Search Results

You are looking at 1 - 10 of 15 items for :

  • "Author cocitation analysis" x
Clear All

Abstract  

The method of author cocitation analysis (ACA) was first presented by White and Griffith in 1981 as a “literature measure of intellectual structure” and its applicability for the mapping of areas of science has since then been tested in various bibliometric science mapping studies. In this study, an experimental method of calculating the first or single author cocitation frequency is presented and compared with the standard method. Applying Ward’s method of clustering, the analysis revealed that the two approaches did not produce similar results and a tentative interpretation of deviations was that the experimental method provided with a more detailed depiction of the specialty structure. It was also concluded that a number of additional research questions need to be resolved before a comprehensive understanding of the suggested method’s merits and demerits is reached.

Restricted access

Introduction Author cocitation analysis (ACA) has been a mature and widely accepted method of discovering the intellectual structure of a given filed after the proposal by White and Griffith ( 1981 ). The principle of ACA is

Restricted access
Scientometrics
Authors: Katherine W. McCain and William E. Snizek

–1995 JASIS 49 4 327 – 355 . White , H. D. 2003 Pathfinder networks and author cocitation analysis: A remapping of paradigmatic

Restricted access

Summary Parallel mappings of the intellectual and cognitive structure of Software Engineering (SE) were conducted using Author Cocitation Analysis (ACA), PFNet Analysis, and card sorting, a Knowledge Elicitation (KE) method. Cocitation counts for 60 prominent SE authors over the period 1990 - 1997 were gathered from SCISEARCH. Forty-six software engineers provided similar data by sorting authors’ names into labeled piles. At the 8 cluster level, ACA and KE identified similar author clusters representing key areas of SE research and application, though the KE labels suggested some differences between the way that the authors’ works were used and how they were perceived by respondents. In both maps, the clusters were arranged along a horizontal axis moving from “micro” to “macro” level R&D activities (correlation of X axis coordinates = 0.73). The vertical axis of the two maps differed (correlation of Y axis coordinates = -0.08). The Y axis of the ACA map pointed to a continuum of high to low formal content in published work, whereas the Y axis of the KE map was anchored at the bottom by “generalist” authors and at the top by authors identified with a single, highly specific and consistent specialty. The PFNet of the raw ACA counts identified Boehm, Basili, and Booch as central figures in subregions of the network with Boehm being connected directly or through a single intervening author with just over 50% of the author set. The ACA and KE combination provides a richer picture of the knowledge domain and provide useful cross-validation.

Restricted access

. 2003 Author cocitation analysis and Pearson's r Journal of the American Society for Information Science and Technology 54 13 1250 – 1259 .

Restricted access

-centered bibliometrics through CAMEOs: Characterizations automatically made and edited online . Scientometrics , 51 : 607 – 637 . WHITE , H. D. ( 2003 ), Pathfinder networks and author cocitation analysis: A

Restricted access

Pearson's r and author cocitation analysis: A commentary on the controversy . Journal of the American Society for Information Science and Technology 55 10 935 10.1002/asi.20028 . Björneborn , L. ( 2004

Restricted access

Similarity measures, author cocitation analysis, and information theory . Journal of the American Society for Information Science and Technology 56 7 769 – 772 10.1002/asi.20130 . Qin , H 1999

Restricted access

Pathfinder networks and author cocitation analysis: A remapping of paradigmatic information scientists . Journal of the American Society for Information Science 54 5 423 – 434 10.1002/asi.10228 . White

Restricted access

comparison of similarity measures is discussed at length by Schneider and Borlund ( 2007a , b ) in an author cocitation analysis context, though. These authors remark that the transformation of a symmetric proximity matrix X into a corresponding matrix Y

Restricted access