12.07.2015 Views

Sunbelt XXXI International Network for Social Network ... - INSNA

Sunbelt XXXI International Network for Social Network ... - INSNA

Sunbelt XXXI International Network for Social Network ... - INSNA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

G8/G20 Preparatory Process <strong>Network</strong>s: A Mixed Method Analysis Of InfluenceAbbott, Clint L.Qualitative and Mixed Method <strong>Network</strong> studiesMixed Methods, <strong>International</strong> <strong>Network</strong>s, Governance, <strong>Social</strong> <strong>Network</strong> Analysis, Political <strong>Network</strong>s, Policy <strong>Network</strong>sTHURS.AM2The preparatory process <strong>for</strong> diplomatic summits has shifted over time to include a diverse range of interconnected agencies and actors. This shift has beenfuelled, at least in part, by rapid globalization, new power dynamics between states and non‐state actors, and a growing interest in new communicationtechnologies. A primary aim of this paper is to examine the emergence networked <strong>for</strong>ms of governance at the summit diplomacy level. Using the 2010Canadian G8/G20 preparatory process as a case study, this paper presents empirical research and challenges involved with using social network analysis (SNA)and qualitative process analysis as tools to study networked governance. The paper demonstrates the value in mixed methods and argues that a wide array ofactors, interdepartmental tensions, and trust and communication factors actor affect the summit preparatory policy processes. Research findings indicate thatthe density of the network varies greatly depending on the policy issue and the stage of the preparatory process. Also, the influence of non‐governmentalactors within this particular network were largely the result of both the government led mechanism used to consult “outside” groups and the emergence oftemporary coalitions. The research aims to highlight the rich qualitative and quantitative data obtained through elite level interviews. Furthermore, it aims tobridge divides between the practice of governance, particularly through networks, and academic theories on global and networked governance. Consequently,the results have broader application to government departments and non‐state organizations attempting to develop networked methods to improve policydevelopment processes.Gaining Access To Both Email Content And Structure In Corporate Environments: A Novel Partnership SolutionGluesing, Julia C.; Riopelle, Kenneth R.; Danowski, James A.Words and <strong>Network</strong>s ‐ Organizational Communication, Team DynamicsOrganizations, Methods, Email <strong>Network</strong>s, Semantic <strong>Network</strong>sSAT.PM2A continuing problem in conducting network analysis in corporate environments using email is limited access to email content. While it is sometimes possibleto obtain structural to‐from and time stamped network data, there are often constraints related to confidentiality and privacy that restrict access to or prohibitanalysis of email content. This paper describes a novel solution developed in the course of research conducted <strong>for</strong> an NSF‐funded grant to study diffusion ofinnovation in global networked organizations. The research team <strong>for</strong>med a partnership with employees inside the corporation who collaborated in thegathering and analysis of data. The academic researchers trained the corporate collaborators to install and operate software within their secure corporateenvironment, to obtain voluntary consent <strong>for</strong> use of email in the study, and to analyze both the structure and the content of the email. The academicresearchers served as consultant to the corporate team and received anonymized network analysis results, including analysis of sentiment and word and wordpair analysis over time. The partnership approach enabled analysis of the full content of emails while preserving confidentiality and privacy and ensuring thatall emails remain protected in the corporate secure environment. The university institutional review board also approved the approach. We will present thedata access and analysis process, the pros and cons of the partnership approach.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!