We conducted a principle components analysis of users' actions in an enterprise file-sharing service. We describe four factors, their attributes with respect to social action and awareness, and their implications for design.
Co proposers in crowdfunding (muller et al. 2016)Michael Muller
Social Ties in Organizational Crowdfunding: Benefits of Team-Authored Proposals
Michael Muller, Mary Keough, John Wafer, Werner Geyer,
Alberto Alvarez Saez, David Leip, and Cara Viktorov
Social ties have been hypothesized to help people to gain
support in achieving collaborative goals. We test this
hypothesis in a study of organizational crowdfunding (or
“crowdfunding behind the firewall”). 201 projects were
proposed for peer-crowdfunding in a large international
corporation. The crowdfunding website allowed people to
join a project as Co-Proposers. We analyzed the funding
success of 114 projects as a function of the number of
(Co-)Proposers. Projects that had more co-proposers were
more likely to reach their funding targets. Using data from
an organizational social-networking service, we show how
employees’ social ties were associated with these success
patterns. Our results have implications for theories of
collaboration in social networks, and the design of
crowdfunding websites.
CSCW 2016 Conference
Lurking as trait or situational disposition: Lurking and contributing in ente...Michael Muller
This CSCW 2012 short-paper tests hypotheses from three theories to account for behaviors of 200,000+ people in 8600+ online enterprise communities in IBM. We find little support for theories based on binary traits (either or lurker OR a contributor) or for social learning (legitimate peripheral participation). We propose a theory of (a) general disposition to engage (through either or both of lurking and contributing) and (b) personal decision regarding the method of engagement, depending on factors such as job-role, topic-interest, or social commitment to other participants.
All Grown Up: Maturation of Analytics in the CloudInside Analysis
The Briefing Room with Wayne Eckerson and Birst
Live Webcast on Nov. 6, 2012
The desire for analytics today extends far beyond the traditional domain of Business Intelligence. The challenge is that operational systems come in countless shapes and sizes. Furthermore, each application treats data somewhat differently. But there are patterns of data flow and transformation that pervade all such systems. And there's one big place where all these data types and use cases have come together architecturally: the Cloud.
Watch this episode of the Briefing Room to hear veteran Analyst Wayne Eckerson explain how Cloud computing is ushering in a new era of analytics and intelligence. He'll be briefed by Brad Peters of Birst who will tout his company's purpose-built analytics platform. He'll discuss how the Birst engine processes and delivers raw data from disparate systems, offering the deployment flexibility of Software-as-a-Service, together with the capabilities of enterprise-class BI.
Co proposers in crowdfunding (muller et al. 2016)Michael Muller
Social Ties in Organizational Crowdfunding: Benefits of Team-Authored Proposals
Michael Muller, Mary Keough, John Wafer, Werner Geyer,
Alberto Alvarez Saez, David Leip, and Cara Viktorov
Social ties have been hypothesized to help people to gain
support in achieving collaborative goals. We test this
hypothesis in a study of organizational crowdfunding (or
“crowdfunding behind the firewall”). 201 projects were
proposed for peer-crowdfunding in a large international
corporation. The crowdfunding website allowed people to
join a project as Co-Proposers. We analyzed the funding
success of 114 projects as a function of the number of
(Co-)Proposers. Projects that had more co-proposers were
more likely to reach their funding targets. Using data from
an organizational social-networking service, we show how
employees’ social ties were associated with these success
patterns. Our results have implications for theories of
collaboration in social networks, and the design of
crowdfunding websites.
CSCW 2016 Conference
Lurking as trait or situational disposition: Lurking and contributing in ente...Michael Muller
This CSCW 2012 short-paper tests hypotheses from three theories to account for behaviors of 200,000+ people in 8600+ online enterprise communities in IBM. We find little support for theories based on binary traits (either or lurker OR a contributor) or for social learning (legitimate peripheral participation). We propose a theory of (a) general disposition to engage (through either or both of lurking and contributing) and (b) personal decision regarding the method of engagement, depending on factors such as job-role, topic-interest, or social commitment to other participants.
All Grown Up: Maturation of Analytics in the CloudInside Analysis
The Briefing Room with Wayne Eckerson and Birst
Live Webcast on Nov. 6, 2012
The desire for analytics today extends far beyond the traditional domain of Business Intelligence. The challenge is that operational systems come in countless shapes and sizes. Furthermore, each application treats data somewhat differently. But there are patterns of data flow and transformation that pervade all such systems. And there's one big place where all these data types and use cases have come together architecturally: the Cloud.
Watch this episode of the Briefing Room to hear veteran Analyst Wayne Eckerson explain how Cloud computing is ushering in a new era of analytics and intelligence. He'll be briefed by Brad Peters of Birst who will tout his company's purpose-built analytics platform. He'll discuss how the Birst engine processes and delivers raw data from disparate systems, offering the deployment flexibility of Software-as-a-Service, together with the capabilities of enterprise-class BI.
Leaving the Ivory Tower: Research in the Real WorldArmonDadgar
Academic research often has a reputation of being insular and seldom being used in the real world. At HashiCorp, we've had a long tradition of basing our tools and products on academic research. We look at research for the initial design of products, and for ongoing development of new features. Our industrial research group, HashiCorp Research, has even published novel work. In this talk we cover why we care, how we incorporate research, and what has been particularly useful for us.
With the tremendous growth of social networks, there has been a growth in the amount of new data that is being created every minute on these networking sites. The notion of community in this social networking world has caught lots of attention. Studying Twitter is useful for understanding how people use new communication technologies to form social connections and maintain existing ones. We analysed how geo-tagged tweets in Twitter can be used to identify useful user features and behavior as well as identify landmarks/places of interests. We also analysed several clustering algorithms and proposed different similarity measures to detect communities.
Learn about Alfresco 4, the most advanced Open Source ECM solution to date. You will see how great new features can be used to make your employees more productive, more connected and more engaged. You will hear more about the exciting features, including:
• Social features – Brining social features to users within the enterprise
• Publishing – Automating the stream of content to multiple social sites
• Improved UI – An enterprise application that users will want to use
• Format support – Extending to iWork, Google Docs, Video, Audio and Adobe files
• Mobile support – Access content from anywhere on any device
• Scalability – The most scalable and robust version yet
• Workflow – Utilizing the new Activiti BPM engine
Project Website: http://www.researchobject.org/
researchobjects.org is a community project that has developed an approach to describe and package up all resources used as part of an investigation as Research Objects (RO’s).
RO’s - provide two main features; a manifest - a consistent way to provide a well-typed, structured description of the resources used in an investigation; and a ‘bundle’ - a mechanism for packaging up manifests with resources as a single, publishable unit.
RO’s therefore carry the research context of an experiment - data, software, standard operating procedures (SOPs), models etc - and gather together the components of an experiment so that they are findable, accessible, interoperable and reproducible (FAIR). RO’s combine software and data into an aggregative data structure consisting of well described reconstructable parts.
RO’s have the potential to address a number of challenges pertinent to open research including: a) supporting interoperability between infrastructures by using ROs as a primary mechanism for exchange and publication b) supporting the evolution of research objects as a living collection, enabling provenance tracking c) providing the ability to pivot research object components (data, software, models) that are not restricted to the traditional publication.
Here we present work towards the development and adoption of ROs:
(i) A series of specifications and conventions, using community standards, for the RO manifest and RO bundles.
(ii) Implementations of Java, Python and Ruby APIs and tooling against those specifications;
(iii) Examples of representations of the RO models in various languages (e.g. JSON-LD, RDF, HTML).
Web Metrics vs Web Behavioral Analytics and Why You Need to Know the DifferenceAlterian
An overview of the web analytics ecosystem and uncover how web behavior analytics can free you from the status quo of just counting page views. More importantly, you will discover what you need to do to truly leverage the data that is available to you from the website.
Ultimately, you will walk away with:
• An understanding of the differences between available tools
• Insight on what data to collect on your site
• Tips to help get your manager to embrace web behavior analytics
• Checklist of next steps
Open Data, by definition, provides the chance to re-shape and publish heterogeneous pieces and fragments of information which are open, namely anyone is free to use, reuse, and redistribute it. In order for users to fully benefit this idea, Open Data Systems of tomorrow must provide high quality data, relying on real time and ubiquitous services, along with a deep integration with mobile and smart devices and infrastructures.
In this session, we present a syntheses of Whitehall proposal addressed a this vision: is addressed at building Open Data in a fully-fledged Big Data infrastructure, realized using graph based and NoSQL technologies. This idea is shaped in a cultural heritage scenario, where data in envisaged at valorizing one of the main assets of Italy: cultural heritage.
Leaving the Ivory Tower: Research in the Real WorldArmonDadgar
Academic research often has a reputation of being insular and seldom being used in the real world. At HashiCorp, we've had a long tradition of basing our tools and products on academic research. We look at research for the initial design of products, and for ongoing development of new features. Our industrial research group, HashiCorp Research, has even published novel work. In this talk we cover why we care, how we incorporate research, and what has been particularly useful for us.
With the tremendous growth of social networks, there has been a growth in the amount of new data that is being created every minute on these networking sites. The notion of community in this social networking world has caught lots of attention. Studying Twitter is useful for understanding how people use new communication technologies to form social connections and maintain existing ones. We analysed how geo-tagged tweets in Twitter can be used to identify useful user features and behavior as well as identify landmarks/places of interests. We also analysed several clustering algorithms and proposed different similarity measures to detect communities.
Learn about Alfresco 4, the most advanced Open Source ECM solution to date. You will see how great new features can be used to make your employees more productive, more connected and more engaged. You will hear more about the exciting features, including:
• Social features – Brining social features to users within the enterprise
• Publishing – Automating the stream of content to multiple social sites
• Improved UI – An enterprise application that users will want to use
• Format support – Extending to iWork, Google Docs, Video, Audio and Adobe files
• Mobile support – Access content from anywhere on any device
• Scalability – The most scalable and robust version yet
• Workflow – Utilizing the new Activiti BPM engine
Project Website: http://www.researchobject.org/
researchobjects.org is a community project that has developed an approach to describe and package up all resources used as part of an investigation as Research Objects (RO’s).
RO’s - provide two main features; a manifest - a consistent way to provide a well-typed, structured description of the resources used in an investigation; and a ‘bundle’ - a mechanism for packaging up manifests with resources as a single, publishable unit.
RO’s therefore carry the research context of an experiment - data, software, standard operating procedures (SOPs), models etc - and gather together the components of an experiment so that they are findable, accessible, interoperable and reproducible (FAIR). RO’s combine software and data into an aggregative data structure consisting of well described reconstructable parts.
RO’s have the potential to address a number of challenges pertinent to open research including: a) supporting interoperability between infrastructures by using ROs as a primary mechanism for exchange and publication b) supporting the evolution of research objects as a living collection, enabling provenance tracking c) providing the ability to pivot research object components (data, software, models) that are not restricted to the traditional publication.
Here we present work towards the development and adoption of ROs:
(i) A series of specifications and conventions, using community standards, for the RO manifest and RO bundles.
(ii) Implementations of Java, Python and Ruby APIs and tooling against those specifications;
(iii) Examples of representations of the RO models in various languages (e.g. JSON-LD, RDF, HTML).
Web Metrics vs Web Behavioral Analytics and Why You Need to Know the DifferenceAlterian
An overview of the web analytics ecosystem and uncover how web behavior analytics can free you from the status quo of just counting page views. More importantly, you will discover what you need to do to truly leverage the data that is available to you from the website.
Ultimately, you will walk away with:
• An understanding of the differences between available tools
• Insight on what data to collect on your site
• Tips to help get your manager to embrace web behavior analytics
• Checklist of next steps
Open Data, by definition, provides the chance to re-shape and publish heterogeneous pieces and fragments of information which are open, namely anyone is free to use, reuse, and redistribute it. In order for users to fully benefit this idea, Open Data Systems of tomorrow must provide high quality data, relying on real time and ubiquitous services, along with a deep integration with mobile and smart devices and infrastructures.
In this session, we present a syntheses of Whitehall proposal addressed a this vision: is addressed at building Open Data in a fully-fledged Big Data infrastructure, realized using graph based and NoSQL technologies. This idea is shaped in a cultural heritage scenario, where data in envisaged at valorizing one of the main assets of Italy: cultural heritage.
Similar to Usage Of Enterprise File Sharing Service Muller Chi 2010 (20)
Return On Contribution (ROC) ECSCW 2009 Muller Et AlMichael Muller
We desribe Return On Contribution (ROC), a social metric for social software. ROC can be used to characterize social software at the level of (a) an application, (b) types of contributions, (c) particular contributions, and (d) particular contributors (where permitted by privacy rules). Our work also highlights the importance of "lurkers" or "non-public participants" in social software. ROC can be applied across diverse types of social software and forms of participation.
Information Curators in an Enterprise File-Sharing ServiceMichael Muller
We describe an emergent role in an enterprise social file-sharing service, in which users create collections of files for use by themselves or other users. We call these users "information curators."
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Usage Of Enterprise File Sharing Service Muller Chi 2010
1. Patterns of Usage
in an Enterprise File-Sharing Service:
Publicizing, Discovering, & Telling the News
Michael Muller, David R Millen, & Jonathan Feinberg*
IBM Research / Collaborative User Experience
IBM Center for Social Software
Cambridge, MA, USA
* Jonathan Feinberg is now at Google.
IBM Research 1
2. Agenda
• File-sharing in an enterprise
• Factor analysis of file-sharing usage patterns
– Upload & Publicize
– Annotate & Watch
– Discover & Tell
– Refind
• Interpretation
– Both more and less social than anticipated
– Design what and for whom?
– Who is missing? Future analyses
IBM Research 2
3. File-Sharing in an Enterprise
• Cattail, an enterprise file-sharing service
– Centralized
– Authenticated for all access
– Simpler than peer-to-peer or public networks
• Cattail statistical profile
– Users 88270 (many job roles, 80 countries)
– Uploaders15943 (18%)
– Files 120288 (diverse formats)
– Downloads 728509
• Related work
– Dropbox / UD Dropbox (Schwartz, 2007)
– Apocrita (Reynolds et al., 2005)
– Studies of file-sharing (Christin et al., 2005; Lee, 2003; Rader, 2009;
Voida et al., 2006; Whalen et al., 2008)
IBM Research 3
4. Cattail Features and Capabilities
• Capabilities
– Upload – Share (recommend) *
– Download * – Collect *
– – Annotate *
– – Watch *
* Can be done on own files or on files that were uploaded by others
A F
H
B
P
C D
Q
G
E
B
IBM Research 4
5. Factor Analysis
• Review of the method of factor analysis
– Start with too many variables
– Find subsets of variables that are highly correlated with one another
summarize each subset of variables as a factor
– Continue the analysis in terms of the smaller number of factors
– Figures of merit: Eigenvalue & variance-accounted-for
• The 10 variables in our factor analysis
On own file On file of other
Upload
Download
Share
Collect
Annotate
Watch
IBM Research 5
7. Factor Analysis Results
• Upload Publicize (15935 users, 18.1%)
Upload + Share-own + Collect-own
– Interest in an audience for own files
• Annotate Watch (9780 users, 11.1%)
Annotate-own + Annotate-other + Watch-other
– Adding value / reviewing rating
– Social awareness
• Discover Tell (85303 users, 96.7%)
Download-other + Share-other + Collect-other
– Interest in an audience for others’ files
– Personal utility of collections
• Refind (5149 users, 5.8%)
Refind
– Download own files - Cattail as an extension of the user’s local drives
IBM Research 7
8. Interpretation: How do people use file-sharing in enterprise?
• Both more social and less social than anticipated
– More social
• Sharing, Collecting for use by others
– Upload Publicize
– Discover Tell
• Similar to “Information Curators” finding (ECSCW 2009)
• Apparently easy to organize (confer Rader, 2009, in public networks)
– “Yours, mine, and… ours” appears to be possible in enterprise sharing
– Less social
• Refind
– Public-access files with no viewers a sharing-failure case?
• Users appropriated the technology for unanticipated purposes
(Dourish, 2001; Kujala Kauppinen, 2004)
– Impression management (see also Thom-Santelli et al, 2008)
– Curating (ECSCW 2009)
– Refinding
IBM Research 8
9. A UI for each Factor? Or combined UI?
Factor Upload Annotate Discover
Refind
Publish Watch Tell
Upload 4301 13269 5143
-
Publish (4.9%) (15.0%) (5.8%)
Annotate 4301 9368 2054
-
Watch (4.9%) (10.6%) (2.3%)
Discover 13269 9368 4640
-
Tell (15.0%) (10.6%) (5.3%)
5143 2054 4640
Refind -
(5.8%) (2.3%) (5.3%)
15935 9780 85303 5149
Total
(18.1%) (11.1%) (96.7%) (5.9%)
• Promote files + • Structured • Promote files +
collections discussion collections • Synchroniza-
• Impression threads / file • Impression tion (private
Potential
management • Has my management disk £ Cattail)
Features
• Ratings by annotation • Ratings by • Ego-centric
readers been read? By readers filters
• Search terms whom? • Search terms
IBM Research 9
10. A UI for each Factor? Or combined UI?
Factor Upload Annotate Discover
Refind
Publish Watch Tell
Upload 4301 13269 5143
-
Publish (4.9%) (15.0%) (5.8%)
Annotate 4301 9368 2054
-
Watch (4.9%) (10.6%) (2.3%)
Discover 13269 9368 4640
-
Tell (15.0%) (10.6%) (5.3%)
5143 2054 4640
Refind -
(5.8%) (2.3%) (5.3%)
Same features Many users
15935 9780 85303 5149
for Total different
two (18.1%) (11.1%) (96.7%) engage in more
(5.9%)
factors than one factor
• Promote files + • Structured • Promote files +
collections discussion collections • Synchroniza-
Three factors
Three factors
• Impression threads / file • Impression tion (private
deal with
Potential
deal with groups management • Has my management disk £ Cattail) of
awareness
Features
of artifacts • Ratings by annotation • Ratings by • Ego-centric
actions by
readers been read? By readers filters
• Search terms whom? • Search terms others, with
impression
IBM Research management 10
11. Summary of Contributions
• Four factors in file sharing
– In the enterprise (and beyond?)
– Patterns of sociality
– Patterns of individual utility
– Appropriation of technology for new purposes
• Implications for design
– Unified user interface, supporting
• Work with collections of artifacts
• Impression management
• Ratings by readers
• Awareness of the work of others
IBM Research 11
12. Who is Missing? Future Work
• Analyses so far
– How do people use file-sharing in the enterprise?
• Four factors in usage (this note)
– “Information curators” (ECSCW 2009)
– Focused on people who changed the database
• Upload original content
• Contribute: Share (recommend), Annotate, Collect…
• (also Downloaders)
– Our four factors are primarily about visible contributions to the system
• Lurkers in file-sharing
– Lurkers are the modal users (75%)
– How do lurkers use file-sharing?
– What do lurkers need from a file-sharing service?
– Should lurkers eventually become contributors?
– Hearing the “silent” users
IBM Research 12