Computational & Mathematical Organization Theory

, Volume 11, Issue 3, pp 201–228 | Cite as

Communication Networks from the Enron Email Corpus “It's Always About the People. Enron is no Different”

  • Jana Diesner
  • Terrill L. Frantz
  • Kathleen M. Carley
Article

Abstract

The Enron email corpus is appealing to researchers because it represents a rich temporal record of internal communication within a large, real-world organization facing a severe and survival-threatening crisis. We describe how we enhanced the original corpus database and present findings from our investigation undertaken with a social network analytic perspective. We explore the dynamics of the structure and properties of the organizational communication network, as well as the characteristics and patterns of communicative behavior of the employees from different organizational levels. We found that during the crisis period, communication among employees became more diverse with respect to established contacts and formal roles. Also during the crisis period, previously disconnected employees began to engage in mutual communication, so that interpersonal communication was intensified and spread through the network, bypassing formal chains of communication. The findings of this study provide valuable insight into a real-world organizational crisis, which may be further used for validating or developing theories and dynamic models of organizational crises; thereby leading to a better understanding of the underlying causes of, and response to, organization failure.

Keywords

Enron email corpus communication networks social network analysis dynamic network analysis organizational crisis organizational hierarchy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bekkerman, R., A. McCallum, and G. Huang (2004), “Automatic Categorization of Email into Folders:Benchmark Experiments on Enron and SRI Corpora,” CIIR Technical Report IR-418 2004. Retrieved June 16,2004, from http://www.cs.umass.edu/~ronb/papers/email.pdf
  2. Berry, M.W. and M. Browne (2005), “Email Surveillance Using Nonnegative Matrix Factorization,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conferenceon Data Mining 2005. Newport Beach, CA, April 2005, 45–54.Google Scholar
  3. Borgatti, S.P. (2004), “The Key Player Problem,” in R. Breiger, K. M. Carley, and P. Pattison (Eds.), Dynamic Social Network Modeling and Analysis: 2002 Workshop Summary and Papers. Washington, DC: National Academies Press, 241–252.Google Scholar
  4. Brown, J. S. and P. Duguid (1991), “Organization Learning and Communities-of-Practice: Toward a Unified View of Working, Learning, and Innovation,” Organization Science, 2(1), 40–57.Google Scholar
  5. Carley, K.M. (2003), “Dynamic Network Analysis,” in R. Breiger, K.M. Carley, and P. Pattison (Eds.), Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, Committee on Human Factors,National Research Council, National Research Council. Washington, DC, 133–145.Google Scholar
  6. Carley, K.M., J. Diesner, J. Reminga, and M. Tsvetovat (forthcoming), “Toward an Interoperable DynamicNetwork Analysis Toolkit,” Decision Support Systems Journal, Special Issue on Cyberinfrastructure for Homeland Security: Advances in Information Sharing, Data Mining, and Collaboration Systems.Google Scholar
  7. Carley, K.M. and J. Reminga (2004), “ORA: Organization Risk Analyzer,” Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International, URL:http://www.casos.cs.cmu.edu/projects/ora/publications.html
  8. Carley, Kathleen M. (1997), “Extracting Team Mental Models Through Textual Analysis,” Journal of Organizational Behavior, 18, 533–538.CrossRefGoogle Scholar
  9. Carley, Kathleen M. (1994), “Extracting Culture through Textual Analysis,” Poetics, 22, 291–312.CrossRefGoogle Scholar
  10. Carley, Kathleen M. and M. Palmquist (1992), “Extracting, Representing and Analyzing Mental Models,” Social Forces, 70(3), 601–636.Google Scholar
  11. Chapanond, A., M.S. Krishnamoorthy, and B. Yener (2005), “Graph Theoretic and Spectral Analysis of Enron Email Data,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 15–22.Google Scholar
  12. Cohen, W.W. (n.d), CALD, CMU. Retrieved October 5, 2004, from http://www-2.cs.cmu.edu/~enron/
  13. Corrada-Emmanuel, A. (n.d.), “Enron Email Dataset Research.” Retrieved October 5, 2004, from http://ciir.cs.umass.edu/~corrada/enron/
  14. Diesner, J. and K.M. Carley (2005a), “Exploration of Communication Networks from the Enron Email Corpus,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 3–14.Google Scholar
  15. Diesner, J. and K.M. Carley (2005b), “Revealing Social Structure from Texts: Meta-Matrix Text Analysisas a novel method for Network Text Analysis,” Chapter 4 in V.K. Narayanan and D.J. Armstrong (Eds.), Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations. Harrisburg, PA: Idea Group Publishing, pp. 81–108.Google Scholar
  16. Duan, Y., J. Wang, M. Kam, and J. Canny (2002), “A Secure Online Algorithm for Link Analysis on Weighted Graph,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 71–81.Google Scholar
  17. Enron Scandal at a Glance (2002), BBC News. Retrieved October 13, 2004, from http://news.bbc.co.uk/1/hi/business/1780075.stm
  18. FERC Western Energy Markets—Enron Investigation, PA02-2. (n.d.), Retrieved October 18, 2004, from http://www.ferc.gov/industries/electric/indusact/wem/pa02-2/info-release.asp.
  19. Ferc/Apsen web site. (n.d.), Retrieved between November 4, 2004 and June 22, 2005, from http://ferc.aspensys.com.
  20. Fox, L. (2003), Enron. The Raise and Fall. Wiley & Sons: Hoboken, N.J.Google Scholar
  21. Fusaro, P.C. and R.M. Miller (2002), What Went Wrong at Enron. Wiley & Sons: Hoboken, N.J.Google Scholar
  22. Johnson-Laird, P. (1983). Mental Models. Cambridge, MA: Harvard University.Google Scholar
  23. Keila, P.S. and D.B. Skillicorn (2005), “Structure in the Enron Email Dataset,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining2005. Newport Beach, CA, April 2005, 55–64.Google Scholar
  24. Klimoski, R. and S. Mohammed (1994), “Team Mental Model: Construct or Metaphor?” Journal of Management 20, 403–437.CrossRefGoogle Scholar
  25. Klimt, B. and Y. Yang (2004, a), “Introducing the Enron Corpus,” First Conference on Email and Anti-Spam (CEAS), Mountain View, CA. Retrieved October 14, 2004, from http://www.ceas.cc/papers-2004/168.pdf
  26. Klimt, B. and Y. Yang (2004, b), “The Enron Corpus: A New Dataset for Email Classification Research,”European Conference on Machine Learning, Pisa, Italy.Google Scholar
  27. Lehmann, M. (n.d.), “String Similarity,” Retrieved from http://search.cpan.org/~mlehmann/String-Similarity-1/Similarity.pm.
  28. Malin, Bradley (2005), “Unsupervised Name Disambiguation via Social Network Similarity,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA, April 2005, 93–102.Google Scholar
  29. McCallum, A., A. Corrada-Emmanuel, and X. Wang (2005), “The Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks, with Application to Enron and Academic Email,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining2005. Newport Beach, CA, April 2005, 33–44.Google Scholar
  30. Meyers, E.W. (1986), “An O(ND) Difference Algorithm and its Variations,” Algorithmica, 1(2).Google Scholar
  31. MIP (2002), “Fortune Magazine's List of 10 Corporate Sins,” Retrieved November 11, 2004, from http://www.mip-paris.com/knowledge/article.asp?id=132
  32. Monge, P.R. and N.S. Contractor (2003), Theories of Communication Networks. New York: Oxford University Press.Google Scholar
  33. Popping, R. (2000). Computer-assisted Text Analysis. Thousand Oaks, CA: Sage Publications.Google Scholar
  34. Powers, W.C. (2002), Report of Investigation, By the Special Investigative Committee of the Board of Directors of Enron Corp, Retrieved November 4, 2004, from http://news.findlaw.com/hdocs/docs/enron/sicreport/sicreport020102.pdf
  35. Priebe, C.E., J.M. Conroy, D.J. Marchette, and Y. Park (2005), “Scan Statistics on Enron Graphs,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA, April 2005, 23–32.Google Scholar
  36. Rouse, W.B. and N.M. Morris (1986), “On Looking into the Black Box; Prospects and Limits in the Search for Mental Models,” Psychological Bulletin, 100, 349–363.CrossRefGoogle Scholar
  37. Sanborn, R. (n.d.), Enron. Retrieved November 4, 2004, from http://www.hoylecpa.com/cpe/lesson001/Lesson.htm
  38. Scott, J. (2000), Social Network Analysis. 2nd edition, London: Sage.Google Scholar
  39. SEC Spotlight on Enron. (n.d.), Retrieved November 4, 2004, from http://www.sec.gov/spotlight/enron.htm
  40. Watkins, S. (2002), e Mail to Enron Chairman Kenneth Lay, Retrieved November 2, 2004 from http://www.itmweb.com/f012002.htm Sherron Watkins e Mail to Enron Chairman Kenneth Lay (2002), Retrieved November 11, 2004, from http://www.itmweb.com/f012002.htm
  41. Shetty, J. and J. Adibi (n.d., a), “Ex employee status report,” Retrieved November 4, 2004, from http://www.isi.edu/~adibi/Enron/Enron_Employee_Status.xls
  42. Shetty, J. and J. Adibi (n.d., b), The Enron Dataset Database Schema and Brief Statistical Report,Retrieved November 4, 2004, from http://www.isi.edu/~adibi/Enron/Enron_Dataset_Report.pdf
  43. SRI International, CALO (Cognitive Assistant that Learns and Organizes) (2004), Retrieved November 4,2004, from http://www.ai.sri.com/project/CALO
  44. Tsvetovat, M., J. Reminga, and K.M. Carley (2003), Dy Net ML: Interchange Format for Rich Social Network Data, CASOS Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International, URL:http://reports-archive.adm.cs.cmu.edu/anon/isri2004/abstracts/04-105.html
  45. UC Berkeley (n.d), Enron Email Analysis Project. Retrieved from http://bailando.sims.berkeley.edu/enron_email.html
  46. Ukkonen, E. (1985), “Algorithms for Approximate String Matching,” Information and Control, 64,100–118.CrossRefGoogle Scholar
  47. United States District Court Southern District of Texas, Indictment (2002), Retrieved October 8, 2004, from http://news.findlaw.com/hdocs/docs/enron/usandersen030702ind.pdf
  48. Wasserman, S. and K. Faust (1994), Social Network Analysis. New York: Cambridge University Press.Google Scholar

Copyright information

© Springer Science + Business Media, Inc. 2006

Authors and Affiliations

  • Jana Diesner
    • 1
  • Terrill L. Frantz
    • 1
  • Kathleen M. Carley
    • 1
  1. 1.Center for Computational Analysis of Social and Organizational Systems (CASOS), Institute for Software Research International (ISRI), School of Computer ScienceCarnegie Mellon UniversityPittsburghUSA

Personalised recommendations