SlideShare uma empresa Scribd logo
1 de 14
© 2013 IBM Corporation
Social network analyses in organizations:
challenges and approaches for
studying work networks
Ana Paula Appel, Vagner F. de Santana, Rogério A. de Paula
Claudio S. Pinhanez, Victor F. Cavalvante
IBM Research Brazil, Service Systems
MCPL 2013 - Sep 11-13, 2013
IBM Research
© 2013 IBM Corporation
Agenda
 Context
 Related works
 Challenges
 Study
 Results
 Final remarks
2
© 2013 IBM Corporation
Context
 The spread of online Social Networks (SN) use is responsible for the
current high interest in complex network analyses, e.g.:
 “People you may know” feature
 How people get connected?
 SN are networks in which
 Nodes represent people, or groups of people
 Edges some form of social interaction
 Social Network Analysis (SNA) allows to diagnose problems and identify
opportunities in organizations
 SNA allows to identify collaborative hot spots and cold spots
 In organizations, connecting people with similar skills, interests, or profiles
can be worth for employees in many ways
3
© 2013 IBM Corporation
Context
 Our work took place at a large IT service delivery organization, Big
Service Factory (BSF)
 Employees are very specialized, often focused on specific tasks
 Sysadmins are responsible for some of the most critical functions
necessary to maintain the customers’ IT infrastructures
 Tickets describe particular incidents
 Tickets have attributes indicating work shift, department, customer, date,
descriptions of the problem, among others
 Challenges in the context involve
 Assignment time
 Data insertion by hand
 …
4
© 2013 IBM Corporation
Related works
 The foundation of the field is attributed to Jacob Levy Moreno who
conducted the first long-range sociometric study from 1932-1938
 Monge and Contractor [1987] utilized social network analysis to study the
communication patterns among workers
 Properties identified:
 The power-law degree distributions as showed in Albert et al. [1999] and
Adamic et al. [2000]
 The diameter shrinkage present in evolving networks presented by Leskovec
et al. [2005]
 The Small World phenomenon studied by Milgram [1967]
5
© 2013 IBM Corporation
Challenges
 How to combine data sources, build a very large network, and mine it?
 Each data source can become a network and all networks can be
combined making one large weighted or multi-edges network, but…
 How do we define the weight for each graph?
 When using multi-edge graphs, the number of available algorithms/techniques
is an issue.
 It is hard to define the mining task for multi-edge graph
 Combining different type of sources to build one very large graph requires
 New algorithms
 New range of methodology and definitions of graph mining area
6
© 2013 IBM Corporation
Study
 108,050 tickets
 Collected from the past 10 months
 315 sysadmins
 Four features where considered
 Work shifts (morning, afternoon and night)
 Department (four departments)
 Customers (around 70)
 Problem severity (1, the hardest one to solve)
 We consolidate the monthly data for each sysadmin into a percentage
representing the weight of each of customers, service lines, shifts, etc.
 Each sysadmin was represented by a feature vector with 80 positions
7
© 2013 IBM Corporation
Study
 To build the networks, we compute the cosine distance among each
sysadmin using a K-NN (K Nearest Neighbor) search, using k = 10
 Who are the 10 most similar sysadmins?
 We explored two types of network
 Using the entire feature vector to compute the distance
 Splitting the feature vector into four independent vector, each one
representing one feature, building four networks, and then merging them into
one multi-edge network
8
© 2013 IBM Corporation
Results – Severity , Shift, Department, and Customer
9
© 2013 IBM Corporation
Results – Service Lines vs. Shift
10
© 2013 IBM Corporation
Results – Service Lines vs. Severity
11
© 2013 IBM Corporation
Results – Shift vs. Severity
12
© 2013 IBM Corporation
Final remarks
 Unveiling underlying emerging networks is a promising approach
 Integrating social analytics and qualitative research has the potential to
reveal "hidden" practices of daily distributed complex tasks
 Using network as a model to connect sysadmin is important specially in
crises situation
 Future work involves
 Field work
 Integrating ticket information with sysadmins’ communication patterns
 New methods and tools are needed to process and display very large
networks with parallel edges
13
© 2013 IBM Corporation
Thank you!
VagSant@br.ibm.com
@santanavagner

Mais conteúdo relacionado

Mais procurados

IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationAreej Qasrawi
 
A framework for improving security in cloud computing
A framework for improving security in cloud computingA framework for improving security in cloud computing
A framework for improving security in cloud computingAJIT M KARANJKAR
 
Social Mobile Analytics Cloud
Social Mobile Analytics CloudSocial Mobile Analytics Cloud
Social Mobile Analytics CloudMphasis
 
Future Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopFuture Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopSOFIProject
 
CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications PayamBarnaghi
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saranshSaransh Agarwal
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsPayamBarnaghi
 
Offloading Computation to the Edge
Offloading Computation to the EdgeOffloading Computation to the Edge
Offloading Computation to the EdgeVittorio Scarano
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of ThingsS.Mostafa Sayyedi
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyMadan Golla
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentationTelstra
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign countryTelstra
 

Mais procurados (20)

IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
SMAC
SMACSMAC
SMAC
 
A framework for improving security in cloud computing
A framework for improving security in cloud computingA framework for improving security in cloud computing
A framework for improving security in cloud computing
 
Social Mobile Analytics Cloud
Social Mobile Analytics CloudSocial Mobile Analytics Cloud
Social Mobile Analytics Cloud
 
Ppt template (1)
Ppt template (1)Ppt template (1)
Ppt template (1)
 
Future Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopFuture Internet Arch - Open Workshop
Future Internet Arch - Open Workshop
 
Siop impact of social media
Siop impact of social mediaSiop impact of social media
Siop impact of social media
 
CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications CityPulse: Large-scale data analysis for smart city applications
CityPulse: Large-scale data analysis for smart city applications
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saransh
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
 
Offloading Computation to the Edge
Offloading Computation to the EdgeOffloading Computation to the Edge
Offloading Computation to the Edge
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Grid computing
Grid computingGrid computing
Grid computing
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Impact2
Impact2Impact2
Impact2
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign country
 

Semelhante a MCPL2013 - Social network analyses in organizations: challenges and approaches for studying work networks

Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingTahmin Aysha Murshed
 
Running headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxRunning headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxrtodd599
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computingijceronline
 
SNA of M2M Organisations
SNA of M2M OrganisationsSNA of M2M Organisations
SNA of M2M OrganisationsLee Cox
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxaudeleypearl
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing ApplicationIRJET Journal
 
The Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterThe Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterTanner Massahos
 
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGMOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGijistjournal
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseLeMeniz Infotech
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challengesAlexander Decker
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalEmily Smith
 

Semelhante a MCPL2013 - Social network analyses in organizations: challenges and approaches for studying work networks (20)

Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
SMAC
SMACSMAC
SMAC
 
Running headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docxRunning headCapstone Project Activity - Unit 2 2C.docx
Running headCapstone Project Activity - Unit 2 2C.docx
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
SNA of M2M Organisations
SNA of M2M OrganisationsSNA of M2M Organisations
SNA of M2M Organisations
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
 
The Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterThe Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium Poster
 
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGMOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTING
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing database
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challenges
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
 

Mais de Vagner Santana

Introdução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPIntrodução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPVagner Santana
 
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...Vagner Santana
 
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...Vagner Santana
 
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure WidgetsWWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure WidgetsVagner Santana
 
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...Vagner Santana
 
IHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliaçãoIHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliaçãoVagner Santana
 
SEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais OnlineSEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais OnlineVagner Santana
 
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...Vagner Santana
 
Padrões Arquiteturais de Sistemas
Padrões Arquiteturais de SistemasPadrões Arquiteturais de Sistemas
Padrões Arquiteturais de SistemasVagner Santana
 
Desenvolvimento de Software
Desenvolvimento de SoftwareDesenvolvimento de Software
Desenvolvimento de SoftwareVagner Santana
 
W4A 2012 - Vagner Santana
W4A 2012 - Vagner SantanaW4A 2012 - Vagner Santana
W4A 2012 - Vagner SantanaVagner Santana
 

Mais de Vagner Santana (13)

Introdução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUPIntrodução à Engenharia de Requisitos e RUP
Introdução à Engenharia de Requisitos e RUP
 
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
W4A2013 - Firefixia: An Accessibility Web Browser Customization Toolbar for P...
 
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
W4A2013 - Web Accessibility Snapshot: An Effort to Reveal Coding Guidelines C...
 
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure WidgetsWWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
WWW/Internet 2011 - A Framework for Web 2.0 Secure Widgets
 
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
IHC 2010 - Bringing Users of a Digital Divide Context to Website Evaluation U...
 
IHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliaçãoIHC 2010 - Competição de avaliação
IHC 2010 - Competição de avaliação
 
Acessibilidade web
Acessibilidade webAcessibilidade web
Acessibilidade web
 
SEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais OnlineSEMISH 2009 - Redes Sociais Online
SEMISH 2009 - Redes Sociais Online
 
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
ICEIS 2012 - VISUALIZING USER INTERFACE EVENTS: Event Stream Summarization th...
 
Padrões de Projeto
Padrões de ProjetoPadrões de Projeto
Padrões de Projeto
 
Padrões Arquiteturais de Sistemas
Padrões Arquiteturais de SistemasPadrões Arquiteturais de Sistemas
Padrões Arquiteturais de Sistemas
 
Desenvolvimento de Software
Desenvolvimento de SoftwareDesenvolvimento de Software
Desenvolvimento de Software
 
W4A 2012 - Vagner Santana
W4A 2012 - Vagner SantanaW4A 2012 - Vagner Santana
W4A 2012 - Vagner Santana
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

MCPL2013 - Social network analyses in organizations: challenges and approaches for studying work networks

  • 1. © 2013 IBM Corporation Social network analyses in organizations: challenges and approaches for studying work networks Ana Paula Appel, Vagner F. de Santana, Rogério A. de Paula Claudio S. Pinhanez, Victor F. Cavalvante IBM Research Brazil, Service Systems MCPL 2013 - Sep 11-13, 2013 IBM Research
  • 2. © 2013 IBM Corporation Agenda  Context  Related works  Challenges  Study  Results  Final remarks 2
  • 3. © 2013 IBM Corporation Context  The spread of online Social Networks (SN) use is responsible for the current high interest in complex network analyses, e.g.:  “People you may know” feature  How people get connected?  SN are networks in which  Nodes represent people, or groups of people  Edges some form of social interaction  Social Network Analysis (SNA) allows to diagnose problems and identify opportunities in organizations  SNA allows to identify collaborative hot spots and cold spots  In organizations, connecting people with similar skills, interests, or profiles can be worth for employees in many ways 3
  • 4. © 2013 IBM Corporation Context  Our work took place at a large IT service delivery organization, Big Service Factory (BSF)  Employees are very specialized, often focused on specific tasks  Sysadmins are responsible for some of the most critical functions necessary to maintain the customers’ IT infrastructures  Tickets describe particular incidents  Tickets have attributes indicating work shift, department, customer, date, descriptions of the problem, among others  Challenges in the context involve  Assignment time  Data insertion by hand  … 4
  • 5. © 2013 IBM Corporation Related works  The foundation of the field is attributed to Jacob Levy Moreno who conducted the first long-range sociometric study from 1932-1938  Monge and Contractor [1987] utilized social network analysis to study the communication patterns among workers  Properties identified:  The power-law degree distributions as showed in Albert et al. [1999] and Adamic et al. [2000]  The diameter shrinkage present in evolving networks presented by Leskovec et al. [2005]  The Small World phenomenon studied by Milgram [1967] 5
  • 6. © 2013 IBM Corporation Challenges  How to combine data sources, build a very large network, and mine it?  Each data source can become a network and all networks can be combined making one large weighted or multi-edges network, but…  How do we define the weight for each graph?  When using multi-edge graphs, the number of available algorithms/techniques is an issue.  It is hard to define the mining task for multi-edge graph  Combining different type of sources to build one very large graph requires  New algorithms  New range of methodology and definitions of graph mining area 6
  • 7. © 2013 IBM Corporation Study  108,050 tickets  Collected from the past 10 months  315 sysadmins  Four features where considered  Work shifts (morning, afternoon and night)  Department (four departments)  Customers (around 70)  Problem severity (1, the hardest one to solve)  We consolidate the monthly data for each sysadmin into a percentage representing the weight of each of customers, service lines, shifts, etc.  Each sysadmin was represented by a feature vector with 80 positions 7
  • 8. © 2013 IBM Corporation Study  To build the networks, we compute the cosine distance among each sysadmin using a K-NN (K Nearest Neighbor) search, using k = 10  Who are the 10 most similar sysadmins?  We explored two types of network  Using the entire feature vector to compute the distance  Splitting the feature vector into four independent vector, each one representing one feature, building four networks, and then merging them into one multi-edge network 8
  • 9. © 2013 IBM Corporation Results – Severity , Shift, Department, and Customer 9
  • 10. © 2013 IBM Corporation Results – Service Lines vs. Shift 10
  • 11. © 2013 IBM Corporation Results – Service Lines vs. Severity 11
  • 12. © 2013 IBM Corporation Results – Shift vs. Severity 12
  • 13. © 2013 IBM Corporation Final remarks  Unveiling underlying emerging networks is a promising approach  Integrating social analytics and qualitative research has the potential to reveal "hidden" practices of daily distributed complex tasks  Using network as a model to connect sysadmin is important specially in crises situation  Future work involves  Field work  Integrating ticket information with sysadmins’ communication patterns  New methods and tools are needed to process and display very large networks with parallel edges 13
  • 14. © 2013 IBM Corporation Thank you! VagSant@br.ibm.com @santanavagner

Notas do Editor

  1. sysadmin that work in same work shift tend to be more similar than the ones that work in different work shift connection among sysadmins during the work is higher to sysadmins that work in same department in same work shift, no matter the costumer or the tickets’ severity
  2. sysadmin that solves same type of ticket tend to be similar to each other
  3. most of tickets with severity one occurs in work shift 3 - night most of the tickets with severity three (Figure 3 (c) red) occurs in work shift 1 – morning