SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Efimova, L.  Grudin, J. (2007). Crossing boundaries: A case study of employee blogging. Proceedings of the
Fortieth Hawaii International Conference on System Sciences (HICSS-40). Los Alamitos: IEEE Press.




               Crossing Boundaries: A Case Study of Employee Blogging

                   Lilia Efimova                                                Jonathan Grudin
               Telematica Instituut                                           Microsoft Research
              Lilia.Efimova@telin.nl                                        jgrudin@microsoft.com


                       Abstract                               had to arrive. Email required new infrastructure in
                                                              most organizations: Wide deployment of technology
   Editors, email, and instant messaging were first           and considerable administrative support. Both
widely used by students who later brought knowledge           benefited from slow expa
A Case Study Of Employee Blogging.
A Case Study Of Employee Blogging.
A Case Study Of Employee Blogging.
A Case Study Of Employee Blogging.
A Case Study Of Employee Blogging.
A Case Study Of Employee Blogging.
A Case Study Of Employee Blogging.
A Case Study Of Employee Blogging.
A Case Study Of Employee Blogging.

Mais conteúdo relacionado

Mais procurados

Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the WorkplaceTawny Brown
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethicsbadak sumbu
 
My paper for philippine conference
My paper for philippine conferenceMy paper for philippine conference
My paper for philippine conferencearteimi
 
Openness and the Future of Assessment
Openness and the Future of AssessmentOpenness and the Future of Assessment
Openness and the Future of AssessmentDavid Wiley
 
38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY100743646balingoay
 
Fears about technology bushra h
Fears about technology bushra hFears about technology bushra h
Fears about technology bushra h100435412hasan
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethicfauzihayob
 
Internet-Based Distance Education
Internet-Based Distance EducationInternet-Based Distance Education
Internet-Based Distance EducationRaymondGreen14
 
Soft Skills and Future Trends
Soft Skills and Future TrendsSoft Skills and Future Trends
Soft Skills and Future TrendsDmitriy Scherbina
 
NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. ShookJ. David Morris
 

Mais procurados (15)

Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
My paper for philippine conference
My paper for philippine conferenceMy paper for philippine conference
My paper for philippine conference
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Openness and the Future of Assessment
Openness and the Future of AssessmentOpenness and the Future of Assessment
Openness and the Future of Assessment
 
38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY
 
Fears about technology bushra h
Fears about technology bushra hFears about technology bushra h
Fears about technology bushra h
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethic
 
Internet-Based Distance Education
Internet-Based Distance EducationInternet-Based Distance Education
Internet-Based Distance Education
 
Some Historical Milestone
Some Historical MilestoneSome Historical Milestone
Some Historical Milestone
 
Soft Skills and Future Trends
Soft Skills and Future TrendsSoft Skills and Future Trends
Soft Skills and Future Trends
 
NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. Shook
 

Destaque

Is Your Management Review Process Adding Value?
Is Your Management Review Process Adding Value?Is Your Management Review Process Adding Value?
Is Your Management Review Process Adding Value?Antonius Pompi Bramono
 
Management review training for bsc
Management review training for bscManagement review training for bsc
Management review training for bscAshley James
 
Conducting effective management reviews
Conducting effective management reviewsConducting effective management reviews
Conducting effective management reviewsPECB
 
Project management for qa manager
Project management for qa managerProject management for qa manager
Project management for qa managergaoliang641
 
Performance Management Review & Skills
Performance Management Review & SkillsPerformance Management Review & Skills
Performance Management Review & Skillsfatima923
 
Program management review presentation
Program management review presentationProgram management review presentation
Program management review presentationtracih27
 
ISO 9001 2015 | Management Reviews | The Five Rules To Business Excellence
ISO 9001 2015 | Management Reviews | The Five Rules To Business ExcellenceISO 9001 2015 | Management Reviews | The Five Rules To Business Excellence
ISO 9001 2015 | Management Reviews | The Five Rules To Business ExcellenceAndre Barnarde
 
Results Based Monitoring and Evaluation
Results Based Monitoring and EvaluationResults Based Monitoring and Evaluation
Results Based Monitoring and EvaluationMadhawa Waidyaratna
 
Capacity Development For Monitoring And Evaluation
Capacity Development For Monitoring And EvaluationCapacity Development For Monitoring And Evaluation
Capacity Development For Monitoring And EvaluationKnowledge Management Center
 
Monitoring & evaluation presentation[1]
Monitoring & evaluation presentation[1]Monitoring & evaluation presentation[1]
Monitoring & evaluation presentation[1]skzarif
 
Developing-Monitoring-And-Evaluation-Framework-for-Budget-Work-Projects
Developing-Monitoring-And-Evaluation-Framework-for-Budget-Work-ProjectsDeveloping-Monitoring-And-Evaluation-Framework-for-Budget-Work-Projects
Developing-Monitoring-And-Evaluation-Framework-for-Budget-Work-ProjectsNIDHI SEN
 

Destaque (17)

Is Your Management Review Process Adding Value?
Is Your Management Review Process Adding Value?Is Your Management Review Process Adding Value?
Is Your Management Review Process Adding Value?
 
Bonus - entitlement or pay for performance
Bonus - entitlement or pay for performanceBonus - entitlement or pay for performance
Bonus - entitlement or pay for performance
 
Management review training for bsc
Management review training for bscManagement review training for bsc
Management review training for bsc
 
Conducting effective management reviews
Conducting effective management reviewsConducting effective management reviews
Conducting effective management reviews
 
Project management for qa manager
Project management for qa managerProject management for qa manager
Project management for qa manager
 
Performance Management Review & Skills
Performance Management Review & SkillsPerformance Management Review & Skills
Performance Management Review & Skills
 
Program management review presentation
Program management review presentationProgram management review presentation
Program management review presentation
 
MRM - Management Review Meeting Presentation
MRM - Management Review Meeting PresentationMRM - Management Review Meeting Presentation
MRM - Management Review Meeting Presentation
 
ISO 9001 2015 | Management Reviews | The Five Rules To Business Excellence
ISO 9001 2015 | Management Reviews | The Five Rules To Business ExcellenceISO 9001 2015 | Management Reviews | The Five Rules To Business Excellence
ISO 9001 2015 | Management Reviews | The Five Rules To Business Excellence
 
Results Based Monitoring and Evaluation
Results Based Monitoring and EvaluationResults Based Monitoring and Evaluation
Results Based Monitoring and Evaluation
 
Monitoring and Evaluation Framework
Monitoring and Evaluation FrameworkMonitoring and Evaluation Framework
Monitoring and Evaluation Framework
 
Monitoring and Evaluation
Monitoring and EvaluationMonitoring and Evaluation
Monitoring and Evaluation
 
Project Monitoring & Evaluation
Project Monitoring & EvaluationProject Monitoring & Evaluation
Project Monitoring & Evaluation
 
Capacity Development For Monitoring And Evaluation
Capacity Development For Monitoring And EvaluationCapacity Development For Monitoring And Evaluation
Capacity Development For Monitoring And Evaluation
 
Kra presentation
Kra presentationKra presentation
Kra presentation
 
Monitoring & evaluation presentation[1]
Monitoring & evaluation presentation[1]Monitoring & evaluation presentation[1]
Monitoring & evaluation presentation[1]
 
Developing-Monitoring-And-Evaluation-Framework-for-Budget-Work-Projects
Developing-Monitoring-And-Evaluation-Framework-for-Budget-Work-ProjectsDeveloping-Monitoring-And-Evaluation-Framework-for-Budget-Work-Projects
Developing-Monitoring-And-Evaluation-Framework-for-Budget-Work-Projects
 

Semelhante a A Case Study Of Employee Blogging.

20220203 jim spohrer uidp v11
20220203 jim spohrer uidp v1120220203 jim spohrer uidp v11
20220203 jim spohrer uidp v11ISSIP
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastJeffrey Hunt
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
 
ICT Quality Assurance
ICT Quality AssuranceICT Quality Assurance
ICT Quality AssuranceAshley Tan
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxtodd241
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
The Mian cyber attack Groups in China (Chinese episonage)
The Mian cyber attack Groups in China (Chinese episonage)The Mian cyber attack Groups in China (Chinese episonage)
The Mian cyber attack Groups in China (Chinese episonage)Jeremiah Wakamu
 
The virtuality of privacy and security on the
The virtuality of privacy and security on theThe virtuality of privacy and security on the
The virtuality of privacy and security on thePlamen Miltenoff
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Fred Kautz
 
Social computing tools for collaboration: perceptions of opportunity and risk
Social computing tools for collaboration: perceptions of opportunity and riskSocial computing tools for collaboration: perceptions of opportunity and risk
Social computing tools for collaboration: perceptions of opportunity and riskHazel Hall
 
Snow, Floods Swine Flu Terrorist Threats Keep Calm and Carry On
Snow,  Floods  Swine Flu Terrorist Threats  Keep  Calm and Carry OnSnow,  Floods  Swine Flu Terrorist Threats  Keep  Calm and Carry On
Snow, Floods Swine Flu Terrorist Threats Keep Calm and Carry OnBex Lewis
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Nick Davis
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Nick Davis
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Readnicolleszkyj
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxannrodgerson
 
Open Source Software to Enhance the STEM Learning Environment
Open Source Software to Enhance the STEM Learning EnvironmentOpen Source Software to Enhance the STEM Learning Environment
Open Source Software to Enhance the STEM Learning EnvironmentMaurice Dawson
 

Semelhante a A Case Study Of Employee Blogging. (20)

20220203 jim spohrer uidp v11
20220203 jim spohrer uidp v1120220203 jim spohrer uidp v11
20220203 jim spohrer uidp v11
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech Feast
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
ICT Quality Assurance
ICT Quality AssuranceICT Quality Assurance
ICT Quality Assurance
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
The Mian cyber attack Groups in China (Chinese episonage)
The Mian cyber attack Groups in China (Chinese episonage)The Mian cyber attack Groups in China (Chinese episonage)
The Mian cyber attack Groups in China (Chinese episonage)
 
The virtuality of privacy and security on the
The virtuality of privacy and security on theThe virtuality of privacy and security on the
The virtuality of privacy and security on the
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Social computing tools for collaboration: perceptions of opportunity and risk
Social computing tools for collaboration: perceptions of opportunity and riskSocial computing tools for collaboration: perceptions of opportunity and risk
Social computing tools for collaboration: perceptions of opportunity and risk
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 
Snow, Floods Swine Flu Terrorist Threats Keep Calm and Carry On
Snow,  Floods  Swine Flu Terrorist Threats  Keep  Calm and Carry OnSnow,  Floods  Swine Flu Terrorist Threats  Keep  Calm and Carry On
Snow, Floods Swine Flu Terrorist Threats Keep Calm and Carry On
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Read
 
Enterprise 2.0 General
Enterprise 2.0 GeneralEnterprise 2.0 General
Enterprise 2.0 General
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
Open Source Software to Enhance the STEM Learning Environment
Open Source Software to Enhance the STEM Learning EnvironmentOpen Source Software to Enhance the STEM Learning Environment
Open Source Software to Enhance the STEM Learning Environment
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

A Case Study Of Employee Blogging.

  • 1. Efimova, L. Grudin, J. (2007). Crossing boundaries: A case study of employee blogging. Proceedings of the Fortieth Hawaii International Conference on System Sciences (HICSS-40). Los Alamitos: IEEE Press. Crossing Boundaries: A Case Study of Employee Blogging Lilia Efimova Jonathan Grudin Telematica Instituut Microsoft Research Lilia.Efimova@telin.nl jgrudin@microsoft.com Abstract had to arrive. Email required new infrastructure in most organizations: Wide deployment of technology Editors, email, and instant messaging were first and considerable administrative support. Both widely used by students who later brought knowledge benefited from slow expa