Browse Definitions :
Definition

sociogram

Contributor(s): Corinne Bernstein

A sociogram is a graph database that depicts the relationships among individuals in a group in order to map the group's social network. Social scientist Jacob L. Moreno developed the sociogram in the mid-20th century as a quantitative method for analyzing social relationships in prisons and reform schools. His goal was to create a sociometric tool that would help administrators learn how reciprocal and non-reciprocal communication patterns, status, alliances and hidden agendas affected a group's ability to remain cohesive.

Sociograms for small groups can often be created through direct observation, but large group mapping benefits by surveys that ask questions about an individual's relationships with other group members. In business, sociograms are often used to gain insights that will help create more effective communication patterns, improve members' active participation on projects and foster a culture of innovationThis is especially important in large organizations with hierarchial corporate cultures.

Facebook CEO Mark Zuckerberg is credited with first using the term social graph in 2007 to refer to the network of connections and relationships documented by Facebook members. As marketers began to understand the potential for using sociograms to improve revenue, software developers responded by making it easier to find group leaders and experiment with influencer marketing campaigns. 

See also: Apache Girafe, Graph Search

This was last updated in June 2018

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close