{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T06:00:15Z","timestamp":1720591215298},"reference-count":49,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T00:00:00Z","timestamp":1410307200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,9]]},"abstract":"Abstract<\/jats:title>While research on organizational online networking recently increased significantly, most studies adopt quantitative research designs with a focus on the consequences of social network configurations. Very limited attention is paid to comprehensive theoretical conceptions of the complex phenomenon of organizational online networking. We address this gap by adopting a theoretical framework of the deep structure of organizational online networking with a focus on their emerging meaning for the employees. We apply and assess the framework in a qualitative case study of a large\u2010scale implementation of a corporate social network site (SNS) in a global organization. We reveal organizational online networking as a multi\u2010dimensional phenomenon with multiplex relationships that are unbalanced, primarily consist of weak ties and are subject to temporal change. Further, we identify discourse drivers and information retrievers as two mutually interdependent actor roles as an explanation for uneven levels of user contributions to the SNS. Based on our analysis, we elicit abstract order principles, such as topical discourses, and identify transactive memory theory as a potent explanation of the evolving interaction structures. We finally discuss how the deep structure framework can contribute to future research on organizational networks.<\/jats:p>","DOI":"10.1111\/isj.12047","type":"journal-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T10:15:39Z","timestamp":1410948939000},"page":"465-488","source":"Crossref","is-referenced-by-count":28,"title":["The deep structure of organizational online networking \u2013 an actor\u2010oriented case study"],"prefix":"10.1111","volume":"25","author":[{"given":"Matthias","family":"Trier","sequence":"first","affiliation":[{"name":"Copenhagen Business School DK\u20102000 Frederiksberg Denmark"}]},{"given":"Alexander","family":"Richter","sequence":"additional","affiliation":[{"name":"University of Zurich CH\u20108050 Z\u00fcrich Switzerland"},{"name":"Bundeswehr University Munich 85577 Neubiberg Germany"}]}],"member":"311","published-online":{"date-parts":[[2014,9,10]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.1.21.12756"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9938"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.1906679"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.2307\/2088165"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1165821"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/160940690600500304"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393552"},{"key":"e_1_2_8_9_1","volume-title":"Structural Holes \u2013 The Social Structure of Competition","author":"Burt R.S.","year":"1995"},{"key":"e_1_2_8_10_1","first-page":"31","volume-title":"Social Capital: Theory and Research. Sociology and Economics: Controversy and Integration Series","author":"Burt R.S.","year":"2001"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148815"},{"key":"e_1_2_8_12_1","first-page":"92","article-title":"Competent jerks, lovable fools, and the formation of social networks","volume":"83","author":"Casciaro T.","year":"2005","journal-title":"Harvard Business Review"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2005.tb00280.x"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00400.x"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460674"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/258557"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1086\/230450"},{"key":"e_1_2_8_19_1","unstructured":"Fallows D.(2002)Email at work \u2013 few feel overwhelmed and most are pleased with the way email helps them do their jobs. PEW Internet and American Life Project Pew Internet and American Life Project Washington DC pp.1\u201326. URLhttp:\/\/www.pewinternet.org\/files\/old\u2010media\/Files\/Reports\/2002\/PIP_Work_Email_Report.pdf.pdf(accessed: 2014\u201006\u201028)"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1100.0614"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9558.2009.00338.x"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1038\/488448a"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148742"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240152493065"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/1368430200033002"},{"key":"e_1_2_8_28_1","doi-asserted-by":"crossref","first-page":"767","DOI":"10.17705\/1jais.00282","article-title":"Validity issues in the use of social network analysis for the study of online communities","volume":"12","author":"Howison J.","year":"2011","journal-title":"Journal of the Association of Information Systems"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0158"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.1.13"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12020"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1120.0806"},{"key":"e_1_2_8_33_1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/25148667","article-title":"Why should I share? Examining social capital and knowledge contributions in electronic networks of practice","volume":"29","author":"McLure Wasko M.","year":"2005","journal-title":"MIS Quarterly"},{"key":"e_1_2_8_34_1","volume-title":"Qualitative Data Analysis: An Expanded Sourcebook","author":"Miles M.B.","year":"1994"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12022"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.2307\/259373"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2003.10.015"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2013.07.001"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-013-0260-x"},{"key":"e_1_2_8_40_1","unstructured":"Richter A. M\u00f6rl S. Trier M.&Koch M.(2011)Anwendungsszenarien als Werkzeug zur VErmittlung des Nutzens von Corporate Social Software. In:Proceedings of the Conference Wirtschaftsinformatik article 5 AIS e\u2010Library Zurich. URLhttp:\/\/aisel.aisnet.org\/wi2011\/5(accessed 2014\u201006\u201001)"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00021-5"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0177"},{"key":"e_1_2_8_43_1","doi-asserted-by":"crossref","unstructured":"Steinfield C. DiMicco J.M. Ellison N.B.&Lampe C.(2009)Bowling online: social networking and social capital within the organization. InProceedings of the Fourth International Conference on Communities and Technologies pp.245\u2013254.ACM Press Pennsylvania.","DOI":"10.1145\/1556460.1556496"},{"key":"e_1_2_8_44_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0191"},{"key":"e_1_2_8_45_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_2_8_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4634-3_9"},{"key":"e_1_2_8_47_1","volume-title":"Identity and Control: A Structural Theory of Social Action","author":"White H.","year":"1992"},{"key":"e_1_2_8_48_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0465"},{"key":"e_1_2_8_49_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb028933"},{"key":"e_1_2_8_50_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.3.02"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:48:53Z","timestamp":1696207733000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,10]]},"references-count":49,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["10.1111\/isj.12047"],"URL":"https:\/\/doi.org\/10.1111\/isj.12047","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,10]]}}}