Automatic Generation of Social Network Data from Electronic-Mail Communications

نویسندگان

  • Jason Yee
  • Robert F. Mills
  • Gilbert L. Peterson
  • Summer E. Bartczak
چکیده

Most organizations have formal and informal elements. Formal structures are usually documented in organizational charts showing chain of command, levels of authority, and personnel resources. The actual effectiveness of the organization or specific individuals may actually depend on informal structures and internal communication networks. These are by definition personality-dependent and may provide significant insight into how work actually gets done within the organization. Effective leaders will want insight into these informal structures for various reasons. Inefficient decision-making or staffing processes may result in unnecessary or redundant communications, chokepoints, or single points of failure, each of which can either delay decisions or degrade the quality of those decisions. Further, sudden changes in the informal structures may indicate underlying stresses within the organization, interpersonal conflicts, or behavioral problems that may significantly disrupt the mission effectiveness or morale of the organization. Documenting these informal structures and networks can be achieved through a variety of means, often through personal interviews or direct observation, both of which are difficult and time consuming. In this paper, we describe a method of automatically generating social network data using electronic mail messaging logs. Performance is demonstrated using three months of real data from a medium sized organization.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Pic Microcontroller-Based Automatic Meter Reading (AMR) System Using the Low Voltage (LV) Power Line Network (TECHNICAL NOTE)

Automatic Meter Reading (AMR) is the remote collection of consumption data from customer’s utility meters over telecommunications, radio, power line and other links. AMR provides water, electric and gas utility service companies the opportunity to streamline metering, billing and collection activities, increase operational efficiency and improve customer service. The AMR system consists of thre...

متن کامل

مصاحبه الکترونیک در پژوهش‌های کیفی

Interview is one of the most common tools among many social and human researches, which has been increasingly taken into account in recent years by expanding the quality and integrative approaches. An interview is usually a deliberate pre-designed conversation about a specific topic in which at least two person are involved. The person who devise the interview questions is the interviewer and t...

متن کامل

A Reliable and Economically Feasible Automatic Meter Reading System Using Power Line Distribution Network (TECHNICAL NOTE)

Automatic Meter Reading (AMR) is the remote collection of consumption data from customer’s utility meters over telecommunications, radio, power line and other links. AMR provides water, electric and gas utility−service companies the opportunities to streamline metering, billing and collection activities, increase operational efficiency and improve customer service. Utility company uses technolo...

متن کامل

Segmentation and Automated Social Hierarchy Detection through Email Network Analysis

We present our work on automatically extracting social hierarchies from electronic communication data. Data mining based on user behavior can be leveraged to analyze and catalog patterns of communications between entities to rank relationships. The advantage is that the analysis can be done in an automatic fashion and can adopt itself to organizational changes over time. We illustrate the algor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005