The document discusses various marketing strategies and frameworks for achieving growth, including exploring new opportunities through innovation and diversification. It emphasizes understanding customer value and aligning finance and marketing functions. Various models are presented for assessing growth opportunities, such as the Ansoff Matrix for evaluating product/market expansion and the concept of addressing "growth gaps" in areas like customer acquisition, loyalty, and margins. Overall, the key message is on developing integrated strategies to generate future sales and profits through innovative approaches to meeting customer needs.
This document discusses strategies for dealing with large social network data, including cleaning redundant data, filtering vertices or edges, and analyzing one-mode and two-mode networks. It also introduces ego-centric networks and varying the degree of separation to analyze an ego's extended network.
The document discusses how families use different information and communication technologies (ICTs) like social media to stay connected with each other in both positive and negative ways. It explores how teens in particular integrate various media into their lives and relationships with parents. While media multiplexity allows families to communicate through different modes, it can also potentially be abused and contradict theories about the social construction of technologies.
The document discusses hypertext and surveillance. It notes that hypertext allows for the "social life" of information as it can be networked and linked online. It then instructs students to compare a print newspaper article to the same article online on the New York Times website, noting the different information and content available on each platform, such as headlines, reporter names, photos, and additional context available online.
The document discusses how networked work and teleworking are changing organizations. It notes that networked organizations are less hierarchical, more geographically distributed, and rely on informal and ad-hoc teams connected through information and communication technologies. While dispersed collaboration enabled by teleworking provides flexibility, it can blur the lines between work and personal life if workers feel they must always be connected. There are also legal questions around overtime pay if employees work outside of traditional work hours via technologies. Achieving a proper work-life balance is a challenge with the always-on culture of networked organizations.
Strategic Thinking
- Sales managers complain that their products are commodities competing based on price with no differentiation, needing to sell large quantities to cover costs. The industry is losing money.
- Strategic thinking is defined as generating and applying business insights continuously for competitive advantage, while strategic planning is channeling insights into action plans to achieve goals.
- Smart strategists sometimes choose bad strategies because they think the strategies are good, lacking data, tools, or understanding of factors like customers, competition, and profit calculation.
This document discusses key concepts and measures for social network analysis:
1) It defines a social network as a collection of people and their relationships to one another, focusing on how people are located in relation to others rather than individual attributes.
2) It describes vertices as nodes in the network and edges as the links or relationships between vertices, which can be directed or undirected.
3) It provides an example of how social network data can be represented using an adjacency matrix or edge list format.
The document discusses various marketing strategies and frameworks for achieving growth, including exploring new opportunities through innovation and diversification. It emphasizes understanding customer value and aligning finance and marketing functions. Various models are presented for assessing growth opportunities, such as the Ansoff Matrix for evaluating product/market expansion and the concept of addressing "growth gaps" in areas like customer acquisition, loyalty, and margins. Overall, the key message is on developing integrated strategies to generate future sales and profits through innovative approaches to meeting customer needs.
This document discusses strategies for dealing with large social network data, including cleaning redundant data, filtering vertices or edges, and analyzing one-mode and two-mode networks. It also introduces ego-centric networks and varying the degree of separation to analyze an ego's extended network.
The document discusses how families use different information and communication technologies (ICTs) like social media to stay connected with each other in both positive and negative ways. It explores how teens in particular integrate various media into their lives and relationships with parents. While media multiplexity allows families to communicate through different modes, it can also potentially be abused and contradict theories about the social construction of technologies.
The document discusses hypertext and surveillance. It notes that hypertext allows for the "social life" of information as it can be networked and linked online. It then instructs students to compare a print newspaper article to the same article online on the New York Times website, noting the different information and content available on each platform, such as headlines, reporter names, photos, and additional context available online.
The document discusses how networked work and teleworking are changing organizations. It notes that networked organizations are less hierarchical, more geographically distributed, and rely on informal and ad-hoc teams connected through information and communication technologies. While dispersed collaboration enabled by teleworking provides flexibility, it can blur the lines between work and personal life if workers feel they must always be connected. There are also legal questions around overtime pay if employees work outside of traditional work hours via technologies. Achieving a proper work-life balance is a challenge with the always-on culture of networked organizations.
Strategic Thinking
- Sales managers complain that their products are commodities competing based on price with no differentiation, needing to sell large quantities to cover costs. The industry is losing money.
- Strategic thinking is defined as generating and applying business insights continuously for competitive advantage, while strategic planning is channeling insights into action plans to achieve goals.
- Smart strategists sometimes choose bad strategies because they think the strategies are good, lacking data, tools, or understanding of factors like customers, competition, and profit calculation.
This document discusses key concepts and measures for social network analysis:
1) It defines a social network as a collection of people and their relationships to one another, focusing on how people are located in relation to others rather than individual attributes.
2) It describes vertices as nodes in the network and edges as the links or relationships between vertices, which can be directed or undirected.
3) It provides an example of how social network data can be represented using an adjacency matrix or edge list format.
This chapter discusses developing a leadership system template to clearly define a vision, values, and strategies. It provides a list of constructs that leaders can use to structure their template, including leadership style, organizational culture, communication, and employee performance. The template then guides leaders to apply relevant theories to each construct, determine how progress will be evaluated, and establish appropriate timeframes. Conducting this exercise helps leaders envision their goals and monitor progress in achieving an effective leadership system.
This document discusses two methods for clustering and grouping networks: 1) Purely network structure-based clustering that uses computer algorithms to identify clusters based on how vertices are connected; and 2) Grouping based on known attribute information where users manually group vertices based on attributes like gender or location. It also provides acknowledgement information for the source material.
(1) This study analyzed how information about the 2009 Gaza conflict was shared on Twitter. It found that traditional large media organizations like the BBC and New York Times were most prominent initially but their role increased over time.
(2) Alternative sources like citizen journalists and NGOs were well integrated with traditional media in the co-tweet network, indicating they supplemented understanding of the issue.
(3) The study concludes Twitter shows a symbiosis between mainstream and alternative sources, with traditional media maintaining influence but new sources also making important contributions.
SharePoint is being rapidly adopted by enterprises large and small as a platform for collaboration. One of the reasons for this rapid adoption is it's ability to be customized through the development of custom Web Parts. This session will take ASP.Net programmers through all of the steps needed to create a custom Web Part from scratch and make it available to Site creators in their SharePoint environment.
Protest Communication in Twitter: An Emergent Norm PerspectiveKyounghee Hazel Kwon
This document discusses the application of emergent norm theory to understand communication on Twitter during the January 25th Egypt protests. It presents emergent norm theory, which focuses on improvised social interactions during crises to collectively define situations and develop shared understandings. The author refines the theory for operationalization and applies it to analyze protest communication on Twitter. Three stages of communication are identified: improvisation, verification, and keynoting. Geographic patterns are also found between Egypt, Pan-Arab, and Non-Arab regions. The analysis provides insights into the emergence of collective identity and roles during crises through social media communication.
This document discusses how user-generated content and participation on the internet, known as Web 2.0, allows for collective knowledge production through contributions from both users and producers. It provides examples of how Wikipedia articles are created through collaboration between casual and dedicated editors. It also examines how ordinary users remix and create content, as seen on YouTube, and how political protests can organize through social media, as happened during the Egyptian revolution in 2011.
This study analyzes Twitter communications during the 2011 Egyptian revolution and January 25th demonstration. The researchers trace how Twitter communications developed over time and suggest a sequential crisis communication model of improvisation, verification, and solidification (IVS). An analysis of over 4,000 tweets from Egypt, other Arab nations, and non-Arab nations during the demonstration found that tweets from Egypt focused more on improvising information, tweets from non-Arab nations focused more on verification, and tweets discussing solidification of collective identity were evenly distributed. The IVS process showed how Twitter served as a global collective sense-making system through personal participation during the political crisis.
This document summarizes a presentation about working with data in SharePoint. It discusses how SharePoint stores data in lists rather than tables, and how the object model differs from a traditional database. It also explains that SharePoint hides some data that developers need to access, and that CAML queries must be used instead of SQL to retrieve list items based on criteria. The presentation demonstrates web parts built to help uncover hidden lists and fields, and to more easily construct CAML queries.
This document discusses personal networks and how they are larger and more complex than typically thought. It summarizes some key studies that found personal networks are on average larger than what was found in earlier research. Personal networks are also fragmented across different aspects of social life and include both strong and weak ties that provide diverse information and resources. While tools like Facebook have increased contact with weaker ties, personal networks are underestimated in size due to limitations in self-reporting and how networks are defined in terms of closeness beyond just discussing important matters.
This chapter discusses developing a leadership system template to clearly define a vision, values, and strategies. It provides a list of constructs that leaders can use to structure their template, including leadership style, organizational culture, communication, and employee performance. The template then guides leaders to apply relevant theories to each construct, determine how progress will be evaluated, and establish appropriate timeframes. Conducting this exercise helps leaders envision their goals and monitor progress in achieving an effective leadership system.
This document discusses two methods for clustering and grouping networks: 1) Purely network structure-based clustering that uses computer algorithms to identify clusters based on how vertices are connected; and 2) Grouping based on known attribute information where users manually group vertices based on attributes like gender or location. It also provides acknowledgement information for the source material.
(1) This study analyzed how information about the 2009 Gaza conflict was shared on Twitter. It found that traditional large media organizations like the BBC and New York Times were most prominent initially but their role increased over time.
(2) Alternative sources like citizen journalists and NGOs were well integrated with traditional media in the co-tweet network, indicating they supplemented understanding of the issue.
(3) The study concludes Twitter shows a symbiosis between mainstream and alternative sources, with traditional media maintaining influence but new sources also making important contributions.
SharePoint is being rapidly adopted by enterprises large and small as a platform for collaboration. One of the reasons for this rapid adoption is it's ability to be customized through the development of custom Web Parts. This session will take ASP.Net programmers through all of the steps needed to create a custom Web Part from scratch and make it available to Site creators in their SharePoint environment.
Protest Communication in Twitter: An Emergent Norm PerspectiveKyounghee Hazel Kwon
This document discusses the application of emergent norm theory to understand communication on Twitter during the January 25th Egypt protests. It presents emergent norm theory, which focuses on improvised social interactions during crises to collectively define situations and develop shared understandings. The author refines the theory for operationalization and applies it to analyze protest communication on Twitter. Three stages of communication are identified: improvisation, verification, and keynoting. Geographic patterns are also found between Egypt, Pan-Arab, and Non-Arab regions. The analysis provides insights into the emergence of collective identity and roles during crises through social media communication.
This document discusses how user-generated content and participation on the internet, known as Web 2.0, allows for collective knowledge production through contributions from both users and producers. It provides examples of how Wikipedia articles are created through collaboration between casual and dedicated editors. It also examines how ordinary users remix and create content, as seen on YouTube, and how political protests can organize through social media, as happened during the Egyptian revolution in 2011.
This study analyzes Twitter communications during the 2011 Egyptian revolution and January 25th demonstration. The researchers trace how Twitter communications developed over time and suggest a sequential crisis communication model of improvisation, verification, and solidification (IVS). An analysis of over 4,000 tweets from Egypt, other Arab nations, and non-Arab nations during the demonstration found that tweets from Egypt focused more on improvising information, tweets from non-Arab nations focused more on verification, and tweets discussing solidification of collective identity were evenly distributed. The IVS process showed how Twitter served as a global collective sense-making system through personal participation during the political crisis.
This document summarizes a presentation about working with data in SharePoint. It discusses how SharePoint stores data in lists rather than tables, and how the object model differs from a traditional database. It also explains that SharePoint hides some data that developers need to access, and that CAML queries must be used instead of SQL to retrieve list items based on criteria. The presentation demonstrates web parts built to help uncover hidden lists and fields, and to more easily construct CAML queries.
This document discusses personal networks and how they are larger and more complex than typically thought. It summarizes some key studies that found personal networks are on average larger than what was found in earlier research. Personal networks are also fragmented across different aspects of social life and include both strong and weak ties that provide diverse information and resources. While tools like Facebook have increased contact with weaker ties, personal networks are underestimated in size due to limitations in self-reporting and how networks are defined in terms of closeness beyond just discussing important matters.