Organization Mining Using Online Social Networks

被引:33
作者
Fire, Michael [1 ,2 ]
Puzis, Rami [1 ,2 ]
机构
[1] Ben Gurion Univ Negev, Telekom Innovat Labs, POB 653, IL-84105 Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Informat Syst Engn, POB 653, IL-84105 Beer Sheva, Israel
关键词
Organizational data mining; Social network data mining; Social network privacy; Organizational social network privacy; Facebook; LinkedIn; Machine learning; Leadership roles;
D O I
10.1007/s11067-015-9288-4
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Complementing the formal organizational structure of a business are the informal connections among employees. These relationships help identify knowledge hubs, working groups, and shortcuts through the organizational structure. They carry valuable information on how a company functions de facto. In the past, eliciting the informal social networks within an organization was challenging; today they are reflected by friendship relationships in online social networks. In this paper we analyze several commercial organizations by mining data which their employees have exposed on Facebook, LinkedIn, and other publicly available sources. Using a web crawler designed for this purpose, we extract a network of informal social relationships among employees of targeted organizations. Our results show that it is possible to identify leadership roles within the organization solely by using centrality analysis and machine learning techniques applied to the informal relationship network structure. Valuable non-trivial insights can also be gained by clustering an organization's social network and gathering publicly available information on the employees within each cluster. Knowledge of the network of informal relationships may be a major asset or might be a significant threat to the underlying organization.
引用
收藏
页码:545 / 578
页数:34
相关论文
共 52 条
  • [1] Privacy and rationality - A survey
    Acquisti, A
    Grossklags, J
    [J]. PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, 2006, : 15 - 29
  • [2] Allen T, 1969, ADM SCI Q
  • [3] [Anonymous], 2002, Connections
  • [4] [Anonymous], 2007, P 22 NAT C ART INT
  • [5] THE SOCIAL-ORGANIZATION OF CONSPIRACY - ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL-EQUIPMENT INDUSTRY
    BAKER, WE
    FAULKNER, RR
    [J]. AMERICAN SOCIOLOGICAL REVIEW, 1993, 58 (06) : 837 - 860
  • [6] Boshmaf Y, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P93
  • [7] Burt R, 1995, STRUCTURAL HOLES RHE
  • [8] Campbell C., 2003, P 12 INT C INFORM KN, P528, DOI [DOI 10.1145/956863.956965, 10.1145/956863.956965]
  • [9] Dynamic Vulnerability Analysis of Public Transport Networks: Mitigation Effects of Real-Time Information
    Cats, Oded
    Jenelius, Erik
    [J]. NETWORKS & SPATIAL ECONOMICS, 2014, 14 (3-4) : 435 - 463
  • [10] Chesney T, 2014, DIFFUSION NETWORKS H, P2014