Verified Document

Social Networking Based On The Term Paper

The crux of this paper emerges a maturity model that defines how social networks eventually attain trusted status among their members, with the structure of the networks themselves being integral to the growth of explicit or tacit knowledge. A fascinating finding is that when social networks are in a star topology there is a pronounced lower level of transactive information sharing. Contrasting this limiting effect on information sharing based on a star topology, the core-periphery structure enables more egalitarian information sharing and transactive use of data. One of the key findings of the work by Huang and DeSanctis (2005) underscores' Cooks' (2001) assessment of multiple roles within a social network creating more of a basis for trust and more effective transactive data being shared and published throughout a network. From these observations by Huang and DeSanctis (2005) and the resulting influences of asymmetrical and symmetrical flows between nodes in an evolving community, a maturity model of interactions, level of transactive data, quantification of trust, core-periphery and ultimately the creation of an information exchange all can be predicted by the maturity model that emerges from the forum-based research completed.

Taking these findings a step further, it becomes clear that the trajectory of growth, composition, and the precise prediction of what any given social network will be in the future is not predictable. For any organization the challenge is fostering more of explicit and tacit information sharing, clearly defining the skills critical on the part of information exchange participants to contribute to and grow both their knowledge but also the knowledge of the broader group or network. The analysis from Huang and DeSanctis (2005) brings up the interrelationship of the density of a given social...

What emerges from the velocity, scope and depth of these information exchanges is a maturity model based on trust first, and validity and relevance of data shared second. The bottom line is that Huang and DeSanctis (2005) have devised in their research the necessary strategies for the next stage of critical work, which is the definition of a social networking maturity model where social capital and credibility are the mediums of exchange. Weisinger and Salipante (2005) have defined social capital as the intersection of opportunity, motivation and ability. The basis for this definition rests in the creation of social networks that assist, foster, growth and nurture these foundations of social capital in a framework that is based on a maturity model of trust.
References

Cook (2001) - Social Networks: A Primer. James a. Cook. Department of Sociology. Duke University. January 6, 2001

Huang and DeSanctis (2005) - Mobilizing Informational Social Capital in CyperSpace: Online Social Network Structural Properties and Knowledge Sharing. Duke University. Twenty-Sixth International Conference on Information Systems.

Weisinger and Salipante (2005) - a Grounded Theory for Building Ethnically Bridging Social Capital in Voluntary Organizations. Nonprofit and Voluntary Sector Quarterly, vol. 34, no. 1, March 2005 29-55. Accessed from the Internet on September 14, 2006: (http://nvs.sagepub.com/cgi/reprint/34/1/29.pdf#search=%22Adler%2C%20P.%2C%20%26%20Kwon%2C%20S.%20(2002).%20Social%20capital%3A%20Prospects%20for%20a%20new%20concept.%20Academy%20of%20Management%20Review%2C%2027(1)%2C%2017-40.%22

Sources used in this document:
References

Cook (2001) - Social Networks: A Primer. James a. Cook. Department of Sociology. Duke University. January 6, 2001

Huang and DeSanctis (2005) - Mobilizing Informational Social Capital in CyperSpace: Online Social Network Structural Properties and Knowledge Sharing. Duke University. Twenty-Sixth International Conference on Information Systems.

Weisinger and Salipante (2005) - a Grounded Theory for Building Ethnically Bridging Social Capital in Voluntary Organizations. Nonprofit and Voluntary Sector Quarterly, vol. 34, no. 1, March 2005 29-55. Accessed from the Internet on September 14, 2006: (http://nvs.sagepub.com/cgi/reprint/34/1/29.pdf#search=%22Adler%2C%20P.%2C%20%26%20Kwon%2C%20S.%20(2002).%20Social%20capital%3A%20Prospects%20for%20a%20new%20concept.%20Academy%20of%20Management%20Review%2C%2027(1)%2C%2017-40.%22
Cite this Document:
Copy Bibliography Citation

Related Documents

Social Networking Does Not Require Social Media
Words: 2606 Length: 10 Document Type: Essay

Social Networking Does Not Require Social Media However Social Networking Is Increasingly Utilizing Social Media The objective of this study is to examine social networking and how it does not require social media however, social networking is increasingly utilizing social media. This work will discuss how one's social networks in real life may or may not connect with their social networks online. Defining Social Networking and Social Media The work of Matt Goddard

Social Networking Is Not Safe for Children
Words: 712 Length: 3 Document Type: Essay

Social Networking Is Not Safe for Children Social networking is ubiquitous in today's culture; even elementary school children operate blogs and join social networking sites such as Facebook. Millions of children place highly personal information on these sites, and spend hours a day interacting with people on social networking sites. While it is true that social networking can sometimes have a positive impact on children's growth and personal development, the time

Social Networking Privacy Online Privacy
Words: 3284 Length: 10 Document Type: Essay

But research is very mixed on what that answer is when the data is voluntarily revealed. For example, if someone "likes" Apple on Facebook and Apple then in turn markets Apple products to that person, it should be asked whether Apple is acting improperly. Companies with products that compete with Apple could do the same thing. Research bears out that this question comes down to personal and professional ethics

Social Networking Industry Online Social
Words: 1980 Length: 6 Document Type: Essay

For this reason, these sites often specialize in the type of experience they provide users. For example, YouTube focuses on video connections, Flickr centers of photo connections, and Twitter focuses on brief status opdates. Complementors are value-added products are services that complement another industries products or services. In the online social networking industry, complementors include user applications for the networking site. As an example, Facebook offers thousands of applications members

Social Networking and Collaboration
Words: 2041 Length: 5 Document Type: Research Paper

Social Networking & Teacher Collaboration Social Networking & Collaboration Facilitating Social Networking with the Teachers Figuring out how to encourage workers to collaborate on the Web has become a common topic in online forums and actual meetings across many different types of enterprises. This section provides some ideas for providing incentives to those who are already inclined to use social networks and building scaffolding for those who are reluctant users. It is helpful to

Social Networking Tools Like Facebook
Words: 603 Length: 2 Document Type: Research Proposal

When sharing photos on sites like Facebook or Flickr, those photos can readily be stolen, manipulated, and used by anyone with access to them. Unwitting users might not understand how to set their security settings in each application, and savvy computer users may be able to override security settings anyway. Another significant drawback with social networking sites is the way that they impact communication. Some users may find themselves conversing more

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now