The Scientist: Secretive, Selfish or Reticent? A Social Network Analysis
نویسنده
چکیده
The central question of this paper is what influences collaborators in electronic work environments to decide what knowledge to exchange, how much to exchange, and under what circumstances. Are scientists motivated by purely selfish economic considerations, or is there a role for social relations to influence behavior? This paper develops an empirically-based theoretical framework based on Mark Granovetter’s (1985) theory of social embeddedness that helps to explain the conditions for knowledge exchange in Grid environments. This is an early analysis based on interviews with a small population of researchers in molecular microbiology, molecular biology, and cell signaling in the United Kingdom. We conducted a small, preliminary social network analysis of this group to determine what they exchange, with whom, and under what conditions. By identifying the role that social embeddedness plays in motivating scientists, we not only begin to understand the contours of knowledge and information exchange in e-science, but we can also develop reasonable expectations of knowledge-sharing patterns across individual scientists and laboratories.
منابع مشابه
Interdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملCliques Role in Organizational Reputational Influence: A Social Network Analysis
Empirical support for the assumption that cliques are major determinants of reputational influence derives largely from the frequent finding that organizations which claimed that their cliques’ connections are influential had an increased likelihood of becoming influential themselves. It is suggested that the strong and consistent connection in cliques is at least partially responsible for the ...
متن کاملSocial-aware Context Based Approach for Forwarding Data in Wireless Network Comprising of Selfish Individuals
In social based mobility network comprises of selfish individuals that are not willing to forward the packets but wants to forward their own messages. Proposed system uses a context based protocol that can be used in social aware network like PSN. Here suggests a method to effectively detect selfish nodes from the network. It helps to differentiate selfish nodes from broken and overloaded nodes...
متن کاملSelfish Routing in Social Networks
I investigate the intersection of selfish routing and the preferential attachment social network. In particular, through the use of a stochastic generative preferential attachment model, a collection abstract network patterns are created for the transfer of flow from one distinct source destination vertex pair. Then, using a linear approximation method, I calculate both Nash and system optimal ...
متن کاملPerformance Analysis of Epidemic Routing in DTN with Overlapping Communities and Selfish Nodes
Abstract: Routing algorithms in delay tolerant networks (DTN) adopt the storecarry-forward way, and this needs the nodes to work in a cooperative way. However, nodes may not be willing to help others in many applications and this behavior can be seen as individual selfish. On the other hand, nodes often can be divided into different communities, and nodes in the same community often have some s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007