ArticlePDF Available

Abstract and Figures

Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
Content may be subject to copyright.
Cornell University ILR School
DigitalCommons@ILR
/4&2/"4*0/"-5#-*$"4*0/3 &9!02,1-"$&0$5.&/43

Social Network Analysis
Olivier Serrat
Asian Development Bank
0--074)*3"/%"%%*4*0/"-702,3"4 )B1%*(*4"-$0..0/3*-2$02/&--&%5*/4-
>"/,905'02%07/-0"%*/("/"24*$-&'20.*(*4"-0..0/3
5110244)*36"-5"#-&2&3052$&40%"9
>*324*$-&*3#205()440905'02'2&&"/%01&/"$$&33#94)&&9!02,1-"$&0$5.&/43"4*(*4"-0..0/34)"3#&&/"$$&14&%'02*/$-53*0/
*//4&2/"4*0/"-5#-*$"4*0/3#9"/"54)02*:&%"%.*/*342"4020'*(*4"-0..0/302.02&*/'02."4*0/1-&"3&$0/4"$4 )-.%*(*4"-$02/&--&%5
Social Network Analysis
Abstract
;8$&214<07&2/0-0/(&22&3*%&3&8$-53*6&-9*'"4"--*/34"4&3*/34*454*0/302-"2(&$02102"4*0/34*3
-0$"4&%*/4)&/&4702,34)"43425$452&30$*&490$*"-/&4702,"/"-93*33&&,3405/%&234"/%/&4702,3"/%4)&*2
1"24*$*1"/43"/%)"3470."*/'0$53&34)&"$4023"/%4)&2&-"4*0/3)*13#&47&&/4)&.*/"31&$*?$30$*"-
$0/4&84
>&*/'02."4*0/2&60-54*0/)"3(*6&/#*24)40/&7&$0/0.*&33425$452&%"205/%@0730'%"4"*/'02."4*0/
"/%,/07-&%(&/1"2"--&-30$*"-/&4702,3)"6&(207/3420/(&2"3'02.30'02("/*:"4*0/0')5."/"$4*6*49
0$*"-/&4702,3"2&/0%&30'*/%*6*%5"-3(2051302("/*:"4*0/3"/%2&-"4&%3934&.34)"44*&*/0/&02.02&
491&30'*/4&2%&1&/%&/$*&34)&3&*/$-5%&3)"2&%6"-5&36*3*0/3"/%*%&"330$*"-$0/4"$43,*/3)*1$0/@*$4
?/"/$*"-&8$)"/(&342"%&+0*/4.&.#&23)*1*/02("/*:"4*0/3"/%(20511"24*$*1"4*0/*/&6&/43".0/(
/5.&205304)&2"31&$430')5."/2&-"4*0/3)*13/%&&%*430.&4*.&3"11&"23"34)05()/&4702,&%
02("/*:"4*0/3054$0.1&4&"--04)&2'02.30'02("/*:"4*0/=$&24"*/-94)&90541"$&6&24*$"-2*(*%$0.."/%
"/%$0/420-#52&"5$2"$*&3!)&/4)&935$$&&%30$*"-/&4702,3*/@5&/$&-"2(&230$*"-120$&33&3#9"$$&33*/(
)5."/30$*"-/"452"-1)93*$"-"/%?/"/$*"-$"1*4"-"37&--"34)&*/'02."4*0/"/%,/07-&%(&$0/4&/40'
4)&3&/%&6&-01.&/4702,4)&9$"/*.1"$410-*$*&3342"4&(*&3120(2".3"/%120+&$43=*/$-5%*/(4)&*2
%&3*(/*.1-&.&/4"4*0/"/%2&35-43="/%4)&1"24/&23)*134)"40A&/5/%&21*/4)&3&0%"4&)07&6&27&
"2&34*--'"2'20.#&*/("#-&40$0/3425&4)&*215#-*$"/%02("/*:"4*0/"-107&2*/7"934)"4$"/)"2/&334)&*2
104&/4*"- /%&234"/%*/(7)&/7)9"/%)074)&9'5/$4*0/#&34*3*.1024"/4&2&30$*"-/&4702,"/"-93*3
$"/)&-1
Keywords
3*"/&6&-01.&/4"/,106&249&$0/0.*$(2074)3534"*/"#*-*49%&6&-01.&/4
Comments
Suggested Citation
&22"4 Social network analysis. !"3)*/(40/3*"/&6&-01.&/4"/,
Required Publisher's Statement
>*3"24*$-&7"3?23415#-*3)&%#94)&3*"/&6&-01.&/4"/,777"%#02(
>*3"24*$-&*3"6"*-"#-&"4*(*4"-0..0/3 )B1%*(*4"-$0..0/3*-2$02/&--&%5*/4-
Knowledge
Solutions February 2009 | 28
Power no longer
resides exclusively
(if at all) in states,
institutions, or
large corporations.
It is located in
the networks that
structure society.
Social network
analysis seeks to
understand networks
and their participants
and has two main
focuses: the actors
and the relationships
between them in
a specic social
context.
Social Network Analysis
by Olivier Serrat
Rationale
The information revolution has given birth to new economies
structured around ows of data, information, and knowledge.
In parallel, social networks1 have grown stronger as forms of
organization of human activity.2 Social networks are nodes
of individuals, groups, organizations, and related systems
that tie in one or more types of interdependencies: these in-
clude shared values, visions, and ideas; social contacts; kin-
ship; conict; nancial exchanges; trade; joint membership
in organizations; and group participation in events, among
numerous other aspects of human relationships.3 Indeed, it
sometimes appears as though networked organizations outcompete all other forms of or-
ganization4—certainly, they outpace vertical, rigid, command-and-control bureaucracies.
When they succeed, social networks inuence larger social processes by accessing human,
social, natural, physical, and nancial capital, as well as the information and knowledge
content of these. (In development work, they can impact policies, strategies, programs,
and projects—including their design, implementation, and results—and the partnerships
that often underpin these.) To date, however, we are still far from being able to construe
their public and organizational power in ways that can harness their potential. Understand-
ing when, why, and how they function best is important. Here, social network analysis can
help.
1 The term was coined by John Barnes in 1954.
2 Information and communication technologies explain much but not all. The other agents that have catalyzed
social networks include globalization; the diversification of policy making to include more nongovernmental
actors, e.g., civil and nongovernment organizations, under the banner of good governance; growing recognition
of the importance of social capital; and practical applications in knowledge management and organizational
learning.
3 “Social networks” is an umbrella term that covers many forms and functions, with each node having distinct
relative worth. (Sometimes, nodes are used to represent events, ideas, or objects.) Communities of practice
are an important form. Others include policy and advocacy networks that work on problem identification
and agenda setting, policy formulation, policy implementation, and policy monitoring and evaluation; private-
public policy networks; knowledge networks; etc. (Increasingly, social networks are social communities of
the web, connected via electronic mail, websites and web logs, and networking applications such as Twitter,
FaceBook, Lotus Quickr, or LinkedIn.) Functions differ too, with nodes behaving as filters, amplifiers, investors
and providers, convenors, community builders, and/or facilitators.
4 In such instances, their strengths arise among others from (i) a unifying purpose and clear coordination structure;
(ii) multiple, interactive communications (spanning both horizontal and vertical dimensions) that encourage
simultaneous action, (iii) dynamism and creativity (owing to multiple, interactive communications between
members), (iv) consensus (born of like-minded actors who rally around shared interests or a common issue), (v)
strength in numbers, (vi) the quality and packaging of evidence, (vii) sustainability, and (viii) representativeness.
Knowledge
Solutions
2
Denition
The dening feature of social network analysis is
its focus on the structure of relationships, ranging
from casual acquaintance to close bonds.5 Social
network analysis assumes that relationships are
important. It maps and measures formal and infor-
mal relationships to understand what facilitates or
impedes the knowledge ows that bind interact-
ing units, viz., who knows whom, and who shares
what information and knowledge with whom by
what communication media (e.g., data and infor-
mation, voice, or video communications).6 (Be-
cause these relationships are not usually readily
discernible, social network analysis is somewhat
akin to an "organizational x-ray".) Social network
analysis is a method with increasing application
in the social sciences and has been applied in ar-
eas as diverse as psychology, health, business or-
ganization, and electronic communications. More
recently, interest has grown in analysis of leadership networks to sustain and strengthen their relationships
within and across groups, organizations, and related systems.
Benets
We use people to nd content, but we also use content to nd people. If they are understood better relation-
ships and knowledge ows can be measured, monitored, and evaluated, perhaps (for instance) to enhance
organizational performance. The results of a social network analysis might be used to:
Identify the individuals, teams, and units who play central roles.
Discern information breakdowns7, bottlenecks8, structural holes, as well as isolated individuals, teams,
and units.
Make out opportunities to accelerate knowledge ows across functional and organizational boundaries.
Strengthen the efciency and effectiveness of existing, formal communication channels.
Raise awareness of and reection on the importance of informal networks and ways to enhance their
organizational performance.
Leverage peer support.
Improve innovation and learning.
Rene strategies.
Development work, for one, is more often than not about social relationships. Hence, the social network
representation of a development assistance project or program would enable attention to be quickly focused
(to whatever level of complexity is required) on who is inuencing whom (both directly and indirectly).
(Outcome mapping is another method that attempts to shifts the focus from changes in state, viz., reduced
poverty, to changes in behaviors, relationships, actions, and activities.) Since a social network perspective
5 This is in contrast with other areas of the social sciences where the focus is often on the attributes of agents rather than on the relations
between them.
6 In contrast, an organization chart shows formal relationships only—who works where, and who reports to whom. Ten years ago, Henry
Mintzberg and Ludo Van der Heyden therefore suggested the use of “organigraphs” to map an organization’s functions and the ways
people organize themselves in it. See Henry Mintzberg and Ludo Van der Heyden. 1999. Organigraphs: Drawing How Companies Really
Work. Harvard Business Review. September-October: 87–94.
7 Breakdowns in information occur most often at one or more of five common boundaries: (i) functional (i.e., breakdowns between
individuals, teams, or units; (ii) geographic i.e., breakdowns between geographically separated locations); (iii) hierarchical (i.e.,
breakdowns between personnel of different levels), (iv) tenure (i.e., breakdowns between long-time personnel and new personnel);
and (v) organizational (i.e., breakdowns among leadership networks).
8 Bottlenecks are central nodes that provide the only connection between different parts of a network.
Figure 1: A Social Network
Source: Rachael King. 2006. CEO Guide to Technology: Social
Networks—Who’s Harnessing Social Networks? BusinessWeek.
Available:
http://images.businessweek.com/ss/06/09/ceo_socnet/source/1.htm
Social Network Analysis
3
is, inherently, a multi-actor perspective, social network analysis can also offset the limitations of logic models
(results frameworks).
Process
Typically, social network analysis relies on questionnaires and interviews to gather information about the re-
lationships within a dened group. The responses gathered are then mapped. (Social network analysis soft-
ware exists for the purpose.)9 This data gathering and
analysis process provides baseline information against
which one can then prioritize and plan interventions to
improve knowledge ows, which may entail recasting
social connections.
Notwithstanding the more complex processes fol-
lowed by some, which can entail sifting through sur-
feits of information with increasingly powerful social
network analysis software, social network analysis
encourages at heart participative and interpretative
approaches to the description and analysis of social
networks, preferably with a focus on the simplest and
most useful basics. Key stages of the basic process will
typically require practitioners to
Identify the network of individuals, teams, and
units to be analyzed.
Gather background information, for example by
interviewing senior managers and key staff to un-
derstand specic needs and issues.
Dene the objective and clarify the scope of the analysis, and agree on the reporting required.
Formulate hypotheses and questions.
Develop the survey methodology
Design the questionnaire, keeping questions short and straight to the point. (Both open-ended and closed
questions can be used.)10
Survey the individuals, teams, and units in the network to identify the relationships and knowledge ows
between them.
Use a social network analysis tool to visually map out the network.
Review the map and the problems and opportunities highlighted using interviews and/or workshops.
Design and implement actions to bring about desired changes.
Map the network again after a suitable period of time. (Social network analysis can also serve as an evalua-
tion tool.)
9 Sociograms, or visual representations of social networks, are important to understand network data and convey the result of the analysis.
Free and commercial social network analysis tools are at hand, each with different functionality. They include UCINET, Pajek, NetMiner, and
Netdraw. In each case, the graphics generated are based on three types of data and information: (i) the nodes that represent the individuals,
groups, or organizations being studied; (ii) the ties that represent the different relationships among the nodes (which may be insufficient,
just right, or excessive); and (iii) the attributes that make up the different characteristics of the individuals, groups, or organizations being
studied. Key measurements apply to the centrality of the social network analyzed; the make-up of its various subgroups (which can develop
their own subcultures and negative attitudes toward other groups); and the nature of ties (viz., direction, distance, and density).
10 Typical questions are: Who knows who and how well? How well do people know each other’s knowledge and skills? Who or what gives
people information about xyz? What resources do people use to find information about xyz? What resources do people use to share
information about xyz?
Figure 2: Formal versus Informal Structure in
a Petroleum Organization
Source: Rob Cross, Andrew Parker, Laurence Prusak, and Stephen
Borgatti. 2001. Knowing What We Know: Supporting Knowledge
Creation and Sharing in Social Networks. Organizational Dynamics.
Vol. 30, No. 2, pp. 100–120. Elsevier Science, Inc.
Exploration & Production
Senior Vice President
Jones
Jones
Exploration Drilling Production
Williams
Williams
G&G
Cohen
Cohen
Cross
Cross
Sen
Sen
O’Brien
O’Brien
Paine
Paine
Shapiro
Shapiro
Moore
Moore
Miller
Miller
Andrew
Andrew
Smith
Smith
Hughes
Hughes
Ramirez
Ramirez
Bell
Cole
Cole
Hussain Hussain
Kelly
Kelly
Petrophysical Production Reservoir
Taylor
Taylor
Stock
Stock
Knowledge
Solutions
4
Asian Development Bank
ADB, based in Manila, is dedicated to reducing poverty in the
Asia and Pacific region through inclusive economic growth,
environmentally sustainable growth, and regional integration.
Established in 1966, it is owned by 67 members—48 from the
region. In 2007, it approved $10.1 billion of loans, $673 million of
grant projects, and technical assistance amounting to $243 million.
Knowledge Solutions are handy, quick reference guides to tools,
methods, and approaches that propel development forward and
enhance its effects. They are offered as resources to ADB staff. They
may also appeal to the development community and people having
interest in knowledge and learning.
The views expressed in this publication are those of the author
and do not necessarily reflect the views and policies of the
Asian Development Bank (ADB) or its Board of Governors or the
governments they represent. ADB encourages printing or copying
information exclusively for personal and noncommercial use with
proper acknowledgment of ADB. Users are restricted from reselling,
redistributing, or creating derivative works for commercial purposes
without the express, written consent of ADB.
Asian Development Bank
6 ADB Avenue, Mandaluyong City
1550 Metro Manila, Philippines
Tel +63 2 632 4444
Fax +63 2 636 2444
knowledge@adb.org
www.adb.org/knowledgesolutions
Further Reading
ADB. 2008. Building Communities of Practice. Manila. Available: www.adb.org/documents/information/
knowledge-solutions/building-communities-practice.pdf
International Network for Social Network Analysis. 2008. Available: www.insna.org
For further information
Contact Olivier Serrat, Head of the Knowledge Management Center, Regional and Sustainable Development Department,
Asian Development Bank (oserrat@adb.org).
... Research on dealmakers has natural application to network theory, which has shown how social networks can influence greater social processes by accessing physical, financial, natural, and human capital (Serrat 2017) and can generate novel ideas (Borgatti and Halgin 2011). Social network analysis is focused on relationships (Tichy et al. 1979;Borgatti et al. 2009) and assumes that these relationships can be affected by proximity, formality, and centrality. ...
... As a result, this research builds upon the foundation of social network theory which assumes that relational networks represent power in social contexts (Serrat 2017). Furthermore, studies have shown that network centrality, in particular, has the potential for generating systemic power (Ibarra and Andrews 1993). ...
Article
Full-text available
Networks of serial entrepreneurs, investors, and their affiliated companies play a critical role in driving entrepreneurial behavior, investor focus, and innovation hot spots within specific industry sectors and are critical for shaping the character of robust regional economies. This research explores the impact of “dealmakers” Zoller ( 2010; Senor and Singer 2009) who are actors that have founded, managed, or invested in multiple private entrepreneurial firms, and hold concurrent equity ties to multiple firms. By studying the scope and connectivity of the dealmaker network within the Tampa area metropolitan statistical area, this study attempts to move the literature beyond aggregate analyses of social capital Feldman & Zoller (Regional Studies, 46: 23–37, 2012) to focus on the individuals within a specific regional ecosystem who drive entrepreneurial performance. The results of this study are influential for scholars of social network theory and for private individuals searching for strategic partners, targeting serial investors, performing competitive analysis, and gaining access to investor and entrepreneur networks. For the economic development community, this dealmaker analysis delivers fresh insight for strategic implementation of cluster and sector development and for the stimulation of inter-regional marketing, recruitment, and business development efforts.
... Social network analysis is a method of increasing use in the social sciences and in diverse fields such as psychology, health, business organization and electronic communications. Recently, interest in the analysis of leadership networks has grown to strengthen and strengthen relationships across groups, organizations, and systems [7]. Diagnosis of the association in complex networks One of the most important issues to consider when analyzing these types of networks is the majority of studies in the field of association detection, through the analysis of network communications, identifying the association [8]. ...
Article
Full-text available
Social network analysis helps discover communities and interactions between users. A community is a group of users with high communication density in that group. Although many algorithms have been developed to identify communities, most are inefficient in terms of processing time and cost for large-scale social networks. In this research, we present a simple and efficient algorithm for social recognition in social networks that does not require any prior knowledge about the number of network communities. Most existing methods of community recognition examine the structure of the social network graph without considering issues and interactions between users. In the proposed method, in addition to considering the communication topology between users, we also consider the tweets used by them. The proposed system consists of three general steps. In the first step, the similarity between each user pair is calculated on the basis of a hybrid clustering method. Initial assemblages are based on the similarity matrix in the second step. Finally, in the third stage, using the cuckoo optimization algorithm, the initial clusters are combined and the final clusters are created. In the cuckoo algorithm, the performance of each solution is evaluated using the metrics evaluation criterion on Twitter's social network. The results show better performance of the proposed method in different criteria than CC-GA and MDCL methods.
... More so, researches peculiar to network analysis consider the identification of communities as a critical task as it provides vital information which proffer solution to real-time problems. [4][5]. ...
Article
Full-text available
Criminal networks analysis has attracted several numbers of researchers as network analysis gained its popularity among professionals and researchers. In this study, we have presented a comprehensive review of community detection methods based on graph analysis. The concept of community was vividly discussed as well as the algorithms for detecting communities within a network. Broad categorization of community detection algorithms was also discussed as well as a thorough review of detection algorithms which has been developed, implemented and evaluated by several authors in social network analysis. Most importantly, a strict review of researches based on the detection of a community in a criminal network was carried out revealing the strength and limitations of criminal network community detection methods. Thus, itbecomes obvious through this study that more research activities is necessary and expected in order to further grow this research area.
... It has proven to be a powerful tool to understand large and complex interactions. Serrat (2009) Porta et al. (1999)). ...
Thesis
Full-text available
Oil palm plantation is complementing tropical forest landscape in Indonesia and Malaysia. The plantation corporations have central responsibilities to produce palm oil sustainably. Sustainable palm oil is becoming a controversial issue between south and north nations. Decisions made by the oil palm plantation corporations varied. Government-linked companies (GLCs) and family-owned businesses (FoBs) are the main players among the oil palm plantation corporations. There is a major gap in understanding what drives GLCs’ and FoBs’ decision-making in the issue of sustainable palm oil. Understanding what drives their decision-making, be it their control patterns or other factors is of extreme importance for the sustainability of agricultural sectors worldwide. This study analysed whether the control and decision-making are determined by the type of owner, i.e. the government or a family. This research quantified and assessed the ownership and control patterns of two very different types of plantation corporations. GLCs (Sime Darby, Boustead, IJM Plantations, and Kulim) and FoBs (IOI Corp, KLK, Genting Plantations, and Jaya Tiasa) are compared for their similarities and differences, and finally, analysed their decision-making control. A network analysis was employed in quantifying and analysing the corporate structures of eight major Malaysian oil palm corporations consist of 4,331 companies’ shareholding data, covering ten levels of shareholding. The shareholdings data generated network topology graphs with its network centrality metrics (structural control (betweenness) and decisions load (stress)) for each corporation. Linear regression models showed a linear pattern of increasing decisions load as the structural control increases. The results may contradict with some other studies and it opens a new field of research and analysis of corporations, regardless of their ownership type/identity (government-owned or family-owned). This method allows us to evaluate the ownership topology structure quantitatively and qualitatively. Furthermore, these companies can be ranked based on the analysis used in this research.
Article
Full-text available
Natural language processing (NLP) is an effective tool for generating structured information from unstructured data, the one that is commonly found in clinical trial texts. Such interdisciplinary research has gradually grown into a flourishing research field with accumulated scientific outputs available. In this study, bibliographical data collected from Web of Science, PubMed, and Scopus databases from 2001 to 2018 had been investigated with the use of three prominent methods, including performance analysis, science mapping, and, particularly, an automatic text analysis approach named structural topic modeling. Topical trend visualization and test analysis were further employed to quantify the effects of the year of publication on topic proportions. Topical diverse distributions across prolific countries/regions and institutions were also visualized and compared. In addition, scientific collaborations between countries/regions, institutions, and authors were also explored using social network analysis. The findings obtained were essential for facilitating the development of the NLP-enhanced clinical trial texts processing, boosting scientific and technological NLP-enhanced clinical trial research, and facilitating inter-country/region and inter-institution collaborations.
Article
Full-text available
Image forgery is an active topic in digital image tampering that is performed by moving a region from one image into another image, combining two images to form one image, or retouching an image. Moreover, recent developments of generative adversarial networks (GANs) that are used to generate human facial images have made it more challenging for even humans to detect the tampered one. The spread of those images on the internet can cause severe ethical, moral, and legal issues if the manipulated images are misused. As a result, much research has been conducted to detect facial image manipulation based on applying machine learning algorithms on tampered face datasets in the last few years. This paper introduces a deep learning-based framework that can identify manipulated facial images and GAN-generated images. It is comprised of multiple convolutional layers, which can efficiently extract features using multi-level abstraction from tampered regions. In addition, a data-based approach, cost-sensitive learning-based approach (class weight), and ensemble-based approach (eXtreme Gradient Boosting) is applied to the proposed model to deal with the imbalanced data problem (IDP). The superiority of the proposed model that deals with an IDP is verified using a tampered face dataset and a GAN-generated face dataset under various scenarios. Experimental results proved that the proposed framework outperformed existing expert systems, which has been used for identifying manipulated facial images and GAN-generated images in terms of computational complexity, area under the curve (AUC), and robustness. As a result, the proposed framework inspires the development of research on image forgery identification and enables the potential to integrate these models into practical applications, which require tampered facial image detection.
Research
Full-text available
This is the era of big data .it refers to large amount of data set whose size is growing at a vast speed and it is collection of dataset that are not only big, but also high in variety and velocity, which makes them difficult to handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be studied and provided in order to handle and extract value and knowledge from these datasets. To handle such large amount of data using traditional software tools available. This paper reviews the technologies and challenges related to big data analytics. First introduce general definition of big data second essential technologies related big data analytics like hadoop, map reduce framework etc. and third challenges arising from big data analytics.
Research
This is the era of big data .it refers to large amount of data set whose size is growing at a vast speed and it is collection of dataset that are not only big, but also high in variety and velocity, which makes them difficult to handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be studied and provided in order to handle and extract value and knowledge from these datasets. To handle such large amount of data using traditional software tools available. This paper reviews the technologies and challenges related to big data analytics. First introduce general definition of big data second essential technologies related big data analytics like hadoop, map reduce framework etc. and third challenges arising from big data analytics.
Article
Full-text available
Big data analytics is a trending practice that many companies are adopting. The analytics process includes the deployment and use of big data analytics tools, that improves operational efficiency, drive new revenue and gain competitive advantages over business rivals. The descriptive analytics focuses on describing something that has already happened, as well as suggesting its root causes. Descriptive analytics, which remains the lion's share of the analysis performed, typically hinges on basic querying, reporting and visualization of historical data. Alternatively, more complex predictive and prescriptive modeling can help companies anticipate business opportunities and make decisions that affect profits in areas such as targeting marketing campaigns, reducing customer churn and avoiding equipment failures. With predictive analytics, historical data sets are mined for patterns indicative of future situations and behaviors, while prescriptive analytics subsumes the results of predictive analytics to suggest actions that will best take advantage of the predicted scenarios.
ResearchGate has not been able to resolve any references for this publication.