{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:10:49Z","timestamp":1772910649748,"version":"3.50.1"},"reference-count":61,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2012,2,17]],"date-time":"2012-02-17T00:00:00Z","timestamp":1329436800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["WIREs Data Min &amp; Knowl"],"published-print":{"date-parts":[[2012,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Data mining is being increasingly applied to social networks. Two relevant reasons are the growing availability of large volumes of relational data, boosted by the proliferation of social media web sites, and the intuition that an individual's connections can yield richer information than his\/her isolate attributes. This synergistic combination can show to be germane to a variety of applications such as churn prediction, fraud detection and marketing campaigns. This paper attempts to provide a general and succinct overview of the essentials of social network analysis for those interested in taking a first look at this area and oriented to use data mining in social networks. \u00a9 2012 Wiley Periodicals, Inc.<\/jats:p><jats:p>This article is categorized under:<jats:list list-type=\"explicit-label\"><jats:list-item><jats:p>Application Areas &gt; Science and Technology<\/jats:p><\/jats:list-item><jats:list-item><jats:p>Commercial, Legal, and Ethical Issues &gt; Social Considerations<\/jats:p><\/jats:list-item><\/jats:list><\/jats:p>","DOI":"10.1002\/widm.1048","type":"journal-article","created":{"date-parts":[[2012,2,17]],"date-time":"2012-02-17T21:02:29Z","timestamp":1329512549000},"page":"99-115","source":"Crossref","is-referenced-by-count":118,"title":["An overview of social network analysis"],"prefix":"10.1002","volume":"2","author":[{"given":"M\u00e1rcia","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o","family":"Gama","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2012,2,17]]},"reference":[{"key":"e_1_2_10_1_2_1","volume-title":"Evolution of Social Networks","author":"Doreian P","year":"1997"},{"key":"e_1_2_10_1_3_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781849209373"},{"key":"e_1_2_10_1_4_1","volume-title":"The Development of Social Network Analysis: A Study in the Sociology of Science","author":"Freeman LC","year":"2004"},{"key":"e_1_2_10_1_5_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811395"},{"key":"e_1_2_10_1_6_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985864"},{"key":"e_1_2_10_2_2_2","volume-title":"Who Shall Survive","author":"Moreno JL","year":"1953"},{"key":"e_1_2_10_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_2_10_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775057"},{"key":"e_1_2_10_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/1232722.1232727"},{"key":"e_1_2_10_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353424"},{"key":"e_1_2_10_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(02)00030-1"},{"key":"e_1_2_10_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1064830.1064834"},{"key":"e_1_2_10_2_9_2","unstructured":"ShettyJ AdibiJ. The Enron Email Dataset Database Schema and Brief Statistical Report. Technical Report University of Southern California 2004."},{"key":"e_1_2_10_2_10_2","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_2_10_2_11_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009683123448"},{"key":"e_1_2_10_2_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-8501(99)00075-9"},{"key":"e_1_2_10_2_13_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.98.2.404"},{"key":"e_1_2_10_2_14_2","first-page":"195","volume-title":"Sixth Australasian Conference on Data Mining and Analytics","author":"Truyen TT","year":"2007"},{"key":"e_1_2_10_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"key":"e_1_2_10_2_16_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1089072"},{"key":"e_1_2_10_2_17_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_2_10_2_18_2","volume-title":"Graph Theory","author":"Diestel R","year":"2005"},{"key":"e_1_2_10_2_19_2","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_2_10_2_20_2","volume-title":"Getting a Job: A Study of Contacts and Careers","author":"Granovetter M","year":"1974"},{"key":"e_1_2_10_2_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"e_1_2_10_2_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.03.006"},{"key":"e_1_2_10_2_23_2","doi-asserted-by":"publisher","DOI":"10.1086\/228631"},{"key":"e_1_2_10_2_24_2","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0503-60"},{"key":"e_1_2_10_2_25_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_2_10_2_26_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1116869"},{"key":"e_1_2_10_2_27_2","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"e_1_2_10_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"e_1_2_10_2_29_2","doi-asserted-by":"publisher","DOI":"10.1080\/00018732.2011.572452"},{"key":"e_1_2_10_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_10_2_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_2_10_2_32_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942"},{"key":"e_1_2_10_2_33_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20253"},{"key":"e_1_2_10_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02476440"},{"key":"e_1_2_10_2_35_2","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"Erdos P","year":"1960","journal-title":"Publ Math Inst Hungarian Acad Sci"},{"key":"e_1_2_10_2_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"e_1_2_10_2_37_2","first-page":"61","article-title":"The small world problem","volume":"1","author":"Milgram S","year":"1967","journal-title":"Psychol Today"},{"key":"e_1_2_10_2_38_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.149.3683.510"},{"key":"e_1_2_10_2_39_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630270505"},{"key":"e_1_2_10_2_40_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.026126"},{"key":"e_1_2_10_2_41_2","doi-asserted-by":"publisher","DOI":"10.1097\/00002030-198912000-00005"},{"key":"e_1_2_10_2_42_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"e_1_2_10_2_43_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"e_1_2_10_2_44_2","volume-title":"Proceedings of the 5th Starting AI Researchers' Symposium","author":"Oliveira M","year":"2010"},{"key":"e_1_2_10_2_45_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature03607"},{"key":"e_1_2_10_2_46_2","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00124"},{"key":"e_1_2_10_2_47_2","unstructured":"2011 R Foundation for Statistical Computing R Development Core Team R: a language and environment for statistical computing"},{"key":"e_1_2_10_2_48_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0601602103"},{"key":"e_1_2_10_2_49_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"e_1_2_10_2_50_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_2_10_2_51_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature03288"},{"key":"e_1_2_10_2_52_2","first-page":"2006","article-title":"Ucinet for Windows: software for social network analysis","author":"Borgatti SP","year":"2002","journal-title":"Harv Anal Technol"},{"key":"e_1_2_10_2_53_2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.25080\/TCWV9851","volume-title":"Seventh Python in Science Conference","author":"Hagberg AA","year":"2008"},{"key":"e_1_2_10_2_54_2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v3i1.13937"},{"key":"e_1_2_10_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556497"},{"key":"e_1_2_10_2_56_2","first-page":"1","article-title":"A comparative study of social network analysis tools","volume":"2","author":"Combe D","year":"2010","journal-title":"Soc Netw"},{"key":"e_1_2_10_2_57_2","first-page":"47","article-title":"Pajek\u2014program for large network analysis","volume":"21","author":"Batagelj V","year":"1998","journal-title":"Connections"}],"container-title":["WIREs Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fwidm.1048","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fwidm.1048","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/widm.1048","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/widm.1048","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/wires.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/widm.1048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T02:45:49Z","timestamp":1742525149000},"score":1,"resource":{"primary":{"URL":"https:\/\/wires.onlinelibrary.wiley.com\/doi\/10.1002\/widm.1048"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,17]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["10.1002\/widm.1048"],"URL":"https:\/\/doi.org\/10.1002\/widm.1048","archive":["Portico"],"relation":{},"ISSN":["1942-4787","1942-4795"],"issn-type":[{"value":"1942-4787","type":"print"},{"value":"1942-4795","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2,17]]}}}