SlideShare une entreprise Scribd logo
1  sur  14
© 2013 IBM Corporation
Social network analyses in organizations:
challenges and approaches for
studying work networks
Ana Paula Appel, Vagner F. de Santana, Rogério A. de Paula
Claudio S. Pinhanez, Victor F. Cavalvante
IBM Research Brazil, Service Systems
MCPL 2013 - Sep 11-13, 2013
IBM Research
© 2013 IBM Corporation
Agenda
 Context
 Related works
 Challenges
 Study
 Results
 Final remarks
2
© 2013 IBM Corporation
Context
 The spread of online Social Networks (SN) use is responsible for the
current high interest in complex network analyses, e.g.:
 “People you may know” feature
 How people get connected?
 SN are networks in which
 Nodes represent people, or groups of people
 Edges some form of social interaction
 Social Network Analysis (SNA) allows to diagnose problems and identify
opportunities in organizations
 SNA allows to identify collaborative hot spots and cold spots
 In organizations, connecting people with similar skills, interests, or profiles
can be worth for employees in many ways
3
© 2013 IBM Corporation
Context
 Our work took place at a large IT service delivery organization, Big
Service Factory (BSF)
 Employees are very specialized, often focused on specific tasks
 Sysadmins are responsible for some of the most critical functions
necessary to maintain the customers’ IT infrastructures
 Tickets describe particular incidents
 Tickets have attributes indicating work shift, department, customer, date,
descriptions of the problem, among others
 Challenges in the context involve
 Assignment time
 Data insertion by hand
 …
4
© 2013 IBM Corporation
Related works
 The foundation of the field is attributed to Jacob Levy Moreno who
conducted the first long-range sociometric study from 1932-1938
 Monge and Contractor [1987] utilized social network analysis to study the
communication patterns among workers
 Properties identified:
 The power-law degree distributions as showed in Albert et al. [1999] and
Adamic et al. [2000]
 The diameter shrinkage present in evolving networks presented by Leskovec
et al. [2005]
 The Small World phenomenon studied by Milgram [1967]
5
© 2013 IBM Corporation
Challenges
 How to combine data sources, build a very large network, and mine it?
 Each data source can become a network and all networks can be
combined making one large weighted or multi-edges network, but…
 How do we define the weight for each graph?
 When using multi-edge graphs, the number of available algorithms/techniques
is an issue.
 It is hard to define the mining task for multi-edge graph
 Combining different type of sources to build one very large graph requires
 New algorithms
 New range of methodology and definitions of graph mining area
6
© 2013 IBM Corporation
Study
 108,050 tickets
 Collected from the past 10 months
 315 sysadmins
 Four features where considered
 Work shifts (morning, afternoon and night)
 Department (four departments)
 Customers (around 70)
 Problem severity (1, the hardest one to solve)
 We consolidate the monthly data for each sysadmin into a percentage
representing the weight of each of customers, service lines, shifts, etc.
 Each sysadmin was represented by a feature vector with 80 positions
7
© 2013 IBM Corporation
Study
 To build the networks, we compute the cosine distance among each
sysadmin using a K-NN (K Nearest Neighbor) search, using k = 10
 Who are the 10 most similar sysadmins?
 We explored two types of network
 Using the entire feature vector to compute the distance
 Splitting the feature vector into four independent vector, each one
representing one feature, building four networks, and then merging them into
one multi-edge network
8
© 2013 IBM Corporation
Results – Severity , Shift, Department, and Customer
9
© 2013 IBM Corporation
Results – Service Lines vs. Shift
10
© 2013 IBM Corporation
Results – Service Lines vs. Severity
11
© 2013 IBM Corporation
Results – Shift vs. Severity
12
© 2013 IBM Corporation
Final remarks
 Unveiling underlying emerging networks is a promising approach
 Integrating social analytics and qualitative research has the potential to
reveal "hidden" practices of daily distributed complex tasks
 Using network as a model to connect sysadmin is important specially in
crises situation
 Future work involves
 Field work
 Integrating ticket information with sysadmins’ communication patterns
 New methods and tools are needed to process and display very large
networks with parallel edges
13
© 2013 IBM Corporation
Thank you!
VagSant@br.ibm.com
@santanavagner

Contenu connexe

Tendances

IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationAreej Qasrawi
 
A framework for improving security in cloud computing
A framework for improving security in cloud computingA framework for improving security in cloud computing
A framework for improving security in cloud computingAJIT M KARANJKAR
 
Social Mobile Analytics Cloud
Social Mobile Analytics CloudSocial Mobile Analytics Cloud
Social Mobile Analytics CloudMphasis
 
Future Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopFuture Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopSOFIProject
 
CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications PayamBarnaghi
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saranshSaransh Agarwal
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsPayamBarnaghi
 
Offloading Computation to the Edge
Offloading Computation to the EdgeOffloading Computation to the Edge
Offloading Computation to the EdgeVittorio Scarano
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of ThingsS.Mostafa Sayyedi
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyMadan Golla
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentationTelstra
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign countryTelstra
 

Tendances (20)

IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
SMAC
SMACSMAC
SMAC
 
A framework for improving security in cloud computing
A framework for improving security in cloud computingA framework for improving security in cloud computing
A framework for improving security in cloud computing
 
Social Mobile Analytics Cloud
Social Mobile Analytics CloudSocial Mobile Analytics Cloud
Social Mobile Analytics Cloud
 
Ppt template (1)
Ppt template (1)Ppt template (1)
Ppt template (1)
 
Future Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopFuture Internet Arch - Open Workshop
Future Internet Arch - Open Workshop
 
Siop impact of social media
Siop impact of social mediaSiop impact of social media
Siop impact of social media
 
CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saransh
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
 
Offloading Computation to the Edge
Offloading Computation to the EdgeOffloading Computation to the Edge
Offloading Computation to the Edge
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Grid computing
Grid computingGrid computing
Grid computing
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Impact2
Impact2Impact2
Impact2
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign country
 

Similaire à Social network analyses in organizations

Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingTahmin Aysha Murshed
 
Running headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxRunning headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxrtodd599
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computingijceronline
 
SNA of M2M Organisations
SNA of M2M OrganisationsSNA of M2M Organisations
SNA of M2M OrganisationsLee Cox
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxaudeleypearl
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing ApplicationIRJET Journal
 
The Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterThe Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterTanner Massahos
 
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGMOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGijistjournal
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseLeMeniz Infotech
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challengesAlexander Decker
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalEmily Smith
 

Similaire à Social network analyses in organizations (20)

Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
SMAC
SMACSMAC
SMAC
 
Running headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxRunning headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docx
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
SNA of M2M Organisations
SNA of M2M OrganisationsSNA of M2M Organisations
SNA of M2M Organisations
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
 
The Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterThe Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium Poster
 
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGMOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing database
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challenges
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
 

Plus de Vagner Santana

Introdução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPIntrodução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPVagner Santana
 
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...Vagner Santana
 
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...Vagner Santana
 
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure WidgetsWWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure WidgetsVagner Santana
 
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...Vagner Santana
 
IHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliaçãoIHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliaçãoVagner Santana
 
SEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais OnlineSEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais OnlineVagner Santana
 
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...Vagner Santana
 
Padrões Arquiteturais de Sistemas
Padrões Arquiteturais de SistemasPadrões Arquiteturais de Sistemas
Padrões Arquiteturais de SistemasVagner Santana
 
Desenvolvimento de Software
Desenvolvimento de SoftwareDesenvolvimento de Software
Desenvolvimento de SoftwareVagner Santana
 
W4A 2012 - Vagner Santana
W4A 2012 - Vagner SantanaW4A 2012 - Vagner Santana
W4A 2012 - Vagner SantanaVagner Santana
 

Plus de Vagner Santana (13)

Introdução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPIntrodução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUP
 
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
 
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
 
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure WidgetsWWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
 
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
 
IHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliaçãoIHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliação
 
Acessibilidade web
Acessibilidade webAcessibilidade web
Acessibilidade web
 
SEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais OnlineSEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais Online
 
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
 
Padrões de Projeto
Padrões de ProjetoPadrões de Projeto
Padrões de Projeto
 
Padrões Arquiteturais de Sistemas
Padrões Arquiteturais de SistemasPadrões Arquiteturais de Sistemas
Padrões Arquiteturais de Sistemas
 
Desenvolvimento de Software
Desenvolvimento de SoftwareDesenvolvimento de Software
Desenvolvimento de Software
 
W4A 2012 - Vagner Santana
W4A 2012 - Vagner SantanaW4A 2012 - Vagner Santana
W4A 2012 - Vagner Santana
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Social network analyses in organizations

  • 1. © 2013 IBM Corporation Social network analyses in organizations: challenges and approaches for studying work networks Ana Paula Appel, Vagner F. de Santana, Rogério A. de Paula Claudio S. Pinhanez, Victor F. Cavalvante IBM Research Brazil, Service Systems MCPL 2013 - Sep 11-13, 2013 IBM Research
  • 2. © 2013 IBM Corporation Agenda  Context  Related works  Challenges  Study  Results  Final remarks 2
  • 3. © 2013 IBM Corporation Context  The spread of online Social Networks (SN) use is responsible for the current high interest in complex network analyses, e.g.:  “People you may know” feature  How people get connected?  SN are networks in which  Nodes represent people, or groups of people  Edges some form of social interaction  Social Network Analysis (SNA) allows to diagnose problems and identify opportunities in organizations  SNA allows to identify collaborative hot spots and cold spots  In organizations, connecting people with similar skills, interests, or profiles can be worth for employees in many ways 3
  • 4. © 2013 IBM Corporation Context  Our work took place at a large IT service delivery organization, Big Service Factory (BSF)  Employees are very specialized, often focused on specific tasks  Sysadmins are responsible for some of the most critical functions necessary to maintain the customers’ IT infrastructures  Tickets describe particular incidents  Tickets have attributes indicating work shift, department, customer, date, descriptions of the problem, among others  Challenges in the context involve  Assignment time  Data insertion by hand  … 4
  • 5. © 2013 IBM Corporation Related works  The foundation of the field is attributed to Jacob Levy Moreno who conducted the first long-range sociometric study from 1932-1938  Monge and Contractor [1987] utilized social network analysis to study the communication patterns among workers  Properties identified:  The power-law degree distributions as showed in Albert et al. [1999] and Adamic et al. [2000]  The diameter shrinkage present in evolving networks presented by Leskovec et al. [2005]  The Small World phenomenon studied by Milgram [1967] 5
  • 6. © 2013 IBM Corporation Challenges  How to combine data sources, build a very large network, and mine it?  Each data source can become a network and all networks can be combined making one large weighted or multi-edges network, but…  How do we define the weight for each graph?  When using multi-edge graphs, the number of available algorithms/techniques is an issue.  It is hard to define the mining task for multi-edge graph  Combining different type of sources to build one very large graph requires  New algorithms  New range of methodology and definitions of graph mining area 6
  • 7. © 2013 IBM Corporation Study  108,050 tickets  Collected from the past 10 months  315 sysadmins  Four features where considered  Work shifts (morning, afternoon and night)  Department (four departments)  Customers (around 70)  Problem severity (1, the hardest one to solve)  We consolidate the monthly data for each sysadmin into a percentage representing the weight of each of customers, service lines, shifts, etc.  Each sysadmin was represented by a feature vector with 80 positions 7
  • 8. © 2013 IBM Corporation Study  To build the networks, we compute the cosine distance among each sysadmin using a K-NN (K Nearest Neighbor) search, using k = 10  Who are the 10 most similar sysadmins?  We explored two types of network  Using the entire feature vector to compute the distance  Splitting the feature vector into four independent vector, each one representing one feature, building four networks, and then merging them into one multi-edge network 8
  • 9. © 2013 IBM Corporation Results – Severity , Shift, Department, and Customer 9
  • 10. © 2013 IBM Corporation Results – Service Lines vs. Shift 10
  • 11. © 2013 IBM Corporation Results – Service Lines vs. Severity 11
  • 12. © 2013 IBM Corporation Results – Shift vs. Severity 12
  • 13. © 2013 IBM Corporation Final remarks  Unveiling underlying emerging networks is a promising approach  Integrating social analytics and qualitative research has the potential to reveal "hidden" practices of daily distributed complex tasks  Using network as a model to connect sysadmin is important specially in crises situation  Future work involves  Field work  Integrating ticket information with sysadmins’ communication patterns  New methods and tools are needed to process and display very large networks with parallel edges 13
  • 14. © 2013 IBM Corporation Thank you! VagSant@br.ibm.com @santanavagner

Notes de l'éditeur

  1. sysadmin that work in same work shift tend to be more similar than the ones that work in different work shift connection among sysadmins during the work is higher to sysadmins that work in same department in same work shift, no matter the costumer or the tickets’ severity
  2. sysadmin that solves same type of ticket tend to be similar to each other
  3. most of tickets with severity one occurs in work shift 3 - night most of the tickets with severity three (Figure 3 (c) red) occurs in work shift 1 – morning