SlideShare a Scribd company logo
© 2013 IBM Corporation
Social network analyses in organizations:
challenges and approaches for
studying work networks
Ana Paula Appel, Vagner F. de Santana, Rogério A. de Paula
Claudio S. Pinhanez, Victor F. Cavalvante
IBM Research Brazil, Service Systems
MCPL 2013 - Sep 11-13, 2013
IBM Research
© 2013 IBM Corporation
Agenda
 Context
 Related works
 Challenges
 Study
 Results
 Final remarks
2
© 2013 IBM Corporation
Context
 The spread of online Social Networks (SN) use is responsible for the
current high interest in complex network analyses, e.g.:
 “People you may know” feature
 How people get connected?
 SN are networks in which
 Nodes represent people, or groups of people
 Edges some form of social interaction
 Social Network Analysis (SNA) allows to diagnose problems and identify
opportunities in organizations
 SNA allows to identify collaborative hot spots and cold spots
 In organizations, connecting people with similar skills, interests, or profiles
can be worth for employees in many ways
3
© 2013 IBM Corporation
Context
 Our work took place at a large IT service delivery organization, Big
Service Factory (BSF)
 Employees are very specialized, often focused on specific tasks
 Sysadmins are responsible for some of the most critical functions
necessary to maintain the customers’ IT infrastructures
 Tickets describe particular incidents
 Tickets have attributes indicating work shift, department, customer, date,
descriptions of the problem, among others
 Challenges in the context involve
 Assignment time
 Data insertion by hand
 …
4
© 2013 IBM Corporation
Related works
 The foundation of the field is attributed to Jacob Levy Moreno who
conducted the first long-range sociometric study from 1932-1938
 Monge and Contractor [1987] utilized social network analysis to study the
communication patterns among workers
 Properties identified:
 The power-law degree distributions as showed in Albert et al. [1999] and
Adamic et al. [2000]
 The diameter shrinkage present in evolving networks presented by Leskovec
et al. [2005]
 The Small World phenomenon studied by Milgram [1967]
5
© 2013 IBM Corporation
Challenges
 How to combine data sources, build a very large network, and mine it?
 Each data source can become a network and all networks can be
combined making one large weighted or multi-edges network, but…
 How do we define the weight for each graph?
 When using multi-edge graphs, the number of available algorithms/techniques
is an issue.
 It is hard to define the mining task for multi-edge graph
 Combining different type of sources to build one very large graph requires
 New algorithms
 New range of methodology and definitions of graph mining area
6
© 2013 IBM Corporation
Study
 108,050 tickets
 Collected from the past 10 months
 315 sysadmins
 Four features where considered
 Work shifts (morning, afternoon and night)
 Department (four departments)
 Customers (around 70)
 Problem severity (1, the hardest one to solve)
 We consolidate the monthly data for each sysadmin into a percentage
representing the weight of each of customers, service lines, shifts, etc.
 Each sysadmin was represented by a feature vector with 80 positions
7
© 2013 IBM Corporation
Study
 To build the networks, we compute the cosine distance among each
sysadmin using a K-NN (K Nearest Neighbor) search, using k = 10
 Who are the 10 most similar sysadmins?
 We explored two types of network
 Using the entire feature vector to compute the distance
 Splitting the feature vector into four independent vector, each one
representing one feature, building four networks, and then merging them into
one multi-edge network
8
© 2013 IBM Corporation
Results – Severity , Shift, Department, and Customer
9
© 2013 IBM Corporation
Results – Service Lines vs. Shift
10
© 2013 IBM Corporation
Results – Service Lines vs. Severity
11
© 2013 IBM Corporation
Results – Shift vs. Severity
12
© 2013 IBM Corporation
Final remarks
 Unveiling underlying emerging networks is a promising approach
 Integrating social analytics and qualitative research has the potential to
reveal "hidden" practices of daily distributed complex tasks
 Using network as a model to connect sysadmin is important specially in
crises situation
 Future work involves
 Field work
 Integrating ticket information with sysadmins’ communication patterns
 New methods and tools are needed to process and display very large
networks with parallel edges
13
© 2013 IBM Corporation
Thank you!
VagSant@br.ibm.com
@santanavagner

More Related Content

What's hot

IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
Areej Qasrawi
 
SMAC
SMACSMAC
SMAC
Mphasis
 
A framework for improving security in cloud computing
A framework for improving security in cloud computingA framework for improving security in cloud computing
A framework for improving security in cloud computing
AJIT M KARANJKAR
 
Social Mobile Analytics Cloud
Social Mobile Analytics CloudSocial Mobile Analytics Cloud
Social Mobile Analytics Cloud
Mphasis
 
Ppt template (1)
Ppt template (1)Ppt template (1)
Ppt template (1)
prakash mahato
 
Future Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopFuture Internet Arch - Open Workshop
Future Internet Arch - Open Workshop
SOFIProject
 
CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications
PayamBarnaghi
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saranshSaransh Agarwal
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
PayamBarnaghi
 
Offloading Computation to the Edge
Offloading Computation to the EdgeOffloading Computation to the Edge
Offloading Computation to the Edge
Vittorio Scarano
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
S.Mostafa Sayyedi
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
Madan Golla
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
Telstra
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign country
Telstra
 

What's hot (20)

IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
SMAC
SMACSMAC
SMAC
 
A framework for improving security in cloud computing
A framework for improving security in cloud computingA framework for improving security in cloud computing
A framework for improving security in cloud computing
 
Social Mobile Analytics Cloud
Social Mobile Analytics CloudSocial Mobile Analytics Cloud
Social Mobile Analytics Cloud
 
Ppt template (1)
Ppt template (1)Ppt template (1)
Ppt template (1)
 
Future Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopFuture Internet Arch - Open Workshop
Future Internet Arch - Open Workshop
 
Siop impact of social media
Siop impact of social mediaSiop impact of social media
Siop impact of social media
 
CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saransh
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
 
Offloading Computation to the Edge
Offloading Computation to the EdgeOffloading Computation to the Edge
Offloading Computation to the Edge
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Grid computing
Grid computingGrid computing
Grid computing
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Impact2
Impact2Impact2
Impact2
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign country
 

Similar to MCPL2013 - Social network analyses in organizations: challenges and approaches for studying work networks

Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Running headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxRunning headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docx
rtodd599
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
IJCI JOURNAL
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
IJERA Editor
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
SNA of M2M Organisations
SNA of M2M OrganisationsSNA of M2M Organisations
SNA of M2M Organisations
Lee Cox
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
audeleypearl
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
IRJET Journal
 
The Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterThe Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium Poster
Tanner Massahos
 
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGMOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
ijistjournal
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
ITIIIndustries
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
ITIIIndustries
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing database
LeMeniz Infotech
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
IAESIJEECS
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
suthi
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
adeyimikaipaye
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
paperpublications3
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challengesAlexander Decker
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
Emily Smith
 

Similar to MCPL2013 - Social network analyses in organizations: challenges and approaches for studying work networks (20)

Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
SMAC
SMACSMAC
SMAC
 
Running headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxRunning headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docx
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
SNA of M2M Organisations
SNA of M2M OrganisationsSNA of M2M Organisations
SNA of M2M Organisations
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
 
The Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterThe Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium Poster
 
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGMOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing database
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challenges
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
 

More from Vagner Santana

Introdução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPIntrodução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPVagner Santana
 
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
Vagner Santana
 
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
Vagner Santana
 
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure WidgetsWWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
Vagner Santana
 
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
Vagner Santana
 
IHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliaçãoIHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliação
Vagner Santana
 
Acessibilidade web
Acessibilidade webAcessibilidade web
Acessibilidade web
Vagner Santana
 
SEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais OnlineSEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais Online
Vagner Santana
 
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
Vagner Santana
 
Padrões de Projeto
Padrões de ProjetoPadrões de Projeto
Padrões de Projeto
Vagner Santana
 
Padrões Arquiteturais de Sistemas
Padrões Arquiteturais de SistemasPadrões Arquiteturais de Sistemas
Padrões Arquiteturais de Sistemas
Vagner Santana
 
Desenvolvimento de Software
Desenvolvimento de SoftwareDesenvolvimento de Software
Desenvolvimento de Software
Vagner Santana
 
W4A 2012 - Vagner Santana
W4A 2012 - Vagner SantanaW4A 2012 - Vagner Santana
W4A 2012 - Vagner Santana
Vagner Santana
 

More from Vagner Santana (13)

Introdução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPIntrodução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUP
 
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
 
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
 
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure WidgetsWWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
 
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
 
IHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliaçãoIHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliação
 
Acessibilidade web
Acessibilidade webAcessibilidade web
Acessibilidade web
 
SEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais OnlineSEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais Online
 
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
 
Padrões de Projeto
Padrões de ProjetoPadrões de Projeto
Padrões de Projeto
 
Padrões Arquiteturais de Sistemas
Padrões Arquiteturais de SistemasPadrões Arquiteturais de Sistemas
Padrões Arquiteturais de Sistemas
 
Desenvolvimento de Software
Desenvolvimento de SoftwareDesenvolvimento de Software
Desenvolvimento de Software
 
W4A 2012 - Vagner Santana
W4A 2012 - Vagner SantanaW4A 2012 - Vagner Santana
W4A 2012 - Vagner Santana
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

MCPL2013 - Social network analyses in organizations: challenges and approaches for studying work networks

  • 1. © 2013 IBM Corporation Social network analyses in organizations: challenges and approaches for studying work networks Ana Paula Appel, Vagner F. de Santana, Rogério A. de Paula Claudio S. Pinhanez, Victor F. Cavalvante IBM Research Brazil, Service Systems MCPL 2013 - Sep 11-13, 2013 IBM Research
  • 2. © 2013 IBM Corporation Agenda  Context  Related works  Challenges  Study  Results  Final remarks 2
  • 3. © 2013 IBM Corporation Context  The spread of online Social Networks (SN) use is responsible for the current high interest in complex network analyses, e.g.:  “People you may know” feature  How people get connected?  SN are networks in which  Nodes represent people, or groups of people  Edges some form of social interaction  Social Network Analysis (SNA) allows to diagnose problems and identify opportunities in organizations  SNA allows to identify collaborative hot spots and cold spots  In organizations, connecting people with similar skills, interests, or profiles can be worth for employees in many ways 3
  • 4. © 2013 IBM Corporation Context  Our work took place at a large IT service delivery organization, Big Service Factory (BSF)  Employees are very specialized, often focused on specific tasks  Sysadmins are responsible for some of the most critical functions necessary to maintain the customers’ IT infrastructures  Tickets describe particular incidents  Tickets have attributes indicating work shift, department, customer, date, descriptions of the problem, among others  Challenges in the context involve  Assignment time  Data insertion by hand  … 4
  • 5. © 2013 IBM Corporation Related works  The foundation of the field is attributed to Jacob Levy Moreno who conducted the first long-range sociometric study from 1932-1938  Monge and Contractor [1987] utilized social network analysis to study the communication patterns among workers  Properties identified:  The power-law degree distributions as showed in Albert et al. [1999] and Adamic et al. [2000]  The diameter shrinkage present in evolving networks presented by Leskovec et al. [2005]  The Small World phenomenon studied by Milgram [1967] 5
  • 6. © 2013 IBM Corporation Challenges  How to combine data sources, build a very large network, and mine it?  Each data source can become a network and all networks can be combined making one large weighted or multi-edges network, but…  How do we define the weight for each graph?  When using multi-edge graphs, the number of available algorithms/techniques is an issue.  It is hard to define the mining task for multi-edge graph  Combining different type of sources to build one very large graph requires  New algorithms  New range of methodology and definitions of graph mining area 6
  • 7. © 2013 IBM Corporation Study  108,050 tickets  Collected from the past 10 months  315 sysadmins  Four features where considered  Work shifts (morning, afternoon and night)  Department (four departments)  Customers (around 70)  Problem severity (1, the hardest one to solve)  We consolidate the monthly data for each sysadmin into a percentage representing the weight of each of customers, service lines, shifts, etc.  Each sysadmin was represented by a feature vector with 80 positions 7
  • 8. © 2013 IBM Corporation Study  To build the networks, we compute the cosine distance among each sysadmin using a K-NN (K Nearest Neighbor) search, using k = 10  Who are the 10 most similar sysadmins?  We explored two types of network  Using the entire feature vector to compute the distance  Splitting the feature vector into four independent vector, each one representing one feature, building four networks, and then merging them into one multi-edge network 8
  • 9. © 2013 IBM Corporation Results – Severity , Shift, Department, and Customer 9
  • 10. © 2013 IBM Corporation Results – Service Lines vs. Shift 10
  • 11. © 2013 IBM Corporation Results – Service Lines vs. Severity 11
  • 12. © 2013 IBM Corporation Results – Shift vs. Severity 12
  • 13. © 2013 IBM Corporation Final remarks  Unveiling underlying emerging networks is a promising approach  Integrating social analytics and qualitative research has the potential to reveal "hidden" practices of daily distributed complex tasks  Using network as a model to connect sysadmin is important specially in crises situation  Future work involves  Field work  Integrating ticket information with sysadmins’ communication patterns  New methods and tools are needed to process and display very large networks with parallel edges 13
  • 14. © 2013 IBM Corporation Thank you! VagSant@br.ibm.com @santanavagner

Editor's Notes

  1. sysadmin that work in same work shift tend to be more similar than the ones that work in different work shift connection among sysadmins during the work is higher to sysadmins that work in same department in same work shift, no matter the costumer or the tickets’ severity
  2. sysadmin that solves same type of ticket tend to be similar to each other
  3. most of tickets with severity one occurs in work shift 3 - night most of the tickets with severity three (Figure 3 (c) red) occurs in work shift 1 – morning