SlideShare a Scribd company logo
1 of 14
Download to read offline
Exploring Social Theory through 
Enterprise Social Media 
Michael Muller* 
Cognitive User Experience 
IBM Research, CCaammbbrriiddggee MMAA UUSSAA 
With thanks to: 
Joan DiMicco1, Kate Ehrlich*, Rosta Farzan2, Werner Geyer*, 
Tara Matthews3, MikhilMasli*, David Millen*, Sadat Shami*, JennThom4, 
Steve Daniel*, Wendy Kellogg*, Todd Soule*, John Wafer*, RajanVaish5, 
Li-Te Cheng3, Jonathan Feinberg3 
*IBM unless: 
1. Forrester. 2. University of Pittsburgh 3. Google 4. University CA Santa Cruz 
© IBM Research 2014 1
Context: Broader Approaches to Social Media Studies 
• Ways of Knowing in HCI (ed. Judy Olson & Wendy Kellogg) 
– Loren Terveen: Study, build, repeat:… online communities… 
– Katie Siek: Field deployments: Knowing from using in context 
• David Millen, IBM 
– Identify important phenomenon on Internet 
– Build our own version, “behind the firewall” 
 Authentication trust + accountability 
Confidentiality of own  aanndd ccuussttoommeerr’’ss ddaattaa 
– Werner Geyer: ActivityExplorer Activities 
– Dogear – social bookmarking Bookmarks 
– Cattail – social file-sharing Files 
– Beehive SocialBlue – social-networking Profiles 
– Discover online communities Communities 
– Tara Matthews: Tools for community learders Community Insights 
– Muller et al.: “1x5” for enterprise crowdfunding iFundIT 
• Jill Drury, Laurie Damianos, et al., MITRE 
– Enterprise social media Handshake 
© IBM Research 2014 2
Context: Broader Approaches to Social Media Studies 
• Ways of Knowing in HCI (ed. Judy Olson  Wendy Kellogg) 
– Loren Terveen: Study, build, repeat:… online communities… 
– Katie Siek: Field deployments: Knowing from using in context 
• David Millen, IBM 
– Identify important phenomenon on Internet 
– Build our own version, “behind the firewall” 
 Authentication trust + accountability 
Confidentiality of own  aanndd ccuussttoommeerr’’ss ddaattaa 
– Werner Geyer: ActivityExplorer Activities 
– Dogear – social bookmarking Bookmarks 
– Cattail – social file-sharing Files 
– Beehive SocialBlue – social-networking Profiles 
– Discover online communities Communities 
– Tara Matthews: Tools for community learders Community Insights 
– Muller et al.: “1x5” for enterprise crowdfunding iFundIT 
• Jill Drury, Laurie Damianos, et al., MITRE 
– Enterprise social media Handshake 
© IBM Research 2014 3
Context: Broader Approaches to Social Media Studies 
• Ways of Knowing in HCI (ed. Judy Olson  Wendy Kellogg) 
– Loren Terveen: Study, build, repeat:… online communities… 
– Katie Siek: Field deployments: Knowing from using in context 
• David Millen, IBM 
– Identify important phenomenon on Internet 
– Build our own version, “behind the firewall” 
 Authentication trust + accountability 
Confidentiality of own  aanndd ccuussttoommeerr’’ss ddaattaa 
– Werner Geyer: ActivityExplorer Activities 
– Dogear – social bookmarking Bookmarks 
– Cattail – social file-sharing Files 
– Beehive SocialBlue – social-networking Profiles 
– Discover online communities Communities 
– Tara Matthews: Tools for community learders Community Insights 
– Muller et al.: “1x5” for enterprise crowdfunding iFundIT 
• Jill Drury, Laurie Damianos, et al., MITRE 
– Enterprise social media Handshake 
© IBM Research 2014 4
Context: Broader Approaches to Social Media Studies 
• Ways of Knowing in HCI (ed. Judy Olson  Wendy Kellogg) 
– Loren Terveen: Study, build, repeat:… online communities… 
– Katie Siek: Field deployments: Knowing from using in context 
• David Millen, IBM 
– Identify important phenomenon on Internet 
– Build our own version, “behind the firewall” 
 Authentication trust + accountability 
Confidentiality of own  aanndd ccuussttoommeerr’’ss ddaattaa 
– Werner Geyer: ActivityExplorer Activities 
– Dogear – social bookmarking Bookmarks 
– Cattail – social file-sharing Files 
– Beehive SocialBlue – social-networking Profiles 
– Discover online communities Communities 
– Tara Matthews: Tools for community learders Community Insights 
– Muller et al.: “1x5” for enterprise crowdfunding iFundIT 
• Jill Drury, Laurie Damianos, et al., MITRE 
– Enterprise social media Handshake 
© IBM Research 2014 5
Strategy 
• Build something of value… where people do things of value 
– Criteria: Lots of people use it 
… to do important things for companies, clients, and careers 
• Generate data 
– With full and legal consent (international standards) 
– Authenticated via corporate LDAP 
– Supplement each person’s data with organizational ddeemmooggrraapphhiiccss 
• Country, division, [group name], [job-category name] 
– Supplement each person’s data with social network information 
• Other people in the same group 
• Collaboration partners 
• Limited social network data (friending) 
• Test questions from theory 
– … and provide value to the enterprise 
• Observe and “harvest” user innovations (appropriation) 
© IBM Research 2014 6
“Build Something of Value…” 
• Research prototypes, “fielded” to all of IBM 
– 423,000 potential participants 
– Internal publicity 
– Some ideas succeed 
– Some ideas fail 
• IBM Connection number of multi-user instances 
–– BBllooggss 1144,,554433** 
– Wikis 65,529* 
– Profiles (social networking) 423,000 potential 
– Activities (collaborative task-management) 31,562* 
– Online communities 135,238* 
• iFundIT (enterprise crowdfunding) 7 campaigns / 489 projects** 
* count is for public instances 
** on-going campaign 
© IBM Research 2014 7
“… Where People Do Things of Value” 
• Snapshot 1: Tagging for audiences 
• Snapshot 2: Text-based analysis of Employee Engagement 
• Snapshot 3: Social Identity Theory in enterprise crowdfunding 
© IBM Research 2014 8
Snapshot 1: Audiences in Social Bookmarking 
• Context: 2007, when “bookmarking for an audience” was 
heretical 
• Jenn Thom (Thom-Santelli) 
– “Big data” 
• Track frequency of tag inscriptions 
• Track frequency of tag searches 
– Contextualized, individual, qualitative data 
Combining “big data” 
and local, 
contextualized 
people and places: 
On-going methods 
• Find “interesting” people and interview them 
• Major findings: Tagging for audiences 
– Community leaders – try to choose obvious tags to recruit people 
– Team leaders – try to choose unobvious tags to limit to team members 
– Individuals creating their reputations – try to focus on a single, 
characteristic, popular tag to establish self as company-wide expert 
9 
research 
© IBM Research 2014
Snapshot 1: Audiences in Social Bookmarking 
• Context: 2007, when “bookmarking for an audience” was 
heretical 
• Jenn Thom (Thom-Santelli) 
– “Big data” 
• Track frequency of tag inscriptions 
• Track frequency of tag searches 
– Contextualized, individual, qualitative data 
Combining “big data” 
and local, 
contextualized 
people and places: 
On-going methods 
• Find “interesting” people and interview them 
• Major findings: Tagging for audiences 
– Community leaders – try to choose obvious tags to recruit people 
– Team leaders – try to choose unobvious tags to limit to team members 
– Individuals creating their reputations – try to focus on a single, 
characteristic, popular tag to establish self as company-wide expert 
10 
research 
© IBM Research 2014
Snapshot 2: Text-based analysis of Employee Engagement 
• “Employee engagement” considered desirable by executives 
– Discerned by surveys 
• Expensive 
• Annual 
– Can we find “engagement signals” in employee social media? 
– 263 thematic dictionaries 
•• MMaajjoorr rreessuullttss 
– Data quality: 
Requires about 15 
postings for clear 
characterization 
– State vs. Trait: 
Engagement is a 
state 
– Themes: +PositiveAffect, +Try, +Social, +Wellbeing 
- Decrease, - Vice, - 1st-person-singular, - Future 
11 
Data Quality 
© IBM Research 2014
Snapshot 3: Social Identity Theory in Crowdfunding (1) 
• Enterprise crowdfunding 
– Like Kickstarter, Indiegogo, Rockethub…, but behind the firewall 
– Executive gives each employee in her/his organization a budget to 
spend on proposals by colleagues 
• Research question: Geographical boundaries to investing? 
– Homophily theory: “Birds of a feather flock together” 
– Social Identity theory: Quantify homophily in terms ooff ““ttrraaiittss iinn 
common” 
– Dimensions of difference (“traits in common” or not in common): 
• Country geographical boundaries 
• Global working groups team/work-content boundaries 
• Division (~job requirements) organizational boundaries 
© IBM Research 2014 12
Snapshot 3: Social Identity Theory in Crowdfunding (2) 
• Compute expected % contribution; Plot deviations from expected 
 Main effects for Country, Working-Group, and Division 
300.00% 
0.00% 
same different 
C=C Country 
C=/C G=G G=/G 
300.00% 
0.00% 
same different 
D=D Division 
D=/D 
300.00% 
0.00% 
same different 
Group 
Percent of 
Expected Value 
Percent of 
Expected Value 
Percent of 
Expected Value 
C=C C≠C G=G G≠G D=D D≠D 
300% 
100% 
0% 
% Expected Value 
300% 
100% 
0% 
% Expected Value 
300% 
100% 
0% 
% Expected Value 
Country 
Group Division 
 Two-way interactions of Identity Facets 
13 
600% 
600.00% 
% Expected Value 
Percent of 
Expected Value 
600% 
100% 
600% 
100% 
% Expected Value 
100% 
100.00% 100.00% 100.00% 
0% 
• Conclusions 
600.00% 
0% 
0.00% 
sameCountry 
sameDivision 
sameCountry 
differentDivision 
differentCountry 
sameDivision 
600.00% 
0% 
• People easily invest across obstacles of country, working-group, division 
• Social identity facets in common give an added boost to investment 
differentCountry 
differentDivision 
Country*Division interaction 
0.00% 
sameCountry 
sameGroup 
sameCountry 
differentGroup 
differentCountry 
sameGroup 
differentCountry 
differentGroup 
Country*Group Interaction 
0.00% 
sameGroup 
sameDivision 
sameGroup 
differentDivision 
differentGroup-sameDivision 
differentGroup 
differentDivision 
Group*Division interaction 
C=C 
G=G 
C=C 
G≠G 
C≠C 
G=G 
C≠C 
G≠G 
C=C 
D=D 
C=C 
D≠D 
C≠C 
D=D 
C≠C 
D≠D 
G=G 
D=D 
G=G 
D≠D 
G≠G 
D 
G≠G 
D≠D 
Country*Group interaction Group*Division interaction Country*Division interaction 
% Expected Value 
C=C C=C C=/C C=/C 
G=G G=/G G=G G=/G 
G=G G=G G=/G G=/G 
D=D D=/D D=D D=/D 
C=C C=C C=/C C=/C 
D=D D=/D D=D D=/D 
© IBM Research 2014
Summary and Conclusion 
• Build something of value… where people do things of value 
• Generate data 
– With full and legal consent (international standards) 
– Authenticated via corporate LDAP 
– Supplement each person’s data with organizational demographics 
– Supplement each person’s data with social network information 
• Test questions ffrroomm tthheeoorryy 
• Put methods into dialogue: Shift analyses back and forth 
– Big data / quantitative analyses 
– Contextual data / qualitative analysis 
• Deliver value in areas of theory, method, and business 
© IBM Research 2014 14

More Related Content

What's hot

An Integrated Approach - Measuring Social Media for Government
An Integrated Approach - Measuring Social Media for GovernmentAn Integrated Approach - Measuring Social Media for Government
An Integrated Approach - Measuring Social Media for GovernmentHillary Hartley
 
KM + Social Business - Adrian Malone - APM KSIG Conference 12 March 2013
KM + Social Business - Adrian Malone - APM KSIG Conference 12 March 2013KM + Social Business - Adrian Malone - APM KSIG Conference 12 March 2013
KM + Social Business - Adrian Malone - APM KSIG Conference 12 March 2013AdrianMalone
 
Collective Intelligence
Collective IntelligenceCollective Intelligence
Collective IntelligenceSandra Rivera
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
 
Web 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterWeb 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterHillary Hartley
 
Big Data for Trails
Big Data for TrailsBig Data for Trails
Big Data for TrailsL George
 
Digital Strategy for a Changing World
Digital Strategy for a Changing WorldDigital Strategy for a Changing World
Digital Strategy for a Changing WorldColin Habberton
 
Crowdsourcing presentation
Crowdsourcing presentationCrowdsourcing presentation
Crowdsourcing presentationkleepg23
 
Crowdsourcing co creation and ideation
Crowdsourcing co creation and ideationCrowdsourcing co creation and ideation
Crowdsourcing co creation and ideationsuresh sood
 
Ross Mayfield's Enterprise 2.0 Keynote at Interop
Ross Mayfield's Enterprise 2.0 Keynote at InteropRoss Mayfield's Enterprise 2.0 Keynote at Interop
Ross Mayfield's Enterprise 2.0 Keynote at InteropRoss Mayfield
 

What's hot (17)

An Integrated Approach - Measuring Social Media for Government
An Integrated Approach - Measuring Social Media for GovernmentAn Integrated Approach - Measuring Social Media for Government
An Integrated Approach - Measuring Social Media for Government
 
What is Web 2.0?
What is Web 2.0?What is Web 2.0?
What is Web 2.0?
 
KM + Social Business - Adrian Malone - APM KSIG Conference 12 March 2013
KM + Social Business - Adrian Malone - APM KSIG Conference 12 March 2013KM + Social Business - Adrian Malone - APM KSIG Conference 12 March 2013
KM + Social Business - Adrian Malone - APM KSIG Conference 12 March 2013
 
Enterprise Social Search
Enterprise Social SearchEnterprise Social Search
Enterprise Social Search
 
web 30.pptx
web 30.pptxweb 30.pptx
web 30.pptx
 
Online Community Practices
Online Community PracticesOnline Community Practices
Online Community Practices
 
2009 GMIS - Web 2.0
2009 GMIS - Web 2.02009 GMIS - Web 2.0
2009 GMIS - Web 2.0
 
Personal knowledge management
Personal knowledge managementPersonal knowledge management
Personal knowledge management
 
Collective Intelligence
Collective IntelligenceCollective Intelligence
Collective Intelligence
 
Clarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal PresentationClarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal Presentation
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
 
Web 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterWeb 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutter
 
Big Data for Trails
Big Data for TrailsBig Data for Trails
Big Data for Trails
 
Digital Strategy for a Changing World
Digital Strategy for a Changing WorldDigital Strategy for a Changing World
Digital Strategy for a Changing World
 
Crowdsourcing presentation
Crowdsourcing presentationCrowdsourcing presentation
Crowdsourcing presentation
 
Crowdsourcing co creation and ideation
Crowdsourcing co creation and ideationCrowdsourcing co creation and ideation
Crowdsourcing co creation and ideation
 
Ross Mayfield's Enterprise 2.0 Keynote at Interop
Ross Mayfield's Enterprise 2.0 Keynote at InteropRoss Mayfield's Enterprise 2.0 Keynote at Interop
Ross Mayfield's Enterprise 2.0 Keynote at Interop
 

Similar to Exploring social theory through enterprise social media (muller, ibm research)

Lecture 5: Mining, Analysis and Visualisation
Lecture 5: Mining, Analysis and VisualisationLecture 5: Mining, Analysis and Visualisation
Lecture 5: Mining, Analysis and VisualisationMarieke van Erp
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Mike Kujawski
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the BadXavier Mertens
 
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data DayTransforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data DayAndreas Weigend
 
Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distributeFuming Shih
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisFarida Vis
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisOpen Analytics
 
The Power of Social - Revolutions, Disasters and Tomorrows IT
The Power of Social - Revolutions, Disasters and Tomorrows IT The Power of Social - Revolutions, Disasters and Tomorrows IT
The Power of Social - Revolutions, Disasters and Tomorrows IT Chris Dancy
 
The 5 social medias (5 SMs)
The 5 social medias (5 SMs)The 5 social medias (5 SMs)
The 5 social medias (5 SMs)Patti Anklam
 
Social Media Four S Ms
Social  Media    Four  S MsSocial  Media    Four  S Ms
Social Media Four S MsPatti Anklam
 
Knowledge Extraction from Social Media
Knowledge Extraction from Social MediaKnowledge Extraction from Social Media
Knowledge Extraction from Social MediaSeth Grimes
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Lida change-reference-abels
Lida change-reference-abelsLida change-reference-abels
Lida change-reference-abelsfpehar
 
ArcGIS Open Data: Engagement
ArcGIS Open Data: Engagement ArcGIS Open Data: Engagement
ArcGIS Open Data: Engagement sidewalkballet
 
Brookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 twoBrookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 twogvaughan
 
Drinking from the Digital Data Fire Hose
Drinking from the Digital Data Fire HoseDrinking from the Digital Data Fire Hose
Drinking from the Digital Data Fire HoseGigi Johnson
 
20130427 What's Your Social IQ?
20130427 What's Your Social IQ?20130427 What's Your Social IQ?
20130427 What's Your Social IQ?BlueMetalInc
 

Similar to Exploring social theory through enterprise social media (muller, ibm research) (20)

Lecture4 Social Web
Lecture4 Social Web Lecture4 Social Web
Lecture4 Social Web
 
Lecture 5: Mining, Analysis and Visualisation
Lecture 5: Mining, Analysis and VisualisationLecture 5: Mining, Analysis and Visualisation
Lecture 5: Mining, Analysis and Visualisation
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data DayTransforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
 
Methods and Tools for Facilitating Social Participation
Methods and Tools for Facilitating Social ParticipationMethods and Tools for Facilitating Social Participation
Methods and Tools for Facilitating Social Participation
 
Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distribute
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysis
 
WSA 031215
WSA 031215WSA 031215
WSA 031215
 
The Power of Social - Revolutions, Disasters and Tomorrows IT
The Power of Social - Revolutions, Disasters and Tomorrows IT The Power of Social - Revolutions, Disasters and Tomorrows IT
The Power of Social - Revolutions, Disasters and Tomorrows IT
 
The 5 social medias (5 SMs)
The 5 social medias (5 SMs)The 5 social medias (5 SMs)
The 5 social medias (5 SMs)
 
Social Media Four S Ms
Social  Media    Four  S MsSocial  Media    Four  S Ms
Social Media Four S Ms
 
Knowledge Extraction from Social Media
Knowledge Extraction from Social MediaKnowledge Extraction from Social Media
Knowledge Extraction from Social Media
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Lida change-reference-abels
Lida change-reference-abelsLida change-reference-abels
Lida change-reference-abels
 
ArcGIS Open Data: Engagement
ArcGIS Open Data: Engagement ArcGIS Open Data: Engagement
ArcGIS Open Data: Engagement
 
Brookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 twoBrookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 two
 
Drinking from the Digital Data Fire Hose
Drinking from the Digital Data Fire HoseDrinking from the Digital Data Fire Hose
Drinking from the Digital Data Fire Hose
 
20130427 What's Your Social IQ?
20130427 What's Your Social IQ?20130427 What's Your Social IQ?
20130427 What's Your Social IQ?
 

More from Michael Muller

Hcic muller and liao - participatory design fictions
Hcic   muller and liao - participatory design fictionsHcic   muller and liao - participatory design fictions
Hcic muller and liao - participatory design fictionsMichael Muller
 
Hcic muller guha davis geyer shami 2015 06-29
Hcic muller guha davis geyer shami 2015 06-29Hcic muller guha davis geyer shami 2015 06-29
Hcic muller guha davis geyer shami 2015 06-29Michael Muller
 
Muller and Chua - brainstorming for japan - chi 2012
Muller and Chua - brainstorming for japan - chi 2012Muller and Chua - brainstorming for japan - chi 2012
Muller and Chua - brainstorming for japan - chi 2012Michael Muller
 
Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Michael Muller
 
Lurking as trait or situational disposition: Lurking and contributing in ente...
Lurking as trait or situational disposition: Lurking and contributing in ente...Lurking as trait or situational disposition: Lurking and contributing in ente...
Lurking as trait or situational disposition: Lurking and contributing in ente...Michael Muller
 
Usage Of Enterprise File Sharing Service Muller Chi 2010
Usage Of Enterprise File Sharing Service   Muller   Chi 2010Usage Of Enterprise File Sharing Service   Muller   Chi 2010
Usage Of Enterprise File Sharing Service Muller Chi 2010Michael Muller
 
Grounded Theory Method - Muller
Grounded Theory Method - MullerGrounded Theory Method - Muller
Grounded Theory Method - MullerMichael Muller
 
Return On Contribution (ROC) ECSCW 2009 Muller Et Al
Return On Contribution (ROC)   ECSCW 2009   Muller Et AlReturn On Contribution (ROC)   ECSCW 2009   Muller Et Al
Return On Contribution (ROC) ECSCW 2009 Muller Et AlMichael Muller
 
Information Curators in an Enterprise File-Sharing Service
Information Curators in an Enterprise File-Sharing ServiceInformation Curators in an Enterprise File-Sharing Service
Information Curators in an Enterprise File-Sharing ServiceMichael Muller
 
eParticipation and Participatory Design
eParticipation and Participatory DesigneParticipation and Participatory Design
eParticipation and Participatory DesignMichael Muller
 
Group 2009 Bateman Muller Freyne
Group 2009 Bateman Muller FreyneGroup 2009 Bateman Muller Freyne
Group 2009 Bateman Muller FreyneMichael Muller
 

More from Michael Muller (11)

Hcic muller and liao - participatory design fictions
Hcic   muller and liao - participatory design fictionsHcic   muller and liao - participatory design fictions
Hcic muller and liao - participatory design fictions
 
Hcic muller guha davis geyer shami 2015 06-29
Hcic muller guha davis geyer shami 2015 06-29Hcic muller guha davis geyer shami 2015 06-29
Hcic muller guha davis geyer shami 2015 06-29
 
Muller and Chua - brainstorming for japan - chi 2012
Muller and Chua - brainstorming for japan - chi 2012Muller and Chua - brainstorming for japan - chi 2012
Muller and Chua - brainstorming for japan - chi 2012
 
Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)
 
Lurking as trait or situational disposition: Lurking and contributing in ente...
Lurking as trait or situational disposition: Lurking and contributing in ente...Lurking as trait or situational disposition: Lurking and contributing in ente...
Lurking as trait or situational disposition: Lurking and contributing in ente...
 
Usage Of Enterprise File Sharing Service Muller Chi 2010
Usage Of Enterprise File Sharing Service   Muller   Chi 2010Usage Of Enterprise File Sharing Service   Muller   Chi 2010
Usage Of Enterprise File Sharing Service Muller Chi 2010
 
Grounded Theory Method - Muller
Grounded Theory Method - MullerGrounded Theory Method - Muller
Grounded Theory Method - Muller
 
Return On Contribution (ROC) ECSCW 2009 Muller Et Al
Return On Contribution (ROC)   ECSCW 2009   Muller Et AlReturn On Contribution (ROC)   ECSCW 2009   Muller Et Al
Return On Contribution (ROC) ECSCW 2009 Muller Et Al
 
Information Curators in an Enterprise File-Sharing Service
Information Curators in an Enterprise File-Sharing ServiceInformation Curators in an Enterprise File-Sharing Service
Information Curators in an Enterprise File-Sharing Service
 
eParticipation and Participatory Design
eParticipation and Participatory DesigneParticipation and Participatory Design
eParticipation and Participatory Design
 
Group 2009 Bateman Muller Freyne
Group 2009 Bateman Muller FreyneGroup 2009 Bateman Muller Freyne
Group 2009 Bateman Muller Freyne
 

Exploring social theory through enterprise social media (muller, ibm research)

  • 1. Exploring Social Theory through Enterprise Social Media Michael Muller* Cognitive User Experience IBM Research, CCaammbbrriiddggee MMAA UUSSAA With thanks to: Joan DiMicco1, Kate Ehrlich*, Rosta Farzan2, Werner Geyer*, Tara Matthews3, MikhilMasli*, David Millen*, Sadat Shami*, JennThom4, Steve Daniel*, Wendy Kellogg*, Todd Soule*, John Wafer*, RajanVaish5, Li-Te Cheng3, Jonathan Feinberg3 *IBM unless: 1. Forrester. 2. University of Pittsburgh 3. Google 4. University CA Santa Cruz © IBM Research 2014 1
  • 2. Context: Broader Approaches to Social Media Studies • Ways of Knowing in HCI (ed. Judy Olson & Wendy Kellogg) – Loren Terveen: Study, build, repeat:… online communities… – Katie Siek: Field deployments: Knowing from using in context • David Millen, IBM – Identify important phenomenon on Internet – Build our own version, “behind the firewall” Authentication trust + accountability Confidentiality of own aanndd ccuussttoommeerr’’ss ddaattaa – Werner Geyer: ActivityExplorer Activities – Dogear – social bookmarking Bookmarks – Cattail – social file-sharing Files – Beehive SocialBlue – social-networking Profiles – Discover online communities Communities – Tara Matthews: Tools for community learders Community Insights – Muller et al.: “1x5” for enterprise crowdfunding iFundIT • Jill Drury, Laurie Damianos, et al., MITRE – Enterprise social media Handshake © IBM Research 2014 2
  • 3. Context: Broader Approaches to Social Media Studies • Ways of Knowing in HCI (ed. Judy Olson Wendy Kellogg) – Loren Terveen: Study, build, repeat:… online communities… – Katie Siek: Field deployments: Knowing from using in context • David Millen, IBM – Identify important phenomenon on Internet – Build our own version, “behind the firewall” Authentication trust + accountability Confidentiality of own aanndd ccuussttoommeerr’’ss ddaattaa – Werner Geyer: ActivityExplorer Activities – Dogear – social bookmarking Bookmarks – Cattail – social file-sharing Files – Beehive SocialBlue – social-networking Profiles – Discover online communities Communities – Tara Matthews: Tools for community learders Community Insights – Muller et al.: “1x5” for enterprise crowdfunding iFundIT • Jill Drury, Laurie Damianos, et al., MITRE – Enterprise social media Handshake © IBM Research 2014 3
  • 4. Context: Broader Approaches to Social Media Studies • Ways of Knowing in HCI (ed. Judy Olson Wendy Kellogg) – Loren Terveen: Study, build, repeat:… online communities… – Katie Siek: Field deployments: Knowing from using in context • David Millen, IBM – Identify important phenomenon on Internet – Build our own version, “behind the firewall” Authentication trust + accountability Confidentiality of own aanndd ccuussttoommeerr’’ss ddaattaa – Werner Geyer: ActivityExplorer Activities – Dogear – social bookmarking Bookmarks – Cattail – social file-sharing Files – Beehive SocialBlue – social-networking Profiles – Discover online communities Communities – Tara Matthews: Tools for community learders Community Insights – Muller et al.: “1x5” for enterprise crowdfunding iFundIT • Jill Drury, Laurie Damianos, et al., MITRE – Enterprise social media Handshake © IBM Research 2014 4
  • 5. Context: Broader Approaches to Social Media Studies • Ways of Knowing in HCI (ed. Judy Olson Wendy Kellogg) – Loren Terveen: Study, build, repeat:… online communities… – Katie Siek: Field deployments: Knowing from using in context • David Millen, IBM – Identify important phenomenon on Internet – Build our own version, “behind the firewall” Authentication trust + accountability Confidentiality of own aanndd ccuussttoommeerr’’ss ddaattaa – Werner Geyer: ActivityExplorer Activities – Dogear – social bookmarking Bookmarks – Cattail – social file-sharing Files – Beehive SocialBlue – social-networking Profiles – Discover online communities Communities – Tara Matthews: Tools for community learders Community Insights – Muller et al.: “1x5” for enterprise crowdfunding iFundIT • Jill Drury, Laurie Damianos, et al., MITRE – Enterprise social media Handshake © IBM Research 2014 5
  • 6. Strategy • Build something of value… where people do things of value – Criteria: Lots of people use it … to do important things for companies, clients, and careers • Generate data – With full and legal consent (international standards) – Authenticated via corporate LDAP – Supplement each person’s data with organizational ddeemmooggrraapphhiiccss • Country, division, [group name], [job-category name] – Supplement each person’s data with social network information • Other people in the same group • Collaboration partners • Limited social network data (friending) • Test questions from theory – … and provide value to the enterprise • Observe and “harvest” user innovations (appropriation) © IBM Research 2014 6
  • 7. “Build Something of Value…” • Research prototypes, “fielded” to all of IBM – 423,000 potential participants – Internal publicity – Some ideas succeed – Some ideas fail • IBM Connection number of multi-user instances –– BBllooggss 1144,,554433** – Wikis 65,529* – Profiles (social networking) 423,000 potential – Activities (collaborative task-management) 31,562* – Online communities 135,238* • iFundIT (enterprise crowdfunding) 7 campaigns / 489 projects** * count is for public instances ** on-going campaign © IBM Research 2014 7
  • 8. “… Where People Do Things of Value” • Snapshot 1: Tagging for audiences • Snapshot 2: Text-based analysis of Employee Engagement • Snapshot 3: Social Identity Theory in enterprise crowdfunding © IBM Research 2014 8
  • 9. Snapshot 1: Audiences in Social Bookmarking • Context: 2007, when “bookmarking for an audience” was heretical • Jenn Thom (Thom-Santelli) – “Big data” • Track frequency of tag inscriptions • Track frequency of tag searches – Contextualized, individual, qualitative data Combining “big data” and local, contextualized people and places: On-going methods • Find “interesting” people and interview them • Major findings: Tagging for audiences – Community leaders – try to choose obvious tags to recruit people – Team leaders – try to choose unobvious tags to limit to team members – Individuals creating their reputations – try to focus on a single, characteristic, popular tag to establish self as company-wide expert 9 research © IBM Research 2014
  • 10. Snapshot 1: Audiences in Social Bookmarking • Context: 2007, when “bookmarking for an audience” was heretical • Jenn Thom (Thom-Santelli) – “Big data” • Track frequency of tag inscriptions • Track frequency of tag searches – Contextualized, individual, qualitative data Combining “big data” and local, contextualized people and places: On-going methods • Find “interesting” people and interview them • Major findings: Tagging for audiences – Community leaders – try to choose obvious tags to recruit people – Team leaders – try to choose unobvious tags to limit to team members – Individuals creating their reputations – try to focus on a single, characteristic, popular tag to establish self as company-wide expert 10 research © IBM Research 2014
  • 11. Snapshot 2: Text-based analysis of Employee Engagement • “Employee engagement” considered desirable by executives – Discerned by surveys • Expensive • Annual – Can we find “engagement signals” in employee social media? – 263 thematic dictionaries •• MMaajjoorr rreessuullttss – Data quality: Requires about 15 postings for clear characterization – State vs. Trait: Engagement is a state – Themes: +PositiveAffect, +Try, +Social, +Wellbeing - Decrease, - Vice, - 1st-person-singular, - Future 11 Data Quality © IBM Research 2014
  • 12. Snapshot 3: Social Identity Theory in Crowdfunding (1) • Enterprise crowdfunding – Like Kickstarter, Indiegogo, Rockethub…, but behind the firewall – Executive gives each employee in her/his organization a budget to spend on proposals by colleagues • Research question: Geographical boundaries to investing? – Homophily theory: “Birds of a feather flock together” – Social Identity theory: Quantify homophily in terms ooff ““ttrraaiittss iinn common” – Dimensions of difference (“traits in common” or not in common): • Country geographical boundaries • Global working groups team/work-content boundaries • Division (~job requirements) organizational boundaries © IBM Research 2014 12
  • 13. Snapshot 3: Social Identity Theory in Crowdfunding (2) • Compute expected % contribution; Plot deviations from expected Main effects for Country, Working-Group, and Division 300.00% 0.00% same different C=C Country C=/C G=G G=/G 300.00% 0.00% same different D=D Division D=/D 300.00% 0.00% same different Group Percent of Expected Value Percent of Expected Value Percent of Expected Value C=C C≠C G=G G≠G D=D D≠D 300% 100% 0% % Expected Value 300% 100% 0% % Expected Value 300% 100% 0% % Expected Value Country Group Division Two-way interactions of Identity Facets 13 600% 600.00% % Expected Value Percent of Expected Value 600% 100% 600% 100% % Expected Value 100% 100.00% 100.00% 100.00% 0% • Conclusions 600.00% 0% 0.00% sameCountry sameDivision sameCountry differentDivision differentCountry sameDivision 600.00% 0% • People easily invest across obstacles of country, working-group, division • Social identity facets in common give an added boost to investment differentCountry differentDivision Country*Division interaction 0.00% sameCountry sameGroup sameCountry differentGroup differentCountry sameGroup differentCountry differentGroup Country*Group Interaction 0.00% sameGroup sameDivision sameGroup differentDivision differentGroup-sameDivision differentGroup differentDivision Group*Division interaction C=C G=G C=C G≠G C≠C G=G C≠C G≠G C=C D=D C=C D≠D C≠C D=D C≠C D≠D G=G D=D G=G D≠D G≠G D G≠G D≠D Country*Group interaction Group*Division interaction Country*Division interaction % Expected Value C=C C=C C=/C C=/C G=G G=/G G=G G=/G G=G G=G G=/G G=/G D=D D=/D D=D D=/D C=C C=C C=/C C=/C D=D D=/D D=D D=/D © IBM Research 2014
  • 14. Summary and Conclusion • Build something of value… where people do things of value • Generate data – With full and legal consent (international standards) – Authenticated via corporate LDAP – Supplement each person’s data with organizational demographics – Supplement each person’s data with social network information • Test questions ffrroomm tthheeoorryy • Put methods into dialogue: Shift analyses back and forth – Big data / quantitative analyses – Contextual data / qualitative analysis • Deliver value in areas of theory, method, and business © IBM Research 2014 14