Identifying Key Actors in Organizational Social Network Based on E-Mail Communication

被引:3
|
作者
Barbucha, Dariusz [1 ]
Szyman, Pawel [1 ]
机构
[1] Gdynia Maritime Univ, Dept Informat Syst, Morska 83, PL-81225 Gdynia, Poland
关键词
Organization; Information management; Email communication; Centrality; Social network analysis; PERSPECTIVE;
D O I
10.1007/978-3-030-88113-9_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays a lot of diverse systems in many different fields can be described as complex network and they are the focus of interest in many disciplines such as politics, marketing, social systems. Using different network analysis tools may provide many interesting observations about the structure of the network, dynamics of the network over the time and the role of selected nodes in the network. The paper focuses on organizational social network based on email communication between employees within the organization. Such network has a form of a network including a set of vertices, referring to persons employed in this organization, and a set of edges, defining information flow between these persons using an email communication channel. The main contribution of the paper is to discover main properties of the email-based social network of public organization located in Poland and to identify key actors in it using social network analysis tools. An important part of the analysis is also a comparison of the obtained results with real structure of the organization. The experiment confirmed that analysis of email traffic within an organization may derive information that can be usable for organizational management purposes.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [31] Analyzing E-mail communication of prospective learners
    Joshi, Vibha
    Saxena, Anurag
    TURKISH ONLINE JOURNAL OF DISTANCE EDUCATION, 2005, 6 (04): : 32 - 41
  • [32] e-mail in the public sector: Identifying and managing the risks
    van der Pijl, Gert
    van Grimbergen, Judith
    7TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS, 2007, : 425 - +
  • [33] Design and implementation of smartcard-based secure e-mail communication
    Chen, HH
    Chen, YS
    Chiang, HL
    Yang, CH
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 225 - 231
  • [34] E-mail rules: A business guide to managing policies, security, and legal issues for e-mail and digital communication
    Wiley, DL
    ONLINE, 2003, 27 (05): : 63 - 63
  • [36] E-MAIL AS A COMMUNICATION AND LEARNING TOOL: E-MAIL MESSAGES FROM CHINESE STUDENTS STUDYING IN PORTUGAL TO THEIR TEACHERS
    Barbeiro, L.
    Alexandre, M.
    Santos, I.
    EDULEARN16: 8TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 2016, : 4517 - 4525
  • [37] E-mail - Killer app or social disaster?
    Reisman, S
    IEEE MULTIMEDIA, 1998, 5 (04) : 4 - 5
  • [38] A neural network classifier for junk e-mail
    Stuart, I
    Cha, SH
    Tappert, C
    DOCUMENT ANALYSIS SYSTEMS VI, PROCEEDINGS, 2004, 3163 : 442 - 450
  • [39] Perspective of applying the global e-mail network
    Li, Wenbin
    Zhong, Ning
    Liu, Jiming
    Yao, Yiyu
    Liu, Chunnian
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS), 2006, : 117 - +
  • [40] Revocation of unread e-mail in an untrusted network
    Rubin, AD
    Boneh, D
    Fu, KV
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 62 - 75