Home > BPM, Enterprise 2.0, web 2.0 > Digital Identity and Reputation in the Context of a Bounded Social Ecosystem – a literature review

Digital Identity and Reputation in the Context of a Bounded Social Ecosystem – a literature review

Digital Identity and Reputation in the Context of a Bounded Social Ecosystem

Ben Jennings and Anthony Finkelstein
University College London London, UK

{b.jennings,a.finkelstein}@cs.ucl.ac.uk

Summary

In this article, Jennings and Finkelstein (2008), argue that the concepts of human agent reputation and trust have become critical now that social software is becoming adopted by Industry. And that for the successful integration of social software into business processes, both reputation and authority need to exist.

According to Jennings and Finkelstein (2008), incorporating social technologies within an Organisation has two key benefits: firstly business processes can be improved through socially supported interactions and secondly, by providing a means for human knowledge to be captured & reused by the Organisation. The Authors discuss the theoretical use of “social software data artefacts” to trace data creation back to a unique digital identity so that individuals can be linked to a specific activity, expertise or knowledge.

A key issue raised by Jennings and Finkelstein (2008) is that of information overload and how an excess of messaging can lead to a loss of productivity and potential abandonment of the systems. They propose the use of a computer based filtration system to rank information based on contextual importance or fit for purpose.

The Authors present that trust and reputation are based upon subjective intuition or other ambiguous signals and are key to the adoption of social software. They assert that when a Users perceived value of a social system increases, the amount of trust also increases which in turn supports further adoption.

Jennings and Finkelstein (2008) observe that enterprise social software adoption is typically conservative and non-systematic. They assert that to incorporate human agents into business processes, there must be an automated way of creating unique digital identity resources to serve as the foundations of trust and reputation.

Advertisements
Categories: BPM, Enterprise 2.0, web 2.0
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: