11. January 2000
CIA investigations revealed that the suspected terrorists
Khalid al-Mihdhar and Nawaf al-Hazmi respectively held
a U.S. visa and had traveled to the U.S.
not shared with FBI
12. July 2001
FBI phoenix office wrote a memo
to the counterterrorism
"effort by Osama Bin Laden to send students to the US
to attend civil aviation universities and colleges"
13. July 5, 2001
Meeting with counterterrorism, FBI, Secret
Service, Coast Guard, Federal Aviation
Autorithy:
"Something really spectacular is going to happen
here, and it's going to happen soon"
15. August 6, 2001
CIA analysts' daily brief to the President:
"Bin Laden determined to strike in U.S."
16. August 16, 2001
FBI Minneapolis office arrests Zacharias Moussaoui
having 747 training without basic plane knowledge.
Agents, citing the crime of
"Destruction of aircraft or aircraft facilities",
were refused a search warrant on its personal effects.
17. August 24, 2001
Midhar and Hamzi were added to the TIPOFF
watch list, which was intended terrorists from
entering the U.S.
18. 9/11 commission report
"we propose that information be shared
horizontally, across new networks that
transcend individual agencies"
27. "The Intranet tends to follow trends
from the web, and social networking is
no exception"
[Nielsen Norman Group 2009]
28. "It's better to structure information
according to how people use it, rather
than what department owns it"
[Jakob Nielsen 2009]
29. In 2015, the generation Y, used to social
medias in their daily personal activities, will
represent 15% of the European population
and 40% of workers in France
a whole generation that will ease corporate
uses of social medias and that will probably
argue for it
30. enterprise 2.0
"the use of emergent social software platforms
within companies, or between companies and
their partners or customers" [Mc Afee 2006]
31. "emergent social software platforms"
"digital environments in which contributions and
interactions" are:
• "globally visible and persistent over time"
• performed with social softwares that "enable people
to rendezvous, connect or collaborate through
computer-mediated communication and to form
online communities"
• emergent, freeform, with "patterns and structure
inherent in people’s interactions".
[Mc Afee 2009]
32. intranet of people
via @amcafee
Search
Links follow me @ereteog
Authoring "read write web"
Tags
Extension see also
Signals
34. • explicit and declared relations
• interactions between actors
• affiliation between actors
Social links
colleague
communicate
skill
skill
web
35. the bull's eye of @amcafee
• Strong links: close
collaborators
• Weak links professional
acquaintances
• Potential links:
professional proximity
• Absent relationships:
remainder of the
network
36. Social capital
"resources embedded in one's social networks,
resources that can be accessed or mobilized
through ties in the networks" [Lin 2008]
37. Keep email for its initial goal:
asynchronous discussions
Once consumed, information and
knowledge in email are lost forever.
release and connect it!
38. Enterprise 2.0 and corporate social
capital
Wiki, online office suites:
• collaboration
• productivity
• agility
social networking service:
• link maintenance
• non-redundant information
• network bridging
blog, social bookmarking:
• efficient search
• link formation
• collective intelligence
39. Wiki are efficient for collaboratively
editing document and creating a shared
documentation
Versioning
Accessing
Visibility
Persistent
40. Social networking services assist links
management
Managing contacts
Pushing / receiving
information
Interacting
Emergent social structure
41. Blogs offer to easily publish information
and knowledge
Sharing
Linking
News
Persistent
42. Social bookmarking enables employees
to collaboratively classify content
through a daily personal activity
Collecting
Classifying
Sharing
Emergent signals
44. organizational chart vs emerging structure
companies have spent decades at limiting the
amount of information and collaborators each
employee has to handle, in order to optimize
individual performances.
45. confidentiality restriction
some companies face strong information
security and confidentiality restrictions and
cannot even if accept unexpected practices
and interactions in their processes
47. users need help for preserving the
benefits of enterprise 2.0 software
in order to efficiently handle there social capital
48. Social network analysis
helps understanding and exploiting the key
features of social networks in order to manage
their assets, their life cycle and predict their
evolution.
50. highlighting strategic resources
Degree centrality:
Local attention
beetweenness centrality:
reveal broker
"A place for good ideas"
[Burt 1992] [Burt 2004]
Closeness centrality:
Capacity to
communicate
[Freeman 1979]
54. maintain strong links
• Does your organizational chart take into
account emerging communities?
• highlight influent actors and popular
resources not yet revealed by your
organizational chart
58. references
• A. McAfee: "Enterprise 2.0: New Collaborative
Tools For Your Organization's Toughest
Challenges". Harvard Business Press. (2009)
• R. S. Burt: "Structural holes. The Social Structure
of Competition". Harvard University Press. (1992)
• Lin, N.. "A network theory of social capital", In D.
Castiglione, J.W. van Deth, and G. Wolleb.
Handbook on Social Capital. Oxford University
Press. (2008)
Community detection helps understanding the global structure of a network and the distribution of actors and activities.
Moreover, the community structure influences the way information is shared and the way actors behave.
Information spread quickly in a community and is shared by most of it members.
The centrality highlights the most important actors of the network and three definitions have been proposed by Freeman.
The degree centrality considers nodes with the higher degrees (number of adjacent edges).
The closeness centrality is based on the average length of the paths linking a node to others and reveals the capacity of a node to be reached.
The betweenness centrality focuses on the capacity of a node to be an intermediary between any two other nodes. A network is highly dependent on actors with high betweenness centrality due to their position as intermediaries and brokers in information flow.