Search (2 results, page 1 of 1)

  • × author_ss:"Sawyer, S."
  1. Jarrahi, M.H.; Sawyer, S.: Theorizing on the take-up of social technologies, organizational policies and norms, and consultants' knowledge-sharing practices (2015) 0.01
    0.008017946 = product of:
      0.032071784 = sum of:
        0.032071784 = product of:
          0.06414357 = sum of:
            0.06414357 = weight(_text_:media in 1614) [ClassicSimilarity], result of:
              0.06414357 = score(doc=1614,freq=4.0), product of:
                0.17529039 = queryWeight, product of:
                  4.6838713 = idf(docFreq=1110, maxDocs=44218)
                  0.037424255 = queryNorm
                0.36592746 = fieldWeight in 1614, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  4.6838713 = idf(docFreq=1110, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1614)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Abstract
    We identify the effects of specific organizational norms, arrangements, and policies regarding uses of social technologies for informal knowledge sharing by consultants. For this study, the term social technologies refers to the fast-evolving suite of tools such as traditional applications like e-mail, phone, and instant messenger; emerging social networking platforms (often known as social media) such as blogs and wikis; public social networking sites (i.e., Facebook, Twitter, and LinkedIn); and enterprise social networking technologies that are specifically hosted within one organization's computing environment (i.e., Socialtext). Building from structuration theory, the analysis presented focuses on the knowledge practices of consultants related to their uses of social technologies and the ways in which organizational norms and policies influence these practices. A primary contribution of this research is a detailed contextualization of social technology uses by knowledge workers. As many organizations are allowing social media-enabled knowledge sharing to develop organically, most corporate policy toward these platforms remains defensive, not strategic, limiting opportunities. Implications for uses and expectations of social technologies arising from this research will help organizations craft relevant policies and rules to best support technology-enabled informal knowledge practices.
  2. Kling, R.; Rosenbaum, H.; Sawyer, S.: Understanding and communicating social informatics : a framework for studying and teaching the human contexts of information and communication technologies (2005) 0.01
    0.0050432784 = product of:
      0.010086557 = sum of:
        0.0053060725 = product of:
          0.010612145 = sum of:
            0.010612145 = weight(_text_:28 in 3312) [ClassicSimilarity], result of:
              0.010612145 = score(doc=3312,freq=2.0), product of:
                0.13406353 = queryWeight, product of:
                  3.5822632 = idf(docFreq=3342, maxDocs=44218)
                  0.037424255 = queryNorm
                0.07915758 = fieldWeight in 3312, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5822632 = idf(docFreq=3342, maxDocs=44218)
                  0.015625 = fieldNorm(doc=3312)
          0.5 = coord(1/2)
        0.004780485 = product of:
          0.014341454 = sum of:
            0.014341454 = weight(_text_:22 in 3312) [ClassicSimilarity], result of:
              0.014341454 = score(doc=3312,freq=4.0), product of:
                0.13105336 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.037424255 = queryNorm
                0.109432176 = fieldWeight in 3312, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.015625 = fieldNorm(doc=3312)
          0.33333334 = coord(1/3)
      0.5 = coord(2/4)
    
    Classification
    303.48/33 22
    DDC
    303.48/33 22
    Footnote
    The opening chapter provides a 10-page introduction to social informatics and identifies three high-level subdomains of the field: the normative, analytical, and critical orientations. Chapter 2 then narrows the focus to the social, technical, and institutional nature and consequences of ICTs, and provides a well-chosen review and analysis of social informatics research, mostly case studies of system implementations gone wrong. The recurring finding in these cases is that the social and institutional context of the system implementation was not sufficiently accounted for. In light of these concrete examples, the value and applicability of a social informatics perspective becomes clear. The chapters are organized exceptionally well, with bullet points and tables summarizing core ideas. One particularly good example of the organization of ideas is a table comparing designer-centric and social design views on the task of designing ICTs for workplaces (p. 42). Included are the different views of work, intended goals, design assumptions, and technological choices inherent in each design philosophy. Readers can immediately grasp how a social informatics perspective, as opposed to the more traditional designer-centric perspective, would result in significant differences in the design of workplace ICTs. The chapter titled, "Social Informatics for Designers, Developers, and Implementers of ICT Based Systems," provides an extremely focused introduction to the importance of social informatics for system builders, with more examples of large-scale system breakdowns resulting from failure to account for context, such as the 1988 destruction of a civilian passenger jet in the Persian Gulf by the USS Vincennes. However, many of the chapter subheadings have promising titles such as "ICTs Rarely Cause Social Transformations" (p. 28), and though the findings of several studies that reach this conclusion are reviewed, this section is but a page in length and no dissenting findings are mentioned; this seems insufficient support for such a substantial claim. Throughout the book, conclusions from different studies are effectively juxtaposed and summarized to create a sense of a cohesive body of social informatics research findings, which are expressed in a very accessible manner. At the same time, the findings are discussed in relation to their applicability to diverse audiences outside the social informatics field: system designers and developers, ICT policy analysts, teachers of technical curricula, and ICT professionals. Anticipating and addressing the concerns of such a diverse group of audiences outside the field of social informatics is an admirable but overly ambitious goal to achieve in a 153-page book (not counting the excellent glossary, references, and appendices). For example, the chapter on social informatics for ICT policy analysts includes approximately twenty pages of ICT policy history in the U.S. and Europe, which seems a luxury in such a small volume. Though it is unquestionably relevant material, it does not fit well with the rest of the book and might be more effective as a stand-alone chapter for an information policy course, perhaps used in tandem with the introduction.