Liaquat Hossain

Learn More
In this study, we develop a theoretical model based on social network theories and analytical methods for exploring collaboration (co-authorship) networks of scholars. We use measures from social network analysis (SNA) (i.e., normalized degree centrality, normalized closeness centrality, normalized betweenness centrality, normalized eigenvector centrality,(More)
We analyze whether preferential attachment in scientific coauthorship networks is different for authors with different forms of centrality. Using a complete database for the scientific specialty of research about ―steel structures,‖ we show that betweenness centrality of an existing node is a significantly better predictor of preferential attachment by new(More)
In this study, we propose and validate social networks based theoretical model for exploring scholars’ collaboration (co-authorship) network properties associated with their citation-based research performance (i.e., gindex). Using structural holes theory, we focus on how a scholar’s egocentric network properties of density, efficiency and constraint within(More)
In this study, we draw on network centrality concepts and coordination theory to understand how project team members interact when working towards a common goal. A text-mining application based on the constructs of coordination theory was developed to measure the coordinative activity of each employee. Results show that high network centrality is correlated(More)
Several studies exist which use scientific literature for comparing scientific activities (e.g., productivity, and collaboration). In this study, using co-authorship data over the last 40 years, we present the evolutionary dynamics of multi level (i.e., individual, institutional and national) collaboration networks for exploring the emergence of(More)
Monitoring threats to information security is increasingly becoming important to protecting secured organizational documents. There is increasing number of threats to information security, which originates from the internal users of the system. Insider is defined as a trusted person and has access to classified documents. Our focus here is on understanding(More)
Coordination theory provides a theoretical framework for analysing complex processes of project groups working towards a common goal. In this study, we explore the relationship between coordination and social networks for the development of a network-based coordination model. This model is applied to measure the performance and quality of complex and(More)