This document outlines the syllabus for a course on managing strategic networks. The course aims to help students better understand how to create, use, and manage networks effectively. It will examine network concepts applied in organizational settings, starting with simple structures and progressing to more complex arrangements. Students will analyze individual, organizational, and interorganizational networks. The course involves case studies, readings, surveys, and a final field study project applying the tools learned to evaluate a manager's, team's, or organization's network. Evaluation is based on class participation, a network self-assessment, and the field study project.
Part 1: Concepts and Cases (the language of networks, networks in organizations, case studies and key concepts)
Part 2: (Starts on #44) Mapping Organizational, Personal, and Enterprise Networks: Tools
An update to last year's Social Network Analysis Introduction and Tools...
Social Network Analysis & an Introduction to ToolsPatti Anklam
This presentation was delivered as part of an intense knowledge management curriculum. It covers the basics of network analysis and then goes into the different types of tool that support analyzing networks.
NetWorkShop: Boston Facilitators RoundtablePatti Anklam
The NetWorkShop offers a new perspective – a network lens – that sheds light on how human networks are structured and how technologies can enhance our ability to collaborate and co-create. For facilitators, it offers possibilities of new ways of thinking about client work as well as leadership coaching.
This workshop provides a clear presentation of basic network concepts, including:
· Reflective exercises in creating and interpreting network maps of relationships (organizational and personal) using network concepts
· An introduction to value networking analysis, with a focus on mapping roles and deliverables (gives and gets) in an organizational ecosystem
· A short overview of how social media (Twitter, Facebook, LinkedIn) is altering the landscape of how people create and work in networks.
The Key Success Factor in Knowledge Management... What Else? Change ManagementPatti Anklam
Presented at SLA 2013, on a panel with Ethel Salonen of MITRE Corporation. Provides perspective on change management and how it is used in understanding and creating interventions in knowledge networks.
This short set of slides summarizes the characteristics of people who play specific roles in networks. In a social network analysis, people in these roles can be discovered by running mathematical algorithms through the social graphs. But you don't need to be an algorithm to spot some of these people in your networks!
Social Network Analysis for Competitive IntelligenceAugust Jackson
How can CI teams apply the concepts of social network analysis to gain insight into the capabilities and plans of their competitors? Presented by Jim Richardson and August Jackson in April 2007 at the Society of Competitive Intelligence Professionals annual conference in New York City.
Part 1: Concepts and Cases (the language of networks, networks in organizations, case studies and key concepts)
Part 2: (Starts on #44) Mapping Organizational, Personal, and Enterprise Networks: Tools
An update to last year's Social Network Analysis Introduction and Tools...
Social Network Analysis & an Introduction to ToolsPatti Anklam
This presentation was delivered as part of an intense knowledge management curriculum. It covers the basics of network analysis and then goes into the different types of tool that support analyzing networks.
NetWorkShop: Boston Facilitators RoundtablePatti Anklam
The NetWorkShop offers a new perspective – a network lens – that sheds light on how human networks are structured and how technologies can enhance our ability to collaborate and co-create. For facilitators, it offers possibilities of new ways of thinking about client work as well as leadership coaching.
This workshop provides a clear presentation of basic network concepts, including:
· Reflective exercises in creating and interpreting network maps of relationships (organizational and personal) using network concepts
· An introduction to value networking analysis, with a focus on mapping roles and deliverables (gives and gets) in an organizational ecosystem
· A short overview of how social media (Twitter, Facebook, LinkedIn) is altering the landscape of how people create and work in networks.
The Key Success Factor in Knowledge Management... What Else? Change ManagementPatti Anklam
Presented at SLA 2013, on a panel with Ethel Salonen of MITRE Corporation. Provides perspective on change management and how it is used in understanding and creating interventions in knowledge networks.
This short set of slides summarizes the characteristics of people who play specific roles in networks. In a social network analysis, people in these roles can be discovered by running mathematical algorithms through the social graphs. But you don't need to be an algorithm to spot some of these people in your networks!
Social Network Analysis for Competitive IntelligenceAugust Jackson
How can CI teams apply the concepts of social network analysis to gain insight into the capabilities and plans of their competitors? Presented by Jim Richardson and August Jackson in April 2007 at the Society of Competitive Intelligence Professionals annual conference in New York City.
Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
Mining and Analyzing Academic Social NetworksEditor IJCATR
Academics establish relationships by way of various interactions like jointly authoring a research paper or report, jointly
supervising a thesis, working jointly on a project, etc. Some of these relationships are ubiquitous whereas other are hard to keep track
of. Of all types of possible academic and research collaborations, co-authorship is best documented. In this paper we analyze the coauthorship
based academic social networks of computer science engineering departments of Indian Institutes of Technology (IITs) as
evidenced from their research publications produced during 2011 and 2015. We use social network analysis metrics to study the
collaboration networks in four leading IITs. From experimental results it can be concluded that IIT Delhi and IIT Kharagpur have a
close knit collaboration network whereas the collaboration network of IIT Kanpur and IIT Madras is fragmented. However, the
collaboration networks of all the four IITs exhibit similar network properties as expected from any other collaboration network
An interactive presentation on social network theory and analysis. Content includes information on tie formation and social capital. Network relations are explained by using the example of The A Team. Granovetter's Strength of Weak Ties Theory (1973) is also covered and weak ties and strong ties are explained. Appropriate application of social network theory to individuals understanding how to best take advantage of social networking platforms to find jobs as well as companies taking advantage of social media platforms to find followers are introduced.
Developing a Socially-Aware Engineering Identity Through Transdisciplinary Le...colin gray
In conjunction with the drive towards human-centered design in engineering education, questions arise regarding how students build and engage a socially-aware engineering identity. In this paper, we describe how students in a transdisciplinary undergraduate program struggle to engage with ontological and epistemological perspectives that draw on that social turn, particularly in relation to human-centered engineering approaches and sociotechnical complexity. We use a critical qualitative meaning reconstruction approach to deeply analyze the meaning-making assumptions of these students to reveal characteristic barriers in engaging with other subjectivities, and related epistemological and ontological claims implicit in these subjectivities. We conclude with implications for encouraging socially-aware identity formation in engineering education.
A high-level overview of social network analysis, providing background on how it came into the knowledge management field. Includes an example and core concepts pertinent to the audience, online community managers.
Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
Mining and Analyzing Academic Social NetworksEditor IJCATR
Academics establish relationships by way of various interactions like jointly authoring a research paper or report, jointly
supervising a thesis, working jointly on a project, etc. Some of these relationships are ubiquitous whereas other are hard to keep track
of. Of all types of possible academic and research collaborations, co-authorship is best documented. In this paper we analyze the coauthorship
based academic social networks of computer science engineering departments of Indian Institutes of Technology (IITs) as
evidenced from their research publications produced during 2011 and 2015. We use social network analysis metrics to study the
collaboration networks in four leading IITs. From experimental results it can be concluded that IIT Delhi and IIT Kharagpur have a
close knit collaboration network whereas the collaboration network of IIT Kanpur and IIT Madras is fragmented. However, the
collaboration networks of all the four IITs exhibit similar network properties as expected from any other collaboration network
An interactive presentation on social network theory and analysis. Content includes information on tie formation and social capital. Network relations are explained by using the example of The A Team. Granovetter's Strength of Weak Ties Theory (1973) is also covered and weak ties and strong ties are explained. Appropriate application of social network theory to individuals understanding how to best take advantage of social networking platforms to find jobs as well as companies taking advantage of social media platforms to find followers are introduced.
Developing a Socially-Aware Engineering Identity Through Transdisciplinary Le...colin gray
In conjunction with the drive towards human-centered design in engineering education, questions arise regarding how students build and engage a socially-aware engineering identity. In this paper, we describe how students in a transdisciplinary undergraduate program struggle to engage with ontological and epistemological perspectives that draw on that social turn, particularly in relation to human-centered engineering approaches and sociotechnical complexity. We use a critical qualitative meaning reconstruction approach to deeply analyze the meaning-making assumptions of these students to reveal characteristic barriers in engaging with other subjectivities, and related epistemological and ontological claims implicit in these subjectivities. We conclude with implications for encouraging socially-aware identity formation in engineering education.
A high-level overview of social network analysis, providing background on how it came into the knowledge management field. Includes an example and core concepts pertinent to the audience, online community managers.
Using social network analysis to improve innovation and performanceScott Smith
A significant yet often overlooked component of people’s information environments is composed of the relationships that they use to acquire information and knowledge. Social network analysis (SNA) allows managers to visualize and understand the myriad of relationships that can either facilitate or impede knowledge creation and transfer. In research conducted by the IBM Institute for Knowledge Management, we discovered four different relationship dimensions which are important for success.
Working Out Loud: A step towards building your digital capabilityAnne Bartlett-Bragg
An article that uncovers some of the underpinning perspectives for creating Working Out Loud activities and how these can be a step towards building digital capabilities.
This article originally appeared in Training & Development magazine February 2016 Vol 43 No 1, published by the Australian Institute of Training and Development.
Social Network Analysis based on MOOC's (Massive Open Online Classes)ShankarPrasaadRajama
Collected data by conducting a survey about MOOC among fellow classmates and created edge lists of students and their skills and students and MOOC websites they do courses using Python from the survey data.
Performed visualization of student network in UCINET and found out the densities among clusters in the network.
Performed hypothesis testing to see whether characteristic of a student affects their position(centrality) in the network.
TOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKINGcsandit
With the enormous growth of data, retrieving information from the Web became more desirable
and even more challenging because of the Big Data issues (e.g. noise, corruption, bad
quality…etc.). Expert seeking, defined as returning a ranked list of expert researchers given a
topic, has been a real concern in the last 15 years. This kind of task comes in handy when
building scientific committees, requiring to identify the scholars’ experience to assign them the
most suitable roles in addition to other factors as well. Due to the fact the Web is drowning with
plenty of data, this opens up the opportunity to collect different kinds of expertise evidence. In
this paper, we propose an expert seeking approach with specifying the most desirable features
(i.e. criteria on which researcher’s evaluation is done) along with their estimation techniques.
We utilized some machine learning techniques in our system and we aim at verifying the
effectiveness of incorporating influential features that go beyond publications
Organizational Overlap on Social Networks and its ApplicationsSam Shah
[This work was presented at WWW 2013.]
Online social networks have become important for networking, communication, sharing, and discovery. A considerable challenge these networks face is the fact that an online social network is partially observed because two individuals might know each other, but may not have established a connection on the site. Therefore, link prediction and recommendations are important tasks for any online social network. In this paper, we address the problem of computing edge affinity between two users on a social network, based on the users belonging to organizations such as companies, schools, and online groups. We present experimental insights from social network data on organizational overlap, a novel mathematical model to compute the probability of connection between two peo- ple based on organizational overlap, and experimental validation of this model based on real social network data. We also present novel ways in which the organization overlap model can be applied to link prediction and community detection, which in itself could be useful for recommending entities to follow and generating personalized news feed.
Teaching Excellence in the Social Sciences conference 2015Pamela McKinney
Presentation on the situational analysis of student reflective writing at the University of Sheffield conference on Teaching Excellence in the Social Sciences March 2015
How to conduct a social network analysis: A tool for empowering teams and wor...Jeromy Anglim
Slides and details available at: http://jeromyanglim.blogspot.com/2009/10/how-to-conduct-social-network-analysis.html
A talk on using social network analysis as a team development tool.
This is a presentation that describes at a high level some of the work we've been performing related to NodeXL and it's use to understand social media networks.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
JMeter webinar - integration with InfluxDB and Grafana
Networks final 2012
1. MGT 535: Managing Strategic Networks
Professor Marissa King
Marissa.King@yale.edu
MW 1:00-2:20 PM
Course Scope and Mission:
Networks of relationships determine who is likely to get a job and get promoted, the
innovativeness and profitability of organizations, how effectively industries and
communities can coordinate, and the speed at which ideas and innovations spread.
Although the importance of social capital is self-evident, few managers and
entrepreneurs know how to effectively structure and coordinate their networks. In part,
this is because many of the principles that structure a strategic network are not intuitively
obvious. The number and type of associates a manager or entrepreneur has is often not
as important as how those relations are structured. The goal of this course is to gain a
better understanding of how to create, use, and manage networks effectively.
Course structure:
Network analysis is both a theoretical perspective and a methodology. Each week will
focus on one set of network concepts applied in different organizational settings. We will
begin with the simplest network structures and move towards more complex
arrangements of people and organizations. The first third of the course examines the
way in which patterns of social interaction influence an individual’s ability to achieve their
goals (e.g., get a job or get promoted). Here we draw on cases of individual managers to
assess how their networks help or hinder their performance. The middle of the course
focuses on how networks can affect the ability of organizations to implement change and
realize competitive advantage. Finally, we will examine how increasing connectedness in
the broader social world is transforming the way business is done.
Evaluation and Grades:
Class Participation: 35%
Network Self Assessment + Surveys: 25%
Field Study: 40%
Field Study:
The final team assignment will allow you to use the theoretical and methodological tools
acquired in the course to evaluate either (1) the network around a manager, (2) a team or
unit within an organization, or (3) an interorganizational network. While former
employers and colleagues make fine objects of study, much insight can also be gained by
picking more unusual cases. The project should identify a clear question, problem, or
opportunity and then utilize a combination of observation, interview(s), and/or archival
records to understand the issue. The study should have three components: an overview
of the current situation from a network perspective, a graph of social relations and any
2. relevant network metrics, and a set of recommendations about how to move forward. In
the final session of the course, each team should present an overview of their case and
the recommendations for moving forward.
The project should be done in teams of 4 to 5 people that you are free to choose on your
own. You have considerable latitude in what you choose to study but please meet with
meet with me by September 21st
to discuss your project idea. Past successful projects
have examined network recruitment from schools into Private Equity firms, the role of
twitter in the Egyptian protests, and the Yale SOM alumni network in Silicon Valley. In
general, your project should apply the concepts and theories discussed in the course to a
manager, group, or set of organizations. I generally avoid giving page lengths—quality is
far more important than length. However, I would be surprised if you could successfully
complete the project in less than 15 pages. Both the final report and class
presentations are due on Fri, Oct 14 during class. The class will meet from 11:30
am-1:30 pm.
Network Self-Assessment:
The network self-assessment allows you to examine your work relations (through a
survey instrument and visualizing your LinkedIn network), your personal relations
(through the facebook analyses conducted in class), and the relationship between the
two. Based on the readings and metrics discussed in the course you should 1) analyze
current strengths and weakness of your existing network and 2) use the readings to
develop a strategic action plan to develop your network. The report should be two to
three pages of text, excluding tables and figures. The network self-assessment is due on
September 14th
.
Case Surveys:
To help prepare for discussion and create datasets for the labs, there will often be a two
or three question survey that will take less than five minutes to complete. The results
from these surveys will be used as data in classes. There are no wrong or right answers,
the questions are just meant to provoke discussion. If a survey is due, a link will be
posted on the syllabus or emailed to the class. Please fill out the survey by 7 am on the
day the case will be discussed.
Laptops:
Laptops are not permitted in class, except during lab session. Please take notes by hand.
If you have a particular problem with this request, please see me. If I don’t hear from
you about this individually, I will ask you to close your laptop if I see it open.
3. August 31st: Characteristics of Effective Networks, Part I
Case: Ross Walker’s Path to Power (OB79-PDF-ENG)
Ross Walker, a 2005 graduate of Stanford Business School, had developed an extensive
network for someone at his career stage. He had been chosen to serve as the youngest
alumni representative on the Stanford University Board of Trustees, had a great job, was
well-known and well-liked by a very large number of people. How did he do it? As his
career unfolds, he inevitably faces more intense competition as he moves on to even
bigger platforms and more responsibility. Will the qualities that allowed him to develop
his network continue to serve him just as well in the future as they had in the past?
Readings: Cross, R. and A. Parker (2004). The Hidden Power of Social Networks. Chapter 1.
pp. 2-14.
Ferrazzi, Keith. Never Eat Alone: And Other Secrets to Success, One Relationship at a Time. New
York: Doubleday. (Skim)
Cohen, Allan and David Branford. “Influence Without Authority: The Use of Alliance,
Reciprocity, and Exchange to Accomplish Work.” Organization Dynamics 17:3, pp. 5-17.
(Optional)
September 7th: Characteristics of Effective Networks, Part II
Case: Heidi Roizen
Heidi Roizen, a venture capitalist at SOFTBANK Venture Capital and a former
entrepreneur, maintains an extensive personal and professional network. She leverages
this network to benefit both herself and others. The case considers the steps she's taken
to build and cultivate a network that is both broad and deep.
Prior to the class please fill a quick online survey available at:
http://yale.qualtrics.com/SE/?SID=SV_eKvIdzJNorKCzeA
It should only take 5 to 10 minutes but we will use the network data throughout the
4. Readings:
Knoke, David. Note on Centrality. 2 pages.
Burt, Ronald S. 1992. Structural holes: the social structure of competition. Cambridge, MA:
Harvard University Press.
September 9th: Your network, Lab Part 1
Readings: Brandt, Check, and Pedrazaz. 2006. “You Must Start Before Day One,” From
New Leaders 100-Day Action Plan, 99. 51-68.
Uzzi and Dunlap, “How to Build Your Network,” Harvard Business Review R0512B-PDF-
ENG. 10 pages.
Kuwabara, Ko. “Networking Like an Investor.” Columbia Case Works. 11pages.
Easterly, D and J. Kleiberg. 2010. Networks, Crowds, and Markets. Pages 43-63.
Prepare: Prior to class please go to http://apps.facebook.com/namegenweb/ and
download your Facebook network. Please save the file as a text file and bring the text file
to class. We will analyze this in class.
Go to: http://inmaps.linkedinlabs.com/network and explore visulalizing your LinkedIn
network. It may prove helpful to print out a copy of your network and bring it to class in
order to facilitate comparisons with your Facebook network.
Developmental Network Questionnaire (Classes V2)
September 12th: Status and Mobility
Case: Leading the Josie Esquivel Franchise
After close to a decade at Lehman Brothers, Josie Esquivel was finally ranked number
one in her industry by the Institutional Investor. However, there have been several
organizational changes at Lehman recently and Josie has an offer from Morgan Stanley.
Should she accept? To make this decision, Esquivel needs to reflect on what made her
successful and to consider seriously what it would take to move her "franchise" to
another company without compromising her performance as a star.
5. Readings: Groysberg, Less, and A. Nanda (2008). “Can They Take It With Them? The
Portability of Star Knowledge Workers’ Performance”. Mgmt Science, 7, 1213-1230.
Podolny, J. and D. Phillips (1996). “The Dynamics of Organizational Status,” Journal of
Industrial and Corporate Change, 453-458 (459 – 471 is optional).
September 14th: Teams and Intraorganizational Networks
Case: Building a Networked Organization: Restructuring the IT Department at MWH
Vic Gulas, the new head of IT at the engineering consulting firm MWH Consulting, is
charged with turning a geographically organized department into one organized by
function. He knows that the success of the reorganization will depend on effective
collaboration, but he cannot get a sense of what collaborative relationships do and do
not exist by looking at a formal organizational chart. Instead, Gulas uses organizational
network analysis (ONA), a method for mapping relationships among people in a group.
In the ONA results, Gulas sees a group still fragmented by geography and constrained
by hierarchy and other gaps in connectivity.
Reading: Mehta, Ajay, Andrea Dixon, Daniel Brass and Bruce Robertson. 2006. “The
Social Network Ties of Group Leaders: Implications for Group Performance and Leader
Reputation.” Organization Science 17: 64-79.
September 19th: Sales and Referral Networks
Case: Hale and Dorr
Hale and Dorr, Boston’s largest law firm, is headed by managing partner, Bill Lee. While
the firm has been successful, the industry is getting more competitive. In response, Lee
and the firm’s other partners feel that the time has come to formally think about the
process of acquiring and retaining customers. Put differently, the firm is thinking about
how they should sell their services. The case focuses on two elements of selling:
referrals and sales presentation. Bill Lee must decide how to and to what extent it is
necessary to focus on the development of the firm’s internal and external referral
networks.
September 21st: Brokerage
Case: Jerry Sanders
The Jerry Sanders case recounts how an entrepreneur in the medical devices industry
rapidly transformed a technology concept into a virtual company, X-Cardia. The
6. dilemma posed by the case is whether Sanders’ success with X-Cardia was a one-off or
can it Sanders can have the same success with another company.
Readings: Santos, Filipe and Kathleen Eisenhardt. 2009. “Constructing Markets and Shaping
Boundaries: Entrepreneurial Power in Nascent Fields.” Organization Science 52: 643-671.
September 26th: Negotiation
Case: Basil “Buzz” Hargrove and De Havilland, Inc
In this case we will examine the tactics employed by Basil “Buzz” Hargrove, president of
the Canadian Auto Workers and veteran negotiator, to avoid a strike. During the class
we will watch video footage of the entire process to understand why Hargrove found it
difficult to deal with Merv Gray, the head of the union’s bargaining committee and why
representatives from Buzz’s camp found him difficult to deal with. During the course of
the case discussion we will examine what Hargrove did right and wrong, as well as what
he should do next.
Readings: Gould, Roger V. and Roberto M. Fernandez. 1989. "Structures of Mediation: A
Formal Approach to Brokerage in Transaction Networks." Sociological Methodology pp. 89-126.
September 28th: Visitor—Martina Gmur
Please see resources folder for links to background on the World Economic Forum
Global Agendas Council.
October 3rd
: Your Network--- Lab Part II
Readings:
The Real Life Social Network v2 Slides
An Experimental Study of Search in Global Social Networks Dodds, Muhamad & Watts,
Science, 301, August 8, 2003: 827-829
Watts, Duncan Chapters 2 and 3 in Six Degrees. New York: WB Norton. Pp. 43-83.
Please bring your facebook data to class. We will further analyze this in class. Also
answer the second online survey prior to class. The survey will be the same as the
one you previously filled out. This will allow us to examine the evolution of our
class’s network over the term.
7. Watts, Duncan and Peter Dods. “Thresholds, Cascades, and Predictability.”
October 5th: Viral Marketing
Case: Hasbro POX
Hasbro management is preparing for the launch of a new hand-held electronic game.
The game has several novel benefits: it allows social engagement through its multiplayer
capacity and provides a way to stealthily engage in remote battle sequences. Two
proposals for marketing the new game are on the table at Hasbro. Does a viral marketing
campaign or more traditional marketing approach make the most sense for the new
game?
Watts, D and J Peretti. “Viral Marketing for the Real World.” Harvard Business Review. 2
pages
Elliot, Carl. 2006. “The Drug Pushers.” Atlantic Magazine
http://www.theatlantic.com/magazine/archive/2006/04/the-drug-pushers/4714/
October 10th: Local Networks, Market Entry, and Market Structure
Case: Groupon
This case is set in early 2011, after a period of incredible customer and revenue growth
for Groupon. Reviewing Groupon's rise, the case explores whether Groupon
promotions are really good for local merchants, whether it can continue to thrive amidst
increasingly intense competition, and the key reasons for the company's remarkable early
success.
Ferrary, M. (2003). “The Gift Exchange in the Social Networks of Silicon Valley.”
California
Management Review, 45, 4, 120-138. We will focus on pages 128-138.
Fleming, L. and Matt Marx. (2006). “Managing Creativity in Small Worlds.” California
Management Review, 48, 4, 6-27.
October 12th: Fieldwork Presentations and Wrap Up