<<

This article was downloaded by: [128.240.225.73] On: 10 January 2017, At: 01:57 Publisher: Institute for Operations Research and the Management Sciences (INFORMS) INFORMS is located in Maryland, USA

Information Systems Research

Publication details, including instructions for authors and subscription : http://pubsonline.informs.org Social Media, Sharing, and Innovation: Toward a Theory of Communication Visibility

Paul M. Leonardi

To cite this article: Paul M. Leonardi (2014) Social Media, Knowledge Sharing, and Innovation: Toward a Theory of Communication Visibility. Information Systems Research 25(4):796-816. http://dx.doi.org/10.1287/isre.2014.0536

Full terms and conditions of use: http://pubsonline.informs.org/page/terms-and-conditions

This article may be used only for the purposes of research, teaching, and/or private study. Commercial use or systematic downloading (by robots or other automatic processes) is prohibited without explicit Publisher approval, unless otherwise noted. For more information, contact [email protected]. The Publisher does not warrant or guarantee the article’s accuracy, completeness, merchantability, fitness for a particular purpose, or non-infringement. Descriptions of, or references to, products or publications, or inclusion of an advertisement in this article, neither constitutes nor implies a guarantee, endorsement, or support of claims made of that product, publication, or service. Copyright © 2014, INFORMS

Please scroll down for article—it is on subsequent pages

INFORMS is the largest professional society in the world for professionals in the fields of operations research, management science, and analytics. For more information on INFORMS, its publications, membership, or meetings visit http://www.informs.org Information Systems Research Vol. 25, No. 4, December 2014, pp. 796–816 ISSN 1047-7047 (print) — ISSN 1526-5536 (online) http://dx.doi.org/10.1287/isre.2014.0536 © 2014 INFORMS

Social Media, Knowledge Sharing, and Innovation: Toward a Theory of Communication Visibility

Paul M. Leonardi Technology Management Program, University of California, Santa Barbara, Santa Barbara, California 93106, [email protected]

his paper offers a theory of communication visibility based on a field study of the implementation of a Tnew enterprise social networking site in a large financial services organization. The emerging theory sug- gests that once invisible communication occurring between others in the organization becomes visible for third parties, those third parties could improve their metaknowledge (i.e., knowledge of who knows what and who knows whom). Communication visibility, in this case made possible by the enterprise social networking site, leads to enhanced awareness of who knows what and whom through two interrelated mechanisms: message transparency and network translucence. Seeing the contents of other’s messages helps third-party observers make inferences about coworkers’ knowledge. Tangentially, seeing the structure of coworkers’ communication networks helps third-party observers make inferences about those with whom coworkers regularly communi- cate. The emerging theory further suggests that enhanced metaknowledge can lead to more innovative products and services and less knowledge duplication if employees learn to work in new ways. By learning vicariously rather than through experience, workers can more effectively recombine existing ideas into new ideas and avoid duplicating work. Moreover, they can begin to proactively aggregate information perceived daily rather than engaging in reactive search after confronting a problem. I discuss the important implications of this emerging theory of communication visibility for work in the knowledge economy. Keywords: social networking; innovation; knowledge sharing; metaknowledge; computer-mediated communication and collaboration; ; ethnographic research History: Chris Forman, John Leslie King, Kalle Lyytinen, Senior Editors; Jonny Holmström, Associate Editor. This paper was received July 1, 2013, and was with the author 4 months for 1 revision. Published online in Articles in Advance October 3, 2014.

Introduction less interpersonal trust among coworkers (Cramton Most of the work conducted in today’s knowledge- et al. 2007). In addition, coordination suffers (Dey and intensive organizations is largely invisible. Workers de Guzman 2006), work duplication occurs (Lapré sit at computers typing reports, performing analyses, and Van Wassenhove 2001), and product and pro- writing copy, and performing other tasks that are dif- cess innovation are less likely (Majchrzak et al. 2004). ficult for observers to discern. As scholars have noted, Because of these negative consequences, scholars have work in the postindustrial economy is increasingly searched for technologies that might provide workers disembodied such that there are few physical mani- some visibility into the work of their colleagues. Tech- festations of activity for others to observe (Suchman nologies that make workflows (Kinnaird et al. 2012), 2007). Work is made even more invisible as organiza- activity status (Dourish and Bellotti 1992), and even tions increasingly rationalize it into smaller task units, worker location (Erickson 2010) visible to others pro- spreading them across workers in various groups and vide a means to learn about the work of colleagues departments, perhaps in different geographic loca- and, hopefully, to avoid some of the problems that tions. Even if there were some physical manifesta- occur when work is largely invisible to others. tion of work, there would be few relevant cowork- The past few decades have seen an increase in the Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. ers around to see it done. Consequently, Nardi and use of technology to make communication visible as Engeström (1999, p. 2) suggest that in a knowledge a work activity. Workplace communication by tele- economy “work is, in a sense, always invisible to phone or face-to-face encounters is largely invisible everyone but its own practitioners.” to all but the parties involved or those who may Work invisibility can have a number of negative be in proximity. The number of people who might consequences for organizations. Research has shown overhear an interpersonal conversation (even spoken that when people cannot see what others do, or loudly) is small relative to the size of most teams, when, with whom, and how they do it, there is departments, and organizations. More contemporary

796 Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 797

communication (e.g., email and instant messaging) is The findings demonstrate that the increased com- easily shared with others, and thus visible to a wider munication visibility associated with the social net- audience. Collaboration tools, decision support soft- working site enabled users to become more aware of ware, and worker databases have further increased what and whom their coworkers knew. This enhanced communication visibility by loosening the require- awareness allowed staff to avoid work duplication ment to select a target audience through email car- and to develop more innovative ideas for products bon copy features or the instant messaging forward and services. To realize these positive benefits, users feature. Instead, the sender can create a public com- had to enact fundamental changes in the way they munication platform that can be accessed by team worked. I conclude by discussing the implications of members. Still even shared communication platforms this emerging theory of communication visibility for limit visibility because membership in groupware research in information systems, management, and and other collaboration tools are normally limited to communication. specific team members. Shared databases and other repositories are often password protected and stored in a location unknown to most of the organization. Theoretical Background The introduction of social media tools, including Learning About Knowledge Through social networking sites, blogs, wikis, and microblogs, Communication into organizational contexts continues a long trend of Numerous studies conducted over the past two making workplace communication visible. However, decades have shown that successful organizations cre- as Treem and Leonardi (2012) show in their detailed ate the conditions under which employees can effec- review, social media are making routine communica- tively share knowledge with one another (Argote tions between coworkers even more visible to third et al. 2000, Hansen 1999, Tortoriello et al. 2012). parties than the many preceding communication tech- Most research on organizational knowledge sharing nologies. For example, the exchanges between two has focused on when, in the course of their work, people on an enterprise social networking site often appear on the wall or newsfeed of a third party not researchers should look for new knowledge (Katila involved in the communication (Hampton et al. 2011). and Chen 2008, March 1991) and what conditions That people can articulate their social networks and are likely to ease knowledge transfer (Reagans and tag documents and images produced by coworkers McEvily 2003, Szulanski and Jensen 2006). Clearly, within social networking sites gives outsiders further timing and knowledge transfer issues are important. visibility into the communication partners of their However, the decision on when to acquire knowledge peers (Keitzmann et al. 2011). As some commenta- and how it can be applied to completion of tasks and tors suggest, social media are so quickening the pace problem solving would likely be impossible in the by which technologies afford communication visibil- absence of accurate organizational metaknowledge. ity that we are entering an era of “hypervisbility” Organizational metaknowledge refers to knowledge where anyone can easily see with ease what any other about who knows what and who knows whom within person said and to whom (Keen 2012). the organization. Before workers can acquire instru- This paper will explore how the increasing visibil- mental knowledge, they must know where to get it ity of communication might, as several researchers and how to access other workers, files, or databases have suggested (Gibbs et al. 2013, Jarrahi and Sawyer where that knowledge can be found. 2013, Leonardi et al. 2013, Treem and Leonardi 2012), Researchers who study transactive memory sys- shape knowledge sharing in organizations, and the tems have, so far, been among the organizational the- role that these implications for knowledge sharing orists to explicitly consider the concept of metaknowl- might play in modern work. I conduct a qualitative edge. A transactive memory system is a collective study of the implementation of a new social network- system that individuals in close relationships use to ing site into a large financial services organization. encode, store, and retrieve knowledge (Hollingshead This study takes advantage of a comparative analysis 1998a, Ren et al. 2006). A transactive memory sys- in which only one of two matched-sample groups in tem has two components. The first is a transac- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. the same organization was given access to the social tive memory, or as Ren and Argote (2011, p. 192) networking site for six months; the other group was call it, “metaknowledge, which helps individuals to not. Interviews with members of both groups before retrieve information from external sources.” The sec- implementation of the social networking site and six ond component is a set of processes for updating months after its introduction provided a compara- and using that metaknowledge. Wegner (1995) sug- tive basis for identifying the advantages the technol- gested three such processes related to the develop- ogy provided for staff work and the social dynamics ment and application of metaknowledge: directory that emerged as communication became more visible. development (producing accurate metaknowledge); Leonardi: Social Media, Knowledge Sharing, and Innovation 798 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

information allocation (new knowledge communi- communication partners might be a primary way cated to the person whose expertise will facilitate through which accurate metaknowledge was devel- its storage); and retrieval coordination (knowledge oped: “The history of conversation about who has on any topic retrieved based on knowledge of who done what and heard what and been where and stud- knows what in the system). A transactive memory ied what and with whom and under what circum- system allows each group member to share accurate stance could be exceedingly rich, and so allows mem- organizational metaknowledge. They can then route bers to discern with much greater precision just who new knowledge to those who can best store it, and is expert in each of a variety of information domains” who can teach others in times of need (Brandon and (p. 191). Recently, Palazzolo et al. (2006, p. 245) sug- Hollingshead 2004). gested that informal “water cooler communication” Despite the central role that accurate metaknowl- in which workers talked about their tasks and com- edge plays in effective transactive memory systems munication partners could facilitate development of a (without it, coordination among members of the sys- transactive memory. tem would be difficult [Austin 2003, Yuan et al. There are a number of ways in which workers 2007]), most researchers have focused on informa- might learn what and whom others know. The dis- tion allocation processes (e.g., Jackson and Klobas tinction between experiential and vicarious learning 2008, Yuan et al. 2007) and retrieval coordination (e.g., often discussed in the literature on organizational Hollingshead 1998b, Jarvenpaa and Majchrzak 2008) learning demarcates two distinct strategies (Gioia and at the expense of understanding how accurate meta- Manz 1985, Kim and Miner 2007). A person can knowledge is achieved (see Ren and Argote 2011). learn experientially by communicating directly with Instead, scholars have largely inferred the processes a coworker, i.e., by asking questions and listening by which accurate metaknowledge is developed and to answers. Workers can also acquire metaknowl- shared among members of a group. For example, edge vicariously by watching others communicate. Liang et al. (1995) found that group members who Through direct communication a worker can learn what and whom coworkers know even if that was underwent training together had more accurate meta- not the explicit goal of the communication. Sometimes knowledge that was common to the team than did the focal actor is looking for specific, necessary instru- group members who were trained individually. Other mental knowledge from coworkers and, for this rea- studies have shown that groups constructed of mem- son, asks them to recount tasks they have conducted bers who have had the occasion to see each other or the people they know (March 1991). Yet workers directly performing work tasks (Heald et al. 1998) and can also learn through talking with coworkers though of members who had previously worked jointly on they may have no specific or immediate need for the projects (Reagans et al. 2005) tend to have more accu- knowledge they hope to obtain (Newell et al. 2009). rate and more widely shared metaknowledge. The Like experiential learning from active communica- inferences drawn from these studies and others like tion, vicarious learning by watching the communica- them is that seeing each other learning to conduct tion of others can occur when attention is focused tasks and having experience seeing others actually or divided. Some third-party observation of commu- conducting tasks leads to more accurate and more nication occurring among others is focused in the widely shared metaknowledge. sense that the focal actor is looking to find specific, The assumption that workers will develop accu- needed instrumental knowledge from targets and, for rate and shared metaknowledge naturally through this reason, watches to see what people are saying direct observation of work and interaction becomes to others, to whom they are talking, and who they less tenable when one raises the level of analysis mention they have talked with before (Liebeskind from the group to the organization. The departmen- 1996). Workers can also be exposed to communica- talized structure of most organizations reduces the tions between others even when they are not focused chances that people from different units will work on trying to learn anything. In this way, they divide together, even though they may have complemen- their attention among many communication events tary knowledge. Also, the geographic dispersion of and file vicariously learned metaknowledge for future workers in different departments and business units use (Weick 1995). Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. reduces opportunities to see what others do when To the extent that the organizational environ- they work, and with whom. More commonly, work- ment makes it difficult for workers to develop accu- ers learn by talking with others or hearing second- rate metaknowledge by observing what others do hand reports about how tasks were conducted and and with whom, it is unlikely that the environ- with whom. In his initial theoretical formulation of ment will foster experiential learning through direct, the transactive memory perspective, Wegner (1987) active communication. Studies of co-located cross- acknowledged that, in real world settings (versus the functional teams and geographically distributed func- laboratory) talking with others about their tasks and tional teams find that the departmental, temporal, Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 799

and linguistic boundaries between workers make it (DiMicco et al. 2008). Given the access to others’ com- difficult for them to talk directly with each other munications they provide, enterprise social network- (Cummings et al. 2009). Other studies show that ing sites may enable vicarious learning through pas- active communication among coworkers who are not sive exposure to communications between others that on teams, but who work in the same organization extend observers’ reach beyond their immediate work and do not sit near each other is relatively nonex- group members. istent (Allen 1977). Consequently, when considering If enterprise social networking sites are indeed use- the development of metaknowledge across the orga- ful in helping workers to develop broader and more nization, as opposed to on small teams characterized accurate metaknowledge through vicarious engage- by high degrees of task interdependence, experien- ment in others’ communications than they would oth- tial learning through direct communication with oth- erwise develop through direct experiential involve- ers, whether one’s attention is focused or divided, ment in communication with others, they are likely may not be much more effective than direct observa- to do so only very slowly. It would be unlikely that a routine communication between two cowork- tion of others’ work. However, given recent advances ers occurring on an enterprise social networking site in communication technologies within organizations, would contain a concise description of someone’s improvements in the accuracy of metaknowledge knowledge that would be useful at some other time through vicarious learning, which can occur by sim- by a casual observer. Instead, it is more probable that ply watching or eavesdropping on others communica- routine communications seen by third-party observers tion, may be not only feasible, but also effective (Ren contain some bits of information that can only be and Argote 2011). turned into metaknowledge when they are assembled with other bits of information from different observed Enterprise Social Networking Technologies and communications. Even if this were the case, the mech- Communication Visibility anisms through which communication on an enter- Many organizations, large and small, are beginning to prise social networking site would become visible to use enterprise social networking sites. According to third-party observers are unclear. Also, the kinds of Leonardi et al. (2013, p. 2), enterprise social network- behavioral or work-based changes necessary to take ing technologies allow workers to: (1) communicate advantage of this communication visibility, and the messages with specific coworkers or broadcast mes- goals of that visibility, are unclear. To explore these sages to everyone in the organization; (2) explicitly issues, I turn to the study described below. indicate or implicitly reveal particular coworkers as communication partners; (3) post, edit, and sort text Methods and files linked to themselves or others; and (4) view the messages, connections, text, and files communi- Research Setting and Design cated, posted, edited, and sorted by others in the orga- The data for this study were collected at a large nization at any time. Significantly, enterprise social financial services firm headquartered in the Midwest- networking sites also provide a forum for public com- ern United States. American Financial (a pseudonym, as are all names in this article) is a major direct munication among employees (DiMicco et al. 2008). banking and payment services company. In late 2010, When two people share messages with one another, the company’s Director of Internal Communication those messages appear on the communicators’ per- began working with the external software vendor, sonal profile pages, or “news feeds.” On many social Jive, to customize an enterprise social networking networking sites sold specifically for enterprise use, site for internal communication among employees. or enterprise applications that are built in-house, com- The social networking site, called “A-Life” (short for munications between coworkers can be seen by all of “American Financial Life”), seemed nearly identical their respective contacts, and, if the appropriate set- to publicly available social networking sites, such as tings are applied, by everyone in the organization. myspace and Facebook. It contained profile pages, The little empirical research on the use of enterprise news feeds, and algorithms for suggesting new con- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. social networking sites suggests that, unlike public tacts. The default settings for the site, which were social networking sites such as myspace or Facebook unchanged, allowed anyone who used it to view any- where a user’s online connections are strongly cor- one else’s profile and to see communications between related with his or her offline social networks (see any other users on the site. The site also contained for example, Lampe et al. 2006), employees who use a shared document repository where items could be enterprise social networking sites tend to maintain tagged and linked to a user’s profile page or news connections with coworkers whom they do not know feed. The system used employment data to create a and with whom they do not regularly interact offline list of a user’s work group members and display that Leonardi: Social Media, Knowledge Sharing, and Innovation 800 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

list on his or her profile page. A-Life also allowed Data Collection and Analysis employees to post queries (much like a discussion In December 2011, semi-structured interviews were board) and to blog about ideas. conducted with 16 employees from Marketing and In late 2011, the IT team responsible for A-Life’s 18 from the Operations leadership program groups implementation selected 20 groups, at random, from (hereafter, simply Marketing and Operations) to across the company to participate in a pilot study examine their normal patterns of communication and to ensure the new technology was working prop- the various technologies they used to share knowl- erly before it was rolled out across the entire com- edge. Each interview lasted between 40 and 70 min- pany. One of these groups was a management leader- utes, with an average length of 50 minutes. The ship program in the company’s Marketing Division. interviews followed the same semistandard protocol The program consisted of employees from various comprised of four major sections. In the first sec- departments within the Marketing Division. Employ- tion, informants were asked general questions about ees were selected for the program after a compet- their background and past work experience. Ques- itive admissions process during their first year of tions such as “What do you do in your job?” and employment and remained in the program through- “What does it take to be successful in your current out their tenure at the company. Membership in the role?” were designed to solicit opinions on the skills program provided employees with regular access to necessary to do their work. In the second section, we company executives, extensive professional develop- asked specific questions about information and data ment classes, and regularly scheduled workshops and used at work. Questions such as, “What type of infor- speaker events specifically designed for the program. mation or data do you think is most important for In short, the program was a community of practice being a good (insert job title)?” and “Are some people within the Marketing Division. At the time of this at American Financial more knowledgeable in certain study, there were 44 program members. Their tenure areas than others?” were meant to encourage infor- mants to discuss their needs for information and data with the company ranged from six months to 11 to complete their work. The third section asked them years and spanned entry-level positions through vice- about the kinds of people they interacted with daily, president. how they interacted with them, and how they knew Because the Marketing group had been selected which coworkers to contact. Questions such as “How as a user community for the A-Life pilot study, but do you decide who you will talk with when you’re had not yet seen or begun to use the technology, a working on a project?”; “What kinds of technolo- pre-/post-implementation research design could be gies do you use to interact with others?”; and “What used to assess what types of changes to work were kinds of technologies do you use to learn about associated with implementation and use of the social the interactions occurring among your coworkers?” networking site by comparing how the individuals were intended to capture strategies for communica- worked before as opposed to after their use of the sys- tion, interaction, and learning. The fourth section con- tem. Explaining whether and how A-Life increased tained specific questions about various technologies communication visibility, and exploring changes in used at home and at work, their general perceptions awareness and work practice over time required more of social media technologies, and their perceptions of than a simple pre/post research design. I needed to the role of technology in successfully executing their demonstrate that the dynamics resulting from A-Life work. use were not just attributable to the normal passage Six months after Marketing began using A-Life, of time (Benbasat et al. 1987). To address this issue, a second round of interviews was conducted with we were permitted to examine the work of staff in the same 16 employees from Marketing and 18 from a similar management leadership program group in Operations. The same interview protocol used in sec- the Operations Division over the same time period. tion one was used again for all employees; how- The Marketing and Operations groups represented ever, this round of interviews included questions on a matched sample in that the two leadership pro- specific similarities and differences in communication grams had nearly identical distributions of demo- and knowledge sharing since the last interview. Mar- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. graphic profiles as to age, gender, ethnicity, tenure at keting participants were also asked specifically how the company, hierarchical level, and job performance they used A-Life over the previous six months. In ratings. There were 50 employees in the Operations total, 68 interviews were conducted across the two group. None of them communicated with informants rounds with both groups. With the consent of the in the Marketing group. This reduced the possibility informants, all of the interviews were audio-recorded that changes occurring in one group might depend and later transcribed verbatim. In total, 473 pages of on or be affected by changes in the other. A-Life was single-spaced interview transcripts were produced to implemented in Marketing in early January 2012. serve as the raw data for analysis in this study. Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 801

The logic underlying this research design is the abil- their personal networks, avoided duplicating previ- ity to isolate the effects of communication visibility ously completed work, finished projects faster, and enabled by social media use in Marketing through combined ideas from various sources). a two-way comparison (e.g., Miles and Huberman The second data analysis phase was designed to 1994). The diachronic comparison (i.e., comparison confirm that the codes about what workers learned over time) facilitated understanding of changes to from using the new technology and the outcomes work occurred in Marketing after the implementation that resulted from its use were specific to Market- of the social networking site. The synchronic com- ing at Time 2. Following the analytical induction parison (comparison with another group at the same process (Glaser 1965), I examined all of the other time) between Marketing and Operations both before transcripts (Marketing before implementation of A- the implementation of the technology and after six Life and Operations at both time periods) to ascer- months of use facilitated an understanding of what tain whether the activities that Marketing partici- changes in Marketing resulted from enterprise social pants performed after using A-Life were similar to networking site use as opposed to simply broader or different from the activities before A-Life and organizational changes or changes due to natural whether the same was true for Operations informants increases in learning amongst coworkers due to six at either time. Specifically, I used my understanding additional months spent working together. In other of what Marketing participants learned through vicar- words, comparing the experience of staff in Marketing ious exposure to visible communication on the enter- and Operations at two points in time facilitated focus prise social networking technology, and what they did on the nature of changes in Marketing, the only group with this knowledge, to uncover whether this kind of to use the enterprise social networking site. Data anal- vicarious learning and knowledge use was discussed ysis proceeded through three sequential phases (see in any of the other interview transcripts. To verify Table 1). that Operations was an acceptable comparative set to Marketing, I compared the codes generated for the The first phase of data analysis was designed to two groups from the interviews done before A-Life uncover the mechanisms by which use of the social was implemented. The codes were indeed quite sim- networking technology made communication among ilar both in placement and frequency. This provided coworkers visible. I began the analysis with the pro- evidence that Operations represented a reliable com- cess of theoretical coding. Glaser (1978) suggests that parative set and that I could compare changes that theoretical coding is a useful strategy for the ana- occurred naturally over time in Operations to changes lyst who wishes to study a concept by examining that occurred over time in Marketing. I could then the data. Accordingly, I began by examining the Mar- safely argue that those changes in Marketing were keting interview transcripts only from the interviews different than would be expected given the results in conducted six months after A-Life was implemented. Operations. I identified each instance in which informants talked To verify that the four changes to the way peo- about vicarious exposure to coworkers’ communica- ple in Marketing worked (expanded their personal tions. I applied codes to each instance that indicated networks, avoided duplicating previously completed what type of communication was made visible, how work, finished projects faster, and combined ideas it was made visible, what the informant learned from from various sources) were confined, specifically, to the visible communication, and how that new knowl- the period of use following the implementation of edge was used in their work. In total, 49 distinct the social networking technology, I followed the same codes were produced in these various categories. The process outlined earlier by comparing these codes to next step of analysis was axial coding. This involved codes generated in the other interview transcripts. I reassembling the coded data in new ways by group- used a conservative estimate to determine whether ing codes that were conceptually similar (Strauss and changes uncovered through this coding process were Corbin 1998). Axial coding resulted in the reclassi- specific to the Marketing group. Specifically, I sought fication into two main codes indicating what infor- to determine whether discussions of these four out- mants became aware of due to increased communica- comes were present in less than 5% of the inter- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. tion visibility (knowing what other people knew and views conducted in Marketing before implementa- knowing who other people knew), two main codes tion of the social networking tool, or in Operations indicating how use of the technology prompted this at either point in time. Two of the three outcomes awareness (making it easy to see the content of mes- (i.e., expanded their personal networks and finished sages exchanged and making it easy to see who peo- projects faster) were mentioned in 12% of interviews ple sent messages to or indicated as a frequent con- in Operations at Time 2. (They were excluded as find- tact), and four main codes indicating changes to their ings, leaving only two main outcomes linked to the work that arose from this new awareness (expanded use of the new technology in Marketing.) Leonardi: Social Media, Knowledge Sharing, and Innovation 802 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

Table 1 Phases of Data Analysis

Coding procedures Comparison procedures

Phase Goal Data Theoretical Axial Analytic induction 5% threshold analysis Finding

1 To uncover —16 interviews —49 codes —2 codes N.A. N.A. —Knowing what mechanisms by with Marketing describing what indicating what coworkers which social employees after type of informants knew and networking six months of communication became aware of knowing who technology tech use was made due to increased coworkers makes visible, how that communication knew) communication communication visibility —Making it among was made —2 codes easy to see coworkers visible, what the indicating how the content of visible focal individual use of the messages learned from the technology exchanged visible prompted this and making it communication, awareness easy to see and how they —4 codes who used that new indicating coworkers knowledge in changes to work sent their work that resulted messages to from new awareness 2 To confirm that —32 interviews N.A. N.A. —Compared —Examined 4 —Avoided findings from with Marketing placement and codes indicating duplicating Phase 1 (what employees frequency of changes to work previously workers learned (16 before and codes given to that arose from completed from using the 16 after Marketing and new awareness work and new technology implementation) Operations from from Marketing combined as well as the —36 interviews interviews in Time 2 and ideas from outcomes that with Operations before tech compared to various arose from its employees implementation appearance in sources use) were (18 before and all other limited to those 18 after transcripts who used new implementation) technology 3 To learn what —16 interviews —18 codes —2 codes N.A. N.A. —Learning kinds of with Marketing indicating new indicating without behaviors were employees after ways of working behavioral context and needed to six months of following changes storing change work in tech use implementation necessary to knowledge for ways found in of new tech achieve benefits possible later Phase 1 and found in Phases use verified in 1 and 2 Phase 2

The final phase of the analysis was designed to support new ways of working (i.e., learning without determine what kinds of behaviors were needed to context and storing knowledge for future use). change work in ways uncovered in the previous I used Atlas.ti software to keep track of all the- phase. To execute this phase, I isolated all instances in oretical, axial, and selective codes in each round of which Marketing informants talked about new ways coding described above. To verify the accuracy of of working following the implementation of A-Life. I these codes, two research assistants repeated the cod- then repeated the steps summarized above—engaging ing procedure used by the author, using the detailed Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. in theoretical and axial coding to narrow and connect codebook (i.e., descriptions of each code) created in phenomena in the data and then comparing those the Atlas.ti software. To ensure consistency, the author codes to the other interview transcripts in an attempt initially reviewed the codes applied by the two assis- to isolate these emerging findings to the work of those tants after they had coded five randomly assigned who used A-Life and, consequently, improved their transcripts. This helped the researchers to reach a con- awareness by being exposed to visible communica- sensus on the proper interpretation and application of tions occurring amongst coworkers. Through this pro- each code. The researchers then recoded the five ini- cess, I identified two behavioral changes needed to tial transcripts and all subsequent transcripts. At the Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 803

end of this process, a Cohen’s Kappa was calculated people do really cool things that would be really use- to determine the extent of agreement between the ful for my projects, but I just don’t know what that is three coders (i.e., the author and the two researchers). or who those people are.” The final Cohen’s Kappa, 0.87, was very acceptable The primary reason that most workers knew lit- (Fleiss 1971). tle about what their coworkers were doing is lim- Next I present data primarily from the 16 Market- ited communication. Marketing employees consis- ing interviews conducted after implementation of the tently indicated that they learned about coworkers’ enterprise social networking technology. As described daily activities from exposure to their communica- above, the additional 52 interviews that were ana- tions. Because the actual conduct of one’s work was lyzed allowed me to say with certain confidence that invisible to others, people typically learned what he the practices and changes that occurred within Mar- or she did by either asking them directly about it keting were indeed related to the way individuals or by seeing or hearing communications they had in this group used the new enterprise social net- with others that revealed the nature of their tasks. working site because they represented changes to the For example, when asked during the first round of informants’ own work before the implementation of interviews with whom she typically interacted in the the technology, as well as changes from the normal workplace, one informant answered: dynamics of work in Operations occurring during the same six month window. I typically interact with people I know something about—know what they do. That mostly means I com- Findings municate with people on my immediate team 0 0 0 I don’t The results of the analyses are presented in three sec- ever really see those people actually doing work. I tions. First, I discuss how specific advantages cre- mean I see them sitting at their computers, but I don’t ated by use of the enterprise social networking site know what they’re doing. They could be writing a enabled third-party observers to become aware of report, checking email, or just reading the news. I don’t know. But I normally get a sense of what they do “who knows what” and “who knows whom” in the because they tell me about it when we talk, or I get organization. I then show how this newly held knowl- copied on an email they send to someone else and I edge about what and whom others knew (i.e., meta- read what they say or I overhear them talking about knowledge) facilitated two changes to the way mar- some aspect of their project with someone who comes keting informants worked. First, they avoided task to their desk. So you just sort of get a sense of what duplication through more effective reuse of knowl- people do because you’re getting to see what they’re edge. This increased the speed at which they worked saying or hearing them talk about it. If you don’t have and allowed them to move on to tasks that added that, it’s hard to know what they do. more value to the organization. Second, they recom- bined ideas culled from various coworkers into new As indicated, much of her awareness about her ideas that helped them solve problems faster and coworkers’ tasks was generated through exposure to more thoroughly. Finally, I show how the ability to their communications. However, as she implied, she, develop sufficiently accurate metaknowledge from like most other employees at American Financial, visible communication that could lead to recombi- only had visibility into the communications of those nant innovation and avoidance of task duplication on her team or those sitting around her, and visibil- required at least two significant behavioral changes: ity into even those communications was often only Shifting from problemistic search to proactive aggre- serendipitous. gation of content and doing something else. I present Comparing the Marketing communication environ- evidence for these claims below. ment before and after implementation of the enter- Communication Visibility and the Development prise social networking site, as well as to the dynam- of Metaknowledge ics of the Operations communication environment Like workers in many large organizations, employ- over time, showed that workers used the new tech- ees at American Financial typically had a good idea nology to enhance their awareness of who among Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. of what their coworkers (team members, other staff, their coworkers had what kind of knowledge, as or those they saw daily) were doing. Yet their under- well as to learn which coworkers knew each other. standing of other coworkers’ activities in different Increased awareness of who knows what and who departments (or geographic locations) was not exten- knows whom improved the accuracy of their meta- sive. As one Marketing informant observed, “This is knowledge. Two advantages fostered by the new tech- a big company. I don’t really know what other people nology helped improve the accuracy of metaknowl- do outside of my team. I definitely don’t know what edge: the transparency of coworkers’ messages and they do all across Marketing. My guess is that some the translucence of others’ networks. Leonardi: Social Media, Knowledge Sharing, and Innovation 804 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

Message Transparency and Awareness of “Who Most of the messages communicated across the Knows What.” As demonstrated above, a typical organization were opaque to would-be third-party problem stemming from the invisibility of work observers for two reasons. First, individuals simply and communication at American Financial was that did not know that other people were communicat- employees did not know what their coworkers across ing with each other when those messages were sent the organization knew. Employees recognized that via email, IM, or some other electronic form of writ- under normal conditions communication between ten communication. If they did not know that a mes- coworkers was largely invisible to everyone but the sage was being communicated, would-be third-party sender and the receiver. As one informant com- observers could not try to position themselves in a mented, “I send emails all day. What I say in them place where they could view it. Second, even if a could maybe be useful to someone else, but I don’t third-party could see that communication was occur- know that so I don’t know who to copy on it. Some- ring amongst others (for example, seeing two people one could probably learn a lot if they browsed around talking across the hall or seeing someone pick up the inside my inbox for a day just like I could if I could phone to call someone else) the contents of those mes- see inside other peoples’ emails.” Emails were not sages were often inaccessible. Messages exchanged the only culprit. Even messages exchanged in face- through the enterprise social networking site were not to-face encounters were often indiscernible by third- subject to these two limitations, as perceived by third- party observers. As another informant commented: party observers. Not only were the messages sent “Sometimes I see people talking a couple desks away. transparent such that a third-party observer could see I can’t hear what they’re saying but they look really into them, but they remained transparent over time: into the conversation and it looks important. It proba- A great thing about seeing people send stuff back bly is, but how can I know unless I go over there and and forth on A-Life is that it’s like a conversational eavesdrop.” thread. So you can get to the conversation and scroll Use of the enterprise social networking site for rou- down to see what they said before easily because they tine Marketing communication made coworkers mes- respond specifically to that thread and all the commu- sages more transparent than they might have been nication’s there in one place 0 0 0 Like if someone posted using different technologies. Message transparency their emails to a website. Well, the email chain might means that people can literally see what others are contain some of the information, but if one of the peo- ple didn’t reply to original message and started a new saying to one another. On A-Life, a message sent message instead then you’d miss half of the original between coworkers appears on both the sender and message. That happens all the time. On A-Life you the receiver’s "wall." If another person who was nei- don’t have that problem. ther the sender nor the receiver had accepted one of those two communicators into their social network Consequently, messages that were communicated on the site, that message would appear on his or through A-Life could be viewed by third parties her news feed, essentially making that individual a in ways that provided an aggregate understanding third-party observer to the communication among the of the conversation, which helped them to become others. aware of who had what knowledge, even if the con- As an increasing number of employees began com- versation was no longer active. municating routine messages on the enterprise social Message transparency gave individuals access to networking site, those who were neither the original the contents of communication occurring among oth- sender nor the recipient began to learn who knows ers. Of course, reading content did not translate what by looking at the messages. One informant suc- into an immediate awareness of “who knows what.” cinctly discussed this type of awareness: Instead, third-party observers had to rely on mes- sage content to make inferences about what kinds of I saw some messages exchanged between two guys knowledge others in the organization had. Sometimes in another department saying about how they deter- the inferences made by third-party observers were mined the appropriate rate for a consultant. I didn’t incorrect. But informants overwhelmingly trusted know how to do that and I thought it would be good their own inferences (based on actual work-related Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. to know so I kind of made a mental note that these interactions among people) over someone’s proclama- guys knew that so I could go ask them in the future. tion about his or her own area of expertise: That would really be helpful knowledge to have for some upcoming projects 0 0 0 I’m glad they sent that mes- A lot of people like to look or act like they know some- sage through A-Life ‘cause that meant I got to see it. If thing they don’t. They tell you, “I know how to do they did it through email I wouldn’t have ever known that.” But you ask them later more about it and it turns that message was sent and I couldn’t have seen it so out they don’t. I find it’s better if you actually read I wouldn’t have learned that these guys know about something they wrote—like a note or a report—and rate determination. you can compare that to what someone else wrote and Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 805

then really assess what they know. It’s like going on technology such as email (indicating a strong tie). evidence rather than hearsay. Similarly, if someone indicated that another Ameri- It’s like a mix of things you do to figure out who’s can Financial employee was his or her coworker (in got the knowledge you need. You might get some the way one would accept a “friend” in a popular advice, but you want to do some homework and social networking site like Facebook), the third-party do some comparison to see who is really an expert observer could not know what topics these people because there’s usually more than one person you communicated about (e.g., exchanging work-related could ask. So if you see what people say to each other that’s a pretty good indicator you can use to decide. advice or coordinating a meeting time for lunch). Thus, I suggest that the social networks of others What did informants do with the awareness of made visible through the enterprise social networking “who knows what” that was generated through expo- site are only translucent, i.e., clear enough to show sure to messages communicated by other people on that a relationship exists, but not clear enough to the enterprise social networking site? The data sug- show the scope and/or nature of that relationship. gest that they decided to whom they should go for Network translucence enabled by use of the enter- advice or whom they should approach to ask for prise social networking site was often revealing for transfer of the needed knowledge. The top half of Marketing employees. Consider the following com- Table 2 provides five representative examples, pulled mon responses given by informants to the question, from the interview transcripts, indicating how indi- “What was the most surprising thing you learned viduals used their newly acquired awareness of “who from using A-Life?” knows what,” which was gleaned from their use of I guess I didn’t realize how many people there are in the enterprise social networking site. In each case, Marketing that I don’t know, who know people I actu- informants indicated that they noticed the commu- ally do know. nications occurring between others and attended to I thought for sure no one I work with really talked them because, “what they were saying seemed related to people on the debit side of the business. But it turns to something I was doing or something I knew I out I actually know some people who talk to those had to do.” Thus, potential future applicability of the folks because I see they’re friends on A-Life. knowledge that person had directed the observer’s I had no clue that Molly and Javier knew each other. attention to further read his or her transparent mes- But I see them send messages to each other from time sages. As the final column in the table indicates, to time. observers did not normally need the knowledge that As informants typically indicated, it was difficult they became aware that someone else had immedi- to know whom other people knew in such a large ately. Instead, they projected a need for it sometime company. The default assumption enacted by many in the future. Out of all 33 instances identified (of individuals was that the people they knew typically which only five are summarized in Table 2) the short- knew people they knew. In other words, a logic of est time frame in which an observer projected needing homophily drove most people’s conceptualizations of the knowledge they became aware that someone had the underlying social dynamics at American Finan- was two weeks. cial. But by the translucent networks they perceived Network Translucence and Awareness of “Who on the enterprise social networking technology belied Knows Whom.” Whereas reading the content of the this . Instead, informants began to learn that messages other people communicated on the enter- their communication partner’s communication part- prise social networking technology enabled employ- ners were actually quite diverse. ees to become aware of who knows what, the fact There were several ways that individuals became that they could see with whom others communi- aware of whom their coworkers knew. The most com- cated and who those others signaled were their work- mon way was by seeing the list of names of “con- related colleagues led to an awareness of who knows nections” that was linked to someone’s profile page. whom. The social networks of others, as perceived by Just like the “friends” list on Facebook, employees at third-party observers, revealed actual and potential American Financial could formally request someone communication partners. However, what third-party at the company to be a connection and accept connec- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. observers often could not discern was the nature of tion requests from others. This list of cultivated con- the communication or the scope of the relationship. nections was displayed in association with a person’s For example, a third-party observer might see that personal profile. This list of “connections” provided two coworkers exchanged three messages. Yet they an easy way for individuals to become aware of who could not know whether those were the only mes- knew whom: sages they exchanged through any medium (indi- Sometimes I just kind of look at someone’s list of cating a weak tie) or whether they also exchanged connections really quick just to see what people they many more messages in person or through some other know. That’s always interesting because you get a Leonardi: Social Media, Knowledge Sharing, and Innovation 806 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

Table 2 Examples of Metaknowledge Learned as a Result of Increased Communication Visibility

How metaknowledge was Time frame learned on enterprise social How metaknowledge for projected Type Knowledge needed networking site was/will be used use

Who knows what How to make spending Reading message one employee sent to other Ask the message’s recipient to teach 24 weeks projections for customer to ask for help employee to make projections acquisitions How to determine date for Reviewed a template document sent along Ask the template’s creator about 12 weeks promotional mailings with a message from one employee to feasibility of altering date another How to perform search engine Saw at least four messages among different Approach employee who is 2 weeks optimization people where sender asked recipient for the consistently mentioned and ask to be name of an expert who could help on just this taught task task. One expert was consistently mentioned How to track tasks in a project Noticed template sent by another employee Ask poster of template for tutorial in 12 weeks management environment in a message project tracking How to forecast revenue for new Saw the title of a document that coworker Ask poster of document for a lesson 9 weeks market segment sent, which indicated that the document on how to conduct forecast contained a report in which forecast was made Who knows whom Who has a contact with someone Reviewing a message response from Ask sender for introduction to 6 weeks at the Datacenter who can extract employee commenting on a meeting he was employee at Datacenter promotional histories about to attend Who to ask about the best person Noticing that a close colleague had a Ask the colleague to ask his or her 3 weeks from whom to learn how to write conversation with someone in legal friend in legal who is the appropriate rewards language compliant with person to contact NAD rulings Who knows someone to contact Noticed that someone had asked a colleague Ask the answerer of the question who 5 weeks in the Finance department to a question on his wall about who is the best is the best person to contact in the expedite review of impacts of new person to contact in the Finance department. Finance department and advice for promotional program Employee figured the person asked the the best way to approach this person question because the person of whom it was asked knew the answer Who to ask for a contact who has Saw a message sent by a coworker who Ask coworker for name of focus 3 weeks run a social media contest talked about a focus group she had done at group leader and for introduction to work to give ideas for a social media him or her promotion Needed help writing a script to Saw a picture included in a message from a Ask colleague to persuade person in 4 weeks automate data entry. Heard of colleague in which the colleague was talking IT to help employee with her request. someone who knew how to do at a company party with the person from IT. Personal favor needed because it is this in IT, but heard that person Asked the colleague for an introduction to the outside of IT’s job description was busy. person from IT

sense of who they talk with and a lot of times they’re observation of coworkers sending messages to each people you wouldn’t expect. other: On A-Life you can see what people are sending mes- Although perusing the list of one’s displayed con- sages to other people. So you see that message and its nections was certainly the easiest way to get a sense like, “OK, they know each other, great.” And you can of their work-related contacts, it was also the most kind of just remember that piece of information. And unsatisfactory because it provided the leanest infor- sometimes you see that they send a lot of messages to mation. After reviewing this list, the observer still each other so you say, “Well, I guess they really know

Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. would not know the content that typically flowed each other pretty well.” So that’s all helpful informa- along the tie between the two individuals nor would tion to have. they know how frequently those two individuals The advantage of building an awareness of “who communicated. knows whom” by attending to actual messages Consequently, a more robust way of learning “who exchanged was that the nature and intensity of the tie knows whom” was to pay attention to the messages were easier to discern than building such an aware- people exchanged with one another. Informants took ness simply by reviewing one’s list of contacts. To as evidence of a real and substantial relationship the acquire this more granular information, informants Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 807

would regularly check their own news feeds on the New Ways of Working Arising from Improved enterprise social networking site to see if conversa- Metaknowledge tions among their connections appeared there. They The increased awareness of who knows what and would also regularly peruse the walls of people they who knows whom enabled by seeing coworkers’ com- knew with the explicit goal of learning who their munications in the enterprise social networking site communication partners were. had at least two important consequences for the Mar- What did informants do with the awareness of keting staff. First, enhanced metaknowledge helped “who knows whom” that was generated through workers to avoid doing jobs that had already been exposure to translucent networks on the enterprise done and to avoid taking the time to learn something social networking site? The data suggest that they that a coworker had already learned and could share. In short, improved metaknowledge helped workers decided which of their coworkers could help them to avoid duplicating previous work. Second, enhanced gain an introduction to others at the organization or metaknowledge helped workers to combine disparate endorse them for others from whom they wanted to ideas from across the organization into potential new ask a favor: ideas for specific projects. This recombinant innova- Sometimes you want to talk to someone, but you don’t tion became feasible when workers improved their know them. So you think, “who do I know that might awareness of both who knows what and who knows know them?” and then you go ask that person if they whom in the organization. can make a connection for you, like call them or some- Duplication Avoidance. As in many large organi- thing. Or, you might know that you want to ask some- zations, work duplication was a common problem one you don’t really know well for something, like to at American Financial. Table 3 provides examples of give you a bunch of data. So to make that easier you work duplication that occurred in Marketing prior to ask someone you know to put in a good word for you implementation of the enterprise social networking to that person, like “Jim’s not a bad guy it would be site. As the table indicates, when staff were assigned great you’d help him out” and that can sort of grease to work on a particular task they often began to learn the skids. the knowledge necessary to complete the task with- out learning whether someone else in the organiza- Another way in which informants indicated that tion had either already completed the same task and they used their knowledge of “who knows whom” could simply share their results, or whether some- gained through use of the enterprise social network- one else in the organization already had the knowl- ing site, was to try to discern “who knows who knows edge necessary to do the task and could help the per- whom.” For example, if a person knew that he or she son in question do it without that person having to wanted to talk to a specific person in accounting, but engage in a lengthy learning process. Typically, the didn’t know that person directly, they might see on fact that knowledge and work were duplicated was A-Life that one of her coworkers knows someone in discovered serendipitously after the duplication had accounting and would ask that person to ask the per- occurred and American Financial had incurred the son in accounting if she knows the person in question. associated costs. The bottom half of Table 2 provides five representa- The improved metaknowledge enabled by use of tive examples, pulled from the interview transcripts, the enterprise social networking site helped Market- indicating how individuals used their newly acquired ing staff avoid these kinds of duplication. Having awareness of “who knows whom.” As the examples an awareness of who knows what gave informants illustrate, individuals often had either specific (by a window into the kinds of tasks or jobs coworkers name) or general (by position) people they wanted to were likely to conduct. This insight made it easy for talk with across the organization and used the enter- them to ask others about particular tasks they were prise social networking site to help them figure out working on to ensure that knowledge or work would who amongst those that they did know could help not be duplicated. As one informant summarized: them achieve the goals summarized above. As was My manager asked me to put together a report sum- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. the case with knowledge of “who knows what,” infor- marizing some of our competitor’s positioning and mants indicated that they did not normally activate branding strategies for a particular product. I was like, their new knowledge of “who knows whom” imme- “Ok, I’ll do that.” I had a lot of other things going on diately after acquiring it. Out of all 41 instances iden- and this was going to take two or three days to do and delay me getting to those other things. I told her [the tified (of which only five are summarized in Table 2) manager] that and she said it was ok. But as I started to the shortest time frame in which an observer pro- do it I remember that I saw that Jenny in the Consumer jected needing the knowledge they became aware that Insights department had sent a message on A-Life to someone had was three weeks. someone about some work she was doing with this Leonardi: Social Media, Knowledge Sharing, and Innovation 808 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

Table 3 Examples of Knowledge Duplication Problems in Marketing Division

Knowledge duplication Reason problem How existing knowledge Consequence arising Task problem occurred was discovered from duplication

Assigned to create After creating report, Manager assigned task, but During small talk at company Employee delayed other work report on consumer employee discovered that forgot he had assigned the holiday party employees tasks for four days while default behavior someone had already same task to a person six discussed past projects creating report. Missed created an identical report months before. Employee deadline assigned by another six months earlier did not know that someone manager else had created it Assigned to create Researched types of graphics Employee was unaware of a During review of banner ad by Employee lost two weeks of banner ad for that capture attention. position in the company, legal department, lawyer productivity and spent $15,000 holiday credit card Hired outside consultant to occupied by another asked why employee had on a consultant who created a offer create art. Discovered later employee, dedicated to not utilized the dedicated banner ad that could not be that graphic could not be creating banner ads banner ad position used used for legal reasons Assigned to place a Looked up logic to insert link Employee thought it was such Finally connected with a Wasted time and made himself smart button in for appropriate device a rare instance that he teammate of employee’s look incompetent (when his email so that when (iPhone vs. Android). didn’t think to go around “go to” person in IT (after solutions found on Google mobile phone user Applied various solutions and ask for someone who three weeks of emails to failed) clicked the link, it found through Google knew (employee didn’t various people), who had a would redirect them search. Discovered later think anyone had that better solution to the to their App store person in IT who knew expertise) problem solution. Assigned to create a Similar dashboards existed, Employee did not think that While training a colleague Employee lost two weeks of work dashboard to but needed to make anyone else in her group who was moving over from time trying to update the summarize the changes that reflected new had the skills to make the another department the dashboard. In addition, three progress/success metrics being tracked. Did update and she didn’t know trainee mentioned that he other projects were stalled metrics of various not have skills to create anyone in another group possessed the skills to because workers lacked data team projects dashboard, but tried to by who might have them improve the dashboard that they could have seen if the working two weeks and auto-populate the dashboard had worked. nonstop. Later, found a necessary data colleague who knew how to make the update. Needed to change Information about rewards Employee’s department did While waiting for a staff Company had to retract the first copy (wording) on a changed because of NAD not normally work with meeting to begin, employee letter and send out a second letter going to card rulings. Did not learn that legal so, consequently, they talked with coworker about letter with revised awards. members about wording had changed until were not on legal’s regular the rewards program the Also, purchase credits had to rewards after the letters were update emails coworker initiated and the be given to customers who mailed. coworked mentioned made purchases under false changes from legal assumptions about rewards. Overall, more than $60,000 was spent to fix the problem.

particular competitor. So I called her up and told her someone who knew that person and could provide what my manager wanted me to do and before I could entrée to him or her was needed: finish she told me that she had already done that as a by-product of something she was working on and she So it turned out that this guy in Business Development would send me the file. It was exactly what I needed had put together this fair market value tool for paying so I didn’t have to do the work. It was great 0 0 0 If I consultants, which would say what their rate should hadn’t seen her talk about that on A-Life I wouldn’t be. I needed to hire a consultant for my project and I have ever known to ask her and it would have wasted needed to figure out the rate when I found out this guy those couple of days and pushed back the other work. had this tool. So I emailed him to ask if he could tell me

Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. what information he used to make the tool, I wasn’t Awareness of “who knows whom” was also a cru- even asking for the tool itself, but he never emailed me cial ingredient for duplication avoidance in many back. Maybe he didn’t want to give it up or something. cases because even if, through awareness of “who But I happened to see one day when I was on A-Life knows what,” someone learned that someone else that he was friends with this other guy I know really had completed a particular task or had certain nec- well. Well, I mean they were listed as “connections” essary knowledge, it was not always straightforward and my friend didn’t have a lot of connections. So I that the person who had done the task or had asked my friend if he knew the guy and would ask him the knowledge would share. Sometimes, knowing about the tool for me. He said, “sure” and he copied Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 809

the guy and me on an email together. The next day I was racking my brain about it when I suddenly the guy sends me his tool. That was great, saved me a remembered that I’d seen a communication exchanged bunch of time. between these two guys on A-Life in which one of them, Joe Franklin who’s in the Pricing and Ana- Avoiding the duplication of knowledge and work lytics department, mentioned something—I forget the was a tremendous benefit for employees, their man- context—about interest rate variation depending on agers, and the organization as a whole. As one man- spending habits. That caught my eye so I read the ager noted, “We hire smart people and we want them history of conversation he had and it turns out that to share what they know. We’re a better company there was some flexibility in rate assignment based on when that happens.” Use of the enterprise social net- spending class. When I remembered I had seen this it working site helped individuals in Marketing to avoid occurred to me that we might offer a cash-back bonus or something similar for specific consumers in that duplication by helping them to become aware of who spending class if we kept below our rate assignment might have done something similar already or had threshold. So I sent him an email to see if I could learn similar knowledge and who could help them get to more about it. It made sense so I developed the pro- those people and their products. As one informant gram around it and it has been pretty successful so far. noted, “It’s amazing how much more efficient you can I am proud of the innovativeness as well. actually be when you have a good lay of the land in the company. I never realized [before using A-Life] As this example illustrates, Marta combined her how much I was missing.” knowledge about consumer preferences with Joe Franklin’s knowledge about interest rate variation Recombinant Innovation. Innovation in commer- to produce a novel and useful new marketing pro- cial products and internal processes was highly val- gram. Marta produced this innovation by recombin- ued at American Financial. Employees were formally ing knowledge in new ways. Importantly, her ability recognized by management for developing new ways to do so was enabled by her awareness of what Joe of working more efficiently or for generating good knew, which she had because of the visibility into his ideas that translated into new product offerings. But communication provided by the enterprise social net- developing innovative processes and products was working site. difficult. An increase in the accuracy of one’s meta- Informants from Marketing discussed numerous knowledge, which was enabled by use of the enter- other cases similar to Marta’s, most of which were prise social networking site, allowed informants to much smaller in scope and significance, in which more effectively engage in what innovation schol- they combined knowledge that already existed within ars refer to as “recombinant innovation” (Hargadon American Financial in new ways because use of the 2002). Recombinant innovation refers to innovations enterprise social networking site allowed them to see that arise when knowledge that already exists in the what knowledge other people had, as well as to see organizations is re-used in new combinations that who they would need to talk with to access that result in novel and useful changes in products, pro- knowledge. As one informant suggested: cesses, or services (Majchrzak et al. 2004). Innovating One thing A-Life gives you is a better vantage point. through recombination of knowledge requires indi- You can simply see more of what other people are viduals to be aware of what knowledge exists in the doing by getting involved in their communications. So organization that can be combined with other knowl- you start to realize what they know. Also, even though edge. By enabling better awareness of who knows you might not understand it completely, you can think what and whom, use of the enterprise social net- to yourself, “Hey, I didn’t even realize someone had working site allowed some employees in Marketing this knowledge” and then you can start to think how to meet this requirement. that knowledge might complement some knowledge For example, Marta, who worked in the Card- either you already have or some other knowledge that member Marketing department, had spent several you saw someone else had. That is pretty cool and months conducting research on why consumers were helps you to be more innovative in your job by lever- aging off of what others know. likely to choose one credit card brand over another. Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. Her research uncovered that, within the demographic The metaknowledge enabled by use of the enter- for which she was interested, consumers made deci- prise social networking site did not appear to make sions largely based on the availability of rewards anyone inherently more creative. But, it did appear to programs and, more specifically, rewards that could give people a vision advantage such that they could be redeemed for cash or credit on a card statement. see what knowledge existed within the organization Marta tried, unsuccessfully, for several weeks to fig- to be had and to acquire it from those who held it ure out a strategic plan based on her findings. One such that they could combine it with other pieces of day, however, Marta had a breakthrough: knowledge to innovate in their work. Leonardi: Social Media, Knowledge Sharing, and Innovation 810 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

Behavioral Changes Enabling New Ways of you’re immersed in conversation and you just kind of Working absorb it. Although the data suggest that duplication avoidance Learning through direct communication with oth- and recombinant innovations were two new ways of ers was also common because interpersonal exchange working that arose because enterprise social network- forced individual attention. In other words, in addi- ing site use enabled staff to develop more accurate tion to the benefit of asking clarifying questions to metaknowledge, not everyone could engage in these sustain a conversation (whether synchronous or asyn- new behaviors. In fact, the analysis showed that of chronous) workers had to focus on the communica- the 16 Marketing enterprise social networking site tion partner’s words to respond. This forced attention users interviewed at the end of this study, only eight helped them store the learning about what and whom (i.e., exactly half) reported that use of A-Life allowed that person knew in memory. Repeating it in conver- them to avoid knowledge duplication or to recombine sation helped to solidify it as actual knowledge. knowledge in ways that produced product or process Yet workers effectively avoided duplication of innovation. Interestingly, seven of these eight users knowledge, and combined knowledge in ways that did both. To learn how these eight users worked in produced innovative outputs. Not only did they learn these new ways, I compared their responses to the through their own experience communicating with responses of the other eight informants who did not others, but also by observing other communications in achieve these two benefits, as well as to the Opera- which they were not themselves involved. Although tions informants who also did not report working in this behavioral change seems somewhat subtle, infor- these new ways. This subsequent analysis revealed mants stated that it actually presented substantial that informants worked in new ways. Avoiding dupli- cognitive challenges: cation and recombining knowledge for innovation The major thing I’ve been finding as I’ve been trying were two important behavioral changes that allowed to figure out the best way to use A-Life is I get a lot them to take advantage of the enhanced awareness more out of it by being a lurker than I do from talking of who knows what and who knows whom afforded to people, personally. I mean the people that I would by the new technology: They shifted from engaging send a message to on A-Life are probably the same experiential learning to vicarious learning and moved people I would talk to offline or on email. But when from conducting reactive search practices to proac- I’m on A-Life I can see what a bunch of other peo- tively aggregating knowledge. ple that I wouldn’t normally talk to are saying to one another and all that conversation has useful tidbits in From Experiential Learning to Vicarious Learn- it. But I’ve got to make it a process to read those com- ing. The first behavioral change to adopt the new munications or at least look at them quickly and I have ways described above was to shift the way the worker to reflect on them a bit more than I would if I talked learned from others. Instead of learning through per- to either of those people directly because I’ve got to sonal experience, he or she learned vicariously by try to pick up the context of the comments. It’s like, in school, if you ask the teacher something directly observing the communication between a coworker you know how the answer fits into the bigger picture and someone else. Marketing and Operations infor- because you asked about it. But if you overhear the mants suggested that experiential learning was typ- teacher talking to another student you can still learn a ically the way they developed an understanding of lot, but you’ve got to figure out how to contextualize what and whom coworkers knew, and that this hap- it. That’s hard, but it can be real valuable. pened primarily through communication: Learning vicariously through observation of com- You get to know about other people by talking with munications between others represented an important them directly and asking questions and hearing their behavioral change for those who used the enterprise answers. That’s how you get to know what projects social networking site. Conceptualizing user commen- they’ve worked on and get a sense about the kinds of tary to infer knowledge was particularly important; things they have expertise about. the sustained attention necessary to cull informa- Communicating with other people is one of the most tion from coworkers’ communications required effort important things you can do to be successful in your and control. Significantly, informants did not aban- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. job. You’ve got to make sure you’re learning all the don experiential learning entirely. They continued to time about what other people can do and you can learn through direct conversation with others in their only learn that by being good at engaging them in conversation. work groups and from those who sat near them. Thus, When you’re talking to someone else you can really vicarious learning took place most often through use get a good grip on the kinds of things they know of the enterprise social networking site. Informants about. It’s just the way they respond to you—like had to balance these two modes of learning and move how fast or what they’re body language is like—is quickly and adeptly between them. This entailed how you can get a sense about it. You know, when another unique set of cognitive competencies. Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 811

From Reactive Search to Proactive Aggregation. Although this shift in behavior from waiting until The second behavioral change that workers made knowledge was needed to learn who might have to avoid work duplication and achieve recombi- it or who might know the person who had it, to nant innovation was in their approach to the tim- developing metaknowledge in advance, in anticipa- ing and process of finding knowledge. As Marketing tion of some future need state, was somewhat drastic, and Operations informants indicated, they typically it could pay large dividends. To accumulate those div- acquired new knowledge in the process of trying to idends required that informants be more proactive in solve a newly encountered problem. the purposeful development of metaknowledge: I guess what normally happens is I run into some issue I find myself doing something new now when I’m on in my work that I can’t figure out. So I go out asking A-Life. I see all these things that people are saying and people if they have some solution. Hopefully I find I get a sense for what they know. It’s a lot of noise, but someone. I’ve gotten better about searching for what I it’s useful noise. So when I see something and realize need over time. that John knows about consumer promotion rates I sort If I have some problem that I can’t solve I look for of take a breath and tell myself that I should remember some kind of knowledge or information that will help that and I file it away. That’s a pretty big change—to me solve it. That is probably the instance where I learn see something and try to absorb it so you can use it the most. You know, you learn when you don’t under- later when you don’t even know if you’ll ever need to stand something; it’s just the time when that normally use it. happens. The times when I really find out what people know Although use of the enterprise social network- are when I’m stuck in my own work. I get into some ing site made it easier to learn who knows what kind of jam and there is some problem so I search for a and who knows whom, remembering that knowledge solution. I ask around and around to people till I come appeared to take some willful determination. up with something that will help. Then, it’s like, “Oh yeah, now I just learned something new." Discussion Put in more formal terms, the typical way in which This paper offers a grounded theory of communi- people dealt with problems encountered in their work cation visibility. The emerging theory suggests that was to reactively search for knowledge that would once invisible communication between others in the help to solve them. The process could be character- organization becomes visible for third parties, those ized as reactive because people did not think about third parties may improve their metaknowledge (i.e., acquiring new knowledge, or the metaknowledge that knowledge of who knows what and who knows would help them get that knowledge, until the prob- whom in the organization). Communication visibil- lem arose. Moreover, the process could be character- ity leads to enhanced awareness of who knows ized as search because they were actively looking in what and whom through two interrelated mecha- a focused and directed way for some specific type of nisms: message transparency and network translu- knowledge. cence. Seeing coworkers’ messages helps third-party Note that those who learned the new ways of observers make inferences about others’ knowledge. working described above did not reactively search Seeing the structure of coworkers’ communication for knowledge when they encountered a problem. networks helps third-party observers make inferences Instead, they proactively aggregated the metaknowl- about who coworkers talk with somewhat regularly. edge they acquired daily through the communication The emerging theory further suggests that enhanced visibility made possible by the enterprise social net- metaknowledge can lead to more innovative products working technology. In other words, they stumbled and services and less knowledge duplication if staff into knowledge of who knows what or who knows learn to work in new ways. Specifically, users can whom at random intervals. Although they had no use recombine existing ideas into new ideas more effec- for that metaknowledge at that moment, they held it tively and avoid duplicating work if they switch from in passive memory (along with other pieces of meta- learning through experience to learning vicariously knowledge) for future use. Informants noted that this and if they can begin to proactively aggregate infor- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. behavioral change was profound. mation they are perceiving daily rather than engage in reactive search after they have run up against a The biggest change I have seen from using A-Life is problem they cannot solve. that when I encounter a problem I automatically know who can help me solve it. It is unusual. Earlier, when I Enterprise social media plays a central role in this encountered a problem, I would think, "Damn! Where theory because it makes heretofore invisible commu- am I going to get help for this?" Now, I know imme- nication between coworkers visible to others in the diately who to contact even though I may have never organization. Specifically, the enterprise social net- met that person. working site used among employees in this paper Leonardi: Social Media, Knowledge Sharing, and Innovation 812 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

enabled them to see into their coworkers’ mes- advantage to all employees, regardless of network sages (message transparency) and view coworkers’ position. communication networks (network translucence). By The findings also showed that although commu- enabling message transparency and network translu- nication between coworkers was visible to all users cence, a social media tool such as an enterprise social of the enterprise social networking site, not all users networking site fosters conditions for the dynamics changed their behavior to avoid duplication and to summarized above. However, the mechanisms that innovate through recombination. Communication vis- drive these dynamics are themselves message trans- ibility thus appears to be a necessary but insufficient parency and network translucence. Enterprise social condition for work to change in these ways. Those networking sites are not the only information tech- users who successfully changed their work devel- nologies that can make messages transparent and oped specific new behaviors of vicarious learning networks translucent. The notion of visibility is tied and proactive knowledge aggregation. Most organiza- to the amount of effort necessary to locate infor- tion research on learning processes heralds experien- mation in workers’ communications. If workers per- tial learning or (i.e., learning by doing) (Von Hippel ceive that information is difficult to access, or if they and Tyre 1995) rather than vicarious learning (i.e., do not know what information is accessible, they learning by watching) to acquire knowledge. The are unlikely to seek that information (Brown and findings presented here suggest that in the modern Duguid 2000). In short, information may be avail- workplace vicarious learning may have as many if able for examination, but unless workers know where not more advantages than experiential learning in it is, it will remain invisible. Clearly, effort can help the development of metaknowledge. Still commu- make communications visible. Still, busy workers are nications must be visible if vicarious learning (i.e., unlikely to make that effort if access to those com- observing coworkers’ communications) is to succeed. munications is too difficult. Thus, any technology that Also, organizational scholars typically herald prob- helps to make coworkers’ communications more eas- lemistic search (Cyert and March 1963) as the vehi- ily accessible will make that information visible across cle for workers to effectively acquire new knowl- the organization. As these findings show, an enter- edge, i.e., when they encounter a problem, they search prise social networking site accomplished this in ways for a solution. Yet our findings suggest that proac- that other technologies available to informants could tively aggregating knowledge by observing cowork- not, thus providing them access to new and poten- ers’ visible communications may be more effective tially valuable knowledge. than the reactive problemistic search. To successfully This emerging theory of communication visibility make this switch, workers would hone and retain has several important implications for the nature of their metaknowledge daily so that it could be recalled work in the knowledge economy. As clearly shown when needed. Developing metaknowledge in this by the data presented, communication visibility and way would require individuals to attend to bits of expanded metaknowledge can streamline work across information that may seem trivial or useless in the an organization, while also fostering improvements moment and later recall those bits and assemble them in innovativeness. By learning who knows what and with other bits to arrive at an accurate understanding who knows whom employees at American Finan- of where knowledge is located and who can provide cial saved themselves and the company time and access to it. Thus, these two behavioral changes rep- money by avoiding duplication of knowledge and resent new ways of working that employees would work. Those who were best equipped to solve prob- likely have to adopt to take advantage of the commu- lems could do so. This, of course, is the goal of nication visibility provided by new technologies such work specialization and encouraging intraorganiza- as enterprise social media. tional collaboration (Ren and Argote 2011). In addi- Although the outcomes of communication visibil- tion, by recombining existing knowledge with new ity in this particular study were quite positive, intro- ideas, employees bring new levels of innovation to duction of social networking technologies to the orga- organization products and services. Burt (2004, p. 351) nization could be problematic. For example, when suggests that those who are adept at innovating once invisible behavioral information becomes visi- Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. through recombination of knowledge have a “vision ble, workers may become fearful of surveillance by advantage” that others in the organization do not. management and coworkers (Ciborra 1997, Zuboff He also suggests that this vision advantage comes 1988). Moreover, visible communications may foster from bridging across structural holes in an organi- self-preservation behaviors by which workers do not zation’s communication network. Yet the findings of communicate the true nature of their work, but rather this study suggest that technologies such as enterprise what they believe others think they do and know. social networking sites make communication among (Leonardi and Treem 2012). Thus, the openness fos- coworkers universally visible, thus giving the vision tered by communication visibility could backfire to Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 813

create unproductive organizational behaviors includ- this improved metaknowledge provides the basis for ing intentional ambiguity (Gibbs et al. 2013). Clearly, jointly coordinated action and more economic distri- these responses run counter to the tenets of effec- bution of effort (Austin 2003). tive knowledge sharing. Over time, if communica- To help employees share their knowledge when car- tions through the enterprise social networking tech- rying out tasks, many organizations implement tech- nology stagnate, the result could be smaller increases nologies such as intranets, enterprise resource plan- in the accuracy of metaknowledge. In addition, moti- ning systems, shared data repositories, group support vation to use the enterprise social networking site systems, groupware and customer relationship man- may be undermined by the visibility of too many agement systems, etc. Indeed, years of research on communications between too many workers. Vicari- decision making and information sharing in experi- ous learning may then be stifled when workers’ atten- mental and organizational teams shows that workers tion is divided across too many messages. Workers often fail to integrate their knowledge with cowork- may begin to focus instead on those messages that ers because they do not know what others know directly relate to their immediate task, and in so doing (Argote et al. 2000). Despite the fact that an increas- artificially limit the advantages of the organization- ing number of firms are implementing knowledge wide reach for which the enterprise social networking management technologies, few organizations report site was designed. dramatic improvements in the exploitation of cumu- In addition to the broad implications for organiza- lative expertise (Kankanhalli et al. 2005). Scholars tion theory discussed above, the findings presented have suggested that many organizations using knowl- in this paper contribute to the more specific research edge management systems do not reap their benefits on transactive memory. Transactive memory theo- because workers simply do not enter into the system rists argue that accurate metaknowledge is necessary information that accurately reflects their knowledge for a successful transactive memory system. Yet (to (Wasko and Faraj 2005). There are multiple hypothe- my knowledge) there has been no in-depth explo- ses as to why this might be so: Perhaps workers are ration of how such accuracy is achieved or improved not proficient in using the new technology (Yuan et al. (Peltokorpi 2008, Ren and Argote 2011). Our find- 2005); perhaps electronic documentation has not yet ings demonstrate how enterprise social networking proliferated as a team norm (Walsham 2002); perhaps sites can foster the development and improvement of workers do not think the information they have is accurate organizational metaknowledge by enabling important for their coworkers (Cress et al. 2006). awareness of ambient communication. Significantly, The largest impediment to the success of knowl- the findings show that user inferences about who edge management technologies for organization-wide knows what and who knows whom, gleaned by atten- knowledge sharing is that documenting the knowl- tion to coworker’s visible communications, are reli- edge required to complete one’s work is not a nat- able and produce accurate cognitive knowledge and ural or routine part of most tasks. For example, a social structures. worker who writes marketing plans is typically eval- Transactive memory researchers have shown that uated on the success of those plans. Documenting organizational technologies such as databases and how the material for the plan was assembled is not a directories are useful for helping teams allocate and step in the plan itself. Thus, it may be difficult for a retrieve knowledge from others (Choi et al. 2010). worker to show how they used information technol- These findings demonstrate that technologies, such as ogy to enhance their knowledge and improve knowl- enterprise social networking sites, which make com- edge management efforts. This is not a normal part munication visible and thus enable ambient aware- of the worker’s task (Bowker et al. 1995). It may even ness, can also help workers maintain accurate directo- diminish the worker’s ability to successfully complete ries of who knows what and who knows whom. The future assignments. findings also show that use of such technologies can Goffman (1959) referred to this problem of action increase the similarity between coworkers’ cognitive versus representation of action in what he called the knowledge and organizational social structures. The paradox of representation. He suggested that those production of shared cognition is possible through who are most skilled at particular tasks spend so much Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. the use of enterprise social networking sites because time on those tasks that they do not have time to let workers draw from the same set of cues (transparent others know how they completed them. He further communications and translucent networks) to form argued that because most work is done in private (i.e., perceptions of “who knows what” and “who knows away from coworkers), workers must “dramatize” whom.” Consequently, using enterprise social net- their task to make it visible: “While in the presence working technologies can lead to metaknowledge that of others, the individual typically infuses his activ- is not only more accurate, but also more similar across ity with signs which dramatically highlight and por- coworkers. Transactive memory theorists argue that tray confirmatory factors that might otherwise remain Leonardi: Social Media, Knowledge Sharing, and Innovation 814 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

unapparent or obscure” (1959, p. 33). This insight sug- improved this manuscript, as well as Jeffrey Treem, Casey gests those who take the time to work well may not Pierce, and Stephanie Dailey who helped with data collec- have the time to explain to others how they work well. tion. Generous funding for this study was provided by a In other words, Goffman suggested: “The problem of grant from the National Science Foundation (SES-1331492). dramatizing one’s work involves 0 0 0 making invisible [actions] visible. The work that must be done by those References who fill certain statuses is often so poorly designed as an expression of desired meaning, that if the incum- Allen TJ (1977) Managing the Flow of Technology (MIT Press, Cam- bridge, MA). bent would dramatize the character of his role, he Argote L, Gruenfeld DH, Naquin C (2000) Group learning in orga- must divert an appreciable amount of his energy to do nizations. Turner M, ed. Groups at Work (Lawrence Erlbaum, so” (p. 32). As a consequence of this paradox, many Hillsdale, NJ), 369–411. workers do not take steps to make their behaviors Argote L, Ingram P, Levine JM, Moreland RL (2000) Knowledge public. Thus, the knowledge accumulated in the pro- transfer in organizations: Learning from the experience of oth- ers. Organ. Behav. Human Decision Processes 82(1):1–8. cess of generating their work is unavailable to others Austin JR (2003) Transactive memory in organizational groups: The in the organization (Gardner 1992). effects of content, consensus, specialization, and accuracy on A major implication of our findings is that rather group performance. J. Applied Psych. 88(5):866–878. than encouraging (or forcing) workers to document Benbasat I, Goldstein DK, Mead M (1987) The case research strategy their knowledge for others, a more fruitful strat- in studies of information systems. MIS Quart. 11(3):369–386. egy may be to have them switch their channels of Bowker G, Timmermans S, Star SL (1995) Infrastructure and organi- zational transformation: Classifying nurses’ work. Orlikowski communication to technologies that help make their W, Walsham G, Jones M, DeGross JD, eds. Information Tech- communication visible to others. Developing accu- nology and Changes in Organizational Work (Chapman and Hall, rate metaknowledge through exposure to ambient London), 344–370. communications requires little work on the part of Brandon DP, Hollingshead AB (2004) Transactive memory systems sources. Tangentially, use of an enterprise social net- in organizations: Matching tasks, expertise, and people. Organ. Sci. 15(6):633–644. working site requires minimal effort on the part Brown JS, Duguid P (2000) The Social Life of Information (Harvard of knowledge sources. Sources need only encourage Business School Press, Cambridge, MA). workers to shift their communication activity from Burt RS (2004) Structural holes and good ideas. Amer. J. Sociol. private channels (e.g., phone, email, instant messag- 110(2):349–399. ing, etc.) to an enterprise social networking site where Choi SY, Lee H, Yoo Y (2010) The impact of information technol- communications are public and visible to others in the ogy and transactive memory systems on knowledge sharing, application, and team performance: A field study. MIS Quart. organization. Because they are simply communicating 34(4):855–870. as they normally do, there is a larger body of informa- Ciborra C (1997) De profundis? Deconstructing the concept of tion available to their coworkers. From this coworkers strategic alignment. Scandinavian J. Inform. Systems 9(1):67–82. can develop their own metaknowledge. Cramton CD, Orvis KL, Wilson JM (2007) Situation invisibility In conclusion, communication visibility may have and attribution in distributed collaborations. J. Management many important consequences for the way work is 33(4):525–546. Cress U, Kimmerle J, Hesse FW (2006) Information exchange with conducted in the next several decades. Today, enter- shared databases as a social dilemma: The effect of metaknowl- prise social media tools enable communication visi- edge, bonus systems, and costs. Comm. Res. 33(5):370–390. bility at unprecedented levels. As technology design- Cummings JN, Espinosa JA, Pickering CK (2009) Crossing spa- ers and developers continue to improve these tools, tial and temporal boundaries in globally distributed projects: develop streamlining applications, and devise algo- A relational model of coordination delay. Inform. Systems Res. 20(3):420–439. rithms that make them more efficient, we are likely to Cyert RM, March JG (1963) A Behavioral Theory of the Firm, 2nd ed. see even more communication visibility in the future. (Prentice Hall, New York). This paper has developed a tentative theory of com- Dey AK, de Guzman E (2006) From awareness to connectedness: munication visibility from a qualitative field study The design and deployment of presence displays. Grinter R, on enterprise social networking site use in one large Rodden T, Aoki P, Cutrell E, Jeffries R, Olson G, eds. Proc. Sigchi Conf. Human Factors Comput. Systems (ACM Press, New organization. A good deal of work is needed to refine York), 899–908. this theory, introduce scope, and test its predictions DiMicco J, Millen DR, Geyer W, Dugan C, Brownholtz B, Muller

Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. in varied organizational contexts. Moving the theory M (2008) Motivations for social networking at work. Proc. 2008 forward in this way will foster a greater understand- ACM Conf. Comput. Supported Cooperative Work (ACM Press, ing of how the increasingly public and visible nature New York), 711–720. of our communication is shifting the ways in which Dourish P, Bellotti V (1992) Awareness and coordination in shared workspaces. Turner J, Kraut RE, eds. CSCW’92: Proc. Conf. people work. Comput.-Supported Cooperative Work (ACM Press, New York), 107–114. Acknowledgments Erickson I (2010) Geography and community: New forms of The author thanks Jonny Holmström, Kalle Lyytinen, interaction among people and places. Amer. Behav. Scientist and three anonymous reviewers for comments that have 53(8):1194–1207. Leonardi: Social Media, Knowledge Sharing, and Innovation Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS 815

Fleiss JL (1971) Measuring nominal scale agreement among many Lapré MA, Van Wassenhove LN (2001) Creating and transferring raters. Psych. Bull. 76(5):378–382. knowledge for productivity improvement in factories. Manage- Gardner W (1992) Lessons in organizational dramaturgy: The art of ment Sci. 47(10):1311–1325. impression management. Organ. Dynam. 21(1):33–46. Leonardi PM, Treem JW (2012) Knowledge management technol- Gibbs JL, Rozaidi NA, Eisenberg J (2013) Overcoming the “ideol- ogy as a stage for strategic self-presentation: Implications for ogy of openness”: Probing the affordances of social media for knowledge sharing in organizations. Inform. Organ. 22(1):37–59. organizational knowledge sharing. J. Comput. Mediated Comm. Leonardi PM, Huysman M, Steinfield C (2013) Enterprise social 19(1):102–120. media: Definition, history, and prospects for the study of social technologies in organizations. J. Comput.-Mediated Comm. Gioia DA, Manz CC (1985) Linking cognition and behavior: A script 19(1):1–19. processing interpretation of vicarious learning. Acad. Manage- ment Rev. 10(3):527–539. Liang D, Moreland R, Argote L (1995) Group versus individual training and group performance: The mediating role of trans- Glaser B (1965) The constant comparative method of qualitative active memory. Personality Soc. Psych. Bull. 21(4):384–393. analysis. Soc. Problems 12(4):436–445. Liebeskind JP (1996) Knowledge, strategy and the theory of the Glaser B (1978) Theoretical Sensitivity (The Sociological Press, Mill firm. Strategic Management J. 17(2):93–107. Valley, CA). Majchrzak A, Cooper LP, Neece OE (2004) Knowledge reuse for Goffman E (1959) The Presentation of Self in Everyday Life (Doubleday innovation. Management Sci. 50(2):174–188. Anchor, Garden City, NY). March JG (1991) Exploration and exploitation in organizational Hampton KN, Lee C-J, Her EJ (2011) How new media affords net- learning. Organ. Sci. 2(1):71–87. work diversity: Direct and mediated access to social capital Miles MB, Huberman AM (1994) Qualitative Data Analysis: An through participation in local social settings. New Media Soc. Expanded Sourcebook, 2nd ed. (Sage Publications, Thousand 13(7):1031–1049. Oaks, CA). Hansen MT (1999) The search-transfer problem: The role of weak Nardi BA, Engeström Y (1999) A web on the wind: The structure ties in sharing knowledge across organization subunits. Admin. of invisible work. Comput. Supported Cooperative Work 8(1):1–8. Sci. Quart. 44(1):82–111. Newell S, Robertson M, Scarbrough H, Swan J (2009) Manag- Hargadon AB (2002) Brokering knowledge: Linking learning and ing Knowledge Work and Innovation (Palgrave Macmillan, Bas- innovation. Res. Organ. Behav. 24:41–85. ingstoke, UK). Heald MR, Contractor N, Koehly LM, Wasserman S (1998) For- Palazzolo ET, Serb DA, She YC, Su CK, Contractor NS (2006) mal and emergent predictors of coworkers’ perceptual congru- Coevolution of communication and knowledge networks in ence on an organization’s social structure. Human Comm. Res. transactive memory systems: Using computational models for 24(4):536–563. theoretical development. Comm. Theory 16(2):223–250. Hollingshead AB (1998a) Communication, learning, and retrieval Peltokorpi V (2008) Transactive memory systems. Rev. General in transactive memory systems. J. Experimental Soc. Psych. Psych. 12(4):378–394. 34(5):423–442. Reagans R, McEvily B (2003) Network structure and knowledge Hollingshead AB (1998b) Retrieval processes in transactive memory transfer: The effects of cohesion and range. Admin. Sci. Quart. systems. J. Personality Soc. Psych. 74(3):659–671. 48(2):240–267. Jackson P, Klobas J (2008) Transactive memory systems in organiza- Reagans R, Argote L, Brooks D (2005) Individual experience and tions: Implications for knowledge directories. Decision Support experience working together: Predicting learning rates from Systems 44(2):409–424. knowing who knows what and knowing how to work together. Management Sci. 51(6):869–881. Jarrahi MH, Sawyer S (2013) Social technologies, informal knowl- edge practices, and the enterprise. J. Organ. Comput. Electronic Ren Y, Argote L (2011) Transactive memory systems 1985–2010: Commerce 23(1):110–137. An integrative framework of key dimensions, antecedents, and consequences. Acad. Management Ann. 5(1):189–229. Jarvenpaa SL, Majchrzak A (2008) Knowledge collaboration among professionals protecting nation security: Role of transactive Ren Y, Carley KM, Argote L (2006) The contingent effects of trans- memories in ego-centered knowledge networks. Organ. Sci. active memory: When is it more beneficial to know what others 19(2):260–276. know? Management Sci. 52(5):671–682. Strauss A, Corbin J (1998) Basics of Qualitative Research: Techniques Kankanhalli A, Tan BCY, Wei K-K (2005) Contributing knowl- and Procedures for Developing Grounded Theory, 2nd ed. (Sage edge to electronic repositories: An empirical investigation. MIS Publications, Thousand Oaks, CA). Quart. 29(1):113–143. Suchman L (2007) Human–Machine Reconfigurations: Plans and Situ- Katila R, Chen E (2008) Effects of search timing on innovation: ated Actions (Cambridge University Press, New York). The value of not being in sync with rivals. Admin. Sci. Quart. 53(4):593–625. Szulanski G, Jensen RJ (2006) Presumptive adaptation and the effectiveness of knowledge transfer. Strategic Management J. Keen A (2012) Digital Vertigo (St. Martin’s Press, New York). 27(10):937–957. Keitzmann JH, Hermlens K, McCarthy IP, Silvester BS (2011) Social Tortoriello M, Reagans R, McEvily B (2012) Bridging the knowl- media? Get serious! Understanding the functional building edge gap: The influence of strong ties, network cohesion, and blocks of social media. Bus. Horizons 54(3):241–251. Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved. network range on the transfer of knowledge between organi- Kim J-Y, Miner AS (2007) Vicarious learning from the failures and zational units. Organ. Sci. 23(4):1024–1039. near-failures of others: Evidence from the U.S. commercial Treem JW, Leonardi PM (2012) Social media use in organizations: banking industry. Acad. Management J. 60(3):687–714. Exploring the affordances of visibility, editability, persistence, Kinnaird P, Dabbish L, Kiesler S (2012) Workflow transparency in and association. Comm. Yearbook 36:143–189. a microtask marketplace. Proc. Group ’12 (ACM Press, New Von Hippel E, Tyre MJ (1995) How learning by doing is done: York), 281–284. Problem identification in novel process equipment. Res. Policy Lampe C, Ellison N, Steinfield C (2006) A face (book) in the crowd: 24(1):1–12. Social searching vs. social browsing. Proc. Annual Conf. Comput. Walsham G (2002) What can knowledge management systems Supported Cooperative Work (ACM Press, New York), 167–170. deliver? Management Comm. Quart. 16(2):267–273. Leonardi: Social Media, Knowledge Sharing, and Innovation 816 Information Systems Research 25(4), pp. 796–816, © 2014 INFORMS

Wasko MM, Faraj S (2005) Why should I share? Examining social Yuan Y, Fulk J, Shumate M, Monge PR, Bryant JA, Matsaganis M capital and knowledge contribution in electronic networks of (2005) Individual participation in organizational informa- practice. MIS Quart. 29(1):35–57. tion commons. The impact of team level social influence Wegner DM (1987) Transactive memory: A contemporary analysis and technology-specific competence. Human Comm. Res. 31(2): of group mind. Mullen B, Goethals G, eds. Theories of Group 212–240. Behavior (Springer-Verlag, New York), 185–208. Yuan YC, Fulk J, Monge PR (2007) Access to information in connec- Wegner DM (1995) A computer network model of human transac- tive and communal transactive memory systems. Comm. Res. tive memory. Soc. Cognition 13(3):319–339. 34(2):131–155. Weick KE (1995) Sensemaking in Organizations (Sage Publications, Zuboff S (1988) In the Age of the Smart Machine: The Future of Work Thousand Oaks, CA). and Power (Basic Books, New York). Downloaded from informs.org by [128.240.225.73] on 10 January 2017, at 01:57 . For personal use only, all rights reserved.