The Enron email corpus is appealing to researchers because it represents a rich temporal record of internal communication within a large, real-world organization facing a severe and survival-threatening crisis. We describe how we enhanced the original corpus database and present findings from our investigation undertaken with a social network analytic perspective. We explore the dynamics of the structure and properties of the organizational communication network, as well as the characteristics and patterns of communicative behavior of the employees from different organizational levels. We found that during the crisis period, communication among employees became more diverse with respect to established contacts and formal roles. Also during the crisis period, previously disconnected employees began to engage in mutual communication, so that interpersonal communication was intensified and spread through the network, bypassing formal chains of communication. The findings of this study provide valuable insight into a real-world organizational crisis, which may be further used for validating or developing theories and dynamic models of organizational crises; thereby leading to a better understanding of the underlying causes of, and response to, organization failure.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Bekkerman, R., A. McCallum, and G. Huang (2004), “Automatic Categorization of Email into Folders:Benchmark Experiments on Enron and SRI Corpora,” CIIR Technical Report IR-418 2004. Retrieved June 16,2004, from http://www.cs.umass.edu/~ronb/papers/email.pdf
Berry, M.W. and M. Browne (2005), “Email Surveillance Using Nonnegative Matrix Factorization,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conferenceon Data Mining 2005. Newport Beach, CA, April 2005, 45–54.
Borgatti, S.P. (2004), “The Key Player Problem,” in R. Breiger, K. M. Carley, and P. Pattison (Eds.), Dynamic Social Network Modeling and Analysis: 2002 Workshop Summary and Papers. Washington, DC: National Academies Press, 241–252.
Brown, J. S. and P. Duguid (1991), “Organization Learning and Communities-of-Practice: Toward a Unified View of Working, Learning, and Innovation,” Organization Science, 2(1), 40–57.
Carley, K.M. (2003), “Dynamic Network Analysis,” in R. Breiger, K.M. Carley, and P. Pattison (Eds.), Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, Committee on Human Factors,National Research Council, National Research Council. Washington, DC, 133–145.
Carley, K.M., J. Diesner, J. Reminga, and M. Tsvetovat (forthcoming), “Toward an Interoperable DynamicNetwork Analysis Toolkit,” Decision Support Systems Journal, Special Issue on Cyberinfrastructure for Homeland Security: Advances in Information Sharing, Data Mining, and Collaboration Systems.
Carley, K.M. and J. Reminga (2004), “ORA: Organization Risk Analyzer,” Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International, URL:http://www.casos.cs.cmu.edu/projects/ora/publications.html
Carley, Kathleen M. (1997), “Extracting Team Mental Models Through Textual Analysis,” Journal of Organizational Behavior, 18, 533–538.
Carley, Kathleen M. (1994), “Extracting Culture through Textual Analysis,” Poetics, 22, 291–312.
Carley, Kathleen M. and M. Palmquist (1992), “Extracting, Representing and Analyzing Mental Models,” Social Forces, 70(3), 601–636.
Chapanond, A., M.S. Krishnamoorthy, and B. Yener (2005), “Graph Theoretic and Spectral Analysis of Enron Email Data,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 15–22.
Cohen, W.W. (n.d), CALD, CMU. Retrieved October 5, 2004, from http://www-2.cs.cmu.edu/~enron/
Corrada-Emmanuel, A. (n.d.), “Enron Email Dataset Research.” Retrieved October 5, 2004, from http://ciir.cs.umass.edu/~corrada/enron/
Diesner, J. and K.M. Carley (2005a), “Exploration of Communication Networks from the Enron Email Corpus,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 3–14.
Diesner, J. and K.M. Carley (2005b), “Revealing Social Structure from Texts: Meta-Matrix Text Analysisas a novel method for Network Text Analysis,” Chapter 4 in V.K. Narayanan and D.J. Armstrong (Eds.), Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations. Harrisburg, PA: Idea Group Publishing, pp. 81–108.
Duan, Y., J. Wang, M. Kam, and J. Canny (2002), “A Secure Online Algorithm for Link Analysis on Weighted Graph,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 71–81.
Enron Scandal at a Glance (2002), BBC News. Retrieved October 13, 2004, from http://news.bbc.co.uk/1/hi/business/1780075.stm
FERC Western Energy Markets—Enron Investigation, PA02-2. (n.d.), Retrieved October 18, 2004, from http://www.ferc.gov/industries/electric/indusact/wem/pa02-2/info-release.asp.
Ferc/Apsen web site. (n.d.), Retrieved between November 4, 2004 and June 22, 2005, from http://ferc.aspensys.com.
Fox, L. (2003), Enron. The Raise and Fall. Wiley & Sons: Hoboken, N.J.
Fusaro, P.C. and R.M. Miller (2002), What Went Wrong at Enron. Wiley & Sons: Hoboken, N.J.
Johnson-Laird, P. (1983). Mental Models. Cambridge, MA: Harvard University.
Keila, P.S. and D.B. Skillicorn (2005), “Structure in the Enron Email Dataset,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining2005. Newport Beach, CA, April 2005, 55–64.
Klimoski, R. and S. Mohammed (1994), “Team Mental Model: Construct or Metaphor?” Journal of Management 20, 403–437.
Klimt, B. and Y. Yang (2004, a), “Introducing the Enron Corpus,” First Conference on Email and Anti-Spam (CEAS), Mountain View, CA. Retrieved October 14, 2004, from http://www.ceas.cc/papers-2004/168.pdf
Klimt, B. and Y. Yang (2004, b), “The Enron Corpus: A New Dataset for Email Classification Research,”European Conference on Machine Learning, Pisa, Italy.
Lehmann, M. (n.d.), “String Similarity,” Retrieved from http://search.cpan.org/~mlehmann/String-Similarity-1/Similarity.pm.
Malin, Bradley (2005), “Unsupervised Name Disambiguation via Social Network Similarity,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA, April 2005, 93–102.
McCallum, A., A. Corrada-Emmanuel, and X. Wang (2005), “The Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks, with Application to Enron and Academic Email,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining2005. Newport Beach, CA, April 2005, 33–44.
Meyers, E.W. (1986), “An O(ND) Difference Algorithm and its Variations,” Algorithmica, 1(2).
MIP (2002), “Fortune Magazine's List of 10 Corporate Sins,” Retrieved November 11, 2004, from http://www.mip-paris.com/knowledge/article.asp?id=132
Monge, P.R. and N.S. Contractor (2003), Theories of Communication Networks. New York: Oxford University Press.
Popping, R. (2000). Computer-assisted Text Analysis. Thousand Oaks, CA: Sage Publications.
Powers, W.C. (2002), Report of Investigation, By the Special Investigative Committee of the Board of Directors of Enron Corp, Retrieved November 4, 2004, from http://news.findlaw.com/hdocs/docs/enron/sicreport/sicreport020102.pdf
Priebe, C.E., J.M. Conroy, D.J. Marchette, and Y. Park (2005), “Scan Statistics on Enron Graphs,” Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA, April 2005, 23–32.
Rouse, W.B. and N.M. Morris (1986), “On Looking into the Black Box; Prospects and Limits in the Search for Mental Models,” Psychological Bulletin, 100, 349–363.
Sanborn, R. (n.d.), Enron. Retrieved November 4, 2004, from http://www.hoylecpa.com/cpe/lesson001/Lesson.htm
Scott, J. (2000), Social Network Analysis. 2nd edition, London: Sage.
SEC Spotlight on Enron. (n.d.), Retrieved November 4, 2004, from http://www.sec.gov/spotlight/enron.htm
Watkins, S. (2002), e Mail to Enron Chairman Kenneth Lay, Retrieved November 2, 2004 from http://www.itmweb.com/f012002.htm Sherron Watkins e Mail to Enron Chairman Kenneth Lay (2002), Retrieved November 11, 2004, from http://www.itmweb.com/f012002.htm
Shetty, J. and J. Adibi (n.d., a), “Ex employee status report,” Retrieved November 4, 2004, from http://www.isi.edu/~adibi/Enron/Enron_Employee_Status.xls
Shetty, J. and J. Adibi (n.d., b), The Enron Dataset Database Schema and Brief Statistical Report,Retrieved November 4, 2004, from http://www.isi.edu/~adibi/Enron/Enron_Dataset_Report.pdf
SRI International, CALO (Cognitive Assistant that Learns and Organizes) (2004), Retrieved November 4,2004, from http://www.ai.sri.com/project/CALO
Tsvetovat, M., J. Reminga, and K.M. Carley (2003), Dy Net ML: Interchange Format for Rich Social Network Data, CASOS Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International, URL:http://reports-archive.adm.cs.cmu.edu/anon/isri2004/abstracts/04-105.html
UC Berkeley (n.d), Enron Email Analysis Project. Retrieved from http://bailando.sims.berkeley.edu/enron_email.html
Ukkonen, E. (1985), “Algorithms for Approximate String Matching,” Information and Control, 64,100–118.
United States District Court Southern District of Texas, Indictment (2002), Retrieved October 8, 2004, from http://news.findlaw.com/hdocs/docs/enron/usandersen030702ind.pdf
Wasserman, S. and K. Faust (1994), Social Network Analysis. New York: Cambridge University Press.
Jana Diesner is a Research Associate and Linguistic Programmer at the Center for Computational Analysis of Social and Organizational Systems at the School of Computer Science (CASOS), Carnegie Mellon University (CMU). She received her Masters in Communications from Dresden University of Technology in 2003. She had been a research scholar at the Institute for Complex Engineered System at CMU in 2001 and 2002. Her research combines computational linguistics, social network analysis and computational organization theory.
Terrill L. Frantz is a post-doc researcher at the Center for Computational Analysis of Social and Organizational Systems (CASOS) in the School of Computer Science at Carnegie Mellon University. His research involves studying the dynamics of organization social-networks and behavior via computer modeling and simulation. He is developing an expertise in workforce integration strategy and policy evaluation during organization mergers. He earned his doctorate (Ed.D. in Organization Change) from Pepperdine University, a MBA from New York University and a BS in Business Administration (Computer Systems Management) from Drexel University. Prior to entering academic research, for nearly 20 years he was a software applications development manager in the global financial services and industrial chemicals industries; most recently as a Vice President in Information Technology at Morgan Stanley in Hong Kong, New York and London.
Kathleen M. Carley is a professor at the Institute for Software Research International in the School of Computer Science at Carnegie Mellon University. She is the director of the center for Computational Analysis of Social and Organizational Systems (CASOS) <http://www.casos.cs.cmu.edu/>, a university wide interdisciplinary center that brings together network analysis, computer science and organization science (www.casos.ece.cmu.edu) and has an associated NSF funded training program for Ph.D. students. She carries out research that combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are computational social and organization theory, group, organizational and social adaptation and evolution, social and dynamic network analysis, computational text analysis, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations.
About this article
Cite this article
Diesner, J., Frantz, T.L. & Carley, K.M. Communication Networks from the Enron Email Corpus “It's Always About the People. Enron is no Different”. Comput Math Organiz Theor 11, 201–228 (2005). https://doi.org/10.1007/s10588-005-5377-0
- email corpus
- communication networks
- social network analysis
- dynamic network analysis
- organizational crisis
- organizational hierarchy