roles and channels are relevant for designing the
checklist, where a contact maker contacts a contact
taker. If the contact maker’s attempt to get in touch
with the contact taker fails or the communication
between them is unsatisfactory from the view of the
contact maker, he makes a short annotation into his
checklist by checking his chosen communication
channel, the appropriate role of the person he
contacted and the reason of dissatisfaction. If the
contact taker perceives an attempt of a contact
maker’s contact as inconvenient/inadequate or the
contact taker is dissatisfied by the communication
initiated by the contact maker, the contact taker
annotates this in the checklist as same as done by the
contact maker as described above.
2.2 Design Checklists
As introduced in the previous section, a
communication requires at least two members, a
contact maker and a contact taker. Analogously, two
checklist types are designed, one for the contact
maker and another one for the contact taker.
Figure 2 shows the checklist, which is designed
for contact takers in an unsatisfied communication
situation. The structure of both checklists must allow
personnel to input quickly without spending a
disproportionate amount of time for understanding
what is meant and where to check correctly. For that
reason, pre-tests were performed to improve the
checklist’s efficiency.
Each checklist is self-explanatory. For an
unsatisfied communication case, the contact maker
indicates who he tried to contact, which channel he
used, the reason for dissatisfaction, the range to be
improved and the new attempt of contact including
its rating. The checklist for the contact taker is
similarly designed.
In checklist for contact takers, in the case of an
unsatisfied communication a contact taker indicates
on which channel who tried to contact him, why and
how he counteracted including a rating for his
counteraction.
3 EMPIRICAL INQUIRY
The empirical inquiry is performed in two mid-sized
IT companies each with approximately fifty
employees. The business profile of both companies
investigated can be summarized as follows:
Company A develops an E-Commerce web
portal, which provides products, offers and
consumer information.
Company B provides consulting in the manner of
Design Led Innovation and develops user
feedback driven solutions.
Personnel situated in key roles, such as developers,
marketing professionals and project managers, are
introduced into the inquiry and trained for the usage
of the checklists, which have been designed for this
inquiry.
Before starting the inquiry, both checklists – the
one for contact makers and the other one for contact
takers have been evaluated during a pre-test. During
this pre-test staff members are requested to annotate
exemplary hypothetical situations within the
checklist. For example a marketing employee was
given following imaginary situation:
“You tried to contact a developer by phone in order
to ask for an estimated development time for a new
module planned for sale. The developer didn’t pick
up the phone and you went into his office for giving
your question in a face-2-face talk”.
For a month period the staff member filled out the
checklist, during the first week at each end of the
day feedback dialogs where performed in order to
ensure that the checklist was accurately used and not
forgotten in moments when they are to be used.
After this period, Company A collected from
their personnel 79 checklists from contact makers
and 62 from contact takers. Company B collected
145 checklists from contact makers and 142 from
contact takers.
This data collected forms the basis for the
analysis given by the next section.
4 DATA ANALYSIS
The data analysis consists of three parts. First there
is a descriptive analysis of each company separately.
Another part is the network analysis of each
company. And finally there is the comparison of a
company with another particular company or a set of
companies.
4.1 Descriptive SPSS Report
The descriptive analysis was done with the statistic
application SPSS. Due to the fact that the collected
data is collected anonymously it is not possible to
join/merge the two databases based on different
checklists. The checklists only ask for the role of the
communication partner but not for his identity. But
each database still enables a various kind of analysis.
KMIS 2010 - International Conference on Knowledge Management and Information Sharing
368