<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Design of Enterprise Social Media: Recommendations from a Case Study</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Festo AG &amp; Co. KG</institution>
          ,
          <addr-line>Esslingen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2014</year>
      </pub-date>
      <abstract>
        <p>Enterprise social media (ESM), such as wikis, blogs, or social networks, have rapidly spread across organisations. They offer unique means to support knowledge management, knowledge creation, or internal communication, especially in distributed work environments. While most work focuses on what ESM can be used for, there is little research so far on how ESM themselves should be further developed. Based on the results of a case study at a German enterprise, we come up with recommendations for designers who seek to support the development of ESM.</p>
      </abstract>
      <kwd-group>
        <kwd>Enterprise social media</kwd>
        <kwd>design</kwd>
        <kwd>case study</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Enterprise social media (ESM), such as wikis, blogs, or social networks, have
rapidly spread across organisations. With respect to knowledge management,
ESM provide open and inexpensive alternatives to traditional implementations [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ],
facilitate knowledge creation in organisations [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ], and support knowledge
management practices, support the resource “knowledge”, as well as help in
overcoming knowledge management barriers [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Even though ESM have become increasingly widespread in today’s
organisations [
        <xref ref-type="bibr" rid="ref33 ref5">5, 33</xref>
        ], there is evidence that penetration of ESM inside enterprises is
still low [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and that social networks mainly reflect existing hierarchies and do
not help to overcome organisational silos [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. Thus it may still be argued that
the understanding of the role that ESM play in organizational life is in its
infancy [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. In addition, little focus has been given to organisations overall use of
social media [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>Our research has three objectives:
– To understand the requirements of today’s organisations and what ESM can
be used for
– To derive recommendations how to develop ESM further
– To apply ESM in practice</p>
      <p>
        In this paper, we focus on the second objective. Looking at literature, there
is little research on how to develop ESM further. With respect to wikis, semantic
enhancements have been discussed (e.g., [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]). It has also been shown how social
networks [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] and blogs [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] can be integrated into existing ERP systems. On
a more general level, implications for designers who seek to support reciprocity
have been derived [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. Mostly, however, ESM are used “as is.”
      </p>
      <p>This paper is organised as follows. In the next section, ESM are introduced.
Then we describe our approach. This is followed by our recommendations how
to develop ESM further. A summary of the major points concludes the paper.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Enterprise Social Media</title>
      <p>
        Enterprise social media (ESM) can be defined as Web-based platforms that
allow workers to (1) communicate messages with specific co-workers or broadcast
messages to everyone in the organisation, (2) articulate a list of co-workers with
whom they share a connection, (3) post, edit, and sort text and files linked to
themselves or others, and (4) view the messages, connections, text, and files
communicated, articulated, posted, edited and sorted by anyone else in the
organisation at any time of their choosing [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        ESM possess a range of affordances [
        <xref ref-type="bibr" rid="ref26 ref41">41, 26</xref>
        ] (see Table 1 for an overview). An
affordance describes the property of an environment relative to the people. It
determines the actions people can perform in this environment. You could thus
describe an affordance as “perceived action possibilities” [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        At the centre is the individual or the group [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Capabilities to communicate
with each other are essential in social media. What social media distinguishes
from other media is not only that people, relationships, content and reviews are
visible to the users of an application, but also that they offer insights into the
communicative actions of other people and that the traces of these
communicative actions are and remain visible [
        <xref ref-type="bibr" rid="ref11 ref38">11, 38</xref>
        ]. Visibility and persistence in turn are
prerequisites for someone to expand the circle of people, networks or contents,
of which learning is possible [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        Association describes the relationships between people (e.g., in form of
contact lists as part of public profiles), between people and the content they have
created (e.g., as explicit reference to the author of a wiki article), and between
content (e.g., by creating respective links) [
        <xref ref-type="bibr" rid="ref11 ref38">11, 38</xref>
        ]. Such associations may not
only be made by the users themselves but also by means of algorithms.
      </p>
      <p>
        Identity describes to what extent users reveal themselves [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. This can be
done consciously (e.g., when users show their name, picture, interests, or
responsibilities in a public profile) or unconsciously (e.g., over their comments). With
what characteristics users describe themselves depends firstly on how they see
themselves, and secondly how they want to be perceived by others [
        <xref ref-type="bibr" rid="ref14 ref27">14, 27</xref>
        ].
      </p>
      <p>
        Reputation describes the social standing of users [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. A user’s reputation is
influenced, for example, by the number of high-quality articles he or she publishes
in a wiki or blog, or how many times he or she answers the questions of others.
      </p>
      <p>
        Editability describes both the possibility that users not only create content
but also that they can revise it after its publication [
        <xref ref-type="bibr" rid="ref11 ref22 ref38">11, 22, 38</xref>
        ]. By this, three
things can be achieved [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]:
– Control of external representation (e.g., with what attributes to describe
yourself in your personal profile);
– Creation of target group specific content (e.g., blogs are created with respect
to a readership);
– Improvement of the quality of information (by constantly revising the
content and by having others participating, e.g., in the form of comments or, in
wiki articles, as co-authors).
      </p>
      <p>
        Content does not always have to be created from scratch but can be
assembled from existing content (including content from other authors). This is called
recombinability [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] or replicability [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        In collaboration, several users are grouped around a theme to edit it
together [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Wiki articles represent a good example. Persistence means that
communication remains accessible in the same form as the original display
after an author has finished his or her work [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]. Finally, visibility means that
social media allow users to make their behaviours, knowledge, preferences, and
communication network connections visible to others in the organisation [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Methodology</title>
      <p>
        We conducted a single case study. The goal is to gain a holistic understanding
of the object under investigation, that is, the introduction of an enterprise social
network (ESN) at the German company Festo. The basis is a detailed, empirical
description of the situation [
        <xref ref-type="bibr" rid="ref12 ref39">12, 39</xref>
        ]. Holistic means that we consider the four
following different perspectives:
– Contribution of ESM: Here we follow a distinction found in organisational
development. In general, you can distinguish between increasing efficiency
(e.g., maintaining / increasing flexibility, advancing willingness to innovate
/ to change) and improving quality of working life (e.g., ability to work in
a team / to cooperate, more participation in consulting and decision
processes) [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]. An alternative would have been to consider different use cases.
However, one main characteristic of ESM is that they are highly undefined
and recombinant, that is, they can be employed for many different use cases,
which may also change over time [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ].
– Context: Considering experiences from other disciplines, such as
organisational research [
        <xref ref-type="bibr" rid="ref2 ref34">2, 34</xref>
        ] or Artificial Intelligence [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], we argue that there needs
to be a better understanding of the context in which ESM are applied.
To describe context, we employ the Cynefin sense-making framework [
        <xref ref-type="bibr" rid="ref23 ref36">23,
36</xref>
        ]. It consists of five domains, that is, simple, complex, chaotic,
complicated, and disorder. It also defines different movements between the
domains. Cynefin has been applied to different domains, such as agile software
development [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], homeland security [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], or biomedical research [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
– Process: We adopt a lifecycle model originally developed for communities of
practice and which distinguishes the five phases definition, start-up,
operation, development, and close [
        <xref ref-type="bibr" rid="ref18 ref28">18, 28</xref>
        ].
– Users: Analogous to organisational development, we distinguish between
different levels, that is, the invididual, team, and organisation level [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Besides
readers and authors, the individual level further contains leaders (due to their
importance for ESM adoption) and administrators (of the ESN used at the
German enterprise).
      </p>
      <p>
        To collect and analyse the data a mixed-method approach is employed [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
that is, interviews, online surveys, and content analysis. In addition, the authors
(who lead the Connect! program and also manage several communities) collected
their experiences [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
3.1
      </p>
      <sec id="sec-3-1">
        <title>Festo AG &amp; Co. KG</title>
        <p>Festo (www.festo.com), founded in 1925, is an independent familiy-owned
company based in Esslingen, Germany. It is one of the leading companies in the
field of automation technology. Festo offers products, systems and services for
electric, pneumatic and servo-pneumatic drive and control technologies. The
company employs around 20,100 people and posted 2017 sales of EUR 3.1
billion. Production takes place in eight countries. Apart from Germany, these are
Bulgaria, Brazil, China, India, Switzerland, Czech Republic, and Hungary.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Connect!</title>
        <p>In February 2013, Festo started a project called Connect! whose main objective
has been to determine what positive effects (if any) introducing an enterprise
social network (ESN) has for Festo. (We consider ESN a type of ESM. Other
types are wikis or blogs.)</p>
        <p>At the outset, the following hypotheses were formulated:
– (Urgent) questions can be answered throughout the organisation.
– Colleagues with similar interests can be more easily identified.
– Valuable information can be more easily detected.
– Overall, the productivity increases.
– Relationships between colleagues across departmental, regional, or country
borders are strengthened.</p>
        <p>As a consequence, the resulting social fabric shall Festo make more resiliant
in times of economic crises.</p>
        <p>The technical basis forms a product called Social Sites from Sitrion. It is an
add-on to Microsoft SharePoint and provides the necessary functionality (e.g.,
the means to write posts / to ask questions, an activity stream that shows all post
/ questions in a chronological order, and the possibility to follow communities,
colleagues, and topics).</p>
        <p>Social networking at Festo means that users can found communities for a
department (e.g., to improve information flow), a project (e.g., to improve project
management), or for a specific topic (e.g., to foster information exchange between
experts). Requests for new communities are submitted by an electronic form. In
addition to the name of the planned community, its objectives, the approximate
number of members, the type of community (team, project, or topic), the names
of at least one community manager (i.e., the colleague who will be in charge of
the community), and the name of a manager that supports the community must
be specified. The project team will examine the application and may request
additional information. Upon approval, a SharePoint site can be supplemented
by the corresponding functions and the new community managers are invited to
a respective training.</p>
        <p>Currently, with the migration to Office 365 Social Sites is being replaced with
Microsoft Teams.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Design of Case Study</title>
        <p>Two questionnaires were sent out at intervals of one year to allow a before-after
comparison. Addressed were all users of Connect! worldwide. In questionnaire 1
all questions were asked in English, in questionnaire 2 a German questionnaire
was also offered. Both questionnaires were tested and approved in each case by
the data protection officer and the works council. Anonymity of participants was
ensured. Table 2 provides an overview of the two surveys and the two interviews.
5 Employees 10 Managers
5 Managers
all Festo companies 5 HQ 2 HQ</p>
        <p>5 companies 8 companies</p>
        <p>July/August 2015 June 2015 April/May 2018</p>
        <p>The first survey took place from 28 July 2014 to 11 August 2014. 77 colleagues
participated, which corresponds to a response rate of roughly 10% (in August
2014 approximately 800 colleagues were member in one or more communities).
Participants came from all six communities that existed at that time.</p>
        <p>The second survey took place from July 27, 2015 to August 28, 2015. 63
colleagues participated, which is a response rate of 5% (in August 2015 the
membership in communities had doubled). Out of those who participated in the
survey, 3 were less than a month, 21 between 2 and 6 months, 24 between 7 and
12 months, and 15 more than 12 months member in a community. Participants
came from 20 different communities (out of 32 who existed at that time).</p>
        <p>The questionnaire is divided into five parts: the (subjectively) perceived
benefits for a user, the community and for Festo form the first three questions. The
fourth question deals with the possible barriers of use. For each question between
four and eight statements are formulated and users can rate these statements
along a 5-point Likert scale (“strongle agree”, “agree”, “neither agree nor
disagree”, “disagree”, “strongly disagree”). At the last, the fifth question, the
participants are able to leave a comment. Table 3 gives the statements participants
evaluate regarding the benefits for individual users.
How do you evaluate the benefits of Connect! for individual users?
Communication with colleagues has become easier
Social networking allows me to expand my professional network
Social networking allows me to promote my work-concerned initiatives
It has become easier to find experts in the organisation
Problems can be solved faster
Awareness about and finding of relevant information has been improved
I now discover information of which I did not know it exists</p>
        <p>We conducted two series of interviews. In the first series, taking place in June
2015, a total of ten people from four different departments were interviewed.
Five of these ten coming from the Headquarter and five of sales companies from
Europe and America. Five participants (coming from HQ and companies) were
members of the management. The second series of interviews were held in April
and May 2018. Ten managers from nine different countries took part. The focus
was on how ESM can support managers in their tasks. In both cases, participants
were addressed directly. Participation in the interviews was voluntary. Interviews
have been semi-structured and open. They were conducted either in person or
by telephone.</p>
        <p>In the interview, questions like “What benefits do you perceive in using
Connect! (for idividual users, teams, and the organisation as a whole)?”, “What
topics are suitable for ESM?”, “To what extent have procedures been changed
(i.e., do users work differently than before)?”, or “How do you measure the
success of ESM?”.</p>
        <p>In content analysis as well as looking at our own experiences, we tried to
identify usage patterns. This has been an ongoing task.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Recommendations for ESM</title>
      <p>In the following, we discuss selected findings from each data collection method.
4.1</p>
      <sec id="sec-4-1">
        <title>Surveys</title>
        <p>In both surveys, almost 80% of the participants either agreed or strongly agreed
to the statement that Connect! facilitates the exchange of experiences. On the
other hand, however, in the second survey a fear of information overload was
expressed (in the first survey it was not mentioned). This reflects in our view
the difference between the two roles author and reader. While from an author’s
point of view a social network facilitates the distribution of information, from a
reader’s point of view this additional information adds to the already exisiting
workload.</p>
        <p>
          To alleviate this effect, ESM could recommend for which users or communities
a post could be relevant (thus, an author could mention them explicitely) or
which posts / questions a user should turn his or her attention to [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. A similar
mechanism has been implemented for so-called urgent requests in TechnoWeb,
a Siemens-internal crowd sourcing method [
          <xref ref-type="bibr" rid="ref42">42</xref>
          ].
4.2
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Interviews</title>
        <p>In the first interview series, we inquired about the context in which the
communities operate colleagues are a member of. However, responses were rather generic
and mostly centered around the sharing of information (see above). We therefore
turned to literature to see whether some recommendations can be derived.</p>
        <p>
          In a complex context, users need to probe, sense, and respond [
          <xref ref-type="bibr" rid="ref23 ref36">23, 36</xref>
          ]. The
characteristics of complex systems are non-linear relationships, where small
actions can lead to unpredictable events. There is no clear correlation between
cause and effect. Probing means that actions are performed in the sense of ”trial
and error”. With respect to ESM it could mean that new (or changed)
functionality is first evaluated by a smaller group of users or in certain communities
before it is made generally available. Sensing would mean that management of
the Connect! program monitors whether how the new functionality is received.
Additionally, “test” users can share their impressions in the respective
communities. Responding means that functionality that receives positive feedback is
made available to other communities as well.
        </p>
        <p>This recommendation is related to one result from the second interview series.
Here it was pointed out repeatedly, that ESM have to be easy to use. It was
mentioned several times that if something does not work the first time, people
will not give it a second chance. This view may be extreme, but it underlines
the need to test new functionality first with a limited group of users.</p>
        <p>It is also noteworthy that several participants of the second interview series
did not distinguish between ESM (such as Connect!) and external social media
(e.g., LinkedIn). For them it is more important with whom to share information
and not so much on what platform. The latter question is more of a nuisance.
From a tool perspective, platforms like Connect! could thus offer different
channels through which information can be shared. LinkedIn (or any other external
platform) could be such a channel.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Content Analysis</title>
        <p>We noted that hashtags are only used sporadically. In the training sessions, they
were introduced as means to facilitate information filtering. When asking users
why they do not use hashtags, two points came up repeatedly.</p>
        <p>– People who mainly use messaging apps like WhatsApp, are not used to
hashtags. They have not experienced their benefits in practice.
– Most people view past conversations in Connect! as hardly relevant anymore.</p>
        <p>Hence, there is limited need to search for older posts or to filter them.</p>
        <p>
          Nevertheless, we consider hashtags still to be helpful, especially in use cases
where customer requirements or applications with Festo products are discussed.
Here it is beneficial to turn to past conversations. We therefore recommend that
ESM should actively propose hashtags to authors (e.g., [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]).
        </p>
        <p>It has been interesting to see that hardly any question remained unanswered
and that for some communities this is the main use case. In addition to urgent
questions (see above), it may be worthwhile to introduce additional kinds of
questions.
4.4</p>
      </sec>
      <sec id="sec-4-4">
        <title>Own Experience</title>
        <p>Especially at the beginning of Connect! there were repeated requests whether
people can particpate anonymously in a community or to use an alias. The
main argument was that people would be more willing to engage in conversation
when there was no danger of looking ignorant or uninformed. We always declined
such requests. Our main argument has been that people will engage when they
perceive a benefit, otherwise they won’t. In the meantime, however, we could
imagine one use case where anonymous participation is an option. In case of
(potentially) controversial topic (e.g., company strategy) then people may indeed
think twice before sharing an opinion.</p>
        <p>We were interested in what people really mean when they press the
likebutton. Social Sites distinguishes between posts and questions. For questions,
you can specify different answering options. In a small experiment, the authors
published five posts in a three-month period (March to May, 2018) have been
formated as questions. Depending on whether readers found the post to be useful,
wanted to say thanks for the information, did not necessarily agree with the
content, liked it, or simply wanted to acknowledge having read it, they were
encouraged to click on the respective answering option (see Figure 1 for a sample
post).</p>
        <p>Table 4 summarises user feedback. Nine times people considered the posts
to be “useful information,” three liked it, and each of the remaining three
options (thanks for the information, I do not ncessarily agree, and I’ve read it)
was selected once. This is certainly not conclusive evidence, but it gives a first
indication that “like” may not be enough.
The objective of Connect! objective has been to determine what effects
introducing an enterprise social network (ESN) has for Festo. First and foremost, user
mostly benefit from the possibility to share information quickly and that
colleagues can be reached faster. The latter has also a positive effect on knowledge
acquisition as questions got answered faster.</p>
        <p>In this paper, we have derived recommendations how to develop ESM further.
They are based on the results of a longitudinal case study, in which data have
been collected over a four-year period.</p>
        <p>A limitation of this study is that it only considers enterprise social networks.
Thus a next step is to see whether the recommendations derived equally apply
to wikis and blogs. Another limitation is that the study has been carried out at
one enterprise only. Experiences from more enterprises are needed.</p>
        <p>It can be argued that the users at Festo only have experience with a relatively
old system (i.e., it has not changed since its introduction in 2013) and therefore
the conclusions drawn may be obsolete when using a state-of-the-art platform like
Microsoft Teams, Yammer, or SAP Jam (at Festo we have practical experience
with all three). However, differences are marginal and none of them contains the
functionality suggested in this paper.</p>
        <p>One of the four perspectives was process. We found no indication that
depending on the phase a community is in additional or other functionality is
needed. However, as one of our next steps we will examine whether different key
performance indicators (KPIs) are needed or whether the same KPIs need to be
interpreted differently. For instance, user engagement may be judged differently
in the start-up phase than in the operational phase (where the number of lurkers
may be higher).</p>
        <p>
          It can be expected that data privacy will be a major driver for future
enhancements. For instance, the General Data Protection Regulation (GDPR) of
the EU establishes a “right to explanations” [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. For instance, a social network
should be able to explain why a user should connect with someone else (and on
what data this recommendation rests). In addition, user data could be stored in
distributed locations using blockchain technology [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ].
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Aisenberg</given-names>
            <surname>Ferenhof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Durst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Hesamamiri</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.:</surname>
          </string-name>
          <article-title>The impact of social media on knowledge management</article-title>
          .
          <source>In: Proceedings of 11th International Forum on Knowledge Asset Dynamics</source>
          :
          <article-title>Towards a New Architecture of Knowledge: Big Data, Culture and Creativity (IFKAD</article-title>
          <year>2016</year>
          ).
          <article-title>Institute of Knowledge Asset Management (IKAM</article-title>
          ) (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bamberger</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          :
          <article-title>Beyond contextualization: Using context theories to narrow the micro-macro gap in management research</article-title>
          .
          <source>Academy of Management Journal</source>
          <volume>51</volume>
          (
          <issue>5</issue>
          ),
          <fpage>839</fpage>
          -
          <lpage>846</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Behrendt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trier</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Mixed methods analysis of enterprise social networks</article-title>
          .
          <source>Computer Networks</source>
          <volume>75</volume>
          ,
          <fpage>560</fpage>
          -
          <lpage>577</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bellavita</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Changing homeland security: Shape patterns, not programs</article-title>
          .
          <source>Homeland Security Affairs</source>
          <volume>2</volume>
          (
          <issue>3</issue>
          ) (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Besana</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quintarelli</surname>
          </string-name>
          , E.: Persone, relazioni e business.
          <article-title>La collaborazione nel futuro delle imprese italiane: Social collaboration survey</article-title>
          <year>2013</year>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. boyd, d.:
          <article-title>Social network sites as networked publics: Affordances, dynamics, and implication</article-title>
          . In: Papacharissi,
          <string-name>
            <surname>Z</surname>
          </string-name>
          . (ed.) Networked Self: Identity, Community, and Culture on Social Network Sites, pp.
          <fpage>39</fpage>
          -
          <lpage>58</lpage>
          . MIT Press, Cambridge, MA (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Breitenfeld</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berger</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makeprang</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <article-title>Mu¨ller-</article-title>
          <string-name>
            <surname>Birn</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Generating structured data by nontechnical experts in research settings. i-com 17(1</article-title>
          ),
          <fpage>25</fpage>
          -
          <lpage>40</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Br´ezillon, P.:
          <article-title>Modeling and using context: Past, present and future</article-title>
          .
          <source>Tech. Rep</source>
          .
          <volume>010</volume>
          ,
          <string-name>
            <surname>Laboratoire</surname>
            <given-names>d</given-names>
          </string-name>
          'Informatique de Paris 6 (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Burke</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Knowledge-based recommender systems</article-title>
          .
          <source>In: Encyclopedia of Library and Information Science</source>
          . University of Minnesota (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Burke</surname>
            ,
            <given-names>W.W.:</given-names>
          </string-name>
          <article-title>A contemporary view of organization development</article-title>
          . In: Cummings,
          <string-name>
            <surname>T.G</surname>
          </string-name>
          . (ed.)
          <source>Handbook of Organization Development</source>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>38</lpage>
          . Sage Publications, Thousand Oaks, CA (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ebersbach</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glaser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heigl</surname>
          </string-name>
          , R.: Social Web. UVK Verlagsgesellschaft mbH,
          <string-name>
            <surname>Konstanz</surname>
          </string-name>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Eisenhardt</surname>
            ,
            <given-names>K.M.:</given-names>
          </string-name>
          <article-title>Building theories from case study research</article-title>
          .
          <source>Academy of Management Review</source>
          <volume>14</volume>
          (
          <issue>4</issue>
          ),
          <fpage>532</fpage>
          -
          <lpage>550</lpage>
          (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Faraj</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jarvenpaa</surname>
            ,
            <given-names>S.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Majchrzak</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Knowledge collaboration in online communities</article-title>
          .
          <source>Organization Science</source>
          <volume>22</volume>
          (
          <issue>5</issue>
          ),
          <fpage>1224</fpage>
          -
          <lpage>1239</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kjaergaard</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Identity in information systems</article-title>
          .
          <source>In: ECIS 2009 Proceedings</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Goodman</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flaxman</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>EU regulations on algorithmic decision-making and a ”right to explanation”</article-title>
          .
          <source>In: Proceedings of ICML Workshop on Human Interpretability in Machine Learning (WHI</source>
          <year>2016</year>
          ). New York, NY (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Hense</surname>
            ,
            <given-names>J.U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandl</surname>
          </string-name>
          , H.:
          <article-title>Selbstevaluation als Ansatz der Qualita¨tsverbesserung von E-Learning-Angeboten</article-title>
          .
          <source>Tech. Rep</source>
          .
          <volume>184</volume>
          ,
          <string-name>
            <surname>Ludwig-</surname>
          </string-name>
          Maximilians-Universita¨t, Department Psychologie, Institut fu¨r Pa¨
          <source>dagogische Psychologie</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. H¨ogberg, K.:
          <article-title>Organizational social media: A literature review and research agenda</article-title>
          .
          <source>In: Proceedings of the 51st Hawaii International Conference on System Sciences</source>
          . pp.
          <fpage>1864</fpage>
          -
          <lpage>1873</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Iriberri</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leroy</surname>
          </string-name>
          , G.:
          <article-title>A life cycle perspective on online community success</article-title>
          .
          <source>ACM Computing Surveys</source>
          <volume>41</volume>
          (
          <issue>2</issue>
          ) (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Jenkins</surname>
            ,
            <given-names>H.S.:</given-names>
          </string-name>
          <article-title>Gibson's “affordances”: Evolution of a pivotal concept</article-title>
          .
          <source>Journal of Scientific Psychology (December</source>
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>Kamel</given-names>
            <surname>Boulos</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.N.</surname>
          </string-name>
          :
          <article-title>Semantic wikis: A comprehensible introduction with examples from the health sciences</article-title>
          .
          <source>Journal of Emerging Technologies in Web Intelligence</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ),
          <fpage>94</fpage>
          -
          <lpage>96</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Kempermann</surname>
          </string-name>
          , G.:
          <article-title>Cynefin as reference framework to facilitate insight and decisionmaking in complex contexts of biomedical research</article-title>
          .
          <source>Frontiers in Neuroscience 11(Article 634)</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Kietzmann</surname>
            ,
            <given-names>J.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hermkens</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McCarthy</surname>
            ,
            <given-names>I.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Silvestre</surname>
            ,
            <given-names>B.S.:</given-names>
          </string-name>
          <article-title>Social media? Get serious! Understanding the functional building blocks of social media</article-title>
          .
          <source>Business Horizons</source>
          <volume>54</volume>
          ,
          <fpage>241</fpage>
          -
          <lpage>251</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Kurtz</surname>
            ,
            <given-names>C.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Snowden</surname>
            ,
            <given-names>D.J.:</given-names>
          </string-name>
          <article-title>The new dynamics of strategy: sense-making in a complex-complicated world</article-title>
          .
          <source>IBM Systems Journal</source>
          <volume>42</volume>
          (
          <issue>3</issue>
          ) (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Lehel</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matthes</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Integration von Weblog-Funktionen in eine betriebliche Standardsoftware zum Wissensmanagement</article-title>
          . In: Proceedings KnowTech. Mu¨nchen (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Leonardi</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huysman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steinfield</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Enterprise social media: Definition, history, and prospects for the study of social technologies in organizations</article-title>
          .
          <source>Journal of Computer-Mediated Communication</source>
          <volume>19</volume>
          (
          <issue>1</issue>
          ) (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Leonardi</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vaast</surname>
          </string-name>
          , E.:
          <article-title>Social media and their affordances for organizing: A review and agenda for research</article-title>
          .
          <source>Academy of Management Annals</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Lusoli</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cachia</surname>
          </string-name>
          , R.:
          <article-title>Social computing and identity</article-title>
          . In: Punie,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Lusoli</surname>
          </string-name>
          , W., amd Gianluca Misuraca,
          <string-name>
            <given-names>C.C.</given-names>
            ,
            <surname>Broster</surname>
          </string-name>
          ,
          <string-name>
            <surname>D</surname>
          </string-name>
          . (eds.)
          <source>The Impact of Social Computing on the EU Information Society and Economy, chap. 5</source>
          .
          <string-name>
            <given-names>European</given-names>
            <surname>Comission</surname>
          </string-name>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>McDermott</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Community development as a natural step</article-title>
          .
          <source>Knowledge Management Review</source>
          <volume>3</volume>
          (
          <issue>5</issue>
          ),
          <fpage>16</fpage>
          -
          <lpage>19</lpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Pelaprat</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brown</surname>
          </string-name>
          , B.:
          <article-title>Reciprocity: Understanding online social relations</article-title>
          .
          <source>firstmonday</source>
          <volume>17</volume>
          (
          <issue>10</issue>
          ) (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Pelrine</surname>
          </string-name>
          , J.:
          <article-title>On understanding software agility - a social complexity point of view</article-title>
          .
          <source>E:CO</source>
          <volume>13</volume>
          (
          <issue>1-2</issue>
          ),
          <fpage>26</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Pralong</surname>
          </string-name>
          , J.:
          <article-title>Mode collaboratif ou collaboratif a` la mode? Tech. rep</article-title>
          .,
          <string-name>
            <surname>Institut de Gestion Sociale (IGS-RH</surname>
            <given-names>)</given-names>
          </string-name>
          , Paris, France (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Richter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riemer</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Malleable end-user software</article-title>
          .
          <source>Business &amp; Information Systems Engineering</source>
          <volume>5</volume>
          (
          <issue>3</issue>
          ),
          <fpage>195</fpage>
          -
          <lpage>197</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Richter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Leadership 2.0: Engaging and supporting leaders in the transition towards a networked organization</article-title>
          .
          <source>In: Proceedings of 47th Hawaii International Conference on System Sciences</source>
          . pp.
          <fpage>574</fpage>
          -
          <lpage>583</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Rousseau</surname>
            ,
            <given-names>D.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fried</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Location, location, location: contextualizing organizational research</article-title>
          .
          <source>Journal of Organizational Behavior</source>
          <volume>22</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Schanne</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Organisationsentwicklung im Spannungsfeld von 'Organisation' und 'Profession'</article-title>
          .
          <source>Ph.D. thesis</source>
          , Fakulta¨t fu¨r Wirtschafts- und
          <string-name>
            <surname>Sozialwissenschaften der</surname>
          </string-name>
          Ruprecht-Karls-Universita¨t Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Snowden</surname>
            ,
            <given-names>D.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boone</surname>
            ,
            <given-names>M.E.</given-names>
          </string-name>
          :
          <article-title>A leader's framework for decision making</article-title>
          .
          <source>Harvard Business</source>
          Review pp.
          <fpage>69</fpage>
          -
          <lpage>76</lpage>
          (
          <year>November 2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Subramaniam</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nandhakumar</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baptista</surname>
          </string-name>
          , J.:
          <article-title>Exploring co-presence enabled collaboration in social computing inspired enterprise systems</article-title>
          .
          <source>In: Proceedings of International Conference on Information Systems (ICIS)</source>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Treem</surname>
            ,
            <given-names>J.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leonardi</surname>
            ,
            <given-names>P.M.:</given-names>
          </string-name>
          <article-title>Social media use in organizations: Exploring the affordances of visibility, editability, persistence, and association</article-title>
          .
          <source>Communication Yearbook</source>
          <volume>36</volume>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Urquhart</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vaast</surname>
          </string-name>
          , E.:
          <article-title>Building social media theory from case studies: a new frontier for IS research</article-title>
          .
          <source>In: Proceedings of the International Conference on Information Systems</source>
          . Atlanta,
          <string-name>
            <surname>GA</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40. von Krogh, G.:
          <article-title>How does social software change knowledge management? Toward a strategic research agenda</article-title>
          .
          <source>Journal of Strategic Information Systems</source>
          <volume>21</volume>
          (
          <issue>2</issue>
          ),
          <fpage>154</fpage>
          -
          <lpage>164</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vollmar</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagner</surname>
          </string-name>
          , H.T.:
          <article-title>The impact of information technology on knowledge creation: An affordance approach to social media</article-title>
          .
          <source>Journal of Enterprise Information Management</source>
          <volume>27</volume>
          (
          <issue>1</issue>
          ),
          <fpage>31</fpage>
          -
          <lpage>44</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Wiener</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Acquah</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heiss</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mayerdorfer</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Langen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kammergruber</surname>
          </string-name>
          , W.C.
          <article-title>: Targeting the right crowd for corporate problem solving - a siemens case study with TechnoWeb 2.0</article-title>
          . In: IEEE International Technology Management Conference (ITMC
          <year>2012</year>
          ). pp.
          <fpage>239</fpage>
          -
          <lpage>347</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Witt</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richter</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Ein problemzentrierter Blick auf Blockchain-Anwendungsfa¨lle</article-title>
          .
          <source>In: Proceedings of Multikonferenz Wirtschaftsinformatik</source>
          . pp.
          <fpage>1247</fpage>
          -
          <lpage>1258</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>