Advertisement

Analyzing Organizational Structures Using Social Network Analysis

Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 34)

Abstract

Technological changes have aided modern companies to gather enormous amounts of data electronically. The availability of electronic data has exploded within the past decade as communication technologies and storage capacities have grown tremendously. The need to analyze this collected data for creating business intelligence and value continues to grow rapidly as more and more apparently unbiased information can be extracted from these data sets. In this paper we focus in particular, on email corpuses, from which a great deal of information can be discerned about organization structure and their unique cultures. We hypothesize that a broad based analysis of information exchanges (ex. emails) among a company’s employees could give us deep information about their respective roles within the organization, thereby revealing hidden organizational structures that hold immense intrinsic value. Enron email corpus is used as a case study to predict the unknown status of Enron employees and identify homogeneous groups of employees and hierarchy among them within Enron organization. We achieve this by using classification and cluster techniques. As a part of this work, we have also developed a web-based graphical user interface to work with feature extraction and composition.

Keywords

Business intelligence organizational hierarchies classification clustering Enron email corpus 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Yu, L., Ramaswamy, S., Zhang, C.: Mining email archives and simulating the dynamics of open-source project developer networks. In: Fourth International Workshop on Enterprise and Organizational Modeling and Simulation, Montpellier, France, pp. 17–31 (2008)Google Scholar
  2. 2.
    Wasserman, S., Faust, K.: Social Network Analysis. Cambridge University Press, Cambridge (1994)CrossRefGoogle Scholar
  3. 3.
    Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (2008)Google Scholar
  4. 4.
    Senator, T.E.: Link mining applications: Progress and challenges. SIGKDD Explorations 7(2), 76–83 (2005)CrossRefGoogle Scholar
  5. 5.
    Getoor, L., Diehl, C.P.: Link mining: A survey. SIGKDD Explorations 7(2), 3–12 (2005)CrossRefGoogle Scholar
  6. 6.
    Goldberg, H.G., Kirkland, J.D., Lee, D., Shyr, P., Thakker, D.: The NASD securities observation, news analysis and regulation system (sonar). In: IAAI 2003, pp. 11–18 (2003)Google Scholar
  7. 7.
    Kirkland, J.D., Senator, T.E., Hayden, J.J., Dybala, T., Goldberg, H.G., Shyr, P.: The nasd regulation advanced detection systems (ads). AI Magazine 20(1), 55–67 (1999)Google Scholar
  8. 8.
    Sparrow, M.: The application of network analysis to criminal intelligence: an assessment of the prospects. Social Networks 13, 251–274 (1991)CrossRefGoogle Scholar
  9. 9.
    Provost, F., Fawcett, T.: Activity monitoring: noticing interesting changes in behavior. In: Fifth ACM SIGKDD International conference on knowledge discovery and data mining (KDD 1999), pp. 53–62 (1999)Google Scholar
  10. 10.
    Huang, Z., Perlinch, C.: Relational learning for customer relationship management. In: International Workshop on Customer Relationship Management: Data Mining Meets Marketing (2005)Google Scholar
  11. 11.
    Enron, Enron Email Dataset, http://www.cs.cmu.edu/~enron/
  12. 12.
    Adibi, J., Shetty, J.: The Enron email dataset database schema and brief statistical report, Information Sciences Institute (2004)Google Scholar
  13. 13.
    Yang, Y., Klimt, B.: The enron corpus: A new dataset for email classification research. In: European Conference on Machine Learning, Pisa, Italy (2004)Google Scholar
  14. 14.
    McCallum, A., Corrada-Emmanuel, A., Wang, X.: The author-recipient-topic model for topic and role discovery in social networks: Experiments with entron and academic email. In: NIPS 2004 Workshop on Structured Data and Representations in Probabilistic Models for Categorization, Whister, B.C. (2004)Google Scholar
  15. 15.
    Carley, K.M., Diesner, J.: Exploration of communication networks from the enron email corpus. In: Workshop on Link Analysis, Counterterrorism and Security, Newport Beach, CA (2005)Google Scholar
  16. 16.
    Diesner, J., Frantz, T.L., Carley, K.M.: Communication networks from the Enron email corpus. Journal of Computational and Mathematical Organization Theory 11, 201–228 (2005)CrossRefGoogle Scholar
  17. 17.
    Varshney, V., Deepak, D.G.: Analysis of Enron email threads and quantification of employee responsiveness. In: Workshop on International Joint Conference on Artificial Intelligence, Hyderabad, India (2007)Google Scholar
  18. 18.
    Adibi, J., Shetty, J.: Discovering important nodes through graph entropy: the case of Enron email database. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Ilinois, U.S.A. (2005)Google Scholar
  19. 19.
    Oard, D.W., Elsayed, T.: Modeling identity in archival collections of email: a preliminary study. In: Third Conference on Email and Anti-spam (CEAS), Mountain View, CA (2006)Google Scholar
  20. 20.
    Bar-Yossef, Z., Guy, I., Lempel, R., Maarek, Y.S., Soroka, V.: Cluster ranking with an application to mining mailbox networks. In: ICDM 2006: Proceedings of the Sixth International Conference on Data Mining, Washington, DC. U.S.A, pp. 63–74 (2006)Google Scholar
  21. 21.
    Rowe, R., Creamer, G., Hershkop, S., Stolfo, S.J.: Automated social hierarchy detection through email network analysis. In: Joint 9th WEBKDD and 1st SNA-KDD Workshop 2007, San Jose, California, USA, pp. 1–9 (2007)Google Scholar
  22. 22.
    Everitt, B.S., Landau, S., Leese, M.: Cluster Analysis, 4th edn. A Hodder Arnold Publication (2001)Google Scholar
  23. 23.
    Izenman, A.J.: Modern Multivariate Statistical Techniques: Regression, Classification, and Manifold Learning, 1st edn. Springer, Berlin (2008)CrossRefGoogle Scholar
  24. 24.
    Weka. Weka: Data Mining Software in Java, http://www.cs.waikato.ac.nz/ml/weka/
  25. 25.
    Bensaid, A.M., Hall, L.O., Bezdek, J.C., et al.: Validity-guided (Re)Clustering with applications to image segmentation. IEEE Transactions on Fuzzy Systems 4, 112–123 (1996)CrossRefGoogle Scholar
  26. 26.
    Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum press (1981)Google Scholar
  27. 27.
    Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley, Chichester (1990)CrossRefGoogle Scholar
  28. 28.
    Xie, X.L., Beni, G.A.: Validity measure for fuzzy clustering. IEEE Transactions on Pattern Analysis and Machine Intelligence 3(8), 841–846 (1991)CrossRefGoogle Scholar
  29. 29.
  30. 30.
    Kantardzic, M.: Data Mining: Concepts, Models, Methods, and Algorithms, 1st edn. Wiley/ IEEE (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  1. 1.Department of Applied ScienceUniversity of Arkansas at Little RockLittle Rock, ArkansasUSA
  2. 2.Department of Computer ScienceUniversity of Arkansas at Little RockLittle Rock, ArkansasUSA

Personalised recommendations