Exploring Possibility Space

Musings on risk, innovation, data science & my PhD dissertation

Showing posts with label social network analysis. Show all posts
Showing posts with label social network analysis. Show all posts

Thursday, September 26, 2013

Preso: Does DOE Distort CleanTech VC Co-investment Networks? (A: No)

Here's the presentation I gave today at the Atlanta Conference on Science and Innovation Policy:
  • Does US Dept of Energy (DOE) Distort CleanTech VC Co-investment Networks? - A Social Network Analysis
Here's a few highlights.

Read more »
Posted by Russell Thomas at 9:29 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: journals and conferences, presentations, social network analysis
Older Posts Home
Subscribe to: Comments (Atom)

Russell Cameron Thomas
Principal Modeler for Cyber Risk at Risk Management Solutions and a PhD Candidate in Computational Social Science at George Mason University. Focus: risk analysis, innovation ecosystem analysis, and Agent-based Modeling (ABM). Shameless crosser of boundaries and mixer of metaphors.

You can follow me on Twitter here. I only accepted LinkedIn requests from people I know personally. I'm not on Facebook -- here's why.

My Google Scholar profile
My University page
My ReserchGate page

Follow this blog on Twitter

Follow @ExplPossibility

Most Popular Posts

  • Poor Software QA Is Root Cause of TAY-FAIL (Microsoft's AI Twitter Bot)
  • How to aggregate ground-truth metrics into a performance index
  • Ten Dimensions of Cyber Security Performance
  • Risk Management: Out with the Old, In with the New!
  • Ideal book for self-study: "Doing Bayesian Data Analysis"
  • Microsoft #TAYFAIL Smoking Gun: ALICE Open Source AI Library and AIML
  • The Cyber Insurance Emperor Has No Clothes
  • Microsoft's Tay Has No AI
  • #Tay Twist: @Tayandyou Twitter Account Was Hijacked ...By Bungling Microsoft Test Engineers (Mar. 30)
  • Tutorial: How Fat-Tailed Probability Distributions Defy Common Sense and How to Handle Them

Blog Archive

  • ▼  2020 (5)
    • ▼  May (2)
      • Look Papa! I'm on the Loopcast! -- Talking complex...
      • S4x20 Video: Lessons Learned from Norsk Hydro on L...
    • ►  April (2)
    • ►  January (1)
  • ►  2019 (6)
    • ►  November (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (1)
  • ►  2018 (4)
    • ►  December (1)
    • ►  November (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2016 (16)
    • ►  October (2)
    • ►  June (1)
    • ►  April (1)
    • ►  March (5)
    • ►  February (2)
    • ►  January (5)
  • ►  2015 (4)
    • ►  August (2)
    • ►  April (2)
  • ►  2014 (26)
    • ►  October (2)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (9)
    • ►  February (6)
    • ►  January (6)
  • ►  2013 (68)
    • ►  November (3)
    • ►  October (4)
    • ►  September (7)
    • ►  August (7)
    • ►  July (36)
    • ►  June (11)

Search this blog, linked pages, and blog roll

Translate

Labels

cyber security (47) information security (31) risk (26) framework (23) presentations (21) uncertainty (20) other (18) PhD work (13) data analysis (13) innovation (13) black swans (12) journals and conferences (12) metrics (11) probability (11) surprise (11) complexity (10) simulation (9) visualization (8) statistics (7) humor (6) personal (6) philosophy (6) tools (6) tutorial (6) game theory (5) sociology (5) possibility space (4) scientific method (4) war chariots (4) cyber insurance (3) data science (3) resources (3) finance (2) implementation (2) management (2) practices (2) quotes (2) data breach (1) open access (1) privacy (1) social network analysis (1) valuation (1)

Subscribe via email

Enter your email address:

Delivered by FeedBurner

Subscribe To

 Subscribe in a reader

Blog roll

  • New School of Information Security
  • orgtheory.net
  • Bob Rudis Blog
  • Daniel Blander blog
  • Thumbing ... (Saso Virag)
  • Jack Whitsitt: Art & Security in DC
  • Bad Hessian
  • Biased Transmission (Matt Zimmerman)
  • Graphing Wonderland (Ally Miller)
  • Rethinking Security (Adam Elkus)
  • Risktical Ramblings (Chris Hayes)
  • Free Range Security (Nathaniel Husted)
  • Cognitive Dissidents (Josh Corman)
  • Spire Security (Pete Lindstrom)
  • Behavioral Security (Jay Jacobs)
  • Lockstep Blog (Steve Wilson)
  • CXOWARE (Jack Jones)
  • Verizon Enterprise Security Blog
  • The Risk I/O Blog
  • Society of Information Risk Analysts
  • The Risk Shokunin
  • Scott Crawford blog
Tweets by @MrMeritology

Total Pageviews

Credits

Banner image: Anthony Mattox. A particle system scripted in Processing with springs and complex interparticle and perlin noise based forces to generate undulating ribbons.

Web site design: RCT
© 2013 Russell Cameron Thomas. Simple theme. Powered by Blogger.