Skip to main content
Log in

Communication Networks from the Enron Email Corpus “It's Always About the People. Enron is no Different”

  • Published:
Computational & Mathematical Organization Theory Aims and scope Submit manuscript

Abstract

The Enron email corpus is appealing to researchers because it represents a rich temporal record of internal communication within a large, real-world organization facing a severe and survival-threatening crisis. We describe how we enhanced the original corpus database and present findings from our investigation undertaken with a social network analytic perspective. We explore the dynamics of the structure and properties of the organizational communication network, as well as the characteristics and patterns of communicative behavior of the employees from different organizational levels. We found that during the crisis period, communication among employees became more diverse with respect to established contacts and formal roles. Also during the crisis period, previously disconnected employees began to engage in mutual communication, so that interpersonal communication was intensified and spread through the network, bypassing formal chains of communication. The findings of this study provide valuable insight into a real-world organizational crisis, which may be further used for validating or developing theories and dynamic models of organizational crises; thereby leading to a better understanding of the underlying causes of, and response to, organization failure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Bekkerman, R., A. McCallum, and G. Huang (2004), “Automatic Categorization of Email into Folders:Benchmark Experiments on Enron and SRI Corpora,” CIIR Technical Report IR-418 2004. Retrieved June 16,2004, from http://www.cs.umass.edu/~ronb/papers/email.pdf

  • Berry, M.W. and M. Browne (2005), “Email Surveillance Using Nonnegative Matrix Factorization,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conferenceon Data Mining 2005. Newport Beach, CA, April 2005, 45–54.

  • Borgatti, S.P. (2004), “The Key Player Problem,” in R. Breiger, K. M. Carley, and P. Pattison (Eds.), Dynamic Social Network Modeling and Analysis: 2002 Workshop Summary and Papers. Washington, DC: National Academies Press, 241–252.

    Google Scholar 

  • Brown, J. S. and P. Duguid (1991), “Organization Learning and Communities-of-Practice: Toward a Unified View of Working, Learning, and Innovation,” Organization Science, 2(1), 40–57.

    Google Scholar 

  • Carley, K.M. (2003), “Dynamic Network Analysis,” in R. Breiger, K.M. Carley, and P. Pattison (Eds.), Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, Committee on Human Factors,National Research Council, National Research Council. Washington, DC, 133–145.

  • Carley, K.M., J. Diesner, J. Reminga, and M. Tsvetovat (forthcoming), “Toward an Interoperable DynamicNetwork Analysis Toolkit,” Decision Support Systems Journal, Special Issue on Cyberinfrastructure for Homeland Security: Advances in Information Sharing, Data Mining, and Collaboration Systems.

  • Carley, K.M. and J. Reminga (2004), “ORA: Organization Risk Analyzer,” Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International, URL:http://www.casos.cs.cmu.edu/projects/ora/publications.html

  • Carley, Kathleen M. (1997), “Extracting Team Mental Models Through Textual Analysis,” Journal of Organizational Behavior, 18, 533–538.

    Article  Google Scholar 

  • Carley, Kathleen M. (1994), “Extracting Culture through Textual Analysis,” Poetics, 22, 291–312.

    Article  Google Scholar 

  • Carley, Kathleen M. and M. Palmquist (1992), “Extracting, Representing and Analyzing Mental Models,” Social Forces, 70(3), 601–636.

    Google Scholar 

  • Chapanond, A., M.S. Krishnamoorthy, and B. Yener (2005), “Graph Theoretic and Spectral Analysis of Enron Email Data,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 15–22.

  • Cohen, W.W. (n.d), CALD, CMU. Retrieved October 5, 2004, from http://www-2.cs.cmu.edu/~enron/

  • Corrada-Emmanuel, A. (n.d.), “Enron Email Dataset Research.” Retrieved October 5, 2004, from http://ciir.cs.umass.edu/~corrada/enron/

  • Diesner, J. and K.M. Carley (2005a), “Exploration of Communication Networks from the Enron Email Corpus,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 3–14.

  • Diesner, J. and K.M. Carley (2005b), “Revealing Social Structure from Texts: Meta-Matrix Text Analysisas a novel method for Network Text Analysis,” Chapter 4 in V.K. Narayanan and D.J. Armstrong (Eds.), Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations. Harrisburg, PA: Idea Group Publishing, pp. 81–108.

  • Duan, Y., J. Wang, M. Kam, and J. Canny (2002), “A Secure Online Algorithm for Link Analysis on Weighted Graph,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 71–81.

  • Enron Scandal at a Glance (2002), BBC News. Retrieved October 13, 2004, from http://news.bbc.co.uk/1/hi/business/1780075.stm

  • FERC Western Energy Markets—Enron Investigation, PA02-2. (n.d.), Retrieved October 18, 2004, from http://www.ferc.gov/industries/electric/indusact/wem/pa02-2/info-release.asp.

  • Ferc/Apsen web site. (n.d.), Retrieved between November 4, 2004 and June 22, 2005, from http://ferc.aspensys.com.

  • Fox, L. (2003), Enron. The Raise and Fall. Wiley & Sons: Hoboken, N.J.

    Google Scholar 

  • Fusaro, P.C. and R.M. Miller (2002), What Went Wrong at Enron. Wiley & Sons: Hoboken, N.J.

    Google Scholar 

  • Johnson-Laird, P. (1983). Mental Models. Cambridge, MA: Harvard University.

    Google Scholar 

  • Keila, P.S. and D.B. Skillicorn (2005), “Structure in the Enron Email Dataset,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining2005. Newport Beach, CA, April 2005, 55–64.

  • Klimoski, R. and S. Mohammed (1994), “Team Mental Model: Construct or Metaphor?” Journal of Management 20, 403–437.

    Article  Google Scholar 

  • Klimt, B. and Y. Yang (2004, a), “Introducing the Enron Corpus,” First Conference on Email and Anti-Spam (CEAS), Mountain View, CA. Retrieved October 14, 2004, from http://www.ceas.cc/papers-2004/168.pdf

  • Klimt, B. and Y. Yang (2004, b), “The Enron Corpus: A New Dataset for Email Classification Research,”European Conference on Machine Learning, Pisa, Italy.

  • Lehmann, M. (n.d.), “String Similarity,” Retrieved from http://search.cpan.org/~mlehmann/String-Similarity-1/Similarity.pm.

  • Malin, Bradley (2005), “Unsupervised Name Disambiguation via Social Network Similarity,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA, April 2005, 93–102.

  • McCallum, A., A. Corrada-Emmanuel, and X. Wang (2005), “The Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks, with Application to Enron and Academic Email,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining2005. Newport Beach, CA, April 2005, 33–44.

  • Meyers, E.W. (1986), “An O(ND) Difference Algorithm and its Variations,” Algorithmica, 1(2).

  • MIP (2002), “Fortune Magazine's List of 10 Corporate Sins,” Retrieved November 11, 2004, from http://www.mip-paris.com/knowledge/article.asp?id=132

  • Monge, P.R. and N.S. Contractor (2003), Theories of Communication Networks. New York: Oxford University Press.

    Google Scholar 

  • Popping, R. (2000). Computer-assisted Text Analysis. Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Powers, W.C. (2002), Report of Investigation, By the Special Investigative Committee of the Board of Directors of Enron Corp, Retrieved November 4, 2004, from http://news.findlaw.com/hdocs/docs/enron/sicreport/sicreport020102.pdf

  • Priebe, C.E., J.M. Conroy, D.J. Marchette, and Y. Park (2005), “Scan Statistics on Enron Graphs,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA, April 2005, 23–32.

  • Rouse, W.B. and N.M. Morris (1986), “On Looking into the Black Box; Prospects and Limits in the Search for Mental Models,” Psychological Bulletin, 100, 349–363.

    Article  Google Scholar 

  • Sanborn, R. (n.d.), Enron. Retrieved November 4, 2004, from http://www.hoylecpa.com/cpe/lesson001/Lesson.htm

  • Scott, J. (2000), Social Network Analysis. 2nd edition, London: Sage.

    Google Scholar 

  • SEC Spotlight on Enron. (n.d.), Retrieved November 4, 2004, from http://www.sec.gov/spotlight/enron.htm

  • Watkins, S. (2002), e Mail to Enron Chairman Kenneth Lay, Retrieved November 2, 2004 from http://www.itmweb.com/f012002.htm Sherron Watkins e Mail to Enron Chairman Kenneth Lay (2002), Retrieved November 11, 2004, from http://www.itmweb.com/f012002.htm

  • Shetty, J. and J. Adibi (n.d., a), “Ex employee status report,” Retrieved November 4, 2004, from http://www.isi.edu/~adibi/Enron/Enron_Employee_Status.xls

  • Shetty, J. and J. Adibi (n.d., b), The Enron Dataset Database Schema and Brief Statistical Report,Retrieved November 4, 2004, from http://www.isi.edu/~adibi/Enron/Enron_Dataset_Report.pdf

  • SRI International, CALO (Cognitive Assistant that Learns and Organizes) (2004), Retrieved November 4,2004, from http://www.ai.sri.com/project/CALO

  • Tsvetovat, M., J. Reminga, and K.M. Carley (2003), Dy Net ML: Interchange Format for Rich Social Network Data, CASOS Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International, URL:http://reports-archive.adm.cs.cmu.edu/anon/isri2004/abstracts/04-105.html

  • UC Berkeley (n.d), Enron Email Analysis Project. Retrieved from http://bailando.sims.berkeley.edu/enron_email.html

  • Ukkonen, E. (1985), “Algorithms for Approximate String Matching,” Information and Control, 64,100–118.

    Article  Google Scholar 

  • United States District Court Southern District of Texas, Indictment (2002), Retrieved October 8, 2004, from http://news.findlaw.com/hdocs/docs/enron/usandersen030702ind.pdf

  • Wasserman, S. and K. Faust (1994), Social Network Analysis. New York: Cambridge University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jana Diesner.

Additional information

Jana Diesner is a Research Associate and Linguistic Programmer at the Center for Computational Analysis of Social and Organizational Systems at the School of Computer Science (CASOS), Carnegie Mellon University (CMU). She received her Masters in Communications from Dresden University of Technology in 2003. She had been a research scholar at the Institute for Complex Engineered System at CMU in 2001 and 2002. Her research combines computational linguistics, social network analysis and computational organization theory.

Terrill L. Frantz is a post-doc researcher at the Center for Computational Analysis of Social and Organizational Systems (CASOS) in the School of Computer Science at Carnegie Mellon University. His research involves studying the dynamics of organization social-networks and behavior via computer modeling and simulation. He is developing an expertise in workforce integration strategy and policy evaluation during organization mergers. He earned his doctorate (Ed.D. in Organization Change) from Pepperdine University, a MBA from New York University and a BS in Business Administration (Computer Systems Management) from Drexel University. Prior to entering academic research, for nearly 20 years he was a software applications development manager in the global financial services and industrial chemicals industries; most recently as a Vice President in Information Technology at Morgan Stanley in Hong Kong, New York and London.

Kathleen M. Carley is a professor at the Institute for Software Research International in the School of Computer Science at Carnegie Mellon University. She is the director of the center for Computational Analysis of Social and Organizational Systems (CASOS) <http://www.casos.cs.cmu.edu/>, a university wide interdisciplinary center that brings together network analysis, computer science and organization science (www.casos.ece.cmu.edu) and has an associated NSF funded training program for Ph.D. students. She carries out research that combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are computational social and organization theory, group, organizational and social adaptation and evolution, social and dynamic network analysis, computational text analysis, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Diesner, J., Frantz, T.L. & Carley, K.M. Communication Networks from the Enron Email Corpus “It's Always About the People. Enron is no Different”. Comput Math Organiz Theor 11, 201–228 (2005). https://doi.org/10.1007/s10588-005-5377-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-005-5377-0

Keywords

Navigation