Results 1 - 10
of
69
How To Search a Social Network
- Social Networks
, 2005
"... We address the question of how participants in a small world experiment are able to find short paths in a social network using only local information about their immediate contacts. We simulate such experiments on a network of actual email contacts within an organization as well as on a student soci ..."
Abstract
-
Cited by 158 (2 self)
- Add to MetaCart
(Show Context)
We address the question of how participants in a small world experiment are able to find short paths in a social network using only local information about their immediate contacts. We simulate such experiments on a network of actual email contacts within an organization as well as on a student social networking website. On the e-mail network we find that small world search strategies using a contact’s position in physical space or in an organizational hierarchy relative to the target can effectively be used to locate most individuals. However, we find that in the online student network, where the data is incomplete and hierarchical structures are not well defined, local search strategies are less effective. We compare our findings to recent theoretical hypotheses about underlying social structure that would enable these simple search strategies to succeed and discuss the implications to social software design. 1
Digital Artifacts for Remembering and Storytelling: PostHistory and Social Network Fragments
- In HICSS-37
, 2004
"... Draft version. This paper has been submitted to HICSS-37, Persistent Conversation Track and is awaiting review. Anyone wishing to reference this paper should first contact Fernanda and danah. ..."
Abstract
-
Cited by 69 (6 self)
- Add to MetaCart
Draft version. This paper has been submitted to HICSS-37, Persistent Conversation Track and is awaiting review. Anyone wishing to reference this paper should first contact Fernanda and danah.
Rhythm Modeling, Visualizations, and Applications
- Proceedings of the ACM Symposium on User Interface Software and Technology (UIST
, 2003
"... People use their awareness of others ' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling temporal patterns from a record of online presence data. We describe analytic and end-user visualizations of rhythmic pat ..."
Abstract
-
Cited by 63 (1 self)
- Add to MetaCart
(Show Context)
People use their awareness of others ' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling temporal patterns from a record of online presence data. We describe analytic and end-user visualizations of rhythmic patterns and the tradeoffs between them. We conducted a design study that explored the accuracy of the derived rhythm models compared to user perceptions, user preference among the visualization alternatives, and users' privacy preferences. We also present a prototype application based on the rhythm model that detects when a person is “away ” for an extended period and predicts their return. We discuss the implications of this technology on the design of computer-mediated communication.
Understanding email use: predicting action on a message
- In SIGCHI, ACM
, 2005
"... Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examined people's ratings of message importance and the actions they took on specific email messages, based on message cha ..."
Abstract
-
Cited by 52 (4 self)
- Add to MetaCart
(Show Context)
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examined people's ratings of message importance and the actions they took on specific email messages, based on message characteristics and characteristics of receivers and senders. Respondents kept half of their new messages in the inbox and replied to about a third of them. They rated messages as important if they were about work and required action. Importance, in turn, had a modest impact on whether people replied to their incoming messages and whether they saved them. The results indicate that factors other than message importance (e.g., their social nature) also determine how people handle email. Overall, email usage reflects attentional differences due both to personal propensities and to work demands and relationships.
The social network and relationship finder: Social sorting for email triage
- In Proceedings of CEAS ’05
, 2005
"... Email triage is the process of going through unhandled email and deciding what to do with it. This process can quickly become a serious problem for users with large volumes of email. Studies have found that people use a variety of approaches to triage their email, many of which have a social compone ..."
Abstract
-
Cited by 42 (6 self)
- Add to MetaCart
Email triage is the process of going through unhandled email and deciding what to do with it. This process can quickly become a serious problem for users with large volumes of email. Studies have found that people use a variety of approaches to triage their email, many of which have a social component. We believe that email clients can better support email triage by providing users with additional sorting features based on socially salient information. We present a prototype email client, SNARF (the Social Network and Relationship Finder), that aggregates social meta-data about email correspondents to aid email triage. Users can then sort their correspondents based on this meta-data bringing emails from socially important people to the foreground. 1
Network reachability of real-world contact sequences
- Physical Review E
, 2005
"... We use real-world contact sequences, time-ordered lists of contacts from one person to another, to study how fast information or disease can spread across network of contacts. Specifically we measure the reachability time—the average shortest time for a series of contacts to spread information betwe ..."
Abstract
-
Cited by 34 (3 self)
- Add to MetaCart
We use real-world contact sequences, time-ordered lists of contacts from one person to another, to study how fast information or disease can spread across network of contacts. Specifically we measure the reachability time—the average shortest time for a series of contacts to spread information between a reachable pair of vertices (a pair where a chain of contacts exists leading from one person to the other)—and the reachability ratio—the fraction of reachable vertex pairs. These measures are studied using conditional uniform graph tests. We conclude, among other things, that the network reachability depends much on a core where the path lengths are short and communication frequent, that clustering of the contacts of an edge in time tend to decrease the reachability, and that the order of the contacts really do make sense for dynamical spreading processes.
Using rhythms of relationships to understand e-mail archives
- Journal of the American Society for Information Science and Technology
, 2006
"... Due to e-mail’s ubiquitous nature, millions of users are intimate with the technology; however, most users are only familiar with managing their own e-mail, which is an inherently different task from exploring an e-mail archive. Historians and social scientists believe that e-mail archives are impor ..."
Abstract
-
Cited by 23 (5 self)
- Add to MetaCart
(Show Context)
Due to e-mail’s ubiquitous nature, millions of users are intimate with the technology; however, most users are only familiar with managing their own e-mail, which is an inherently different task from exploring an e-mail archive. Historians and social scientists believe that e-mail archives are important artifacts for understanding the individuals and communities they represent. To understand the conversations evidenced in an archive, context is needed. In this article, we present a new way to gain this necessary context: analyzing the temporal rhythms of social relationships. We provide methods for constructing meaningful rhythms from the e-mail headers by identifying relationships and interpreting their attributes. With these visualization techniques, e-mail archive explorers can uncover insights that may have been otherwise hidden in the archive. We apply our methods to an individual’s 15-year e-mail archive, which consists of about 45,000 messages and over 4,000 relationships.
Design, Implementation and Test of an Email Virus Throttle
- IN 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE
, 2003
"... This paper presents an approach to preventing the damage caused by viruses that travel via email. The approach prevents an infected machine spreading the virus further. This directly addresses the two ways that viruses cause damage: less machines spreading the virus will reduce the number of ma ..."
Abstract
-
Cited by 22 (2 self)
- Add to MetaCart
(Show Context)
This paper presents an approach to preventing the damage caused by viruses that travel via email. The approach prevents an infected machine spreading the virus further. This directly addresses the two ways that viruses cause damage: less machines spreading the virus will reduce the number of machines infected and reduce the traffic generated by the virus. The approach
Watts (2005). "In search of coherence: a review of e-mail research." Human–Computer Interaction 20(1-2
"... E-mail research encompasses a vast and diverse body of work that accumulated over the past 30 years. In this article, we take a critical look at the research litera-ture and ask two simple questions: What is e-mail research? Can it help us rein-vent e-mail? Rather than defining an overarching framew ..."
Abstract
-
Cited by 20 (1 self)
- Add to MetaCart
(Show Context)
E-mail research encompasses a vast and diverse body of work that accumulated over the past 30 years. In this article, we take a critical look at the research litera-ture and ask two simple questions: What is e-mail research? Can it help us rein-vent e-mail? Rather than defining an overarching framework, we survey the litera-ture and identify three metaphors that have guided e-mail research up to this day: e-mail as a file cabinet extending human information processing capabilities, e-mail as a production line and locus of work coordination, and, finally, e-mail as a communication genre supporting social and organizational processes. We pro-pose this taxonomy so that designers of future e-mail systems can forge their own direction of research, with knowledge of other directions that have been explored in the past. As an illustration of the possible future work we want to encourage
Blogging at work and the corporate attention economy
- in SIGCHI Conference on Human Factors in Computing. 2009
"... The attention economy motivates participation in peerproduced sites on the Web like YouTube and Wikipedia. However, this economy appears to break down at work. We studied a large internal corporate blogging community using log files and interviews and found that employees expected to receive attenti ..."
Abstract
-
Cited by 18 (2 self)
- Add to MetaCart
(Show Context)
The attention economy motivates participation in peerproduced sites on the Web like YouTube and Wikipedia. However, this economy appears to break down at work. We studied a large internal corporate blogging community using log files and interviews and found that employees expected to receive attention when they contributed to blogs, but these expectations often went unmet. Like in the external blogosphere, a few people received most of the attention, and many people received little or none. Employees expressed frustration if they invested time and received little or no perceived return on investment. While many corporations are looking to adopt Web-based communication tools like blogs, wikis, and forums, these efforts will fail unless employees are motivated to participate and contribute content. We identify where the attention economy breaks down in a corporate blog community and suggest mechanisms for improvement. Author Keywords Blogging, blog readers, attention economy, workplace,