Premium Essay

Analysis of Communication Network

In: Business and Management

Submitted By maizatulsyahirah
Words 3796
Pages 16
BISE – RESEARCH PAPER

Analysis of Informal Communication Networks – A Case Study
It is becoming more and more important for knowledge workers to increase their productivity. However, there is a general lack of (semi-)automated, IT-supported data collection and evaluation approaches that allow insights into the processes and structures of an enterprise’s internal networks and the activities of its knowledge workers. The article presents a prototype of an IT-supported instrument (“Social Badges”) that supports automatic collection of informal, personal interaction between (knowledge) workers within an enterprise. The authors’ aim is to introduce a novel approach which improves data quality over legacy methods. The approach uses Social Network Analysis (SNA) to make it easier for executives to analyze and manage informal communications networks. Its practical applicability is demonstrated by a case study.
DOI 10.1007/s12599-008-0018-z

The Authors
Dr. Kai Fischbach Prof. Dr. Detlef Schoder
Seminar for Business Informatics and Information Management University of Cologne Pohligstr. 1 50969 Cologne Germany {fischbach | schoder}@ wim.uni-koeln.de

1 Introduction
If the formal organization is the skeleton of a company, the informal is the central nervous system driving the collective thought processes, actions, and reactions of its business units. (Krackhardt and Hanson 1993, p. 104) Both the volume and importance of knowledge workers are growing as industrialized countries go through structural changes towards service-oriented societies (Albach 1999; Drucker 1999; Davenport 2005). According to Apte and Nath (2007), knowledge workers already account for 70 % of the labor force in the USA and for more than 60 % of its added value. Despite the importance of knowledgeintensive work, little is known about how to improve it compared to manual work processes. This is…...

Similar Documents

Premium Essay

Social Network Analysis

...Application A Social Network Analysis Platform for Organizational Risk Analysis - ORA Yin Qiuju, Chen Qingqing School of Management and Economics, Beijing Institute of Technology, 100081 c_yinqj@163.com Abstract—ORA(Organizational Risk Analyzer) is a dynamic network evaluation and analysis tools which developed by the center for Computational Analysis of Social and Organizational System(CASOS), Carnegie Mellon University. It can track the relevant index of the group, identify the style of location and contrast the relation among networks, groups and individuals from the perspective of dynamic network. ORA also can recognize the key members, groups and vulnerabilities of the network between different time points, basing on which, carry on the further analysis. Compare with other social network analysis platform, ORA can support multiple data input form, and can instantly show the dynamic change of the network. This paper introduces the structure and functions of ORA, moreover, uses it to analyze the structure of a terrorist network, in order to find out the weakness of the organization. problems and to take advantage of network strengths. According to different contexts and types of the data, need to detailed test and determined. ORA can be used to do a risk audit for the organization of its individual and organization risks. Such risks include, but are not limited to, tendency to groupthink, overlook of information, communication barriers, and......

Words: 2827 - Pages: 12

Premium Essay

Social Network (Essay Analysis)

...Social Network Is social networking a bad thing? Going back in time to about forty years ago, there was no such thing as social networking. Technology has become a major part of society. It has also impacted the youth of this generation. Now social networking is a part of most teenagers’ life, which most times lead into an addiction. My article is titled, Study Finds Teenagers’ Internet Socializing Isn’t Such a Bad Thing by Tamar Lewin (676). Although it captivates its reader’s attention with the use of logos and ethos, the evidence used in it, and its appeal to the audience, the purpose of this article is not entirely effective. It lacks information (evidence and support), about the main subject, which would answer the question, “How does internet socializing benefit teenagers?” The use of egos and logos was thorough and well used in this article. For example, in the article, Ms. Ito, a research scientist in the department of informatics at the University of California, Irvine, said that some parental concern about the dangers of Internet socializing might result from a misperception (Lewin 677). This is a good example of logos, and how the author integrates the information of credible sources. The author also integrates the studies of the MacArthur Foundation, which is part of a $50 million project on digital and media learning (Lewin 677). This leads to show that Tamar Lewin put logical and legitimate sources in his article. Tamar Lewin himself seems credible in......

Words: 1011 - Pages: 5

Free Essay

Implementation and Analysis of a Wide Area Network

...IMPLEMENTATION AND ANALYSIS OF A WIDE AREA NETWOK (A FEASIBILITY REPORT) BY ISAIAH ADEBAYO STUDENT’S NAME WITH 3121658 STUDENT’S NUMBER COMPUTER SYSTEMS AND NETWORKING ENGINEERING (CSN)-FULL TIME SUBMITTED TO: DR VINCENT SIYAU (SUPERVISOR) TABLE OF CONTENTS CHAPTER ONE 1.0 AIM.............................................................................................................................Page 3 1.1 OBJECTIVES.............................................................................................................Page 3 1.2 INTRODUCTION......................................................................................................Page 4 1.3 EQUIPMENTS USED............................................................................................... Page 4 CHAPTER TWO 2.0 METHODS AND PROCEDURES............................................................................Page 5 2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5 2.2 MAIN OFFICE NETWORK......................................................................................Page 7 2.3 SUBNET OFFICE NETWORK.................................................................................Page 7 2.4 BUSY NETWORK SCENARIO...............................................................................Page 7 CHAPTHER THREE 3.0 PROPOSED NETWORK SCENARIO....................................................

Words: 1948 - Pages: 8

Free Essay

Tele Communication Network

... | |Client relationship | | | |Self-managed team member and leader | |Ability to work under tight deadlines and pressure | |Good written and verbal communication skills | |Decision making ability | | | | | |Computer and IT Skills ...

Words: 448 - Pages: 2

Premium Essay

Analysis of Reliance Communications

...should be done in order to receive higher and continuous gains. Equity valuation begins with analysis of the sector where a person wants to invest. If the sector looks positive than evaluation of all the companies in that sector should be done in order to decide upon the investment. The objective of this report is to analyse the credibility of an investment into Reliance Communications Limited. In order to achieve this we will focus upon the organisation’s strategic and financial information. A SWOT analysis will evaluate the potential strengths, weaknesses, opportunities and threats facing the business and valuation analysis will tell about the profitability of the company. The methods used for the valuation analysis are: Fundamental Analysis and Technical Analysis. FUNDAMENTAL ANALYSIS: Fundamental analysis is a technique that attempts to determine a securities value by focusing on underlying factors that affect a company’s actual business and its future prospects. Fundamental analysts attempt to study everything that can affect the security's value, including macroeconomic factors (like the overall economy andindustry conditions) and company-specific factors (like financial condition andmanagement).Fundamental analysis of a business involves analyzing its financial statements and health, its management and competitive advantages, and its competitors and markets. Fundamental analysis is performed on historical and present data, but with the goal of making financial......

Words: 4676 - Pages: 19

Premium Essay

Analysis of Social Network

...Analysis of Online Social Network American Sentinel University RN – BSN COM412 11-04-2011 Abstract In my previous papers, I have analyzed my self-concept and I found out that, I am an ISFJ personality. And by doing communication skills test based on www.queendom.com my interpersonal communication skills were graded as excellent, which I feel it is true based on my self-analysis. The aim of this paper is to make a link between Self-concept and communication skills and, to do an online search in Google or other popular engines like Facebook and twitter to find out” who I am, and how others are seeing me”. In order to do that, I considered myself as a stranger and an Employer. Key words: Self-Concept, Communication Skills, Facebook, “Who I am and how others are seeing me”, Stranger, Employer. In this paper, in order to make a link between “Who I am and how others are seeing me”, I did an online search in Google and other popular engines like Facebook and twitter. I wasn’t able to find my name in Google, because of the privacy settings in my Facebook profile. So, I logged into my Facebook account and I considered myself as a stranger and analyzed my profile. The results of self –analysis are as follows. Being a Stranger my assumptions are: 1. Privacy: My account settings are not open to public, by choosing the privacy settings my phone number, Email address, home address, date of birth; my friends and family list are kept private. 2. Profile......

Words: 705 - Pages: 3

Premium Essay

Network and Communication

...Network and communication Network: A computer network is a collection of computers and hardware components interconnected by communication channels that allow sharing of resources and information Types of Network: Local Area Network(LAN) Metropolitan Area Network(MAN) Wide Area Network(WAN) LAN: When computers located within a small geographical area such as office or a University Campus are connected together we call it a Local Area Network. MAN: The geographical range of MAN is bigger than LAN. It covers a small city. WAN: Wide area network span broad geographical distances, ranging from several miles to across entire continents. WAN may consist of a combination of switched and dedicated Lines, microwaves, and satellite communication. Types of LAN Client-server: A client server LAN consists of the requesting microcomputers, called clients, and the supplying devices that provides the services, called servers. The server is a powerful computer that manages shared devices and software. Example file server, database server. Peer-to-peer: In a peer-to-peer LAN all microcomputers on the network communicate directly with one another without the help of a server. This is less expensive than a client-server LAN and works effectively with up to 25 computers and thus appropriate for small groups. Components of a LAN • LANs are made up of the following components: • Connection or cabling system • Microcomputers with interface......

Words: 3635 - Pages: 15

Free Essay

Network Analysis Tool

...Recommendation for Network Analysis Tool Due to the increased budget of Digifirm I was asked to research and review some network traffic analysis tools and sniffers that could use in future investigations. There are several pieces of software available to fit out needs. I looked at many sniffers and network analysis tolls. Some of the programs I have researched are TCDump, Windump, Wireshark, HTTPSniffer, Nmap and Snort. A common tool used to intercept and log traffic over a digital network is TCpdump for UNIX platforms and Windump for windows computers. They both extract network packets and perform a statistical analysis on the dumped information. They can be used to measure response time and the percentage of packets lost, and TCP/UDP connection start up and end. TCPdump and Windump are not very user friendly sniffers. Wireshark is a packet sniffer that is used a lot. I even have it on my home computer. It is free download and is available for many operating systems. It is simple to use and the user will select an interface, or network card and then start the process. You can see the address where the packets are coming from or where they are going to. You can also protocol, timing and other important information. You can also stop the packet capture process and view individual packets. When you click on any given packet it displays the details of that particular packet. The information is color coded and sometimes you can even see the data in packet. ......

Words: 639 - Pages: 3

Premium Essay

Network Requirements Analysis

...Designing a new network from the ground up requires the input from many stakeholders of the project. Failure to follow a standard requirements analysis model often leads to network architectures and design that are outside of the scope of the project. For example, the resulting network may not be what the users expected, it may not support applications envisioned, and the technology the design is based on may not support certain devices. Failure to communicate during the requirements analysis process can end up with a network designer doing whatever he/she/ or they feel comfortable with. What the resulting product may become is a network based on proprietary technology of a single vendor, making the network difficult to expand or upgrade in the future. In this paper, the requirements analysis sections will be thoroughly discussed as they apply to the network design process, and how following each one to its completion improves the entire process. In addition, the specific tools for determining performance requirements and the importance of stakeholder input will also be addressed. It is often the case that strict timelines and budgetary concerns result in shortcuts to the requirements analysis process, shortcuts that can become expensive headaches down the road. The process of analyzing requirements is composed of five sections that include gathering and listing requirements, developing service matrices, characterizing behavior, developing requirements, and mapping these......

Words: 1017 - Pages: 5

Premium Essay

Communication Analysis

...Communication Analysis Sarah Bishop Rosa Santos Ruby Stanley Lynn Vong The nurse demonstrates her unprofessional behavior and poor communication skills during the first patient interaction scenario when she speaks to the pregnant women. She asks about the patients insurance even before being concerned about if the possibility of active labor. She informs the patient that she needs the patient’s husband’s number so she can call him about her being in the hospital. The nurse should have asked if there was anyone the patient wanted contacted, and she should only ask that after the patient has been sent back to the examination room. The nurse also makes a snap judgment about the laboring women when she finds out that she isn’t married. The nurse decides that the status of the child is such that the religious hospital won’t see her. The federal government enacted several laws that the nurse in this video has ignored. The First law is the Emergency Medical Treatment and Labor Act that says that a Medicare-accepting hospital has to take patients in emergency situation, including active labor, regardless of their ability to pay. They have to stabilize these patients before they can be discharged or transferred. By asking about her insurance while the women was in active labor she broke this law. She also was going to violate the HIPPA law by contacting......

Words: 807 - Pages: 4

Free Essay

Networks / Data Communications

...Version attached for better viewing and printing) Networks / Data Communications NTC 360 Lecture Week Three INTRODUCTION Now that we have covered most of the media types available for our networks Protocols that run over the top of the media and the standards they follow, the final topic here is choosing a design of a network by choosing media types and infrastructure that will best suit the needs of the business. INFRASTRUCTURE When to use hubs verses routers and switches is not always a clear-cut decision. In many cases the decision is made due to cost not necessarily best choice. For most office environments a hierarchical design with 10/100/1000 Mbps Ethernet hub/repeaters are adequate. However, there are times when high-speed transfer is worth the cost of installing switches. A good example may be in the motion picture industry where large full motion video clips are developed and edited on computer screens. Due to the size of these kinds of files and the critical nature of time in the industry full duplex switching in the LAN environment may be called for along with Gigabit Ethernet or higher = ). There is an old saying out there that was “route when you can, bridge if you must” This saying still holds true through time. However, switching has for the most part replaced most bridges today. Routing is the best means of isolating and reducing network traffic, which in the end equates to better network performance, however the speeds of the......

Words: 3575 - Pages: 15

Premium Essay

Kudler Fine Foods Network Analysis

...In order to determine the requirements for the new Kudler Fine Foods network design, it is important to understand the importance of communication protocols and define the protocols that would be most effective for the Kudler Fine Foods network. Understanding the usefulness of a traffic analysis and the effect of latency response time and jitter are also necessary. Other aspects of developing an effective network design are understanding the effect of data rate on each part of the network and developing strategies to ensure the availability of network access in switched and routed networks. Communication protocols are the pre-defined set of rules which enable the networked devices to communicate effectively with each other. These protocols determine how messages are sent and received, detect and recover transmission errors and determine how messages are formatted. These protocols are important because they define the guidelines which determine how computers communicate with each other in a standardized manner. The protocol identified for Kudler Fine Foods is the Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol Suite. There are many advantages to using this protocol. It is compatible with all operating systems, hardware, software and network configurations. This protocol is routable and highly scalable which enables expansion of the network as needed. It also provides very reliable data delivery. The Suite includes protocols such as Hypertext......

Words: 995 - Pages: 4

Premium Essay

Network and Communication

...UNIVERSITY SUBJECT: NETWORK AND COMMUNICATION Presentation Topic: Subnet Masking MBA IN E-GOVERNANCE - Programme III Prepared and Narrated by : KDU/MEG/03/11 – Theshantha Mukirigala Submission Date : 26 November 2015 Subnet Mask • An IP address has 2 parts: – The Network identification. – The Host identification. • Frequently, the Network & Host portions of the address need to be separately extracted. • In most cases, if you know the address class, it’s easy to separate the 2 portions. Subnet Mask (Cont.) • With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks. • Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Subnet Mask (Cont.) • The subnet masking process was developed to identify & extract the Network part of the address. • A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network. • If it is not, the process of routing it to an outside network begins. Subnet Mask (Cont.) • The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network. • It is applied to a message’s destination address to extract the network......

Words: 770 - Pages: 4

Premium Essay

Security Issues and Procedures in Communication Networks

...PROCEDURES OF COMMUNICATION NETWORKS Student’s Name Institutional Affiliation Currently prompt evolution in computer communications linked to terminal-based, multi-operator systems, and in computer networks. Almost all these arrangements interconnect process, keep important data that is consider reserved or patented by their possessors and managers, or that should be protected from illegal access as a requisite of the law. Additionally, telecommunication systems, connected terminals, communication processors, and computers should be safeguarded from invaders who may strive to modify programs or files in the system, or to interrupt the facilities offered. The above threats are existent, as it is not challenging to interrupt communications in telecommunication systems, and the probability of connecting illegitimate terminals or computers into the scheme with the aim of “managing" the usual terminal-computer network, or making the system inaccessible to others. The security of such systems against the several dangers encompasses identification, and verification of the individuality, organized right to use to computers and their databases, and shelter of the information being carried in the telecommunication system. Related to every threat is various conceptual, along with technical challenges and a diversity of solutions. Local area network (LAN) refers to an assembly of PCs and other devices spread over a reasonably limited area and linked by a communications connection......

Words: 3002 - Pages: 13

Premium Essay

Avaya Unified Communications: a Call Center Communication Network

...Running head: AVAYA UNIFIED COMMUNICATIONS Avaya Unified Communications: A Call Center Communication Network Effective Communication in a call center is vital for success. Yet today there are too many communication devices which seem to be adversely challenging and confusing to today’s employees. The need for electronic business and communication technologies are growing as call centers grow to keep up with competition, develop e-business, and to go global. Office phones, cell phones, lap tops, smart phones, text messing, instant messaging, voice mail, and email are some of the ways to communicate and to stay constantly connected. However, if all of these devices are not directly connected there could be a delay in response. Avaya Unified Communications simplifies interaction with employees and customers resulting in a decrease in the delay time and creating a Unified Business. A Unified Businesses is a business that has mastered today’s diverse communications technology. Improving business operations and processes with Avaya Unified Communications is beneficial to our business and increases productivity by improving the customer service experience. Avaya, Inc. has been privately own company since 2007. Kevin Kennedy, the President and CEO, Avaya Inc. stated that our purpose is “To keep business communications, and society, constantly moving forward, to be the Futuremakers of communications” (Avaya, 2009). Avaya Uniform Communication All Inclusive......

Words: 1016 - Pages: 5

Contigo No Bicho BLuRayRip | Watch movie | Protection Ecran Pour Iphone 7 6 5 4 Verre Trempe Protège Glass Screen Protector