Kenneth Griggs and Rosemary Wild
government policy or a simple means of reporting infrastructure problems in real‐time would be appropriate candidates for a social networking application demonstrating these characteristics.
This process of categorization has the potential to guide the use of existing SNA’ s or to offer a strategy for their customization within government. In addition, it can be used to trigger entirely new and unique SNA’ s created from technology components likely to be available in the near future.
6. Conclusion
The proposed model described in this paper offers a preliminary framework for viewing and understanding the value of different types of social networking applications for government use. Current SNA’ s are dominated by a few players such as Facebook, Google, Twitter, and a handful of others that consist of relatively closed structures. However, there is a clear industry trend to move the original applications toward the creation of social networking infrastructures consisting of discrete components that would allow for the detailed customization and enhanced application control required by many government agencies. The concepts of virality, temporality, locationality, risk mitigation, etc., will be fundamental to design efforts of the future.
Now that social networking is moving from an emerging technology to a powerful and viable means for governments to collaborate and communicate internally with government agencies as well as externally with its citizens, the challenge is to strike the right balance between managing risks and creating value. Our proposed model serves as an initial framework for doing so but is limited by the implicit assumption that the stated factors represent the most critical factors to consider, that the factors can be reliably measured, and that SNA’ s of the future will be sufficiently customizable to justify the model. Several examples of recent SNA’ s in Egypt(“ Arab Spring” incident), India( Gang Rape in New Delhi), the UK( London gang riots), the U. S.(“ Occupy Wall Street”) and elsewhere tend to underscore the importance of the factors we have identified as critical in the adoption of SNA’ s. Ultimately, our proposed model framework will require external validation.
References
Ahn, J., Plaisant, C. & Schneiderman, B.,( 2011). A task taxonomy of network evolution analysis, s. l.: University of Maryland, Human‐Computer Interaction Lab Tech Report HCIL‐2011‐09.
Boudreaux, C.,( 2009). Policy Database: Social Media Governance, s. l.: Chris Boudreaux ‐. available at http:// socialmediagovernance. com / policies. php? f = 0 [ Accessed 2013 ].
Choy, V., 2011.“ Perishable Information in an Increasingly Mobile World.” New Review of Information Networking, 16( 2), pp. 141‐150.
D. M. Boyd and Ellison, N. B.,( 2007).“ Social Network Sites: Definition, History, and Scholarship.“ Journal of Computer‐
Mediated Communication, Volume 13, p. 210 – 230. Day, K., 2010. Labour:“ Change we see but you can ' t photograph“. The Telegraph, 26 January. Difonzo, N. & Bordia, P.,( 2007).“ Rumor, Gossip, and Urban Legends” Diogenes, 54( 1), pp. 19‐35. Drapeau, M. & Wells II, L.,( 2009). Social Software and National Security: An Initial Net Assessment, Washington, D. C.:
Center for Technology and National Security Policy, National Defense University. Freeman, L., 1996. Some antecedents of social network analysis. Connections, Volume 19, pp. 39‐42. Hansen, D., Schneiderman, B. & Smith, M. A.,( 2010). Analyzing Social Networks with NodeXL: Insights from a Connected
World. Morgan Kaufman. Magro, M. J.,( 2012). A Review of Social Media Use in E‐Government. Administrative Sciences, Volume 2, pp. 148‐161. Moody, D. L. & Walsh, P. A.,( 1999). Measuring the Value of Information: An Asset Value Approach. Copenhagen, European
Conference on Information Systems( pp. 2004‐2005) Newman, M.,( 2003).“ The structure and function of complex networks“. SIAM Review, Volume 45, pp. 167‐256. Rheingold, H.,( 2003). Smart Mobs: The Next Social Revolution. New York: Basic Books. Rogin, J.,( 2012).“ Cairo Embassy tweeter warns of‘ dictatorship’ in Egypt.“ Foreign Policy, 27 November, http:// thecable. foreignpolicy. com / posts / 2012 / 11 / 27 / cairo _ embassy _ tweeter _ warns _ of _ dictatorship _ in _ egypt. Scott, J.,( 2000). Social Network Analysis: A Handbook. London: Sage. The Center for Excellence in Digital Government, 2010. Dipity. [ Online ] Available at: http:// www. dipity. com / govnewmedia / Gov‐Social‐Media‐Timeline /# timeline [ Accessed 2013 ]. Turban, E., Bolloju, N. & Liang, T.( 2011).“ Enterprise Social Networking: Opportunities, Adoption, and Risk Mitigation”.
Journal of Organizational Computing and Electronic Commerce, 21( 3), pp. 202‐220. White, H.,( 2008). Identity and Control. How Social Formations Emerge. 2nd ed. Princeton: Princeton University Press.
229