Enterprise Social Networks As Digital Infrastructures - Understanding the Utilitarian Value of Social Media at the Workplace

Total Page:16

File Type:pdf, Size:1020Kb

Enterprise Social Networks As Digital Infrastructures - Understanding the Utilitarian Value of Social Media at the Workplace Information Systems Management ISSN: 1058-0530 (Print) 1934-8703 (Online) Journal homepage: https://www.tandfonline.com/loi/uism20 Enterprise Social Networks as Digital Infrastructures - Understanding the Utilitarian Value of Social Media at the Workplace Christian Meske, Konstantin Wilms & Stefan Stieglitz To cite this article: Christian Meske, Konstantin Wilms & Stefan Stieglitz (2019): Enterprise Social Networks as Digital Infrastructures - Understanding the Utilitarian Value of Social Media at the Workplace, Information Systems Management To link to this article: https://doi.org/10.1080/10580530.2019.1652448 © 2019 The Author(s). Published with license by Taylor & Francis Group, LLC. Published online: 26 Aug 2019. Submit your article to this journal View related articles View Crossmark data Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=uism20 INFORMATION SYSTEMS MANAGEMENT https://doi.org/10.1080/10580530.2019.1652448 Enterprise Social Networks as Digital Infrastructures - Understanding the Utilitarian Value of Social Media at the Workplace Christian Meske a, Konstantin Wilmsb, and Stefan Stieglitzb aDepartment of Information Systems, Freie Universität Berlin and Einstein Center Digital Future, Berlin, Germany; bDepartment of Computer Science and Applied Cognitive Science, University of Duisburg-Essen, Duisburg, Germany ABSTRACT KEYWORDS In this study, we first show that while both the perceived usefulness and perceived enjoyment of Enterprise social networks; enterprise social networks impact employees’ intentions for continuous participation, the utilitarian digital infrastructure; value significantly outpaces its hedonic value. Second, we prove that the network’s utilitarian value usefulness; enjoyment; is constituted by its digital infrastructure characteristics: versatility, adaptability, interconnectedness adoption; use continuance; small- and medium-sized and invisibility-in-use. The study is set within a software engineering company and bases on enterprises (SME); PLS-SEM quantitative survey research, applying partial least squares structural equation modeling. Introduction of utilitarian and hedonic motivations to use an ESN, which can be used for work purposes but also imports In conjunction with the popularity of public social media basic principles from public social media and therefore like Facebook or Twitter (Larosiliere, Carter, & Meske, may be seen as a mean to socialize and increase enjoy- 2017), the implementation of social media within organi- ment. Our first goal is to close this research gap by zational contexts has significantly increased over the last comparing the impact of perceived usefulness and per- years and became an important focus of the information ceived enjoyment on employees’ ESN use continuance systems research community (Engler & Alpar, 2017;Soto- intentions. Acosta, Cegarra-Navarro, & Garcia-Perez, 2017). Our second goal is to identify factors, that influence the Enterprise social networks (ESNs) such as Confluence, employees’ perception of the ESN’s usefulness, as this IBM Connections, Jive, Slack, Sharepoint or Yammer aspect has two major implications for information systems have hence started to play an increasingly influential managers. If they do not know why the ESN is useful, it is role at organizational workspaces. However, since parti- difficult to justify a corresponding project to the top man- cipating in the provided ESN is usually not mandated, agement (Pérez-González, Trigueros-Preciado, & Popa, organizations often face the challenge of voluntary ESN 2017; Wehner, Ritter, & Leist, 2017), what may impede adoption and continued use (Choudrie & Zamani, 2016; introducing the ESN in the first place. In addition, man- Engler & Alpar, 2017), why there is a high risk that ESN agers face the challenge to communicate the work-related projects fail and lead to significant sunk costs. From added value of the ESN to the potential participants. literature on public social media we know, that hedonic Shortcomings may lead to impeded ESN integration, or motivations like enjoyment are recurrently mentioned as limited acceptance and usage (Iglesias-Pradas, Hernández- important factors for users to adopt or continually use García, & Fernández-Cardador, 2017; Riemer, Stieglitz, & social networks (e.g. Chen & Sharma, 2013;Hu,Poston,& Meske, 2015). While ESNs have often been described as Kettinger, 2011; Song, Wang, Zhang, & Qiao, 2017). At communication or collaboration infrastructures in work the same time, literature on information systems at the contexts (Kwahk & Park, 2016), an empirical investigation work place has shown, that usefulness is one of the most of infrastructure characteristics as antecedents of their use- important predictors for use behavior (e.g. Davis, Bagozzi, fulness is still missing. To fill this gap, we conceptualize &Warshaw,1989; Lu, Yao, & Yu, 2005; Venkatesh & ESNs as digital infrastructures and argue that certain infra- Davis, 2000; Venkatesh, Thong, & Xu, 2016). This rela- structure characteristics, which can also be found for phy- tionship has also been proven in the context of ESN (e.g. sical infrastructures such as railways or roads, make ESNs Engler & Alpar, 2017). However, to the best of our knowl- useful for participants. This perspective helps in edge, no comparison has yet been made between the role CONTACT Christian Meske [email protected] Department of Information Systems, Freie Universität Berlin and Einstein Center Digital Future, Garystr. 21, Berlin 14195, Germany © 2019 The Author(s). Published with license by Taylor & Francis Group, LLC. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License (http://creativecommons.org/licenses/by-nc- nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way. 2 C. MESKE ET AL. understanding that ESNs can be perceived as useful by discussed on a theoretical level but has not been tested employees, even though they are not designed to directly empirically until now. Besides adding first empirical support certain business processes or specific tasks. In the work in this context, our shift in perspective also current information systems literature, the term ‘infrastruc- impacts our general understanding of communication ture’ has been used to describe a multitude or diversity of and collaboration technologies, such as ESNs, as rather hardware devices, software applications, or all-embracing being open work-infrastructures than task-oriented application layers (Pipek & Wulf, 2009). According to artefacts. This in turn influences research on the design, Pipek and Wulf (2009) and based on the work of Star and adoption and management of corresponding infrastruc- Bowker (2002),informationsystemscanbereconceptua- tures, for which we however need a proper understand- lized as digital work infrastructures, and can be described ing of their core characteristics. This has also significant by certain key characteristics: interconnectedness, adapt- impacts on practitioners, since the shift of perspective ability, reflexivity, versatility and invisibility-in-use. In this on ESNs as digital infrastructures and better under- study,weexaminehowtheperceptionoftheseinfrastruc- standing of their perception by employees may influ- ture characteristics influences employees’ perceived useful- ence corresponding investment, selection, management ness as an antecedent of ESN use continuance. and evaluation processes within organizations. Third, Understanding the nature of ESNs is crucial, since they we introduce new constructs to capture infrastructure influence performance, particularly of knowledge-centric characteristics, which can also be applied for adoption organizations (Cleveland & Ellis, 2014; Fischbach, Gloor, and post-adoption studies of other information sys- &Schoder,2009; Leon, Rodríguez-Rodríguez, Gómez- tems, inside and outside of organizations. Gasquet, & Mula, 2017;Wu&Chang,2013). The remainder of the paper is structured as follows: In sum, we therefore pursue to answer the following in the next section, we provide an overview of related two research questions: work on ESNs in organizations, and describe both the utilitarian and hedonic aspects of ESN usage. We also (1) To which extent do both factors, usefulness and introduce the perspective of ESNs as digital infrastruc- enjoyment, influence the use continuance of tures. In the following section, the overall research enterprise social networks in organizations? model and hypotheses are developed. Afterwards, the (2) How do the infrastructure characteristics of enter- research design is described in detail, including context prise social networks influence employees’ percep- information and measurement instruments. Then, we tion of the networks’ usefulness and hence describe the results, including the descriptive statistics, utilitarian value? measurement analysis and hypotheses testing. Subsequently, the findings are discussed and implica- To answer these two questions, in our study, we con- tions for research and practice are derived. This paper duct a quantitative survey in an international, medium- ends with a conclusion and outlook in terms of further sized company that offers software engineering and research. cloud services, and which is one of the leading
Recommended publications
  • Regional Use of Social Networking Tools
    Regional Use of Social Networking Tools Kate Meeuf December 2014 TECHNICAL REPORT CMU/SEI-2014-TR-018 CERT® Division http://www.sei.cmu.edu Copyright 2014 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center sponsored by the United States Department of Defense. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of Department of Homeland Security or the United States Department of Defense. This report was prepared for the SEI Administrative Agent AFLCMC/PZM 20 Schilling Circle, Bldg 1305, 3rd floor Hanscom AFB, MA 01731-2125 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted be- low. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works.
    [Show full text]
  • Archetypes of Enterprise Social Network Users
    Proceedings of the 51st Hawaii International Conference on System Sciences j 2018 Archetypes of Enterprise Social Network Users Christian Oettl, Thomas Berger, Markus Böhm, Manuel Wiesche, Helmut Krcmar Technical University of Munich {c.oettl, thomas.berger}@tum.de, {markus.boehm, manuel.wiesche, krcmar}@in.tum.de Abstract organizations will promote the introduction and development of ESNs in the future [8]. Investments in enterprise social networks (ESNs) have However, even if ESNs are implemented in increased rapidly in recent years. However, an ESN organizations, their value contribution appears unclear utilization intensity develops slowly, and there are a because 80% of projects do not fulfill expectations few well-grounded approaches to understand ESN [16]. The typical ROI of any social technology usage. To elaborate on different archetypes of ESN becomes positive when 15% to 25% of employees use users, we conducted a case study that comprised 28 such technology extensively and companies should not interviews with a large IT services company. We assume that “If we build it, they will come” [3]. present a model to characterize ESN users and classify This was also observed in the company that was them as archetypes based on the following two considered in this study. In 2014, a large multinational dimensions: individual openness to ESNs and IT service provider started a radical metamorphosis perceived task-fit. We determine six archetypes of ESN from an email centered to an ESN centered users, namely, power users, limited users, reluctant organization. The implemented solution provides users, repudiators, hidden champions, and question typical key functionalities that characterize an ESN as marks.
    [Show full text]
  • THE SIGNIFICANCE of SOCIAL SOFTWARE Danah Boyd UC
    THE SIGNIFICANCE OF SOCIAL SOFTWARE danah boyd UC Berkeley School of Information, Berkeley, CA, USA [email protected] http://www.zephoria.org/ Social software… It’s a term that is thrown around frequently, rarely defined, completely elusive, and yet totally significant. What on earth does it mean? And should you care? (IMHO) Of course you should care! Social software is all around us now. It is altering the organization of social life. How do you communicate with loved ones? How do you find information? A lot of this hinges on social software. In this opening essay, I want to address the significance of „social software.” I will look at this from a few different angles, building on the attitudes and practices of creators, users, and researchers of social software. My goal is to lay out some possible approaches for thinking about the types of technologies and behaviors that emerge. What I’m offering is not some truth serum (nor even a proper analysis) – it can and should be contested, questioned, and wrestled with. Let’s begin. Social Software First… what constitutes „social software“? Where does this term come from? In 2002, Clay Shirky (re)claimed the term „social software“ to encompass „all uses of software that supported interacting groups, even if the interaction was offline.“1 His choice was intentional. Although other terms existed – groupware, social computing, computer-mediated communication, etc. – he felt that these older terms In: Burg, Thomas N. / Jan Schmidt (Eds.) BlogTalks Reloaded. Social Software - Research & Cases. Norderstedt: Books on Demand. BlogTalk Reloaded were either polluted or a bad fit to address certain new technologies.
    [Show full text]
  • Protection, Not Barriers: Using Social Software Policies to Guide and Safeguard Students and Employees
    Georgia State University ScholarWorks @ Georgia State University University Library Faculty Publications Georgia State University Library Fall 2010 Protection, Not Barriers: Using Social Software Policies to Guide and Safeguard Students and Employees Brian K. Kooy Georgia State University, [email protected] Sarah King Steiner Georgia State University, [email protected] Follow this and additional works at: https://scholarworks.gsu.edu/univ_lib_facpub Part of the Library and Information Science Commons Recommended Citation Kooy, B. & Steiner, K. (2010). Protection, not barriers: Using social software policies to guide and safeguard students and employees. Reference & User Services Quarterly, 50(1), 59-71. doi: 10.5860/ rusq.50n1 This Article is brought to you for free and open access by the Georgia State University Library at ScholarWorks @ Georgia State University. It has been accepted for inclusion in University Library Faculty Publications by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. FeAture Protection, not Barriers Using Social Software Policies to Guide and Safeguard Students and Employees Academic librarians have been using social outreach to include online spaces as Brian k. kooy and software and networking sites for public well. One area in which librarians are Sarah k. Steiner services since they appeared on the Inter- providing online outreach is through net. While issues of privacy, identity man- the use of social software and social Brian K. Kooy is Philosophy, Religious agement, and self-disclosure when using networking websites such as Facebook Studies, and Middle East Studies such technologies have been written about, and MySpace. Even most library blogs Librarian and Sarah K.
    [Show full text]
  • The (R)Evolution of Social Media in Software Engineering
    The (R)Evolution of Social Media in Software Engineering Margaret-Anne Storey Leif Singer Brendan Cleary University of Victoria University of Victoria University of Victoria Victoria, BC, Canada Victoria, BC, Canada Victoria, BC, Canada [email protected] [email protected] [email protected] Fernando Figueira Filho Alexey Zagalsky Universidade Federal do Rio University of Victoria Grande do Norte, Natal, Brazil Victoria, BC, Canada [email protected] [email protected] ABSTRACT 1. INTRODUCTION Software developers rely on media to communicate, learn, A few years after the term \software engineering" was collaborate, and coordinate with others. Recently, social coined at a 1968 NATO conference [49], Weinberg media has dramatically changed the landscape of software published his acclaimed book on the \Psychology of engineering, challenging some old assumptions about how Computer Programming." [78] Weinberg emphasizes that developers learn and work with one another. We see the although programming is an activity that can be rise of the social programmer who actively participates in performed alone, it relies on extensive social activities as online communities and openly contributes to the creation developers will often have to ask others for help. of a large body of crowdsourced socio-technical content. The need to collaborate and interact with others has In this paper, we examine the past, present, and future only increased over time. Even solitary developers need to roles of social media in software engineering. We provide a interact directly or indirectly with others to learn, to review of research that examines the use of different media understand requirements and to seek feedback on their channels in software engineering from 1968 to the present creations.
    [Show full text]
  • Social Software
    social software Everyone’s an Author: Wikis and Blogs Wikis and blogs are two kinds of social software that are centered on authorship. Wikis allow some groups of people (ranging from a limited set of members to anyone with access to the web) to edit the web pages that make up a website. They also provide ways to discuss the pages as a separate process from altering them, and ways to compare different versions of the page over time. Wikis are especially useful for collaborative writing and knowledge sharing, with Wikipedia (www.wikipedia. org) being one of the best known examples. For local examples of wikis, check out http://wiki.williams.edu (an official college wiki) and http://wso.williams.edu/wiki/ index.php/Main_Page (a student run wiki about all things Williams). A number of Blackboard courses also use wikis as a framework for student collaboration. With wikis, the content organization is arbitrary (but usually topical and hierarchical) and it’s owned by the entire community; every member of the community has as much right to alter the content as any other member (though practically speaking there’s usually a core group of the most active members which act as moderators). Blogs are a way for one or more authors to publish things organized primarily by time, and for the readers and author to discuss what’s posted. People read and write blogs for a variety of reasons, ranging from keeping in touch with far flung friends, to learning and talking about particular subjects, to keeping up on the cutting edge of news.
    [Show full text]
  • Social Software: E-Learning Beyond Learning Management Systems
    Social software: E-learning beyond learning management systems Christian Dalsgaard [[email protected]] Institute of Information and Media Studies University of Aarhus Helsingforsgade 14, 8200 Aarhus N, Denmark [http://www.imv.au.dk] Introduction Whether focusing on distance education or campus based education, universities all over the world are using learning management systems (LMS) to support and improve learning within their institution. Yet the OECD (2005) report "E-learning in Tertiary Education: Where do we stand?" indicates that universities primarily use LMS for administrative purposes, and that LMS so far have had a limited impact on pedagogy: "ICT has penetrated tertiary education, but has had more impact on administrative services (e.g. admissions, registration, fee payment, purchasing) than on the pedagogic fundamentals of the classroom." (OECD, 2005, p. 15) This article will discuss the use of centralized and integrated LMS and argue that they, within a framework of a social constructivist pedagogy, should play only a minor role within organization of e-learning. It is argued that social software tools can support a social constructivist approach to e- learning by providing students with personal tools and engaging them in social networks. Using social software in this way requires that organization of e-learning moves beyond centralized and integrated LMS and towards a variety of separate tools which are used and managed by the students in relation to their self-governed work. It is argued that social software tools enable a different way of using the web within an educational context. The article discusses how social software can be used to support a social constructivist approach to e-learning, or more specifically, how social software can support self-governed, problem-based and collaborative activities.
    [Show full text]
  • Privacy by Design: Does It Matter for Social Networks?
    Privacy by Design: Does it matter for Social Networks? Mohammad Badiul Islam 1, 2 , Renato Iannella 1, 3 1 Computer Science Discipline, Faculty of Science and Technology, Queensland University of Technology 2 NICTA (National ICT Australia), Queensland Research Lab, Brisbane, Australia. 3 Semantic Identity, Brisbane, Australia. [email protected] , [email protected] Abstract: Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy inva- sive” areas such as social networks. However, Social Network users seldom know how to protect their own privacy through online mechanisms. What is re- quired is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting users’ personal information. The research has also posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online in- formation systems. Keywords: Privacy by Design, Social Networks, Privacy, Access Control, Mo- bile Social Networks, Distributed Social Networks, Open Source Social Net- works, Diaspora, Clique.
    [Show full text]
  • An Empirical Study of the Driving Forces Behind Online Communities Sergio L
    The current issue and full text archive of this journal is available at www.emeraldinsight.com/1066-2243.htm INTR 19,4 An empirical study of the driving forces behind online communities Sergio L. Toral, M. Rocı´o Martı´nez-Torres, Federico Barrero and 378 Francisco Corte´s University of Seville, Seville, Spain Received 11 June 2008 Accepted 17 May 2009 Abstract Purpose – A large variety of online communities have emerged during the last years as a result of the challenges faced by both the business and scientific worlds. This trend has also been promoted by the development of internet and new Web 2.0 technologies. In this context, this paper is focused on the determinants of success of online communities. But, as a difference from other studies, these determinants are analyzed from the social network analysis perspective. Several constructs related to the community organization as a social network are proposed and their interrelations are hypothesized in a general research framework. The obtained results test the proposed model providing the most relevant antecedents of the project success. Design/methodology/approach – A case study based on Linux ports to non-conventional processor and environments is used to test the proposed model. Structural equation modeling analysis is used to validate the structural proposed model. Findings – The main antecedents of online communities’ success, quantifying the strength of the relation through the standardized path coefficients. Research limitations/implications – The research is limited to a particular set of online communities engaged with the development of the non-conventional Linux ports. However, they constitute a representative set of communities in the field of the open source projects (OSS) development, which are typically developed using a community of support.
    [Show full text]
  • Contextual Social Networking
    Technische Universit¨atM¨unchen Fakult¨atf¨urInformatik Contextual Social Networking Dipl.-Phys., Dipl.-Inform. Dr.rer.nat. Georg Groh Habilitationsschrift Mitglieder des Habilitationskomittees: Prof. Dr. Johann Schlichter Prof. Dr. Bettina Berendt Prof. Dr. Helmut Seidl Kurz-Zusammenfassung Der zentrale Gegenstand der vorliegenden Arbeit ist die vielschichtige Frage, wie Kontexte detektiert und abgeleitet werden k¨onnen,die dazu dienen k¨onnen,neuar- tige kontextbewusste Social Networking Dienste zu schaffen und bestehende Di- enste in ihrem Nutzwert zu verbessern. Die (noch nicht abgeschlossene) erfolgre- iche Umsetzung dieses Programmes f¨uhrtauf ein Konzept, das man als Contextual Social Networking bezeichnen kann. In einem grundlegenden ersten Teil werden die eng zusammenh¨angendenGebiete Contextual Social Networking, Mobile Social Networking und Decentralized Social Networking mit verschiedenen Methoden und unter Fokussierung auf verschiedene Detail-Aspekte n¨aherbeleuchtet und in Zusam- menhang gesetzt. Ein zweiter Teil behandelt die Frage, wie soziale Kurzzeit- und Langzeit-Kontexte als f¨urdas Social Networking besonders interessante Formen von Kontext gemessen und abgeleitet werden k¨onnen. Ein Fokus liegt hierbei auf NLP Methoden zur Charakterisierung sozialer Beziehungen als einer typischen Form von sozialem Langzeit-Kontext. Ein weiterer Schwerpunkt liegt auf Methoden aus dem Mobile Social Signal Processing zur Ableitung sinnvoller sozialer Kurzzeit-Kontexte auf der Basis von Interaktionsgeometrien und Audio-Daten. Es wird ferner unter- sucht, wie pers¨onliche soziale Agenten Kontext-Elemente verschiedener Abstraktion- sgrade miteinander kombinieren k¨onnen.Der dritte Teil behandelt neuartige und verbesserte Konzepte f¨urkontextbewusste Social Networking Dienste. Es werden spezielle Formen von Awareness Diensten, neue Formen von sozialem Information Retrieval, Konzepte f¨urkontextbewusstes Privacy Management und Dienste und Plattformen zur Unterst¨utzungvon Open Innovation und Kreativit¨atuntersucht und vorgestellt.
    [Show full text]
  • A Discussion on Social Software: Concept, Building Blocks and Challenges
    International Journal for Infonomics (IJI), Volume 3, Issue 4, December 2010 A Discussion on Social Software: Concept, Building Blocks and Challenges Roberto Pereira M. Cecilia C. Baranauskas Sergio R. P. da Silva Institute of Computing Institute of Computing Department of Informatics University of Campinas University of Campinas State University of Maringá Abstract interaction are extended to issues related to human- computer-human interaction in social situations. The possibility of developing more interactive and Despite the popularity and the growing in the innovative applications led to an explosion in the number of users of the social software, just a small amount of systems available on the web in which fraction of systems is really successful. To Webb [2], users interact with each other and have a primary the main particularity of social software is in the role as producers of content — the so-called social design process, because human factors and group software. However, despite their popularity, few of dynamics introduce design difficulties that are not these systems keep an effective participation of users, obvious without considering the human psychology promoting a continuous and productive interaction. and nature. Moreover, as Silva and Pereira [3] argue, This paper examines the concept of social software due to the recent emergence and popularization of and analyzes the social software honeycomb, a social software it is still necessary to understand the framework to help in understanding this kind of impacts that this new range of applications cause, system. Based on the analysis of an inclusive social both in social and technological aspects. Likewise, it network and on literature review, we revisit that is necessary to study the new challenges raised by framework.
    [Show full text]
  • Alwaysocial: Social Networking in the Real World
    AlwaySocial: Social Networking in the Real World Nir J. Peer Department of Computer Science A.V. Williams Building University of Maryland College Park, MD 20742, USA [email protected] ABSTRACT tion, they act as an enhanced directory service that allows Social networking is nowadays a popular way for people to users to keep a communication path with friends and ac- socialize and network professionally. Currently, social net- quaintances even when they relocate or change their contact working websites provide a mostly online experience whether information. Furthermore, by exposing one’s friends, users they are accessed from a computer or a mobile phone. This are able to reconnect with old contacts who they have lost leads to a chasm between online social activities and those touch with. In other words, social networks allow users to done in the actual world. As there is no direct way to turn maintain existing- and reconstitute lost- social connections. an online acquaintance to a real friend, users are required to They also allow to meet or get introduced to new people de- constantly synchronize between the two activities. pending on the particular website’s etiquette. Another excit- ing feature of social networks, is that they sometimes allow to Social Proximity Applications (SPA) aim to introduce tech- discover cliques and mutual connections that were not appar- nology into real world networking in order to facilitate it. ent. This is closely related to the Small World or six degrees However, they often use proprietary and restricted profile of separation hypothesis. systems and therefore do not bridge the online/offline gap.
    [Show full text]