Professional Documents
Culture Documents
KIM TRACY
-mail has become one of the primary communication methods for members of a project team to communicate and to make progress on a project. Even though e-mail has become so critical to project communications and coordination, it is still inherently unstructured. As a result, the effective use of e-mail by a project team can help, hurt, or just distract a project team from making progress on the project. This article looks at e-mail to see if there are narrative structures that come out of a project teams use of e-mail and whether that structure can be used to stem poor project behavior and to encourage good project behavior. This project does not consider the use of narrative to describe a project (such as books written about a project), the generation of narrative in meetings, or generating a narrative based on project-related e-mail. The problem is defined more succinctly as: How can narrative structures in e-mail be used to better guide a project?
Successfully solving this problem should help project members and managers spot useful narrative patterns that they can respond to and thereby help the project. Without solving this problem, these patterns may be missed and the opportunity to correct or leverage the pattern would be missed. The greater hope is that the study of project-related e-mail patterns could result in more effective use of this already pervasive communication mechanism to have more predictable and useful effects on a project.
Patterned approach
In starting this project, it was not clear that there are any interesting narrative structures in e-mail that would affect the project team. So, one of the first tasks was to determine if there were interesting patterns that one could consider narrative in nature. If there were, then I could look at them for interesting patterns. I could not find any prior work that was specifically concerned with the use of narrative in
0278-6648/09/$25.00 2009 IEEE
e-mail. There is some work done on patterns of communication in project teams that is interesting, but is not narrative related. (See examples such as Cain, et al., December, 1996.) Fortunately, I have access to a large number of project-related e-mails from participating on many technologyrelated projects for my organization. The number of these project-related e-mails range from 200 to 400 in any given work day. The approach taken is to mine this set of e-mails to look for interesting, narrative patterns. The danger in doing so is that these patterns may be atypical and peculiar to the source organization. After analyzing the e-mails for evidence of narrative, I looked for interesting patterns that may have value for affecting the course of the project. After identifying those, I had the opportunity to actually practice looking for these patterns and consciously use e-mail replies to better the course of the project and form some simple recommendations on patterns to look for and actions to take.
IEEE POTENTIALS
14
Authorized licensed use limited to: Manuel Giovannetti. Downloaded on August 25, 2009 at 12:34 from IEEE Xplore. Restrictions apply.
It is important to note a few details about the methodology used for this study. The study focused on an enterprise resource planner (ERP) deployment for a university that is in its third year. This project included the efforts of about 300 people with approximately 70 of them being in the IT organization. There were about 10,000 such e-mails used for this study that encompassed about one year of that project. My collection of e-mails was from the perspective as the leader of the IT organization (so, I did not get every e-mail affecting the project). The results of this project are not meant to be scientific but to present a typical projects e-mail experiences and give a few guidelines that are often not followed, even though they may seem obvious.
HI just wanted to let you know that so far, I have found four or five e-mails sent to me yesterday 2/13/08 that I have not gotten. some of which were very important. Is there any way to know what else I am missing? I am concerned about how to effectively work with this problem. Fig. 1 Example e-mail #1.
1.1 Background
A key insight has been that much of the communication that these project teams generate is not narrative but merely responding to a previous communication that was sent with a short answer or response. However, a string (or here, thread ) of such communication will often take shape as a narrative form where it has a context, characters, and structural elements such as an introduction and conclusion. Inherent in much of these threads is an underlying context for the communication. In addition to the technical context, many of these narrative threads will also have social context that affect the meaning of the narrative, particularly to individuals. Consider the context for the snippet of an e-mail in Fig. 1, which is part of a larger e-mail thread. This e-mail was sent in the context of many e-mail issues and relies on the larger context that this person has already experienced e-mail issues. Furthermore, this is a department chair who has also reported similar problems from his/her staff. The last statement in their e-mail shows a growing concern for the problem and the risk of escalation as this problem does not get better. Knowing the context that they are an important department chairperson also increases the importance of getting the issue resolved. The rest of the thread shows a continuing escalation of the problem but does not show the larger organization context that also plays a role. In this case, the e-mail caused me to escalate the problem and to get better status.
MARCH/APRIL 2009
Ricouer (Ricoeur, 2004) was helpful in determining the effect of memory and selective forgetting on these types of project-related exchanges. In particular, some of these messages will attempt to forge a narrative that reflects the authors perception, rather than being factual. A simple example of this is in Fig. 2. In this case, the context was that this mail was sent just after the salesperson was told by me that he was not going to get the sale of the product they were hawking. So, he sent me the email in Fig. 2. The issue was (as with many salespeople) that their facts and questions were targeted to try to get us to reconsider our choice. It turns out all of the questions were not issues. The larger effect of this e-mail (if the sender understood the context) is that I no longer trust them to provide accurate assessments of what they
are trying to sell and will make every attempt to avoid interactions with this sales vehicle. It should be noted that they have been overselling this product for about a year and with each attempt, it becomes less credible. So, for the prior example, the selective forgetting (you didnt really decide yet, did you?) and the additional plea to do a demo (we had already done two full-blown ones) were damaging to the relationship of the vendor to the customer. A more interesting analysis will be to look at the effects of a longer thread of project-related e-mails and see how the narrative can enhance the project to help in accomplishing a task or furthering teamwork and camaraderie. These small examples show how simple e-mails can provide a stimulus to get something done (Fig. 1) and how they can damage an ongoing relationship (Fig. 2). It remains to be shown that a larger narrative is created by some project-team e-mail threads and that some single e-mail narratives also affect the project as narrative.
Hi Kim. I did do some checking on the [XXX ] solution that you are investigating for scripting/job scheduling. There were a few things that came up that should be considered: Im not sure how up to date the code is and how much customization is necessary in order for this solution to work with [YYY ] either today or in the future. What is the support structure for this solution, on-going development effort, customer base, etc? Is [XXX ] selling their code or giving it away and then you customize it? From what I understand, another Washington based institution reviewed [XXX s] solution and determined that a lot of code/customization would be necessary, that institution is now an [XXX Solution] customer. I would be more than happy to schedule a demo for you, your staff and functional users to help show the functionality of [XXX Solution] for all your applications. Thank you and look forward to talking with you soon. Fig. 2 Example e-mail #2.
15
Authorized licensed use limited to: Manuel Giovannetti. Downloaded on August 25, 2009 at 12:34 from IEEE Xplore. Restrictions apply.
In addition to static types of e-mails, interactions and relationships are also important to determining when intervention might be needed. Based on the types and interactions, patterns are identified where intervention may be helpful.
esting to see as a narrative and can have conflict (i.e., Im not doing that!) and a common goal to resolve the issue. Trying to resolve an issue via an e-mail discussion usually produces a stream of interactions many of which are narrative in form. They usually have pieces that are not narrative but the
were often in narrative form and would often bring a chorus of other e-mails expressing sympathy or other complaints. (e.g. Why are you or the project such an X ?) Both the messages themselves and the thread tend to have more narrative form.
Some e-mail will provide no value at all and are just responding to have sent a response. For example, some people will respond to a question with a nonanswer or with no substantial content. These responses can have all sorts of motivations.
Many messages are simple questions that should have simple answers. (e.g. Who is responsible for X ?) Occasionally, these will spark a larger discussion or bring on a larger issue.
Authorized licensed use limited to: Manuel Giovannetti. Downloaded on August 25, 2009 at 12:34 from IEEE Xplore. Restrictions apply.
can more easily occur in large project teams where people begin responding to an innocuous e-mail by Take me off this list and others chime in, thereby destroying the utility of email to that group for some period of time. These can also be stimulated by simple errors (the mail was intended for one person but went to a large list by mistake). E-mail silence. E-mail silence can be deadly and equate to an issue or person being ignored. Threats and insults. Can also cause disastrous results and affect teamwork outside the e-mail realm.
These three types seemed to have the most narrative character and resulted in situations where intervention could be helpful.
Only those purpose driven e-mail exchanges trying to resolve an issue produce interesting narratives. Complaining sessions where lots jump in can sometimes also produce interesting dialogues.
were effective when the interventions were attempted. Noticing Excellence. In a chain of email that are trying to accomplish a task (Type 3.1.3) it can be very helpful to publicly acknowledge excellent work or behavior by an individual. The sooner that can be done the better. It not only recognizes the individual but reinforces similar behavior (hopefully) in others. Stalled efforts. Also in type 3.1.3, if the discussion and/or conversation stalls, it may need intervention to get restarted. This could lead to an e-mail silence in this thread (all of a sudden, theres no more discussion but the issue is not resolved) where someone needs to kick start the process again. It could also be that the discussion has completely gone off-track from the issue and is no longer productive in terms of helping the project. This requires someone in authority to intervene and get the team back to the issue (as well as probably reiterating the known status). Destructive complaining. (Type 3.1.5). Attacks on an individual can result in either an e-mail storm or silence. In
17
Authorized licensed use limited to: Manuel Giovannetti. Downloaded on August 25, 2009 at 12:34 from IEEE Xplore. Restrictions apply.
either case, the best action is to intervene right away and to try to resolve the issue, preferably outside the e-mail forum. Other complaining about issues that are not solvable by the team can also be (hopefully) squelched by someone in authority intervening. Erroneous e-mail damage. (Type 3.1.8). This also should be stemmed as soon as possible and, if possible, taken outside the e-mail forum. Too often once something started in e-mail, others respond in the same medium.
Attacks on an individual can result in either an e-mail storm or silence. In either case, the best action is to intervene right away and to try to resolve the issue, preferably outside the e-mail forum.
the intervention helpful, but it can keep team problems from becoming much worse. This paper details four simple interventions that a watchful individual can directly use in any real project team that makes heavy use of e-mail.
B. G. Cain, J. O. Coplien, and N. B. Harrison, Social patterns in productive software development organizations, Ann. Softw. Eng., vol. 2, no. 1, pp. 259286, Dec. 1996. P. Ricoeur, Memory, History, Forgetting. Chicago, IL: Univ. of Chicago Press, 2004.
Conclusion
There are patterns of use in e-mail that take narrative form and some of those patterns are useful from a project management perspective to look for and to intervene when they occur. Not only is
make a sound? tree falls in a forest w If a ith no one to hear it, does it
IEEE Potentials s is interested in hearing from students who are active in their Student Branch. Has your student branch grown in popularity? Do you organize innovative, fun, and educational activities? Are your Student Branch officers particularly adept at meeting the needs of members? How would you like to share your experiences with other IEEE Student Branches across the world? If your Student Branch has a story to tell, we would like to hear it. Simply p g for details. e-mail potentials@ieee.or potentials@ieee.org In your response, please include brief answers to the following questions: What are the goals of your Student Branch? What do you consider the Student Branchs most notable achievement and why? How does your Student Branch attract new members? How does your Student Branch keep members involved? A profile of your Student Branch could appear in an upcoming issue of IEEE Potentials. These profiles help open up lines of communication between Student Branches and inspire increased involvement and activity sharing information regarding what other branches are doing and what has and has not been successful. All Student Branches from Regions 110 are welcome to respond.
18
Authorized licensed use limited to: Manuel Giovannetti. Downloaded on August 25, 2009 at 12:34 from IEEE Xplore. Restrictions apply.
IEEE POTENTIALS