Spoke builds enterprise applications that deliver insight from--and access to--human capital through intra- and extra-enterprise relationships Connecting People to Knowledge Through Relationships Andrew Halliday VP Business Development
[email protected]
1 Spoke Software - Confidential
Social Networks, and Social Network Analysis...Some Terms of Art •
Links are “arcs” between “nodes” in a “graph” – Links (arcs) between people can be: •
declared
•
observed/recorded
•
“Degrees of separation” measures the number of arcs separating nodes
•
Most current web social networks are fashioned of declared arcs – Web interfaces for creating one’s node/profile, and workflow to collect arcs – Graph represents the “n degrees” of all inter-connected nodes – Users can typically navigate paths along arcs to friends-of-friends
•
Social Network Analysis...two distinct kinds 1. simple mapping of declared social networks (arcs are undifferentiated) 2. analysis of digital messaging to establish social networks and create measures of strength of relationships (arcs are quantified)
2 Spoke Software - Confidential
What if You could…
•
Discover and measure all the private relationships held within a company and its partners, without data entry?
•
Get everyone to participate because their personal relationship information is kept private, and under their control?
•
Deliver cooperative insight and access from all company relationships with active participation and permission, opt-in?
•
Bring any relationship the company, its partners, and affiliates have to bear on any business situation?
•
Discover the knowledge resources the enterprise is connected to through relationships?
3 Spoke Software - Confidential
Discovering organizational relationship capital Your workgroup network
Human Resources inside or outside the company
Northeast Division
West Division
“light up” all the channels of insight and access
© 2003 Spoke Software, Inc.
4 Spoke Software - Confidential
Networked Users
+ those known by users
Message analysis extends Network Comprehension and Reach to all those known by networked users in email...with no data entry
5 Spoke Software - Confidential
Reach in Social Networks, and Diversity •
Constraints on reach in “declared arc” networks –
Limited to those who join
–
Limited to the scope of user’s input effort
–
Limited to memorable/comfortable connections
•
Automated discovery in electronic messaging enables broader reach, and comprehends many non-users
•
Including those known to users creates a comprehensive map of social networks, and rich data, but this demands etiquette and privacy controls for users, and especially non-users
•
–
System Messaging to/through users only
–
Freedom from social pressure for introductions
–
Inclusion of thousands of user correspondents requires differentiation among various categories/levels of relationship
The benefit is Diversity –
inclusion of both strong ties and “the strength of weak ties”
–
Innovations and information value come from as-yet-unexplored relationship capital
6 Spoke Software - Confidential
Extra-enterprise reach is essential to creating value in external and multi-company business alliances •
Many if not most relationships of value to the enterprise are outside the firewall
•
Intra-enterprise discovery systems are limited to one degree beyond the firewall – Effective for intra-enterprise collaboration – Extra-enterprise collaboration depends on navigation beyond 1 degree
•
Federation with broad public networks enables discovery of external relationships many degrees beyond the firewall
7 Spoke Software - Confidential
“Private information self-determination” Maintaining privacy through individual control •
Your information is yours, for your eyes only...and my information is mine
•
Never reveal contact information
•
Never allow anyone to discover who-knows-whom
•
Provide fine-grained control over movement of my data
•
Provide articulate control over who can access/message me
•
Allow permissioned disclosure of private information
•
Design Principle: Relationships are owned by the individual, not the enterprise...any other premise results in sabotage
8 Spoke Software - Confidential
Future Impact of Social Networks •
Search – by creating personalized context for results based on whom-you-know
•
Commerce – by facilitating relevant influencer effects on Tipping Points in societies – personally relevant peer reviews based on network proximity
•
Communities – by supporting flexible, personally-defined networks and subnetworks
•
Media – by promoting and coordinating content choices within cohorts, creating communal experience and keeping you au courant with your cohort
9 Spoke Software - Confidential
Online Social Networks will have an impact on internetworking...these are some possible developments 1. The emergence of extensive online registries with personal profiles 2. New model of relevance for peoplesearch...”Who matters most are those most connected, and/or those most connected to you” 3. Profiles derived from social cohorts will be used for content routing, search personalization, and alignment into communities-of-interest 4. The emergence of trusted messaging networks based on relationship managers can replace the polluted general emailbox 5. Social networks will be used for knowledge collection, collaboration, and dissemination, with higher personal relevance based on society
10 Spoke Software - Confidential
Personal Context and Productivity: Managing the volume problem in the digital environment
11 Spoke Software - Confidential
Person-centric knowledge assets are auto-generated in Social Network systems Visualization of Personal Network
• Privacy maintained • Individual or organizational • Handles massive data organization
Building Sharable Dossiers
• Automated data collection on persons • Plus manual collection and annotation • Research asset accumulates
12 Spoke Software - Confidential
1. Online registry of professional and personal profiles •
Social Networks are providing a motive for personal self-profiling
•
Publish Profile with multi-tiered access permissions-management
•
–
based on relationship levels and roles
–
allows multiple perspectives of personal information
The role of profiles in the semantic web – Who is managing you as an entity on the web?
•
The value of self-declared interests, preferences, and expertise
•
The value of messaging-derived interests, preferences, and expertise
•
The inclusion of RSS and weblogs to circulate and collect content and context about individuals
13 Spoke Software - Confidential
1. Profiles: example of self-attributed user profile
14 Spoke Software - Confidential
2. Search: Comprehensive Search on People at Companies
15 Spoke Software - Confidential
2. PeopleSearch relevance •
Personalized results based on proximity in your network – The person you are looking for is more likely to be connected to your social network than not
•
Relevance based on number of connections – Google changed page rank relevance to “most connected” – People are more relevant the more connected they are...to you
•
Results based on match in profiles – Declared Interests, Preferences, and Needs – News and Event-related context sensitivity
16 Spoke Software - Confidential
3. Social Network data about who-knows-whom provides a new source of context about individuals •
My Personal context is defined by my own relationship circles
•
My context can be derived from analysis of my social cohort
•
Profiling by association (whom you know defines your attributes)
•
Cohorts create indicators for content relevance – In information search – In semantic routing of content – Targeting of media and advertising – Suggested distribution in publish/subscribe networks
•
“Connectedness” to circles of experts can denote subject familiarity
•
All this governed by personal privacy rules with permissions
17 Spoke Software - Confidential
4. Social Networks create New Models for Messaging and Communication •
Creates context for communication – Social networks cut through the chaos of large collectives and create stronger paths of connection and provide for the creation of subgroups
•
Trusted networks create implied endorsement even after crossing multiple degrees
•
Position in network may provide source qualification for new messages
•
Audit trails based on relationship or membership in topical communities qualifies contact and increases comfort with “strangers”
•
Declared connections provide the basis for two-way permissions and knowledge sharing
18 Spoke Software - Confidential
Enabling Trusted Messaging and Collaboration •
Like IM, pre-authorized two-way channels based on your SN circles
•
Unlike email, not openly accessible to anyone who can determine address
•
Validated senders=those in my network, or those who can pass through my network
•
Social Networks for Dissemination: allows discovery and validation of whom-to-message in extended trusted networks
•
The end of the General Inbox – Prioritization and organization by strength of relationship – Pre-qualification of new senders based on referral endorsements or ties to reference networks – Inboxes based on topical or community-of-interest networks 19 Spoke Software - Confidential
Eventually, Social Network Analysis is applicable to other messaging/data exchanges 1. SN currently focused on web interactions/transactions and email 2. Next: Instant Messaging 3. Then: Voice over IP 4. Social Network Analysis and the Semantic Web 1. Auto-creation or nomination of RDF assertions about individuals •
Based on user profiles
•
Based on cohorts
2. Metadata about software systems interactions •
Relationship analysis of software systems’ behavior as nodes in the social network of web services (software agents analogous to humans as nodes in the graph)
•
What is the SOR of this agent with all others like X, where SOR is a measure based on successful transactions?
•
Finally, reputation tracking of software agents representing humans.... 20 Spoke Software - Confidential