Who is Key? - Value Adding Users in Enterprise Social Networks

Whereas the use of Enterprise Social Networks (ESN) is a pervasive topic in research and practice, both parties are still struggling to come to a better understanding of the role and impact of ESN in and on knowledge-intensive corporate work. As a part of this phenomenon, employees who communicate their knowledge in ESN helping other users to do their daily work play a decisive role. We need to come to a better understanding of the role and behaviour of such value adding users. This is a prerequisite, for example, for understanding knowledge support hubs or for enabling more effective internal information and knowledge sharing. Against this background, we investigate the structural characteristics of value adding users in ESN using qualitative text analysis and Social Network Analysis. Based on a large scale dataset of a global consulting company using the ESN Yammer.com we analyse the social relationships of value adding users. We confirm their significant position and draw conclusions for research and practice.

[1]  J. Fleiss Measuring nominal scale agreement among many raters. , 1971 .

[2]  Kate Ehrlich,et al.  Diversity among enterprise online communities: collaborating, teaming, and innovating through social media , 2012, CHI.

[3]  L. Freeman,et al.  Centrality in social networks: ii. experimental results☆ , 1979 .

[4]  Mark Wallace,et al.  The Effects of the Social Structure of Digital Networks on Viral Marketing Performance , 2008, Inf. Syst. Res..

[5]  Alexander Richter,et al.  Methods And Metrics For Measuring The Success Of Enterprise Social Software - What We Can Learn From Practice And Vice Versa , 2013, ECIS.

[6]  Alexander Richter,et al.  Success Measurement of Enterprise Social Networks , 2013, Wirtschaftsinformatik.

[7]  Michael J. Muller,et al.  Motivations for social networking at work , 2008, CSCW.

[8]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[9]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[10]  Stephen P. Borgatti,et al.  Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.

[11]  Steven B. Andrews,et al.  Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.

[12]  J. R. Landis,et al.  The measurement of observer agreement for categorical data. , 1977, Biometrics.

[13]  Yi Wang,et al.  Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies , 2013, Comput. Networks.

[14]  P. Bonacich Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.

[15]  Johan Bollen,et al.  Journal status , 2006, Scientometrics.

[16]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[17]  Scott A. Golder,et al.  Blogging at work and the corporate attention economy , 2009, CHI.

[18]  Lisa Kaati,et al.  Social positions and simulation relations , 2011, Social Network Analysis and Mining.

[19]  Robert E. Kraut,et al.  Editorial Overview - The Interplay Between Digital and Social Networks , 2008, Inf. Syst. Res..

[20]  S. Borgatti,et al.  The Network Paradigm in Organizational Research: A Review and Typology , 2003 .

[21]  Matthias Trier,et al.  Research Note - Towards Dynamic Visualization for Understanding Evolution of Digital Communication Networks , 2008, Inf. Syst. Res..

[22]  Stephen P. Borgatti,et al.  Centrality and network flow , 2005, Soc. Networks.

[23]  Lynn Wu,et al.  Social Network Effects on Productivity and Job Security: Evidence from the Adoption of a Social Networking Tool , 2012, Inf. Syst. Res..

[24]  Mark J. Safferstone Information Rules: A Strategic Guide to the Network Economy , 1999 .

[25]  Samer Faraj,et al.  Lurking: Legitimate or Illegitimate Peripheral Participation? , 2006, ICIS.

[26]  M. Sarvary,et al.  Network Effects and Personal Influences: The Diffusion of an Online Social Network , 2011 .

[27]  Werner Geyer,et al.  People Sensemaking and Relationship Building on an Enterprise Social Network Site , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[28]  S. Kiesler,et al.  Applying Common Identity and Bond Theory to Design of Online Communities , 2007 .

[29]  Paul A. Pavlou,et al.  Visions and Voices on Emerging Challenges in Digital Business Strategy , 2013, MIS Q..

[30]  Samer Faraj,et al.  Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..

[31]  Marshall W. Van Alstyne,et al.  How to Find Answers within Your Company , 2010 .

[32]  K. Riemer,et al.  Powercrowd: enterprise social networking in professional service work: a case study of Yammer at Deloitte australia , 2012 .

[33]  Przemyslaw Kazienko,et al.  Key Person Analysis in Social Communities within the Blogosphere , 2012, J. Univers. Comput. Sci..

[34]  Jun Zhang,et al.  A case study of micro-blogging in the enterprise: use, value, and related issues , 2010, CHI.

[35]  Yunjie Calvin Xu,et al.  AIS Electronic Library (AISeL) , 2022 .

[36]  Georg von Krogh,et al.  How does social software change knowledge management? Toward a strategic research agenda , 2012, J. Strateg. Inf. Syst..

[37]  S. Wasserman,et al.  Models and Methods in Social Network Analysis: Structural Analysis in the Social Sciences , 2005 .

[38]  J. Goldenberg,et al.  The Role of Hubs in the Adoption Process , 2009 .

[39]  Natasha F. Veltri,et al.  Investigation of the Network Construction Behavior on Social Networking sites , 2010, ICIS.

[40]  Donald R. Cooper,et al.  Business Research Methods , 1980 .

[41]  Darren Gergle,et al.  Organizational acculturation and social networking , 2011, CSCW.

[42]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[43]  Hawoong Jeong,et al.  Comparison of online social relations in volume vs interaction: a case study of cyworld , 2008, IMC '08.

[44]  Michael J. Muller,et al.  Return On Contribution (ROC): A Metric for Enterprise Social Software , 2009, ECSCW.

[45]  Matthew K. O. Lee,et al.  A theoretical model of intentional social action in online social networks , 2010, Decis. Support Syst..

[46]  Christian Wagner,et al.  Weblogging: A study of social computing and its impact on organizations , 2008, Decis. Support Syst..

[47]  Florian Probst,et al.  Identifying Key Users in Online Social Networks: A PageRank Based Approach , 2010, ICIS.

[48]  Alexander Richter,et al.  Eliciting the Anatomy of Technology Appropriation Processes: a Case Study in Enterprise Social Media , 2012, ECIS.

[49]  Alexander Richter,et al.  The Contextual Nature Of Enterprise Social Networking: A Multi Case Study Comparison , 2013, ECIS.

[50]  Dragomir R. Radev,et al.  Identifying gene-disease associations using centrality on a literature mined gene-interaction network , 2008, ISMB.

[51]  Kate Ehrlich,et al.  Community insights: helping community leaders enhance the value of enterprise online communities , 2013, CHI.

[52]  N. Sadat Shami,et al.  We are all lurkers: consuming behaviors among authors and readers in an enterprise file-sharing service , 2010, GROUP '10.

[53]  Martin Bichler,et al.  Identification of influencers - Measuring influence in customer networks , 2008, Decis. Support Syst..

[54]  Stephen Shaoyi Liao,et al.  A graph-based action network framework to identify prestigious members through member's prestige evolution , 2012, Decis. Support Syst..

[55]  Martin G. Everett,et al.  A Graph-theoretic perspective on centrality , 2006, Soc. Networks.

[56]  P. Bonacich Factoring and weighting approaches to status scores and clique identification , 1972 .

[57]  Mark Wallace,et al.  The Effects of the Social Structure of Digital Networks on Viral Marketing Performance , 2008 .

[58]  D. Iacobucci Networks in Marketing , 1996 .

[59]  Jan U. Becker,et al.  Seeding Strategies for Viral Marketing: An Empirical Comparison , 2011 .

[60]  Michael Trusov,et al.  Determining Influential Users in Internet Social Networks , 2010 .

[61]  Mor Naaman,et al.  Is it really about me?: message content in social awareness streams , 2010, CSCW '10.

[62]  Laurie E. Damianos,et al.  Factors impeding Wiki use in the enterprise: a case study , 2010, CHI Extended Abstracts.

[63]  Alexander Richter,et al.  Oh, SNEP! The Dynamics of Social Network Emergence-the case of Capgemini Yammer , 2012 .

[64]  Michael J. Brzozowski WaterCooler: exploring an organization through enterprise social media , 2009, GROUP.

[65]  Lada A. Adamic,et al.  Friends and neighbors on the Web , 2003, Soc. Networks.

[66]  Jim Giles,et al.  Computational social science: Making the links , 2012, Nature.

[67]  Ann Majchrzak,et al.  Knowledge Collaboration in Online Communities , 2011, Organ. Sci..

[68]  Franz Lehner,et al.  Measuring Knowledge Management Success: Development and Test of a Theory-Based Measuring Model , 2011, it Inf. Technol..

[69]  Scott A. Golder,et al.  Structural Predictors of Tie Formation in Twitter: Transitivity and Mutuality , 2010, 2010 IEEE Second International Conference on Social Computing.

[70]  Wil M. P. van der Aalst,et al.  Mining Social Networks: Uncovering Interaction Patterns in Business Processes , 2004, Business Process Management.

[71]  Steffen Staab,et al.  Social Networks Applied , 2005, IEEE Intell. Syst..

[72]  David Godes,et al.  Introduction to the Special Issue - Social Media and Business Transformation: A Framework for Research , 2013, Inf. Syst. Res..

[73]  Gerhard Schwabe,et al.  Identifying Patterns of Idea Diffusion in Innovator Networks , 2013, ICIS.