Skip to main content
Top
Published in: Information Systems Frontiers 6/2017

01-06-2017

A study on the author collaboration network in big data*

Authors: Yufang Peng, Jin Shi, Marcelo Fantinato, Jing Chen

Published in: Information Systems Frontiers | Issue 6/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In order to obtain a deeper understanding of the collaboration status in the big data field, we investigated the author collaboration groups and the core author collaboration groups as well as the collaboration trends in big data by combining bibliometric analysis and social network analysis. A total of 4130 papers from 13,759 authors during the period of 2011–2015 was collected. The main results indicate that 3483 of the papers are coauthored (i.e., 84.33% of all papers) from 12,016 coauthors (i.e., 87.33% of all authors), which represent a reputable level of collaboration. On the other hand, 91.83% of all the identified coauthors have published only one paper so far, reflecting a poor level of maturity of such authors. Through social network analysis, we observed that the author collaboration network is composed of small author collaboration groups and also that the authors are mainly from the computer science & technology field. As an important contribution of our study, we further analyzed the author collaboration network, culminating in the generalization of four subnet modes, which were defined by some papers: ‘dual-core’, ‘complete’, ‘bridge’ and ‘sustainable development’. It was found that the dual-core mode stands for the stage that researchers have just begun to study big data. Beginning of big data research, the complete mode tends to joint research, both the dual-core and complete modes are mostly engaged in the same project, and the bridge mode and the sustainable development mode represent, respectively, the popular and valued directions in the big data field. The results of this study can be useful for researchers interested in finding suitable partners in the big data field. By tracking the core authors and the key author collaboration groups, one can learn about the current developments in the big data field as well as predict the development prospects of such a field. Therefore, we expect with the results of our study summarized in this paper to contribute to a faster development of the big data field.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Chen, C., & Paul, R. J. (2001). Visualizing a knowledge domain’s intellectual structure. IEEE Computer, 34(3), 65–71.CrossRef Chen, C., & Paul, R. J. (2001). Visualizing a knowledge domain’s intellectual structure. IEEE Computer, 34(3), 65–71.CrossRef
go back to reference Dou, W., Zhang, X., Liu, J., et al. (2015). HireSome-II: Towards privacy-aware cross-cloud service composition for big data applications. Parallel & Distributed Systems IEEE Transactions, 26(2), 455–466.CrossRef Dou, W., Zhang, X., Liu, J., et al. (2015). HireSome-II: Towards privacy-aware cross-cloud service composition for big data applications. Parallel & Distributed Systems IEEE Transactions, 26(2), 455–466.CrossRef
go back to reference Freeman, L. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1), 35–41.CrossRef Freeman, L. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1), 35–41.CrossRef
go back to reference Freeman, L. (1979). Centrality in social networks. 1. Conceptual clarification. Social Networks, 1, 215–239.CrossRef Freeman, L. (1979). Centrality in social networks. 1. Conceptual clarification. Social Networks, 1, 215–239.CrossRef
go back to reference Freeman, L. (2000). Visualizing social networks. Journal of social. Structure, 1(1), 1–15. Freeman, L. (2000). Visualizing social networks. Journal of social. Structure, 1(1), 1–15.
go back to reference Fu, Y., Niu, W. Y., Wang, Y. L., & Li, D. (2009). Co-author Network analysis in the scientific field - take "science research management" (2004-2008) as an example. Research Management in Chinese, 30(3), 41–46. Fu, Y., Niu, W. Y., Wang, Y. L., & Li, D. (2009). Co-author Network analysis in the scientific field - take "science research management" (2004-2008) as an example. Research Management in Chinese, 30(3), 41–46.
go back to reference Garfield, E. (1979). Citation indexing—Its theory and application in science, technology, and humanities. New York: Wiley. Garfield, E. (1979). Citation indexing—Its theory and application in science, technology, and humanities. New York: Wiley.
go back to reference Huang, Y. Q. (2014). A study on the analysis of the research hotpots and development trends of big data overseas. Journal of Intelligence in Chinese, 6, 99–104. Huang, Y. Q. (2014). A study on the analysis of the research hotpots and development trends of big data overseas. Journal of Intelligence in Chinese, 6, 99–104.
go back to reference Kretschmer, H., & Aguillo, I. (2004). Visibility of collaboration on the web. Scientometrics, 61(3), 405–426. Kretschmer, H., & Aguillo, I. (2004). Visibility of collaboration on the web. Scientometrics, 61(3), 405–426.
go back to reference Li. Y., Zhang, Z. Q. (2010). Effect evaluation method Intelligence research Core authors partnerships. Information Science in Chinese, 29(10), 80–83. Li. Y., Zhang, Z. Q. (2010). Effect evaluation method Intelligence research Core authors partnerships. Information Science in Chinese, 29(10), 80–83.
go back to reference Liu, J. (2004). Study on document author 's distribution regulation—— A review of 15 years research articles on Lotka’s& Price’s Laws in China. Information Science in Chinese, 1(22), 123–128. Liu, J. (2004). Study on document author 's distribution regulation—— A review of 15 years research articles on Lotka’s& Price’s Laws in China. Information Science in Chinese, 1(22), 123–128.
go back to reference Liu, Z. H., & Zhang, Z. Q. (2010). Author keywords coupling analysis and empirical study. Information Technology in Chinese, 29(2), 268–275. Liu, Z. H., & Zhang, Z. Q. (2010). Author keywords coupling analysis and empirical study. Information Technology in Chinese, 29(2), 268–275.
go back to reference Liu, C., Zhang, X., Liu, C., et al. (2013). An iterative hierarchical key exchange scheme for secure scheduling of big data applications in cloud computing[C]// proceedings of the 2013 12th IEEE International conference on trust, security and privacy in computing and communications (pp. 9–16). New York: IEEE Computer Society. Liu, C., Zhang, X., Liu, C., et al. (2013). An iterative hierarchical key exchange scheme for secure scheduling of big data applications in cloud computing[C]// proceedings of the 2013 12th IEEE International conference on trust, security and privacy in computing and communications (pp. 9–16). New York: IEEE Computer Society.
go back to reference Liu, C., Chen, J., Yang, L. T., et al. (2014). Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2234–2244.CrossRef Liu, C., Chen, J., Yang, L. T., et al. (2014). Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2234–2244.CrossRef
go back to reference Ma, T., Rong, H., Ying, C., Tian, Y., Al-Dhelaan, A., & Al-Rodhaan, M. (2016). Detect structural-connected communities based on BSCHEF in C-DBLP. Concurrency and Computation: Practice and Experience, 28(2), 311–330. Ma, T., Rong, H., Ying, C., Tian, Y., Al-Dhelaan, A., & Al-Rodhaan, M. (2016). Detect structural-connected communities based on BSCHEF in C-DBLP. Concurrency and Computation: Practice and Experience, 28(2), 311–330.
go back to reference Newman, M. E. J. (2004). Coauthorship networks and patterns of scientific collaboration. Proceedings of the National Academy of Sciences of the United States of America, 101(1), 5200–5205.CrossRef Newman, M. E. J. (2004). Coauthorship networks and patterns of scientific collaboration. Proceedings of the National Academy of Sciences of the United States of America, 101(1), 5200–5205.CrossRef
go back to reference Otte, E., & Rousseau, R. (2002). Social network analysis a powerful strategy, also for the information sciences. Journal of Information Science, 28(6), 441–453. Otte, E., & Rousseau, R. (2002). Social network analysis a powerful strategy, also for the information sciences. Journal of Information Science, 28(6), 441–453.
go back to reference Peng, X. X., Zhu, Q. H., & Shen, C. (2013). The collaborative research of social computing based on social network analysis. Journal of Intelligence in Chinese, 3, 93–100. Peng, X. X., Zhu, Q. H., & Shen, C. (2013). The collaborative research of social computing based on social network analysis. Journal of Intelligence in Chinese, 3, 93–100.
go back to reference Qiu, J. P., & Wu, C. (2011). Study on the co-author relationship of Informetrics based on social network analysis. Information and Knowledge in Chinese, 6, 12–15. Qiu, J. P., & Wu, C. (2011). Study on the co-author relationship of Informetrics based on social network analysis. Information and Knowledge in Chinese, 6, 12–15.
go back to reference Ren, Y., Shen, J., Wang, J., et al. (2015). Mutual verifiable provable data auditing in public cloud storage[J]. Journal of Internet Technology, 16(2), 317–323. Ren, Y., Shen, J., Wang, J., et al. (2015). Mutual verifiable provable data auditing in public cloud storage[J]. Journal of Internet Technology, 16(2), 317–323.
go back to reference Wang, D. (2008). An empirical study of network structure analysis in co-authorship. Information Science in Chinese, 26(11), 1735–1739. Wang, D. (2008). An empirical study of network structure analysis in co-authorship. Information Science in Chinese, 26(11), 1735–1739.
go back to reference Wang, B. L. (2015). Research on big data on scientometrics and visualization analysis. Journal of Intelligence in Chinese, 2, 131–136. Wang, B. L. (2015). Research on big data on scientometrics and visualization analysis. Journal of Intelligence in Chinese, 2, 131–136.
go back to reference Wang, Y. B., Guo, X., & Wang, J. M. (2014). Study on the theme of big data based on co-ward analysis. Library Tribune in Chinese, 8, 96–102. Wang, Y. B., Guo, X., & Wang, J. M. (2014). Study on the theme of big data based on co-ward analysis. Library Tribune in Chinese, 8, 96–102.
go back to reference Yang, C., Zhang, X., Zhong, C., et al. (2014). A spatiotemporal compression based approach for efficient big data processing on cloud. Journal of Computer and System Sciences, 80(8), 1563–1583.CrossRef Yang, C., Zhang, X., Zhong, C., et al. (2014). A spatiotemporal compression based approach for efficient big data processing on cloud. Journal of Computer and System Sciences, 80(8), 1563–1583.CrossRef
go back to reference Yoshikane, F., Takayuki, N., & Keita, T. (2005). Comparative analysis of co-authorship networks considering authors’ roles in collaboration: Differences between the theoretical and application areas. ISSI, 2, 509–516. Yoshikane, F., Takayuki, N., & Keita, T. (2005). Comparative analysis of co-authorship networks considering authors’ roles in collaboration: Differences between the theoretical and application areas. ISSI, 2, 509–516.
go back to reference Yoshikane, F., Nozawa, T., & Tsuji, K. (2006). Comparative analysis of co-authorship networks considering authors’ roles in collaboration: Differences between the theoretical and application areas. Scientomentrics, 68(3), 643–655.CrossRef Yoshikane, F., Nozawa, T., & Tsuji, K. (2006). Comparative analysis of co-authorship networks considering authors’ roles in collaboration: Differences between the theoretical and application areas. Scientomentrics, 68(3), 643–655.CrossRef
go back to reference Zhang, X., Liu, C., & Surya, N. (2013a). SaC-FRAPP: A scalable and cost-effective framework for privacy preservation over big data on cloud. Concurrency & Computation Practice & Experience, 25(18), 2561–2576.CrossRef Zhang, X., Liu, C., & Surya, N. (2013a). SaC-FRAPP: A scalable and cost-effective framework for privacy preservation over big data on cloud. Concurrency & Computation Practice & Experience, 25(18), 2561–2576.CrossRef
go back to reference Zhang, X., Yang, C., Nepal, S., et al. (2013b). A MapReduce based approach of scalable multidimensional anonymization for big data privacy preservation on cloud[C]// 2013 International conference on cloud and green computing (pp. 105–112). New York: IEEE Computer Society. Zhang, X., Yang, C., Nepal, S., et al. (2013b). A MapReduce based approach of scalable multidimensional anonymization for big data privacy preservation on cloud[C]// 2013 International conference on cloud and green computing (pp. 105–112). New York: IEEE Computer Society.
go back to reference Zhao, J., Wang, L., Jie, T., et al. (2014). A security framework in G-Hadoop for big data computing across Distributed cloud data Centres. Journal of Computer and System Sciences, 80(5), 994–1007.CrossRef Zhao, J., Wang, L., Jie, T., et al. (2014). A security framework in G-Hadoop for big data computing across Distributed cloud data Centres. Journal of Computer and System Sciences, 80(5), 994–1007.CrossRef
Metadata
Title
A study on the author collaboration network in big data*
Authors
Yufang Peng
Jin Shi
Marcelo Fantinato
Jing Chen
Publication date
01-06-2017
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 6/2017
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-017-9771-1

Other articles of this Issue 6/2017

Information Systems Frontiers 6/2017 Go to the issue

Premium Partner