2001).

How to Cite:

Newman, M. E. J. (2001). The structure of scientific collaboration networks. Proc. Natl. Acad. Sci., 98;404-409. Retrieved from http://www-personal.umich.edu/~mejn/netdata/


Cond Mat 2003

Description

Updated version of cond-mat data set.

File Downloads

References

  • M. E. J. Newman, Fast algorithm for detecting community structure in networks, Phys. Rev. E 69, 066133 (2004).

How to Cite:

Newman, M. E. J. (2004). Fast algorithm for detecting community structure in networks. Phys. Rev.,69; 066133. Retreived from http://www-personal.umich.edu/~mejn/netdata/


Cond Mat 2005

Description

Updated version of cond-mat data set.

File Downloads

References

  • M. E. J. Newman, The structure of scientific collaboration networks, Proc. Natl. Acad. Sci. USA 98, 404-409 (2001).

How to Cite:

Newman, M. E. J. (2001). The structure of scientific collaboration networks. Proc. Natl. Acad. Sci., 98; 404-409. Retreived from http://www-personal.umich.edu/~mejn/netdata/


Covert Networks

Description

Covert networks datasets (total of 41) compiled by the Mitchell Centre for Social Network Analysis, University of Manchester and funded by a grant from the Leverhulme Trust (RPG-2013-140) http://www.socialsciences.manchester.ac.uk/mitchell-centre/research/covert-networks

A covert network is a social network which has one or many elements of secrecy about it. Network members may try to keep their identities secret (as with criminal or terrorist organizations); the network may form around activities which have to be kept secret because they are illegal or dangerous (such as covert social movements like the Suffragettes), or for other reasons.

File downloads

  • 17 November Greece Bombing

    The dataset refers to the 17 November Revolutionary Organixation, a Marxist urban guerrilla organization operating in Greece. The data refers to the specific temporal window which runs from 1975 to 2002. During these years the group has been responsible for several violent acts such as assassinations, kidnappings and symbolic attacks on government offices. The original file presents a distinction among several types of relationships: 1. Acquaintances/Distant family ties (interactions limited to radical organisation activities), 2. Friends/Moderately close family ties (interactions extend beyond radical organizations to include such categories as co-workers and roommates); Operational/Organisational leadership (i.e. JI leadership, formally or informally ranking members of burgeoning cells); Operational Ties (i.e. worked closely on a bombing together). 3. Close Friends/Family, Tight-knit operational cliques (would die for each other). If one of these three types of relationships was present, it has been coded with 1.
    File Downloads: greece.zip
    How to Cite: John Jay & ARTIS Transnational Terrorism Database (2016). 17 November Greece Bombing data set [Data set]. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/data.php.
  • 9/11 Hijackers

    Famous dataset of the terrorists involved in the 9/11 bombing of the World Trade Centres in 2001. Data was extracted from news reports and ties range from at school with to on same plane. Ties are undirected and binary. Relations are a mix of prior-contacts like trained together, lived together, financial transactions, at school with, on same flight.
    Attribute codes:
    • Network Strength; 1 = Trusted Prior Contacts, 2 = Other Associates
    • Ties; 1 = AA #11 WTC North, 2 = AA #77 Pentagon, 3 = UA #93 Pennsylvania, 4 = UA #175 WTC South, 5 = Other Associates
    • Las Vegas Meeting; 1 = Attended, 0 = Did Not Attend

    File Downloads: 9_11_hijackers.xml (Dynetml)
    Reference: Krebs, Valdis E. Mapping networks of terrorist cells. Connections 24.3 (2002): 43-52.
    How to Cite: Krebs, Valdis E. (2002). Mapping networks of terrorist cells. Connections 24.3: 43-52. Retrieved from: http://firstmonday.org/ojs/index.php/fm/article/view/941/863#fig4.
  • Australian Embassy Bombing, Indonesia 2004

    This is a time series that treat specific attacks as endpoints and depict the evolution of relations between individuals indirectly and directly associated with the Australian Embassy bombing. http://en.wikipedia.org/wiki/2004_Australian_Embassy_bombing_in_Jakarta. 1-mode stacked matrices 27 x 27 person by person. Data for 11 time periods plus kinship data. Undirected, valued ties.
    File Downloads: AE_INDO.zip
    How to Cite: John Jay & ARTIS Transnational Terrorism Database (2016). Austrailian Embassy Bombing data set [Data set]. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/data.php.
  • Baerveldt Dutch Deliquents

    This data set is about the evolution of a friendship network and delinquent behavior of pupils in school classes, collected in the Dutch Social Behavior study, a two-wave survey in classrooms (Houtzager and Baerveldt, 1999). These data are from classrooms of the MAVO track, the lower middle level of the Dutch secondary school system, in which the pupils filled in a questionnaire in the 3d and 4th years, with about one year in between.
    File Downloads: dutch.xml (Dynetml)
    References:
    • Houtzager, B. & Baerveldt, C. (1999). Just like Normal. A Social Network Study of the Relation between Petty Crime and the Intimacy of Adolescent Friendships. Social Behavior and Personality 27(2), 177-192.
    • Snijders, Tom A.B, and Baerveldt, Chris (2003). A Multilevel Network Study of the Effects of Delinquent Behavior on Friendship Evolution. Journal of Mathematical Sociology 27, 123-151.
    • Chris Baerveldt, Beate Volker, and Ronan Van Rossem (2008). Revisiting selection and influence: an inquiry into the friendship networks of high school students and their association with delinquency. Canadian Journal of Criminology and Criminal Justice, 50, 559-587. http://dx.doi.org/10.3138/cjccj.50.5.559

    How to Cite: Houtzager, B. & Baerveldt, C. (1999). Just like Normal. A Social Network Study of the Relation between Petty Crime and the Intimacy of Adolescent Friendships. Social Behavior and Personality 27(2), 177-192. Retrieved from: https://www.stats.ox.ac.uk/~snijders/siena/BaerveldtData.html
  • Bali Bombing 2002/Jemaah Islamiyah

    This is a time series that treat specific attacks as endpoints and depict the evolution of relations between individuals indirectly and directly associated with the 2002 Bali bombing by Jemaah Islamayah. http://en.wikipedia.org/wiki/2002_Bali_bombings. 1-mode stacked matrices 27 x 27 person by person, data for 11 time periods. Ties are undirected and valued. Tie codes: 0 = No relation; 1 = Acquaintances/distant family ties (interaction limited to radical organisation activities); 2 = Friends/Moderately close family (inc co-workers/ roommates) Operational/Org leadership/Operational lies (e.g. worked closely on a bombing together); 3 = Close friends/family, tight-knit operational cliques.
    File Downloads: bali2002.zip
    How to Cite:
  • Bali Bombing 2005

    This is a time series that treat specific attacks as endpoints and depict the evolution of relations between individuals indirectly and directly associated with the 2005 Bali bombing by Jemaah Islamayah. http://en.wikipedia.org/wiki/2005_Bali_bombings 1-mode matrix 27 x 27 person by person, data for 11 time periods. Ties are undirected and valued. Tie codes: 0 = No relation; 1 = Acquaintances/distant family ties (interaction limited to radical organisation activities); 2 = Friends/Moderately close family (inc co-workers/ roommates) Operational/Org leadership/Operational lies (e.g. worked closely on a bombing together); 3 = Close friends/family, tight-knit operational cliques.
    File Downloads: bali2005.zip
    How to Cite:
  • Baseball Steroid Use

    When the Mitchell Report on steroid use in Major League Baseball [MLB], was published people were surprised at both the number and names of those who were mentioned. The dataset was created from data found in the Mitchell Report. Baseball players are shown as green nodes. Those who were found to be providers of steroids and other illegal performance enhancing substances appear as red nodes. The links reveal the flow of chemicals -- from providers to players. See http://orgnet.com/steroids.html
    File Downloads: baseball.zip
    How to Cite: Mitchell, George J. (2007). Mitchell Report: Report to the Commissioner of Baseball of an Independent Investigation into the Illegal use of Steroids and Other Performance Enhancing Substances by Players in Major League Baseball. Retreived from: http://orgnet.com/steroids.html.
  • Big Allied and Dangerous (BAAD)

    The Big Allied And Dangerous (BAAD) project focuses on creation and maintenance of a comprehensive database of terrorist organizational characteristics. This project has created two datasets. The first, BAAD Version 1.0 (BAAD1) contains a single snapshot of 395 terrorist organizations active (meaning they perpetrated at least one attack) between 1998-2005. This dataset grew from the information originally hosted by the Memorial Institute for the Prevention of Terrorism's (MIPT) in their Terrorism Knowledge Base (TKB). BAAD1 improved and extended the data available from MIPT through independent verification and coding efforts. The dataset includes both case-by-variables information on each organization and network data. The case-by-variables dataset is available for download currently. The network data will be available for download during the second quarter of 2010. Big Allied and Dangerous, Version 2.0 (BAAD2) seeks to improve upon BAAD1 in multiple ways by (1) providing time series data in yearly slices, (2) expanding the time period forward through 2007, and (3) increasing the number and depth of variables collected and coded. BAAD2 is made up of two major components. The first is the data on organizational variables. These variables include: group name, aliases, homebase, ideology, size, age, structure, financial support, electoral involvement, leadership loss, territorial control, CBRN pursuit or use, and number of incidents, injuries, and fatalities. The second component is the social network data, which characterizes relations between terrorist organizations as well as between countries and terrorist organizations. Relationships are coded for categories such as: suspected ally, ally, faction, splinter group, rival, enemy, target, and state sponsor. This data can then be used to create dynamic network visualizations to show the networks evolving over the 10 years included in the dataset. Data construction for BAAD2 is currently ongoing.
    File Downloads: baad.zip
    References: Asal, Victor H. and R. Karl Rethemeyer. (2008). The Nature of the Beast: Terrorist Organizational Characteristics and Organizational Lethality. Journal of Politics, 70(2): 437-449.
    How to Cite: Asal, Victor H. and R. Karl Rethemeyer. (2008). The Nature of the Beast: Terrorist Organizational Characteristics and Organizational Lethality. Journal of Politics, 70(2): 437-449. Retreived from: http://www.albany.edu/pvc/data.shtml.
  • Caviar

    Project Caviar was a unique investigation that targeted a network of hashish and cocaine importers operating out of Montreal. The network was targeted between 1994 and 1996 by a tandem investigation uniting the Montreal Police, the Royal Canadian Mounted Police, and other national and regional law-enforcement agencies from various countries (i.e., England, Spain, Italy, Brazil, Paraguay, and Colombia). The case is unique because it involved a specific investigative approach that will be referred to as a seize and wait strategy. Unlike most law-enforcement strategies, the mandate set forward in the Project Caviar case was to seize identified drug consignments, but not to arrest any of the identified participants. This took place over a 2-year period. Thus, although 11 importation consignments were seized at different moments throughout this period, arrests only took place at the end of the investigation. What this case offers is a rare opportunity to study the evolution of a criminal network phenomenon as it was being disrupted by law-enforcement agents. The inherent investigative strategy permits an assessment of change in the network structure and an inside look into how network participants react and adapt to the growing constraints set upon them. The principal data source was comprised of information submitted as evidence during the trials of 22 participants in the Caviar network. It included 4,279 paragraphs of information (over 1,000 pages) revealing electronically intercepted telephone conversations between network participants. These transcripts were used to create the overall matrix of the drug-trafficking operation's communication system throughout the course of the investigation. Individuals falling in the surveillance net were not all participants in the trafficking operation. An initial extraction of all names appearing in the surveillance data led to the identification of 318 individuals. From this pool, 208 individuals were not implicated in the trafficking operations. Most were simply named during the many transcripts of conversations, but never detected. Others who were detected had no clear participatory role within the network (e.g., family members or legitimate entrepreneurs). The final network was thus composed of 110 participants. Ties are communication exchanges between criminals. Values represent level of communication activity. Data comes from police wiretapping.
    File Downloads: caviar.zip
    References: Morselli, C., 2009. Inside criminal networks. New York: Springer.
    How to Cite: Morselli, C. (2009). Inside criminal networks. New York: Springer. Available from: http://www.springer.com/social+sciences/criminology/book/978-0-387-09525-7.
  • Christmas Eve Bombings Indonesia 2000

    This is a time series that treat specific attacks as endpoints and depict the evolution of relations between individuals indirectly and directly associated with the 2000 Christmas Eve bombing. DATA: 1-mode stacked matrices 27 x 27 person by person. Data for 11 time periods plus kinship data. Undirected, valued ties. Tie value codes for kinship matrix: 0 = No Kinship // 1 = In-laws // 2 = Cousins // 3 = Sibling // 4 = Parent/Child // 5 = Married // 6 = Grandparent/Child // 7 = Significant Other
    Tie value codes for time series matrices: 0 = No relation // 1 = Acquaintances/distant family ties (interaction limited to radical organisation activities) // 2 = Friends/Moderately close family (inc co-workers/ roommates) Operational/Org leadership/Operational lies (e.g. worked closely on a bombing together) // 3 = Close friends/family, tight-knit operational cliques http://en.wikipedia.org/wiki/Christmas_Eve_2000_Indonesia_bombings
    File Downloads: christmas.zip
    How to Cite: John Jay & ARTIS Transnational Terrorism Database (2000). Christmas Eve Bombings Indonesia [Data set]. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/data.php.
  • CielNet

    Project Ciel is based on a small drug-importation network that was importing liquid hashish from Jamaica to Montreal. This network was targeted by the Royal Canadian Mounted Police and the Montreal Police from May 1996 to June 1997. Typical of many Canadian investigations of drug smuggling and trafficking, the operations in Project Ciel were described as taking place within a tightly governed organizational framework hierarchy, in short. Reports from the investigation maintained that the main target of the investigation was the organizational leader. Other key targets included the leaders lieutenant and a series of other subordinates. The investigation produced three separate seizures, with two taking place at Mirabel airport near Montreal and another occurring at Sangster airport in Jamaica. Overall, 75 people fell into the surveillance net. A selection process that was aimed at identifying only those individuals who were active in the drug-importation operations resulted in a final network of 25 participants.
    File Downloads: cielnet.zip
    References: Morselli, C., 2009. Inside criminal networks. New York: Springer.
    How to Cite: Morselli, C. (2009) Inside criminal networks. New York: Springer. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/cielnet.
  • Cocaine Dealing Natarajan

    This dataset comes from an investigation into to a large cocaine trafficking organization in New York City. DATA: 1-mode matrix 28 x 28 persons by persons. Directed binary relations are communications exchanges / flows of information. Data come from police wiretappings (transcripts of 151 telephone conversations).
    File Downloads: dealing.zip
    References: Natarajan, M. (2006). Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data. Quantitative Journal of Criminology, 22(2), 171-192.
    How to Cite: Natarajan, M. (2006). Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data. Quantitative Journal of Criminology, 22(2), 171-192. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/cocainedealingnatarajan.
  • Cocaine Smuggling

    Data refers to four groups involved in cocaine trafficking in Spain. Information comes from police wiretapping and meetings registered by police investigations of these criminal organisations between 2007 and 2009. Operation MAMBO (N=22). The investigation started in 2006 and involved Colombian citizens that were introducing 50 kg of cocaine to be adulterated and distributed in Madrid (Spain). Ultimately, the group was involved in smuggling cocaine from Colombia through Brazil and Uruguay to be distributed in Spain. This is a typical Spanish middle cocaine group acting as wholesale supplier between a South American importer group and retailers in Madrid. Operation JUANES (N=51). In 2009, the police investigation detected a group involved in the smuggling of cocaine from Mexico to be distributed in Madrid (Spain). In this case, the group operated in close cooperation with another organization that was laundering the illegal income from drug distribution from this and other groups. The cocaine traffickers earned an estimated EUR 60 million. Operation JAKE (N=62). In 2008, the group investigated was operating as a wholesale supplier and retail distributor of cocaine and heroin in a large distribution zone located in Madrid (Spain), where gypsy clans traditionally carry out similar activities. The group was in charge of acquiring, manipulating and selling the drugs in the gypsy quarter. Operation ACERO (N=11). This investigation started in 2007 and involved a smaller family-based group. The group was composed mainly of members of a same family and was led by a female. They distributed cocaine in Madrid (Spain) that was provided to them by other groups based in a northwest region of the country, one of the most active areas in the provision of cocaine from the countries of origin. The group also had their own procedures to launder money.
    File Downloads: smuggling.zip
    References: Jimenez-Salinas Framis, A. Illegal networks or criminal organizations: Power, roles and facilitators in four cocaine trafficking structures. In Third Annual Illicit Networks Workshop, Montreal. 2011.
    How to Cite: Jimenez-Salinas Framis, A. (2011). Illegal networks or criminal organizations: Power, roles and facilitators in four cocaine trafficking structures. In Third Annual Illicit Networks Workshop, Montreal. 2011. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/cocainesmuggling.
  • Czech Corruption

    The data comes from a Czech media database called Newton Media Search and involves all major Czech newspapers for the period from 4th June 2013 to 4th June 2014. DATA: 1-mode matrix 16 x 16 person by person. The ties are co-appearances every time an actor was mentioned in one article together with any other actor, it is considered to be a tie. Ties are valued on am 11 point scale, where 10 is the strongest tie (Nagyova - Necas). All other ties were transformed by dividing the total number of co-appearances between the two actors by the value of the strongest tie, which gave the percent of the maximal tie. This percentage was then assigned an integer value from range 0 - 9 according to which tenth of percents this particular value falls into.
    File Downloads: czech.zip
    How to Cite: Diviák, Tomas (2014). Czech Corruption data set [Data Set]. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/czechcorruption.
  • Domestic Terrorist Web Links

    Network of hyperlinks between domestic terrorist group websites in the United States.
    File Downloads: weblinks.zip
    How to Cite: Zhou et al. (2005). US domestic extremist groups on the web: link and content analysis. Retrieved from: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1511999&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1511999.
  • Global Suicide Attacks

    Data is on militant organizations between 1985 and 2006. Each node signifies a militant organization or other type of entity that conducts suicide attacks.
    File Downloads: suicide.zip
    References: Benjamin Acosta & Steven J. Childs (2013) Illuminating the Global Suicide-Attack Network, Studies in Conflict & Terrorism, 36:1, 49-76
    How to Cite: Acosta, Benjamin & Childs, Steven J. (2013) Illuminating the Global Suicide-Attack Network, Studies in Conflict & Terrorism, 36:1, 49-76. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/globalsuicideattacks.
  • Hamburg Cell 9/11 2001

    This is a time series that treat specific attacks as endpoints and depict the evolution of relations between individuals indirectly and directly associated with the sleeper Al Qaeda cell in Hamburg around the time of the 9/11 bombings. http://en.wikipedia.org/wiki/Hamburg_cell
    File Downloads: hamburg.zip
    How to Cite: John Jay & ARTIS Transnational Terrorism Database (2001). Hamburg Cell 9/11 [Data set]. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/data.php.
  • Heroin Dealing Natarajan

    This dataset comes from an investigation into a large heroin trafficking organization in New York City in the 1990s. Directed binary relations are communications exchanges / flows of information. Data come from police wiretappings (transcripts of 151 telephone conversations).
    File Downloads: heroin.zip
    How to Cite:Available from Manchester. Reconstructed from Natarajan, M. (2006). Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data. Quantitative Journal of Criminology, 22(2), 171-192.
  • Islamic State Allegiances

    2-mode dataset describing groups allied to Islamic State and the countries in which they are operating. 2-mode matrix 47 x 20 organizations by state, undirected binary ties.
    File Downloads: allegiances.zip
    How to Cite: Availble from: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/islamicstateallegiances.
  • Islamic State Group

    The data describes relationships between members of the Islamic State supplied to the BBC by IS investigation team. The data includes three matrices with three types of relationships.
    File Downloads: islamicgroup.zip
    How to Cite: UK paying experts to build Islamic State war crimes case, BBC News, September 3, 2014. Available from: http://www.bbc.co.uk/news/world-middle-east-29052475.
  • Italian Gangs

    Describes Italian gang members and their nationalities. No further contextual data available. 1-Mode matrix 67x67 person by person, relations are co-membership of gangs. Attribute data is gang member's country of origin, coded numerically. No codebook available.
    File Downloads: italiangangs.zip
  • Jakarta Bombing 2009 / Noordin Top

    This is a time series that treat specific attacks as endpoints and depict the evolution of relations between individuals indirectly and directly associated with the 2009 Jakarta bombing. http://en.wikipedia.org/wiki/2009_Jakarta_bombings. This network draws on the same terrorist activities as the Noordin Top network. DATA: 1-mode stacked matrices, 28 x 28 person by person, data for kinship, pre-attack and post-attack. Ties undirected and valued.
    File Downloads: jakarta2009.zip
    How to Cite: John Jay & ARTIS Transnational Terrorism Database (2009). Jakarta Bombing 2009 [Data set]. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/data.php.
  • Linux Terrorists

    These are two datasets about a set of terrorists and the attacks they carry out collected by the MIND Lab at University of Maryland (UMD) (http://www.mindswap.org/). NETWORK DATA: 1-mode matrix 645 x 645 organization by organization, directed ties. Ties are co-location of terrorist attacks. 1-mode matrix 260 x 260 organization by organization, directed ties. Ties are co-located terrorist attacks by same organization.
    File Downloads: linux.zip
    How to Cite: University of Maryland, MIND lab. Linux Terrorists [Data set]. Retrieved from: http://www.mindlab.umd.edu/index.shtml.
  • London Gang

    Data is on co-offending in a London-based inner-city street gang, 2005-2009, operating from a social housing estate. Data comes from anonymised police arrest and conviction data for all confirmed members of the gang. 1-Mode matrix 54 x 54 persons by persons, undirected, valued. Network tie values:1 (hang out together); 2 (co-offend together); 3 (co-offend together, serious crime); 4 (co-offend together, serious crime, kin).Attributes: Age, Birthplace (1 = West Africa, 2= Caribbean, 3= UK, 4= East Africa), Residence, Arrests, Convictions, Prison, Music.
    File Downloads: london.zip
    How to Cite: Grund, T. and Densley, J. (2015) Ethnic Homophily and Triad Closure: Mapping Internal Gang Structure Using Exponential Random Graph Models. Journal of Contemporary Criminal Justice, Vol. 31, Issue 3, pp. 354-370
  • Madoff Fraud

    Bernie Madoff was involved in a massive financial fraud in the USA and was sentenced to 150 years in prison (http://en.wikipedia.org/wiki/Bernard_Madoff). The network is finance flows between financial institutions and Madoff's firm. All data for this network was gathered from news stories and court documents found on major media web sites. Read more about the social network underpinnings of this scheme in The Network Thinkers blog post (http://www.thenetworkthinkers.com/2009/02/madoff-feeder-funds.html). Relations are money flows. Arrows show direction of money flow. DATA: 1-mode directed network 61 x 61 firm by firm, showing money flows between banks and other organizations, leading ultimately to Madoff's firm.
    File Downloads: madoff.zip
    How to Cite: OrgNet. Madoff Fraud [Data set]. Retrieved from: http://orgnet.com/Madoff9.png.
  • Madrid Train Bombing 2004

    This is a time series that treat specific attacks as endpoints and depict the evolution of relations between individuals indirectly and directly associated with the Madrid train bombing. http://en.wikipedia.org/wiki/2004_Madrid_train_bombings
    File Downloads: madrid.zip
    How to Cite: John Jay & ARTIS Transnational Terrorism Database (2004). Madrid Train Bombing 2004 [Data set]. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/data.php.
  • Mali Terrorist Network

    Data refers to a terrorist network operating in the Sahel Sahel-Sahara region and describes relationships between Islamists and Tuareg rebels during the Malian conflict. Data comes from a selection of newspaper articles published between 2010 and 2012. Using social network analysis, our first aim is to illuminate the relationships between the Islamists and the rebels involved in the current Malian conflict. We use a selection of newspaper articles to demonstrate that the connection between Islamists and rebels depends on brokers who passed from the Tuareg rebellion to radical groups. Our second objective is to detail the internal relationships within each of the subgroups. Our findings show how Islamists were affected by the accidental disappearance of one the AQMI regional emirs and how the death of one of the architects of the Tuareg rebellion affected rebel cohesion. Walther et al., INSNA Sunbelt Conference 2013. Relations derived from interactions, including participation in political or military event, political meetings; trainings in Afghanistan, Iraq, or Libya; combats; negotiations for hostage releases; or involvements with a killing, an abduction, or a bombing.
    File Downloads: mali.zip
    How to Cite: Walther, Olivier J., and Dimitris Christopoulos (2015), Islamic terrorism and the Malian rebellion. Terrorism and Political Violence, 27 (3), 497-519.
  • Montreal Street Gangs

    Data obtained from the Montreal Police's central intelligence base, the Automated Criminal Intelligence Information System (ACIIS), was used to reconstruct the organization of drug-distribution operations in Montreal North. These operations were targeted during three separate investigations between 2004 and 2007 by the Montreal Police, who believed that the criminal activities were under the control of one of the more reputed gangs in Montreal - the Bo-Gars (or Handsome Boys, in English). Because the trials extending from two of the investigations were still ongoing at the time of analysis, their names remain confidential and I simply refer to Investigations A, B, and C. Investigation A began in February 2004 and ended in April 2005, with the arrests of 27 individuals who were accused primarily of importing and distributing crack and cocaine in a Montreal North neighborhood. Investigation A was the largest of the three investigations under study and it was the only case to offer electronic surveillance information amongst the available data sources. Investigations B and C, which were direct extensions of observations made during Investigation A, both began during the fall of 2006 and ended in June 2007, with the arrests of 24 individuals who were targeted in Investigation B and 11 individuals targeted in Investigation C. Investigation B concentrated on street dealers of marijuana and crack, while Investigation C focused specifically on the activities of a group of wholesalers who were supplying some of the dealers targeted in Investigation B. Overall, 101 individuals were monitored during the investigations-45 in Investigation A, 30 in Investigation B, and 26 in Investigation C. This list of 101 individuals was used as a starting point to reconstruct the final network. This final network was comprised of 70 participants and was based on information obtained from three data sources. Ties are relationships between gangs (as reported in focus groups/interviews with gang members).
    File Downloads: montreal.zip
    How to Cite: Karine Descormiers and Carlo Morselli (2011) Alliances, Conflicts, and Contradictions in Montreal's Street Gang Landscape International Criminal Justice Review, Vol. 1 No. 3, pp. 297-314.
  • Ndrangheta Mafia 2

    Data is on attendance of suspected members of the Ndrangheta criminal organization at summits (meetings whose purpose is to make important decisions and/or affiliations, but also to solve internal problems and to establish roles and powers) taking place between 2007 and 2009. Attendance at events have been registered by police authorities through wiretapping and observations during the large investigation called Operazione Infinito.
    File Downloads: ndrangheta.zip
    How to Cite: The data has been reconstructed by the document ORDINANZA DI APPLICAZIONE DI MISURA COERCITIVA con mandato di cattura - art. 292 c.p.p. which is available online at the following address http://www.stampoantimafioso.it/documentazione-antimafia/ordinanze/.
  • Noordin Top

    These data were drawn primarily from Terrorism in Indonesia: Noordin's Networks, a publication of the International Crisis Group (2006) and include relational data on the 79 individuals listed in Appendix C of that publication. The data were initially coded by Naval Postgraduate School students as part of the course Tracking and Disrupting Dark Networks under the direction of Professor Sean Everton, Co-Director of the CORE Lab, and Professor Nancy Roberts. CORE Lab Research Assistant Daniel Cunningham reviewed and cleaned all coding made by students. Ties include classmates; friendship; soulmates; co-location of logistical activity; co-attendance at meetings; co-participation in operations; co-attendance at training events; communications; business & financial ties.
    File Downloads: noordintop.zip
    How to Cite: Roberts, Nancy and Sean F. Everton (2011), Roberts and Everton Terrorist Data: Noordin Top Terrorist Network (Subset). Retrieved from https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/noordintop.
  • Paul Revere

    The Paul Revere conspiracy dataset concerns relationships between 254 people and their affiliations with seven different organizations in Boston. The dataset refers to Paul Revere, who was responsible for organizing a local militia of Boston's revolutionary movement (see http://en.wikipedia.org/wiki/Sons_of_Liberty). The dataset was analysed by Kieran Healy of Duke University. This dataset has been reconstructed by looking at the information presented in the appendix of the book Paul Revere's Ride published by David Fischer (1994).
    File Downloads: paulrevere.zip
    How to Cite: Fischer, D. (1994), Paul Revere's ride, Oxford University Press. Retrieved from: http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/.
  • Philippine Kidnappings

    Data refers to the Abu Sayyaf Group (ASG), a violent non-state actor operating in the Southern Philippines. In particular, this data is related to the Salast movement that has been founded by Aburajak Janjalani, a native terrorist of the Southern Philippines in 1991. ASG is active in kidnapping and other kinds of terrorist attacks (Gerdes et al. 2014). The reconstructed 2-mode matrix combines terrorist kidnappers and the terrorist events they have attended.
    File Downloads: kidnappings.zip
    How to Cite: Gerdes, Luke M., Kristine Ringler, and Barbara Autin (2014). Assessing the Abu Sayyaf Group's Strategic and Learning Capacities. Studies in Conflict & Terrorism 37, no. 3: 267-293. Retreived from: http://www.tandfonline.com/eprint/cCV3RJihmG3miPFECpV7/full.
  • Philippines Bombing

    This is a time series that treat specific attacks as endpoints and depict the evolution of relations between individuals indirectly and directly associated with the Philippines bombing http://en.wikipedia.org/wiki/Rizal_Day_bombings. DATA: 1-mode stacked matrices 16 x 16 person by person nodes, data on 11 time periods plus kinship data and tie extinguished data.
    File Downloads: philippines_bombing.zip
    How to Cite: John Jay & ARTIS Transnational Terrorism Database (2000). Phillippines Bombing [Data set]. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/data.php..
  • Provisional Irish Republican Army

    Data is on active Provisional IRA (hereafter PIRA) members between 1970 and 1998. Data collected at the International Center for the Study of Terrorism, Pennsylvania State University. From this data are derived network structures and the nature of dependence within them. The PIRA network comprises the following four types of relationships: (1) involvement in a PIRA activity together, (2) friends before joining PIRA movement, (3) blood relatives, and (4) related through marriage. We treated each relation as a tie and coded whether a tie exists between two members or not. Thus, the networks have, conceptually and technically, binary and symmetric relations between members. Data also includes sociological information of members, such as gender, age, marital status, recruiting age, education (that is, attending university), brigade memberships, non-/violent characteristics, role-related characteristics - senior leader, IED constructor, IED planter, and gunman-and task-related characteristics (that is, foreign operation tasks, and involvement in bank robbery, kidnapping, hijacking, and drugs).
    File Downloads: irish_army.zip
    How to Cite: Paul Gill , Jeongyoon Lee , Karl R. Rethemeyer , John Horgan & Victor Asal (2014) Lethal Connections: The Determinants of Network Connections in the Provisional Irish Republican Army, 1970 – 1998, International Interactions: Empirical and Theoretical Research in International Relations, 40:1, 52-78.
  • Rhodes Bombing

    Data is a social network of the (believed defunct) Greek terrorist group November17 (N17) that was derived from open source reporting (Irwin et al, 2002; Abram and Smith, 2004).
    File Downloads: rhodes.zip
    How to Cite: Rhodes, C.J. and P. Jones, Inferring Missing Links in Partially Observed Social Networks, Journal of the Operational Research Society (2009) 60, 1373-1383.
  • Saxena Terror India

    Data is organisation-to-organisation links of terrorist organisations operating in the Indian State of Jammu & Kashmir.
    File Downloads: saxena.zip
    How to Cite: Sudhir Saxena, K. Santhanam, Aparna Basu (2004), Application of social network analysis (SNA) to terrorist networks in Jammu & Kashmir, Strategic Analysis 28(1).
  • Siren

    Project Siren began in February 1998 when a port worker informed members of the CERVO group that a container of stolen vehicles had been recently shipped to Ghana. This shipment was subsequently seized at its transit point in Anvers, Belgium. This initial tip and action led to a close monitoring of the suspects involved in the shipment. The investigation continued for 4 months (to June 1998), during which time CERVO members monitored stolen-vehicle shipments intended for Russia, Egypt, Iraq, Italy, and Switzerland. Some vehicles were also resold in Toronto. Overall, 35 cars were retrieved according to the files that were consulted.
    File Downloads: siren.zip
    How to Cite: Morselli, C., 2009. Inside criminal networks. New York: Springer. Retrieved From: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/siren.
  • Slumlords

    A client of [orgnet] -- a small, not-for-profit, economic justice organization [EJO] -- used social network analysis [SNA] to assist their city attorney in convicting a group of slumlords of various housing violations that the real estate investors had been side-stepping for years. The housing violations, in multiple buildings, included raw sewage leaks, multiple tenant children with high lead levels, eviction of complaining tenants, utility liens of six figures.
    File Downloads: slumlords.zip
    How to Cite: OrgNet. Slumlords [Data set]. Retrieved from: http://www.orgnet.com/slumlords.html.
  • Southeast Asian Aggregated Attacks 2005

    The Southeast Asian Aggregate Attack Series collapses all of the individual, Indonesian cases into a single series of relations useful for inspecting a series of behavioural and compositional changes in one terrorist network. DATA: 1-mode stacked matrices 109x109 person by person. Kinship, friendship, acquaintanceship, time series, tie formed, tie ended.
    File Downloads: asian_attacks_05.zip
    How to Cite: John Jay & ARTIS Transnational Terrorism Database (2005). Southeast Asian Aggregated Attacks 2005 [Data set]. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/data.php.
  • Suffragettes

    Dataset collected by Gemma Edwards on the Suffragette movement in the UK. Relational data were constructed from historical archives, including suffragette letters and speeches, and secondary sources like published auto-biographies and newspaper accounts. This historical material provided not only relational data for quantitative network analysis about the structure of these networks, but rich, narrative accounts about the meaning of ties over time and the perception of the network from those within it. Using historical letters as a source of data on suffragette networks was seen as particularly useful for example, as letters contained relational data in terms of 'who was writing to whom', and writers would further 'talk their ties' within the course of letter writing. Also, letters tend to be dated, allowing for an analysis of the evolution of ties over time (Edwards and Crossley 2009).
    File Downloads: suffragettes.zip
    References:
    • Edwards, Gemma. Infectious innovations? The diffusion of tactical innovation in social movement networks, the case of suffragette militancy. Social Movement Studies 13.1 (2014): 48-69.
    • Edwards, Gemma. Social Movements and Protest. Cambridge University Press, 2014.
    • Crossley, Nick, et al. Covert social movement networks and the secrecy-efficiency trade off: The case of the UK suffragettes (1906–1914). Social Networks 34.4 (2012): 634-644.
    How to Cite: Edwards, G. and Crossley, N. (2009). Measures and meanings: exploring the ego-net of Helen Kirkpatrick Watts, militant suffragette. Methodological Innovations Online 4.1: 37-61. Retrieved from: http://eprints.ncrm.ac.uk/842/1/Social_Network_analysis_Edwards.pdf.
  • Swingers

    Data on couples attending swinging parties. Swing units are a couple attending events with other swing units.
    File Downloads: swingers.zip
    How to Cite: Anne-Marie Niekamp. swingers data set [Data set]. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/swingers.
  • Togo

    Project Togo began in February 1998 when a Toronto-based ringing operation was dismantled and one of its participants informed the police that he was previously employed by a Montreal businessman who was also active in the resale of stolen vehicles. This initial tip was corroborated soon after by a thief who had been arrested while driving a stolen vehicle. By December 1998, the Togo investigation was under way. It spanned into February 1999 and 20 cars that were destined for France, Ghana, and local buyers in southern Quebec were retrieved.
    File Downloads: togo.zip
    How to Cite:Morselli, C., 2009. Inside criminal networks. New York: Springer. Retrieved From: https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/togo.

Source/Availability:

Available from Manchester or here https://sites.google.com/site/ucinetsoftware/datasets


CSphd

Description

The network contains the ties between Ph.D. students and their advisors in theoretical computer science; each arc points from an advisor to a student. The partition contains the (estimated) year in which the Ph.D. was obtained.

File Downloads

References

  • D. S. Johnson, The Genealogy of Theoretical Computer Science, SIGACT News, Vol. 16, No. 2, pp. 36-44, 1984. Reprinted in Bulletin of the EATCS, No. 25, pp. 198-211, 1985.
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 11.

How to Cite:

D. S. Johnson, The Genealogy of Theoretical Computer Science, SIGACT News, Vol. 16, No. 2, pp. 36-44, 1984. Reprinted in Bulletin of the EATCS, No. 25, pp. 198-211, 1985.


Davis Southern Club Women

Description

These data were collected by Davis et al in the 1930s. They represent observed attendance at 14 social events by 18 Southern women. The result is a person-by-event matrix: cell (i,j) is 1 if person i attended social event j, and 0 otherwise.

File Downloads

References

  • Breiger R. (1974). The duality of persons and groups. Social Forces, 53, 181-190.
  • Davis, A et al. (1941). Deep South. Chicago: University of Chicago Press.

How to Cite:

Davis, A et al. (1941). Deep South. Chicago: University of Chicago Press. Retrieved From: https://sites.google.com/site/ucinetsoftware/datasets/davissouthernclubwomen.


David Copperfield

Description

A network of common adjective and noun adjacencies for the novel "David Copperfield" by Charles Dickens, as described by M. Newman. Nodes represent the most commonly occurring adjectives and nouns in the book. Edges connect any pair of words that occur in adjacent position in the text of the book.

File Downloads

References

  • E. J. Newman, Finding community structure in networks using the eigenvectors of matrices, Preprint physics/0605087 (2006).

How to Cite:

E. J. Newman (2006). Finding community structure in networks using the eigenvectors of matrices. Preprint physics, 0605087. Retrieved From: http://www-personal.umich.edu/~mejn/netdata/.


Dining

Description

Dining-table partners in a dormitory at a New York State Training School.

File Downloads

References

  • The network was coded from a sociogram published in J.L. Moreno, The Sociometry Reader. Glencoe (Ill.), The Free Press, 1960, p. 35.
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 1.

How to Cite:

J. L. Moreno (1960). The Sociometry Reader. The Free Press, Glencoe, Illinois, pg.35. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/dining-tablepartnersinadormitoryatanewyorkstatetrainingschool.


Dolphins

Description

An undirected social network of frequent associations between 62 dolphins in a community living off Doubtful Sound, New Zealand, as compiled by Lusseau et al. (2003).

File Downloads

References

  • D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, and S. M. Dawson, The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations, Behavioral Ecology and Sociobiology 54, 396-405 (2003).

How to Cite:

D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, and S. M. Dawson, The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations, Behavioral Ecology and Sociobiology 54, 396-405 (2003). Retrieved from: http://www-personal.umich.edu/~mejn/netdata/.


Drug Net

Description

This is a dichotomous adjacency matrix of drug users in Hartford. Ties are directed and represent the lending of drug needles. The network is a result of two years of ethnographic observations of people's drug habits. Data description: 1-mode matrix 293x293 person by person, directed ties. Relations are needle sharing. Attribute dataset includes ethnicity, gender.

File Downloads

References

  • Weeks, M. R., Clair, S., Borgatti, S. P., Radda, K. & Schensul, J. J. 2002. Social networks of drug users in high-risk sites: Finding the connections. AIDS and Behaviour, 6, 193-206.

How to Cite:

Weeks, M. R., Clair, S., Borgatti, S. P., Radda, K. & Schensul, J. J. (2002). Social networks of drug users in high-risk sites: Finding the connections. AIDS and Behaviour, 6, 193-206. Retrieved from: https://sites.google.com/site/sfeverton18/research/cohesion-and-clustering.


Family Planning in Korea

Description

This is a communication network within a small enterprise: a sawmill. All employees were asked to indicate the frequency with which they discussed work matters with each of their colleagues on a five-point scale ranging from less than once a week to several times a day. Two employees were linked in the communication network if they rated their contact as three or more. We do not know whether both employees had to rate their tie in this way or that at least one employee had to indicate a strength of three or more.

In the sawmill, the employees are Spanish-speaking (H) or English- speaking (E), which, of course, is relevant to their communication. The sawmill contains two main sections: the mill (M), where tree trunks are sawn into logs, and the planer section (P), where logs are planed. Then there is a yard (Y) where two employees are working, and some managers and additional officials. Vertex labels indicate the ethnicity and the type of work of each employee, e.g. HP-10 is an Hispanic (H) working in the planer section (P).

File Downloads

References

E.M. Rogers & D.L. Kincaid, Communication Networks. Toward a New Paradigm for Research (New York: The Free Press, 1981).
W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 6.

How to Cite:

E.M. Rogers & D.L. Kincaid, (1981). Toward a New Paradigm for Research. Communication Networks New York: The Free Press. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/familyplanninginkorea.


Flying Teams

Description

In 1943, Leslie D. Zeleny administered a sociometric test to 48 cadet pilots at an US Army Air Forces flying school. Cadets were trained to fly a two- seated aircraft, taking turns in flying and aerial observing. Cadets were assigned to instruction groups ranging in size from 5 to 7 at random, so they had little or no control over who their flying partners would be. The sociometric test was used to improve the composition of instruction groups. Zeleny asked each cadet to name the members of his flight group with whom he would like to fly as well as those with whom he would not like to fly.

File Downloads

References

  • J. L . Moreno (et al.), The Sociometry Reader (Glencoe (Illinois): The Free Press, 1960, p. 534-547).
  • W. de Nooy, A. Mrvar, and V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 4.

How to Cite:

J. L . Moreno, et.al (1960) The Sociometry Reader. The Free Press, p. 534-547. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/flyingteams.


Football

Description

Our network example describes the 22 soccer teams which participated in the World Championship in Paris, 1998.

Players of the national team often have contracts in other countries. This constitutes a players market where national teams export players to other countries. Members of the 22 teams had contracts in altogether 35 countries.

Counting which team exports how many players to which country can be described with a valued, asymmetric graph. The graph is highly unsymmetric: some countries only export players, some countries are only importers.

File Downloads

References

  • Dagstuhl seminar: Link Analysis and Visualization, Dagstuhl 1-6. July 2001.

How to Cite:

Lothar Kremple (1999). football data set [Data set].


Galesburg

Description

In a famous study, known as the Columbia University Drug Study, the diffusion of a new drug (gammanym) was investigated. The researchers collected data on the first subscription of this drug by physicians in several communities. In addition, they investigated friendship ties and discussion links between the physicians, asking them to name three doctors whom they considered to be personal friends and to nominate three doctors with whom they would choose to discuss medical matters.

The file Galesburg.net contains a network of friendship (blue) and discussion ties (red) between 17 physicians who adopted the new drug in Galesburg (Illinois) in the 1950s. The partition Galesburg_adoptiontime.clu specifies the number of months since the introduction of the new drug at which the physician first prescribed the drug. This is considered to be their adoption time.

File Downloads

  • Galesburg.xml (DyNetML)
  • References

    • J.S. Coleman, E. Katz and H. Menzel, Medical Innovation. A Diffusion Study (Indianapolis: Bobbs-Merrill, 1966).D. Knoke and R.S. Burt, 'Prominence', in R.S. Burt and M.J. Minor (Eds.), Applied Network Analysis. A Methodological Introduction (Beverly Hills: Sage Publications, 1983, 195-222).
    • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 8.

    How to Cite:

    Knoke D., Burt, R.S.(1983). Prominence, in R.S. Burt and M.J. Minor (Eds.), Applied Network Analysis. A Methodological Introduction, Beverly Hills: Sage Publications, 195-222. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/galesburgdrugstudy.


Gama

Description

Hage & Harary (1983) use the Gahuku-Gama system of the Eastern Central Highlands of New Guinea, described by Read (1954), to illustrate a clusterable signed graph. Read's ethnography portrayed an alliance structure among three tribal groups containing balance as a special case; among Gahuku-Gama the enemy of an enemy can be either a friend or an enemy.

The signed graph has been split into two matrices: GAMAPOS for alliance ("rova") relations, GAMANEG for antagonistic ("hina") relations. To reconstruct the signed graph, multiply GAMANEG by -1, and add the two matrices.

File Downloads

References

  • Hage P. and Harary F. (1983). Structural models in anthropology. Cambridge: Cambridge University Press. (See p 56-60).
  • Read K. (1954). Cultures of the central highlands, New Guinea. Southwestern Journal of Anthropology, 10, 1-43.

How to Cite:

Read K. (1954). Cultures of the central highlands, New Guinea. Southwestern Journal of Anthropology, 10, 1-43.


Gleiser Comics

Description

Analysis of a collaboration network based on the Marvel Universe comic books. First, the system as a binary network, where two characters are connected if they appear in the same publication. The analysis of degree correlations reveals that, in contrast to most real social networks, the Marvel Universe presents a disassortative mixing on the degree. Then uses a weight measure to study the system as a weighted network. This allows you to find and characterize well defined communities. Through the analysis of the community structure and the clustering as a function of the degree they show that the network presents a hierarchical structure.

File Downloads

References

How to Cite:

Pablo M. Gleiser (2007). How to Become a Superhero. Journal of Statistical Mechanics: Theory and Experiment, Volume 2007. Retrieved from: http://iopscience.iop.org/article/10.1088/1742-5468/2007/09/P09020/meta;jsessionid=6DC1E2E1629D54838A4E7091DECD4A38.c2.iopscience.cld.iop.org.


Goodreau's Faux Mesa High School

Description

The network is named faux.mesa.high because the school community on which it is based is in the rural western United States, with a student body that is largely Hispanic and Native American. The data set is based upon a model to fit data from one school community from the National Longitudinal Study on Adolescent Health (Resnick et al., 1997). This network was originally distributed as part of the Statnet package.

File Downloads

References

  • M.D. Resnick, P.S. Bearman, R.W. Blum et al. (1997). Protecting adolescents from harm. Findings from the National Longitudinal Study on Adolescent Health, Journal of the American Medical Association, 278: 823-32.
  • M.S. Handcock, D.R. Hunter, C.T. Butts, S.M. Goodreau, and M. Morris. 2003 statnet: Software tools for the Statistical Modeling of Network Data, http://statnetproject.org.

How to Cite:

M.D. Resnick, P.S. Bearman, R.W. Blum et al. (1997). Protecting adolescents from harm. Findings from the National Longitudinal Study on Adolescent Health, Journal of the American Medical Association, 278: 823-32.


Hep-Th

Description

A collaboration network of scientists posting preprints on the high-energy theory archive at www.arxiv.org, 1995-1999, as compiled by M. Newman.

File Downloads

References

  • M. E. J. Newman, The structure of scientific collaboration networks, Proc. Natl. Acad. Sci. USA 98, 404-409 (2001).
  • M. E. J. Newman, Scientific collaboration networks: I. Network construction and fundamental results, Phys. Rev. E 64, 016131 (2001).
  • M. E. J. Newman, Scientific collaboration networks: II. Shortest paths, weighted networks, and centrality, Phys. Rev. E 64, 016132 (2001).

How to Cite:

M. E. J. Newman (2001). The structure of scientific collaboration networks, Proc. Natl. Acad. Sci. USA 98, 404-409. Retrieved from: http://www-personal.umich.edu/~mejn/netdata/.


Hi-tech

Description

The case is a small hi-tech computer firm which sells, installs, and maintains computer systems. The network contains the friendship ties among the employees, which were gathered by means of the question: Who do you consider to be a personal friend? Three employees (Fran, Quincy, and York) did not return the questionnaire. Note that most friendship nominations are reciprocated, but not all (112 out of 147). A friendship choice (arc) is only included in the network if both persons involved acknowledge it.

Some months later, employees tried to unionize the firm: they sought support among the employees to let the union have a say in the firm. The three top managers and three employees who were not directly involved were opposed to union certification of the firm. Five employees were pro- union, but two of them (Chris and Ovid) did not actively advocate the pro- union position. At the end, the proposal to unionize the firm was voted down. Chris resigned from the firm ten days before the vote because he did not want to participate in it. He rejoined the firm two days after the vote.

File Downloads

References

  • D. Krackhardt's 'The ties that torture: Simmelian tie analysis in organizations' (Research in the Sociology of Organizations, 16 (1999), 183-210).
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 7.

How to Cite:

D. Krackhardt (1999) The ties that torture: Simmelian tie analysis in organizations Research in the Sociology of Organizations, 16:183-210.


Hollywood Film Music

Description

This network contains the collaboration of 40 composers of film scores and the 62 producers who produced a minimum of five movies in Hollywood, 1964-1976. This is a 2-mode network: a line between a composer and a producer indicates that the former created the soundtrack for the movie produced by the latter. The line values indicate the number of movies by one producer for which the composer created the music in the period 1964- 1976. The five top composers, each of whom earned 1.5% or more of the total income of Hollywood movie score composers in the 1960s and 1970s, are identified.

File Downloads

References

Robert R. Faulkner, Music on Demand. Composers and Careers in the Hollywood Film Industry (New Brunswick: Transaction Books, 1983).
W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 5.

How to Cite:

Robert R. Faulkner (1983) Composers and Careers in the Hollywood Film Industry. Music on Demand, Transaction Books, New Brunswick. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/hollywoodfilmmusic.


Isle of Man

Description

This GEDCOM file contains the combined genealogies of approximately 20 families from the British Isle of Man.

File Downloads

References

  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 11.

How to Cite:

The Isle of Man Family History Society (2001). Isle of Man data set [Data set]. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/isleofmangenealogies.


Kapferer Mine

Description

Bruce Kapferer (1969) collected data on men working on the surface in a mining operation in Zambia (then Northern Rhodesia). He wanted to account for the development and resolution of a conflict among the workers. The conflict centered on two men, Abraham and Donald; most workers ended up supporting Abraham.

Kapferer observed and recorded several types of interactions among the workers, including conversation, joking, job assistance, cash assistance and personal assistance. Unfortunately, he did not publish these data. Instead, the matrices indicate the workers joined only by uniplex ties (based on one relationship only, KAPFMU) or those joined by multiple-relation or multiplex ties (KAPFMM).

File Downloads

References

  • Kapferer B. (1969). Norms and the manipulation of relationships in a work context. In J. Mitchell (ed), Social networks in urban situations. Manchester: Manchester University Press.
  • Doreian P. (1974). On the connectivity of social networks. Journal of Mathematical Sociology, 3, 245-258.

How to Cite:

Kapferer B. (1969). Norms and the manipulation of relationships in a work context. In J. Mitchell (ed), Social networks in urban situations. Manchester: Manchester University Press. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/kapferermine.


Kapferer Tailor Shop

Description

Bruce Kapferer (1972) observed interactions in a tailor shop in Zambia (then Northern Rhodesia) over a period of ten months. His focus was the changing patterns of alliance among workers during extended negotiations for higher wages.

The matrices represent two different types of interaction, recorded at two different times (seven months apart) over a period of one month. TI1 and TI2 record the "instrumental" (work- and assistance-related) interactions at the two times; TS1 and TS2 the "sociational" (friendship, socioemotional) interactions.

The data are particularly interesting since an abortive strike occurred after the first set of observations, and a successful strike took place after the second.

File Downloads

References

  • Kapferer B. (1972). Strategy and transaction in an African factory. Manchester: Manchester University Press.

How to Cite:

Kapferer B. (1972). Strategy and transaction in an African factory. Manchester: Manchester University Press. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/kapferertailorshop.


Knoke and Kuklinski

Description

In 1978, Knoke & Wood collected data from workers at 95 organizations in Indianapolis. Respondents indicated with which other organizations their own organization had any of 13 different types of relationships.

Knoke and Kuklinski (1982) selected a subset of 10 organizations and two relationships. Money exchange is recorded in KNOKM, information exchange in KNOKI. See Knoke & Kuklinski (1982) for details.

Sectors encoding (KNOKSEC): 1 - GOV, 2 - VOL, 3 - PVT.

File Downloads

References

  • Knoke D. and Wood J. (1981). Organized for action: Commitment in voluntary associations. New Brunswick, NJ: Rutgers University Press.
  • Knoke D. and Kuklinski J. (1982). Network analysis, Beverly Hills, CA: Sage.

How to Cite:

Knoke D. and Wood J. (1981). Organized for action: Commitment in voluntary associations. New Brunswick, NJ: Rutgers University Press. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/knokebureaucracies.


Krackhardt High-tech Managers

Description

David Krackhardt collected cognitive social structure data from 21 management personnel in a high-tech, machine manufacturing firm to assess the effects of a recent management intervention program. The relation queried was Who does X go to for advice and help with work? (KRACKAD) and Who is a friend of X? (KRACKFR). Each person indicated not only his or her own advice and friendship relationships, but also the relations he or she perceived among all other managers, generating a full 21 x 21 matrix of adjacency ratings from each person in the group.

File Downloads

References

  • Krackhardt D. (1987). Cognitive social structures. Social Networks, 9, 104-134.

How to Cite:

Krackhardt D. (1987). Cognitive social structures. Social Networks, 9, 104-134. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/krackhardthigh-techmanagers.


Krackhardt Office CSS

Description

David Krackhardt collected cognitive social structure data from 21 management personnel in a high-tech, machine manufacturing firm to assess the effects of a recent management intervention program. The relation queried was Who does X go to for advice and help with work? (KRACKAD) and Who is a friend of X? (KRACKFR). Each person indicated not only his or her own advice and friendship relationships, but also the relations he or she perceived among all other managers, generating a full 21 x 21 matrix of adjacency ratings from each person in the group.

File Downloads

References

  • Krackhardt D. (1987). Cognitive social structures. Social Networks, 9, 104-134.

How to Cite:

Krackhardt D. (1987). Cognitive social structures. Social Networks, 9, 104-134. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/krackhardtofficecss.


Literature 1976

Description

This network contains the critical attention among a set of Dutch literary authors and critics in 1976. It contains an arc between two people if the first has passed judgment on the work of second in an interview or review.

File Downloads

References

  • W. de Nooy, 'A literary playground. Literary criticism and balance theory' (in Poetics, 26 (1999), 385-404).
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 10.

How to Cite:

W. de Nooy (1999). A literary playground. Literary criticism and balance theory. Poetics, 26:385-404. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/dutchliterarycriticism1976.


Mexican Power

Description

In Mexico, political power has been in the hands of a relatively small set of people who are connected by business relations, family ties, friendship, and membership of political institutions throughout most of the 20th century. A striking case in point is the succession of presidents, especially the nomination of the candidates for the presidential election. Since 1929, each new president was a secretary in the previous cabinet, which means that he worked closely together with the previous president. Moreover, the candidates always entertained close ties with former presidents and their closest collaborators. In this way, a political elite has maintained control over the country.

File Downloads

References

  • J. Gil-Mendieta and S. Schmidt, 'The political network in Mexico' (in: Social Networks 18 (1996), 4: 355-381).
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 12.

How to Cite:

J. Gil-Mendieta and S. Schmidt (1996). The political network in Mexico. Social Networks 18, 4: 355-381. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/mexicanpoliticalelite.


Modern Math Method Diffusion

Description

This network concerns the diffusion of a new mathematics method in the 1950s. This innovation was instigated by top mathematicians and sponsored by the National Science Foundation of the USA as well as the U.S. Department of Education. The diffusion process was successful since the new method was adopted in a relatively short period by most schools. The example traces the diffusion of the modern math method among school systems which combine elementary and secondary programs in Allegheny County (Pennsylvania, USA). All school superintendents who were at least two years in office were interviewed. They are the gatekeepers to educational innovation because they are in the position to make the final decision. The researchers obtained data from 61 out of 68 superintendents, 51 of whom had adopted by 1963 (84%). Among other things, the superintendents were asked to indicate their friendship ties with other superintendents in the county with the following question: Among the chief school administrators in Allegheny County, who are your three best friends?

The researcher analyzed the friendship choices among the 38 interviewed superintendents who adopted the method and were in position at least one year before the first adoption, so they could have adopted earlier. Unfortunately, the researcher did not include the friendship choices by superintendents who did not receive any choices themselves; they are treated as isolates. In the original network, some friendship choices are reciprocated and others are not (ModMath_directed.net) but we will use the symmetrized network (ModMath.net). A line in this network indicates that at least one superintendent chooses the other as his friend. The year of adoption by a superintendent's school is coded in the partition ModMath_adoption.clu: 1958 is class (time) one, 1959 is class (time) two, etc. The first adopter (v1) is a superintendent with many contacts outside Allegheny County but few friends within the county. He is a 'cosmopolite' and cosmopolites usually are early adopters but they are often too innovative to be influential in a local network.

File Downloads

References

  • R.O. Carlson, Adoption of Educational Innovations (Eugene: University of Oregon, Center for the Advanced Study of Educational Administration, 1965, p. 19).
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 8.

How to Cite:

R.O. Carlson (1965) Adoption of Educational Innovations. University of Oregon, Center for the Advanced Study of Educational Administration, p. 19. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/modernmathmethoddiffusion.


NetScience

Description

A coauthorship network of scientists working on network theory and experiment, as compiled by M. Newman in May 2006. The network was compiled from the bibliographies of two review articles on networks, M. E. J. Newman, SIAM Review 45, 167-256 (2003) and S. Boccaletti et al., Physics Reports 424, 175-308 (2006), with a few additional references added by hand. The version given here contains all components of the network, for a total of 1589 scientists, and not just the largest component of 379 scientists previously published. The network is weighted, with weights assigned as described in M. E. J. Newman, Phys. Rev. E 64, 016132 (2001).

File Downloads

References

  • M. E. J. Newman, Finding community structure in networks using the eigenvectors of matrices, Preprint physics/0605087 (2006).

How to Cite:

M. E. J. Newman (2006). Finding community structure in networks using the eigenvectors of matrices. Preprint physics/0605087. Retrieved from: http://www-personal.umich.edu/~mejn/netdata/.


Newcomb Fraternity

Description

These 15 matrices record weekly sociometric preference rankings from 17 men attending the University of Michigan in the fall of 1956; data from week 9 are missing. A "1" indicates first preference, and no ties were allowed.

The men were recruited to live in off-campus (fraternity) housing, rented for them as part of the Michigan Group Study Project supervised by Theodore Newcomb from 1953 to 1956. All were incoming transfer students with no prior acquaintance of one another.

File Downloads

References

  • Newcomb T. (1961). The acquaintance process. New York: Holt, Reinhard & Winston.
  • Nordlie P. (1958). A longitudinal study of interpersonal attraction in a natural group setting. Unpublished doctoral dissertation, University of Michigan.
  • White H., Boorman S. and Breiger R. (1977). Social structure from multiple networks, I. Blockmodels of roles and positions. American Journal of Sociology, 81, 730-780.

How to Cite:

Newcomb T. (1961). The acquaintance process. New York: Holt, Reinhard & Winston. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/newcombfraternity.


John Padgett - Florentine Families

Description

Breiger & Pattison (1986), in their discussion of local role analysis, use a subset of data on the social relations among Renaissance Florentine families (person aggregates) collected by John Padgett from historical documents. The two relations are business ties (PADGB - specifically, recorded financial ties such as loans, credits and joint partnerships) and marriage alliances (PADGM).

As Breiger & Pattison point out, the original data are symmetrically coded. This is acceptable perhaps for marital ties, but is unfortunate for the financial ties (which are almost certainly directed). To remedy this, the financial ties can be recoded as directed relations using some external measure of power - for instance, a measure of wealth. PADGW provides information on (1) each family's net wealth in 1427 (in thousands of lira); (2) the number of priorates (seats on the civic council) held between 1282- 1344; and (3) the total number of business or marriage ties in the total dataset of 116 families (see Breiger & Pattison (1986), p 239).

Substantively, the data include families who were locked in a struggle for political control of the city of Florence in around 1430. Two factions were dominant in this struggle: one revolved around the infamous Medicis (9), the other around the powerful Strozzis (15).

File Downloads

References

  • Breiger R. and Pattison P. (1986). Cumulated social roles: The duality of persons and their algebras. Social Networks, 8, 215-256.
  • Kent D. (1978). The rise of the Medici: Faction in Florence, 1426-1434. Oxford: Oxford University Press.
  • Altman, Neal and Carley, Kathleen M and Reminga, Jeffrey. (2017). ORA User's Guide 2017. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report CMU-ISR-17-100.

How to Cite:

Breiger R. and Pattison P. (1986). Cumulated social roles: The duality of persons and their algebras. Social Networks, 8, 215-256. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/padgettflorentinefamilies.


Pol Blogs

Description

Political blogosphere, Feb. 2005.

File Downloads

References

  • Lada A. Adamic and Natalie Glance, The political blogosphere and the 2004 US Election, in Proceedings of the WWW-2005 Workshop on the Weblogging Ecosystem (2005).

How to Cite:

Lada A. Adamic and Natalie Glance (2005). The political blogosphere and the 2004 US Election, in Proceedings of the WWW-2005 Workshop on the Weblogging Ecosystem. Retrieved from: http://www-personal.umich.edu/~mejn/netdata/.


Pol Books

Description

Nodes represent books about US politics sold by the online bookseller Amazon.com. Edges represent frequent co-purchasing of books by the same buyers, as indicated by the "customers who bought this book also bought these other books" feature on Amazon.

File Downloads

References

How to Cite:

Valdis Krebs (2004). Books about US Politics data set [Data set]. Retrieved from: http://www-personal.umich.edu/~mejn/netdata/.


Power

Description

An undirected unweighted representation of the topology of the Western States Power Grid of the United States, compiled by Duncan Watts and Steven Strogatz. Node IDs are the same as those used by Prof. Watts.

File Downloads

References

D. J. Watts and S. H. Strogatz, "Collective dynamics of `small-world' networks", Nature 393, 440-442 (1998).

How to Cite:

D. J. Watts and S. H. Strogatz (1998). Collective dynamics of `small-world' networks. Nature 393, 440-442. Retrieved from: http://cdg.columbia.edu/cdg/datasets


Prison

Description

In the 1950s John Gagnon collected sociometric choice data from 67 prison inmates. All were asked, What fellows on the tier are you closest friends with? Each was free to choose as few or as many friends as he desired. The data were analyzed by MacRae and characterized by him as less clear cut in their internal structure than similar data from schools or residential populations.

File Downloads

References

  • MacRae J. (1960). Direct factor analysis of sociometric data. Sociometry, 23, 360-371.

How to Cite:

MacRae J. (1960). Direct factor analysis of sociometric data. Sociometry, 23, 360-371. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/gagnonmacraeprison.


Ragusan

Description

Ragusa, which is now known as Dubrovnik (Croatia, Europe), was settled on the coast of the Adriatic Sea in the 7th century. For a time, it was under Byzantine protection, becoming a free commune as early as the 12th century. Napoleon, having destroyed the Venetian Republic in 1797, put an end to the Republic of Ragusa in 1806. It came under Austrian control until the fall of the Austro-Hungarian monarchy in 1918.

In Ragusa, all political power was in the hands of male nobles older than 18 years. They were members of the Great Council (Consilium majus) which had the legislative function. Every year, 11 members of the Small Council (Consilium minus) were elected. Together with a duke, the Small Council had both executive and representative functions. The main power was in the hands of the Senat (Consilium rogatorum) which had 45 members elected for one year. This organization prevented any single family, unlike the Medici in Florence, from prevailing. Nevertheless the historians agree that the Sorgo family was all the time among the most influential.

The Ragusan nobility evolved in the 12th century through the 14th century and was finally established by statute in 1332. After 1332, no new family was accepted until the large earthquake in 1667. A major problem facing the Ragusan noble families was that by decreases of their numbers and the lack of noble families in the neighboring areas, which were under Turkish control, they became more and more closely related - marriages between relatives in the 3rd and 4th remove were frequent. It is interesting to analyze how families of a privileged social class organized their relations by marriage and how they coped with the limited number of potential spouses for their children.

File Downloads

References

  • Irmgard Mahnken (1960): Das Ragusanische Patriziat des XIV. Jahrhunderts. PhD dissertation.
  • V. Batagelj, 'Ragusan families marriage networks' in A. Ferligoj & A. Kramberger (Eds.), Developments in Data Analysis (Ljubljana: FDV, 1996, 217-228).
  • Dremelj P., Mrvar A., Batagelj V.: Analiza rodoslova dubrovaCkog vlasteoskog kruga pomocu programa Pajek. Anali Dubrovnik XL, HAZU, Zagreb, Dubrovnik, 2002, 105-126.
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 11.

How to Cite:

Irmgard Mahnken (1960). ragusa data set [Data set]. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/ragusannobilitygenealogy.


Sample Limesurvey data

Description

Sample network data collected in MGT 780 class, January 2014, using online survey tool Limesurvey.

File Downloads

How to Cite:

Limesurvey (2014). sample limesurvey data set [Data set]. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/classdata.


Sample Qualtrics File

Description

Data collected Spring 2016 in phd network class MGT 780. Used to demonstrate how to import network survey data.

File Downloads

How to Cite:

University of Kentucky (2016). sample qualtrics file data set [Data set]. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/samplequaltricsfile.


Sampson Monastery

Description

Sampson recorded the social interactions among a group of monks while resident as an experimenter on vision, and collected numerous sociometric rankings. During his stay, a political crisis in the cloister resulted in the expulsion of four monks (Nos. 2, 3, 17, and 18) and the voluntary departure of several others - most immediately, Nos. 1, 7, 14, 15, and 16. (In the end, only 5, 6, 9, and 11 remained).

Most of the present data are retrospective, collected after the breakup occurred. They concern a period during which a new cohort entered the monastery near the end of the study but before the major conflict began. The exceptions are "liking" data gathered at three times: SAMPLK1 to SAMPLK3 - that reflect changes in group sentiment over time (SAMPLK3 was collected in the same wave as the data described below). Information about the senior monks was not included.

Four relations are coded, with separate matrices for positive and negative ties on the relation. Each member ranked only his top three choices on that tie. The relations are esteem (SAMPES) and disesteem (SAMPDES), liking (SAMPLK) and disliking (SAMPDLK), positive influence (SAMPIN) and negative influence (SAMPNIN), praise (SAMPPR) and blame (SAMPNPR). In all rankings 3 indicates the highest or first choice and 1 the last choice. (Some subjects offered tied ranks for their top four choices).

File Downloads

References

  • Breiger R., Boorman S. and Arabie P. (1975). An algorithm for clustering relational data with applications to social network analysis and comparison with multidimensional scaling. Journal of Mathematical Psychology, 12, 328-383.
  • Sampson, Samuel Frank. A Novitiate in a period of change: An experimental and case study of social relationships, Doctoral Dissertation, Cornell University, 1968. 6905775.

How to Cite:

Samuel Frank Sampson (1968). A Novitiate in a period of change: An experimental and case study of social relationships. Doctoral Dissertation, Cornell University, 6905775. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/sampsonmonastery.


San Juan Sur

Description

In 1948, American sociologists executed a large field study in the Turrialba region, which is a rural area in Costa Rica (Latin America). They were interested in the impact of formal and informal social systems on social change. Among other things, they investigated visiting relations between families living in haciendas (farms) in a neighborhood called San Juan Sur. The network of visiting ties is a simple directed graph: each arc represents "frequent visits" from one family to another. The exact number of visits was not recorded. Line values classify the visiting relation as ordinary (value one), visits among kin (value two), and visits among ritual kin, i.e., between god-parent and god-child.

File Downloads

References

  • Charles P. Loomis, Julio O. Morales, Roy A. Clifford & Olen E. Leonard, Turrialba. Social Systems and the Introduction of Change (Glencoe (Ill.): The Free Press, 1953): p. 45 and 78.
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 9.

How to Cite:

Charles P. Loomis, Julio O. Morales, Roy A. Clifford & Olen E. Leonard (1953). Social Systems and the Introduction of Change. The Free Press, p. 45 and 78. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/visitingtiesamongfamiliesinsanjuansurcostarica1948.


Sawmill

Description

This is a communication network within a small enterprise: a sawmill. All employees were asked to indicate the frequency with which they discussed work matters with each of their colleagues on a five-point scale ranging from less than once a week to several times a day. Two employees were linked in the communication network if they rated their contact as three or more. We do not know whether both employees had to rate their tie in this way or that at least one employee had to indicate a strength of three or more.

In the sawmill, the employees are Spanish-speaking (H) or English- speaking (E), which, of course, is relevant to their communication. The sawmill contains two main sections: the mill (M), where tree trunks are sawn into logs, and the planer section (P), where logs are planed. Then there is a yard (Y) where two employees are working, and some managers and additional officials. Vertex labels indicate the ethnicity and the type of work of each employee, e.g. HP-10 is an Hispanic (H) working in the planer section (P).

File Downloads

References

  • J.H. Michael & J.G. Massey, 'Modeling the communication network in a sawmill' (Forest Products Journal, 47 (1997), 25-30).
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 6.

How to Cite:

J.H. Michael and J.G. Massey (1997). Modeling the communication network in a sawmill. Forest Products Journal, 47, p. 25-30. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/informalcommunicationwithinasawmillonstrike.


Scotland

Description

This dataset contains the corporate interlocks in Scotland in the beginning of the twentieth century (1904-5). In the nineteenth century, the industrial revolution brought Scotland railways and industrialization, especially heavy industry and textile industry. The amount of capital needed for these large scale undertakings exceeded the means of private families, so joint stock companies were established, which could raise the required capital. Joint stock companies are owned by the shareholders, who are represented by a board of directors. This opens up the possibility of interlocking directorates. By the end of the nineteenth century, joint stock companies had become the predominant form of business enterprise at the expense of private family businesses. Families, however, still exercised control through ownership and directorships.

The data are taken from the book The Anatomy of Scottish Capital by John Scott and Michael Hughes. It lists the (136) multiple directors of the 108 largest joint stock companies in Scotland in 1904-5: 64 non-financial firms, 8 banks, 14 insurance companies, and 22 investment and property companies (Scotland.net). In this dataset, which was compiled from the Appendix of Scott & Hughes' book, note that two multiple directors (W.S. Fraser and C.D. Menzies) are affiliated with just one board so they are not multiple directors in the strict sense.

The companies are classified according to industry type: 1 - oil & mining, 2 - railway, 3 - engineering & steel, 4 - electricity & chemicals, 5 - domestic products, 6 - banks, 7 - insurance, and 8 - investment. In addition, there is a vector specifying the total capital or deposits of the firms in 1,000 pound sterling.

File Downloads

References

  • John Scott & Michael Hughes, The anatomy of Scottish capital: Scottish companies and Scottish capital, 1900-1979 (London: Croom Helm, 1980).
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 5.

How to Cite:

John Scott & Michael Hughes (1980). The anatomy of Scottish capital: Scottish companies and Scottish capital, 1900-1979. London: Croom Helm. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/corporateinterlocksinscotland1904-5.


Stranke94

Description

Relations between Slovene parliamentary political parties:

  • SKD - Slovene Christian Democrats;
  • ZLSD - Associated List of Social Democrats;
  • SDSS - Social Democratic Party of Slovenia;
  • LDS - Liberal Democratic Party;
  • ZSESS - first of two Green Parties, separated after 1992 elections;
  • ZS - second Green Party;
  • DS - Democratic Party;
  • SLS - Slovene People's Party;
  • SNS - Slovene National Party;
  • SPS SNS - a group of deputies, former members of SNS, separated after 1992 elections
were estimated by the members of the Slovene National Parliament. So the respondents were well informed and competent to give such estimations. In the questionnaire designed by a group of experts on Parliament activities, some questions about the political space and its dimensions were included and the following question about relations between parliamentary political parties:

If various criteria (or various dimensions of the political space) are taken into account, some parties are by average closer than others. How would you personally estimate distances between pairs of parties in the political space?

Please, estimate the distance between each pair of parties on the scale from -3 to +3, where:

-3 means that parties are very dissimilar;
-2 means that parties are quite dissimilar;
-1 means that parties are dissimilar;
0 means that parties are neither dissimilar nor similar (somewhere in between);
+1 means that parties are similar;
+2 means that parties are quite similar;
+3 means that parties are very similar.

To collect estimations each respondent was given a 10-party by 10-party table with empty cells in the upper triangle. The diagonal and the lower triangle were coloured in black. Each respondent had to estimate relations between 45 pairs of parties.

The measures of central tendency were computed on the basis of the estimations given by 72 out of 90 members of the Parliament. 17 members of the Parliament were not available at the time of interviewing and one refused respond. 64 respondents out of the 72 estimated all 45 requested party relations. Only two out of 8 respondents with missing values have a large number of missing values (namely 40), the rest of them have 5 to 10 missing values. As far as the parties (variables) are considered, there are from 0 to 8 missing values and a recognisable pattern: relations involving ZS (which had no representatives in the Parliament at the time of interviewing) include from 6 to 8 missing values, others from 0 to 3 missing values.

The weights of arcs in the network are averages of values multiplied by 100 and rounded. The missing values were excluded.

File Downloads

References

  • Samo Kropivnik and Andrej Mrvar: An Analysis of the Slovene Parliamentary Parties Network. Developments in Statistics and Methodology. (A. Ferligoj, A. Kramberger, editors) Metodoloski zvezki 12, FDV, Ljubljana, 1996, p. 209-216.
  • Patrick Doreian and Andrej Mrvar(1996): A Partitioning Approach to Structural Balance. Social Networks, 18, p. 149-168.

How to Cite:

Kropivnik, Samo and Mrvar, Andrej (1996). An Analysis of the Slovene Parliamentary Parties Network. in Developments in Statistics and Methodology. A. Ferligoj and A. Kramberger, eds. Metodoloski zvezki 12, FDV, Ljubljana, p. 209-216.


Strike

Description

In a wood-processing facility, a new management team proposed changes to the workers' compensation package, which the workers did not accept. They started a strike, which led to a negotiation stalemate. Then, management asked an outsider to analyze the communication structure among the employees because it felt that information about the proposed changes was not effectively communicated to all employees by the union negotiators.

The outside consultant asked all employees to indicate the frequency in which they discussed the strike with each of their colleagues on a 5-point scale, ranging from 'almost never' (less then once per week) to 'very often' (several times per day). The consultant used three as a cut-off value. If at least one of two persons indicated that they discussed work with a frequency of three or more, a line between them was added to the informal communication network.

The network displays fairly stringent demarcations between groups defined on age and language. The Spanish-speaking young employees, who are of age 30 or younger, are almost disconnected from the English- speaking young employees, who communicate with no more than two of the older English-speaking employees.

All ties between groups have special backgrounds. Among the Hispanics, Alejandro is most proficient in English and Bob speaks some Spanish, which explains their tie. Bob owes Norm for getting his job and probably because of this, they developed a friendship tie. Finally, Ozzie is the father of Karl.

File Downloads

References

  • J.H. Michael, 'Labor dispute reconciliation in a forest products manufacturing facility' (Forest Products Journal, 47 (1997), 41-45).
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 7.

How to Cite:

J.H. Michael (1997). Labor dispute reconciliation in a forest products manufacturing facility. Forest Products Journal, 47, 41-45. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/informalcommunicationwithinasawmillonstrike.


Student Government

Description

This network contains the discussion relations among the eleven students who were members of the student government at the University of Ljubljana in Slovenia. The students were asked to indicate with whom of their fellows they discussed matters concerning the administration of the university informally. Within the parliament, students have positions which convey formal ranking: the prime minister, the ministers, and the advisors.

File Downloads

References

  • V. Hlebec, 'Recall versus recognition: comparison of two alternative procedures for collecting social network data.' (in A. Ferligoj & A. Kramberger (Eds.), Developments in Statistics and Methodology. Ljubljana: FDV, 1993).
  • Pajek dataset: Student Government of the University of Ljubljana / 1992
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 10.

How to Cite:

V. Hlebec (1993) Recall versus recognition: comparison of two alternative procedures for collecting social network data. In A. Ferligoj & A. Kramberger (eds.), Developments in Statistics and Methodology. Ljubljana: FDV. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/studentgovernmentdiscussionnetwork.


Szcid

Description

These data come from a six-year research project, concluded in 1976, on corporate power in nine European countries and the United States. Each matrix represents corporate interlocks among the major business entities of two countries - the Netherlands (SZCID) and West Germany (SZCIG).

The volume describing this study, referenced below, includes six chapters on network theoretical and analytical issues related to data of this type.

File Downloads

References

  • Stokman F., Wasseur F. and Elsas D. (1985). The Dutch network: Types of interlocks and network structure. In F. Stokman, R. Ziegler & J. Scott (eds), Networks of corporate power. Cambridge: Polity Press, 1985.

How to Cite:

Stokman F., Wasseur F. and Elsas D. (1985). The Dutch network: Types of interlocks and network structure. In F. Stokman, R. Ziegler & J. Scott (eds), Networks of corporate power. Cambridge: Polity Press.


Szcig

Description

These data come from a six-year research project, concluded in 1976, on corporate power in nine European countries and the United States. Each matrix represents corporate interlocks among the major business entities of two countries - the Netherlands (SZCID) and West Germany (SZCIG).

The volume describing this study, referenced below, includes six chapters on network theoretical and analytical issues related to data of this type.

File Downloads

References

  • Ziegler R., Bender R. and Biehler H. (1985). Industry and banking in the German corporate network. In F. Stokman, R. Ziegler & J. Scott (eds), Networks of corporate power. Cambridge: Polity Press, 1985.

How to Cite:

Ziegler R., Bender R. and Biehler H. (1985). Industry and banking in the German corporate network. In F. Stokman, R. Ziegler & J. Scott (eds), Networks of corporate power. Cambridge: Polity Press.


Taro

Description

These data represent the relation of gift-giving (taro exchange) among 22 households in a Papuan village. Hage & Harary (1983) used them to illustrate a graph hamiltonian cycle. Schwimmer points out how these ties function to define the appropriate persons to mediate the act of asking for or receiving assistance among group members.

File Downloads

References

  • Hage P. and Harary F. (1983). Structural models in anthropology. Cambridge: Cambridge University Press.
  • Schwimmer E. (1973). Exchange in the social structure of the Orokaiva. New York: St Martins.

How to Cite:

Schwimmer, E. (1973). Exchange in the social structure of the Orokaiva. New York: St Martins.


Thurman Office

Description

Thurman spent 16 months observing the interactions among employees in the overseas office of a large international corporation. During this time, two major disputes erupted in a subgroup of fifteen people. Thurman analyzed the outcome of these disputes in terms of the network of formal and informal associations among those involved.

THURA shows the formal organizational chart of the employees and THURM the actors linked by multiplex ties.

File Downloads

References

  • Thurman B. (1979). In the office: Networks and coalitions. Social Networks, 2, 47-63.

How to Cite:

Thurman B. (1979). In the office: Networks and coalitions. Social Networks, 2, 47-63. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/thurmanoffice.


USAir97

Description

US Air flights, 1997.

File Downloads

How to Cite:

US Airways (1997). USAir97 data set [Data set]. Retreieved from: www.casos.cs.cmu.edu/tools/datasets/external/index.php.


Valdez Krebs Anytie

Description

The Valdez Krebs Anytie Dataset.

File Downloads

How to Cite:


Valdez Krebs Interaction

Description

The Valdez Krebs Interaction Dataset.

File Downloads

How to Cite:


Valdez Krebs TrustedPrior

Description

The Valdez Krebs TrustedPrior Dataset.

File Downloads

How to Cite:


Wiring

Description

These are the observational data on 14 Western Electric (Hawthorne Plant) employees from the bank wiring room first presented in Roethlisberger & Dickson (1939). The data are better known through a scrutiny made of the interactions in Homans (1950), and the CONCOR analyses presented in Breiger et al (1975).

The employees worked in a single room and include two inspectors (I1 and I3), three solderers (S1, S2 and S3), and nine wiremen or assemblers (W1 to W9). The interaction categories include: RDGAM, participation in horseplay; RDCON, participation in arguments about open windows; RDPOS, friendship; RDNEG, antagonistic (negative) behavior; RDHLP, helping others with work; and RDJOB, the number of times workers traded job assignments.

File Downloads

References

  • Breiger R., Boorman S. and Arabie P. (1975). An algorithm for clustering relational data with applications to social network analysis and comparison with multidimensional scaling. Journal of Mathematical Psychology, 12, 328-383.
  • Homans G. (1950). The human group. New York: Harcourt-Brace.
  • Roethlisberger F. and Dickson W. (1939). Management and the worker. Cambridge: Cambridge University Press.

How to Cite:

Roethlisberger F. and Dickson W. (1939). Management and the worker. Cambridge: Cambridge University Press.


Wolf

Description

These data represent 3 months of interactions among a troop of monkeys, observed in the wild by Linda Wolfe as they sported by a river in Ocala, Florida. Joint presence at the river was coded as an interaction and these were summed within all pairs (WOLFN).

WOLFK indicates the putative kin relationships among the animals: 18 may be the granddaughter of 19. WOLFI contains four columns of information about the individual animals: (1) ID number of the animal; (2) age in years; (3) sex; (4) rank in the troop.

File Downloads

How to Cite:


World Trade

Description

The files contain data on trade miscellaneous manufactures of metal among 80 countries in 1994. All countries with entries in the paper version of the Commodity Trade Statistics published by the United Nations were included, but for some countries the 1993 data (Austria, Seychelles, Bangladesh, Croatia, and Barbados) or 1995 data (South Africa and Ecuador) were used because they were not available for 1994. Countries which are not sovereign are excluded because additional economic data were not available: Faeroe Islands and Greenland, which belong to Denmark, and Macau (Portugal). Most missing countries are located in central Africa and the Middle East, or belong to the former USSR. The arcs represent imports by one country from another for the class of commodities designated as ' miscellaneous manufactures of metal', which represents high technology products or heavy manufacture. The absolute value of imports (in 1,000 US$) is used but imports with values less than 1% of the country's total imports were omitted.

In addition, several attributes of the countries were coded: their continent, their structural world system position in 1994, their world system position in 1980 according to a previous analysis by Smith and White - see the reference below - and their Gross Domestic Product per capita in US$ in 1995 (Statistical Yearbook of the United Nations).

File Downloads

References

  • D.A. Smith and D.R. White, 'Structure and Dynamics of the Global Economy - Network Analysis of International-Trade 1965-1980'. In: Social Forces, vol. 70 (1002), p. 857-893.
  • United Nations , Statistical Papers. Commodity Trade Statistics (Series D Vol. XLIV, No. 1-34 (1994)).
  • United Nations, Statistical Yearbook of the United Nations (Ed. 43, IVATION Datasystems Inc.) for additional economic and demographic data.
  • W. de Nooy, A. Mrvar, & V. Batagelj, Exploratory Social Network Analysis with Pajek (Cambridge: Cambridge University Press, 2004), Chapter 2.

How to Cite:

W. de Nooy, A. Mrvar, & V. Batagelj (2004) Exploratory Social Network Analysis with Pajek. Cambridge: Cambridge University Press, Chapter 2. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/worldtradeinmiscellaneousmanufacturesofmetal1994.


Zachary Karate Club

Description

A network of friendships between the 34 members of a karate club at a US university, as described by Wayne Zachary in 1977.

File Downloads

References

  • W. W. Zachary, An information flow model for conflict and fission in small groups, Journal of Anthropological Research 33, 452-473 (1977).

How to Cite:

W. W. Zachary (1977). An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33 , 452-473. Retrieved from: https://sites.google.com/site/ucinetsoftware/datasets/zacharykarateclub.