Browse Definitions :
Definition

sociogram

A sociogram is a graph database that depicts the relationships among individuals in a group in order to map the group's social network. Social scientist Jacob L. Moreno developed the sociogram in the mid-20th century as a quantitative method for analyzing social relationships in prisons and reform schools. His goal was to create a sociometric tool that would help administrators learn how reciprocal and non-reciprocal communication patterns, status, alliances and hidden agendas affected a group's ability to remain cohesive.

Sociograms for small groups can often be created through direct observation, but large group mapping benefits by surveys that ask questions about an individual's relationships with other group members. In business, sociograms are often used to gain insights that will help create more effective communication patterns, improve members' active participation on projects and foster a culture of innovationThis is especially important in large organizations with hierarchial corporate cultures.

Facebook CEO Mark Zuckerberg is credited with first using the term social graph in 2007 to refer to the network of connections and relationships documented by Facebook members. As marketers began to understand the potential for using sociograms to improve revenue, software developers responded by making it easier to find group leaders and experiment with influencer marketing campaigns. 

See also: Apache Girafe, Graph Search

This was last updated in June 2018

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

  • information security (infosec)

    Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of ...

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close