Complex Networks pp 209-223 | Cite as
Identification of Social Tension in Organizational Networks
Abstract
Analysis of email networks reveals properties similar to classic social networks such as homophily (assortativity) and community formation. The technology underlying email enables the formation of a network but it does not explain characteristics of the network that occur only as a result of patterns in human social behavior. Accordingly, a network formed from email activity correlates to the social environment and the dynamics of the environment used to create the network. Furthermore, the overall social behavior observed in an organization may be attributed directly to the organization’s strength and resilience. When an organization is in trouble, we observe social tension among its employees. That being the case, one should be able to discern this tension by examining properties of a social network of the employees-the network should reflect the employees’mood; the fears, worries, gossips that are circulating, the good and the bad, are all reflected in organization’s social network. One of the best representations of the true social organizational social network can be constructed from email exchange. The issue we investigate in this paper relates to timing: when does the network exhibits social tension when it is known to be present in the organization? In this paper, we provide a temporal analysis of the email social network constructed for the Enron Corporation and show that changes in network characteristics strongly correlate to real-world events in that organization. More importantly, we show that this correlation is time-shifted and appears in the network before the event becomes common knowledge; our hypothesis is that we can use the anomalies in the network to identify social tension in the organization and consequently help mitigate its consequences.
Keywords
Social Network Stock Price Organizational Network Social Tension Email NetworkPreview
Unable to display preview. Download preview PDF.
References
- 1.Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378–382 (2000)CrossRefGoogle Scholar
- 2.Barabási, A.-L.: Linked: The New Science of Networks. Perseus Publishing (2002)Google Scholar
- 3.Bryce, R.: Pipe Dreams: Greed, Ego, and the Death of Enron. PublicAffairs (October 2002)Google Scholar
- 4.Diesner, J., Frantz, T.L., Carley, K.M.: Communication networks from the enron email corpus: It’s always about the people. enron is no different. Computational and Mathematical Organization Theory 11(3), 201–228 (2005)MATHCrossRefGoogle Scholar
- 5.Ebel, H., Mielsch, L.-I., Bornholdt, S.: Scale-free topology of e-mail networks. Phys. Rev. E 66(3), 035103 (2002)CrossRefGoogle Scholar
- 6.Gervasio, M.: Enron email dataset (March 2004), http://www.cs.cmu.edu/~enron/
- 7.Guimerà, R., Danon, L., Díaz-Guilera, A., Giralt, F., Arenas, A.: Self-similar community structure in organisations. Phys. Rev. E 68, 065103 (2003)CrossRefGoogle Scholar
- 8.Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady 10, 707–710 (1966)MathSciNetGoogle Scholar
- 9.Mokken, R.J.: Cliques, clubs and clans. Quality and Quantity 13, 161–173 (1979)CrossRefGoogle Scholar
- 10.Newman, M.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)MATHCrossRefMathSciNetGoogle Scholar
- 11.Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Phys. Rev. E 66(3), 035101 (2002)CrossRefGoogle Scholar
- 12.Sterman, J.: System dynamics modeling: Tools for learning in a complex world. California Management Review 43(4), 8–25 (2001)Google Scholar
- 13.Watts, D.: Six Degrees: The Science of a Connected Age. Norton (2003)Google Scholar
- 14.Zhou, D., Song, Y., Zha, H., Zhang, Y.: Towards discovering organizational structure from email corpus. In: ICMLA 2005: Proceedings of the Fourth International Conference on Machine Learning and Applications, pp. 279–284. IEEE Computer Society, Washington (2005)CrossRefGoogle Scholar