Information exchange tool

ABSTRACT

Mining human capital information includes defining one or more attributes of a communication group, extracting a target group by searching one or more of explicit and implicit data sources according to the defined attributes, communicating with the extracted target group, logging at least some of the communications, and analyzing the logged communications.

RELATED APPLICATIONS

This application is a divisional (and claims the benefit of priorityunder 35 U.S.C. § 121) of U.S. application Ser. No. 10/620,539, filedJul. 16, 2003. The disclosure of the prior application is consideredpart of (and is incorporated by reference in) the disclosure of thisapplication.

BACKGROUND

The following disclosure relates to an information exchange tool.

Enterprises typically have a need to communicate and extract informationfrom individuals across their organization. Enterprises often employtechniques for one-to-one/one-to-few communications such as, forexample, electronic-mail (email). They also may employ techniquesavailable for large-scale communications using, for example,enterprise-wide custom surveys.

SUMMARY

The present inventors recognized that exchange techniques, such as emailand surveys may lack the ability to communicate with a group ofindividuals in an enterprise in an efficient and structured manner.Accordingly, systems and techniques described here, among otherfeatures, enable an enterprise to communicate with a target group havinga common attribute.

Human Capital Information Mining

Human capital information mining (HCIM) may involve searching explicitlydefined data and implicit data, such as information extracted fromemails, to define certain attributes of a target group. Communicationscan take place with a list of people who fit specified search attributecriteria. Communication may involve either pushing information to a listof people or sending a request for information to those people. Thecommunications can be saved, extracted, assimilated and analyzed by theenterprise.

The systems and techniques may find application in several differentcontexts such as Human Capital Information Mining, Distribution listManagement, and Relationship Identification and Communication.

In one aspect, the systems and techniques described here includedefining one or more attributes of a communication group, extracting atarget group by searching one or more of explicit and implicit datasources according to the defined attributes, communicating with theextracted target group, logging at least some of the communications, andanalyzing the logged communications.

The defined attributes may be saved for future use. Moreover,communicating with the extracted target group may include sending to thetarget group an information request based on at least one of a surveyand a questionnaire. A report can be generated based on a result ofanalyzing the logged communications. An enterprise resource planning(ERP) system can be accessed to extract a target group. Information canbe sent to a member of the target group triggered on an occurrence of alife or work event associated with a member. Attributes can be based onat least one of special knowledge area, work experience, academicexperience, position, and work situation associated with the targetgroup.

Communicating can occur over at least one of a computer network, wiredor wireless communications channels, the Internet, an intranet,extranet, email and voice-mail. Communication with the target group caninclude at least one of structured communication wherein possibleresponses to queries are predefined and/or unstructured communicationwherein possible responses to queries are not predefined. Communicatingcan include distributing information to the target group, and receivingfeedback from the target group. Enterprise software systems can beprovided with an ability to make decisions automatically based on aresult of analyzing the one or more logged communications. Explicit datasources can include explicitly defined attribute information, andimplicit data sources can include implicitly defined attributeinformation.

In various implementations, the disclosed techniques may provide one ormore of the following advantages. Enterprises typically have a need tocommunicate with individuals across their organization. Enterprisesoften employ techniques for one-to-one/one-to-few communications suchas, for example, email. These communications require that the targetgroup be pre-defined by naming the recipient(s) or by pre-defining astatic distribution list. They may also employ techniques available forlarge-scale communications using, for example, enterprise-wide customsurveys. The use of the above techniques provides an enterprise theability to communicate with a flexible target group based on one or morecommon attributes for the target group, e.g., all employees with Javaprogramming experience that work in the Palo Alto office and with morethan 3 years experience. These techniques can be combined with toolssuch as SAP's Business Intelligence product for extracting, assimilatingand analyzing data, providing a facility for logging communication dataand then analyzing the logged communications.

Distribution List Management

In general, distribution list management (DLM) provides an enterprisewith an ability to create and maintain a dynamic distribution list. Bydefining a target group based on one or more attributes rather thanexplicitly defining the members, the group's membership may varydepending on when the search for members having the attributes is run.

Establishing a target group may include defining information associatedwith one or more attributes for a target group, saving the definedattribute information, and searching explicit and implicit data sourcesfor people having the defined attributes.

Generating or updating a distribution list defining a target group maybe performed at the time information is to be exchanged with the targetgroup. Information communicated to the extracted target group mayinclude an information request based on at least one of a survey and aquestionnaire. An enterprise resource planning system may be accessed todefine information associated with one or more attributes for a targetgroup. Information may be send to a member of the target group triggeredon an occurrence of a life or work event associated with a member.

The defined attributes delineating the target group may be based on aspecial knowledge area, work experience, academic experience, position,and/or work situation associated with the target group. Communicatingwith the target group may occur over one or more of a computer network,wired or wireless channel, the Internet, an intranet, an extranet, emailand/or voice-mail. Communicating with the target group may includesending the target group structured communication wherein possibleresponses to queries are predefined, and/or unstructured communicationwherein possible responses to queries are not predefined. Communicatingwith the target group may further include distributing information tothe target group, and receiving feedback from the target group.Identifying one or more attributes may include searching data sourceshaving explicitly defined attribute information and searching datasources having implicitly defined attribute information.

In various implementations, the disclosed DLM techniques may provide oneor more of the following advantages. Enterprises often have a need to beable to communicate to specific groups of people. Currently, e-mailsystems provide for defining distribution lists. Typically, these arecreated well before communicating with the target group via extractionof data out of an ERP system or built up manually. These staticdistributions lists tend to be valid only at the point of creation andmay gradually become outdated as employees change positions or otherattributes.

Enterprises also typically need to identify individuals in an enterprisewith certain attributes or qualifications for purposes of targetedcommunications or to define a project group. Search engines exist forsearching fixed databases, for example, SAP's Enterprise ResourcePlanning (ERP) system searches explicit data. Search engines also maysearch implicit data, for example, web crawlers or SAP's Expert Findermay search email or other unstructured information.

One need, however, that may not have previously been considered oraddressed is the ability to identify a target group of people having auser-defined set of attributes, and the ability to extract a currentlyaccurate target group at any time, taking into account employee changes.For example, the attributes may define all employees with Javaprogramming experience that work in the Palo Alto office and with morethan 3 years experience. The described techniques may realize these andother advantages by providing an enterprise with the ability to searchacross a plurality of data sources and save the search criteria forfuture identification of a target group having the same minimumattributes.

Relationship Identifier and Communications

Relationship identifier and communications techniques provide anenterprise with an ability to perform a search and to extract a targetgroup and then using the extracted target group to run a secondaryrelationship evaluation process to derive a secondary group from thetarget group.

In this context, identifying a target group may include declaringattributes required for membership to a first group of objects (e.g.,computer servers at a certain location in an enterprise), using a leastsome of the defined attributes to search at least one of explicit andimplicit data sources for objects belonging to the first group, andusing results of the search to perform a relationship evaluation toderive a secondary group of objects (e.g., Managers owning cost centersto which computer servers with attributes of the first group belong).

Moreover, the results of a previous relationship evaluation may be usedto perform a subsequent relationship evaluation to derive a subsequentgroup of objects. The first group of objects may include a first groupof people and the secondary group of objects may include a secondarygroup of people having an organizational relationship with the firstgroup of people. An enterprise resource planning system may be accessedto obtain information associated with one or more attributes for a firstgroup of objects. Attributes may be based on special knowledge area,work experience, academic experience, position, and/or work situationassociated with the first group of objects. (E.g., A previousrelationship evaluation identified Managers owning cost centers to whichcomputer servers with certain attributes belong. A subsequentrelationship evaluation identifies the Administrative Assistants ofthose Managers with a specific technical expertise, with the purpose oforganizing a Technical Update meeting.)

The disclosed techniques may be applicable in the context of humanresources management where the groups and relationships relate to peoplesuch as managers or administrative personnel associated with each of thetarget group (employees). In this context, secondary and possiblyfurther levels of relationship evaluations may be performed, using theresults (group) of the previous search or relationship evaluation. Thesetechniques may be applicable to other objects and their relationships.

The disclosed techniques may provide one or more of the followingadvantages. An enterprise may have a need to search and then communicatewith a group of people having a common attribute. However, suchinformation may not always be directly accessible in a search. Forinstance, search engines may search using fixed database fieldsincluding explicit data and implicit data. However the result of theprimary search may not necessarily include the desired group of people.For instance, it may be desirable to locate the managers of personnel.While a search can be executed defining employee attributes, it may notnecessarily define the manager of the employee.

These techniques also may provide the ability to extract informationthat may not directly available from a single search step. For example,manager information may be determined by evaluating the relationship“employee-manager,” allowing the group of managers to be derived usingthe group of employees. Accordingly, the disclosed techniques andsystems provide a dramatic advantage in that they facilitate definingrelationship criteria and have a series of successive relationshipevaluation runs that leverage information extracted from earliersearches or relationship evaluations in the series.

The disclosed techniques are not limited to searching for people orrelationships to people. They may apply to any group of objects,applying a specific relationship to the group of objects and deriving asecondary group of objects. For instance, searching within the inventoryof a company for the objects “printer in building A” may result in alist of all printers within the company and building A. Evaluating therelationship “printer<->cost center”, the group of derived objects mayinclude a list of all cost centers containing a printer in building A.Evaluating the relationship “cost center<->cost center manager”, thegroup of derived objects may include a list of all cost center managers“owning a printer in building A.” Evaluating the relationship“manager<->admin assistant”, the group of derived objects may include alist of all assistants assigned to a manager responsible for printers inbuilding A. Having identified these assistants, a manager may be able tosend an email message to the assistants about “phasing out theindividual printers” and implementing central print services in anotherlocation.

The techniques disclosed herein may serve as an enterprise survey toolfor facilitating the management and extraction of information from humancapital assets such as employees in an enterprise. The techniques maypermit precise targeting of a desired “knowledge group” within theenterprise in combination with existing enterprise resource planning(ERP) data and Expertise Management software. Information may beaccurately distributed to a specific “knowledge group” throughcommunication channels (email, voice mail, etc.), keeping the people inan organization who “need to know” well-informed. Also, Structuredinformation may be efficiently and consistently extracted fromrepositories relating to a “knowledge group” by combining survey toolstechniques and deploying existing ERP data. Support may be provided forpersistent and consistent analytics and reporting ondistributed/extracted information by supporting and deploying enterprisebusiness warehouse (BW) systems.

Moreover, an enterprise may be able to mine high quality informationfrom its human capital assets in an efficient, persistent and consistentmanner. For example, the enterprise may provide high quality informationthrough precise targeting of “knowledge groups” (representing theparadigm “ask the people who know”). This can be achieved efficientlyby, for example, precise targeting of knowledge groups (“ask only thepeople who know, inform only the people who need to know”), bycomplementing survey content with business content already availablethrough ERP (“use the data you already have”), and by improved surveyresponse management. The information may be persistent becauseinformation is stored and collected in the enterprise BW (“keep the datayou need”). The information also may be consistent because a commonenterprise analytics and reporting tool is deployed (“the right dataavailable to the right people”) and because a single enterprisecommunication solution is deployed throughout the enterprise (“one need,one solution”).

The techniques may allow enterprise applications to provide a new classof communication to be directed to knowledge groups not previouslyaccessible to decision makers: Questions, which previously were notappropriate when asked across an entire enterprise, can now be directedto an expert audience; Information, which may not have made sense to bedistributed across an entire enterprise (or even to a staticdistribution list), can now be directed to a targeted audience;Accessible, high quality information/data may now enable decision makerwithin the enterprise to make informed business decisions.

The techniques can be used by an enterprise to replace current systems,such as “two-way, one-to-many, structured communication tools” likespreadsheets, broadcast emails and custom survey solutions, which tendto be inefficient, ineffective and costly. Consequently, the techniquesdisclosed herein may allow an enterprise, for example, to make betterdecisions, visualize new opportunities, reduce existing costs, andincrease efficiency and effectiveness of processes.

The details of one or more embodiments are set forth in the accompanyingdrawings and the description below. Other features and advantages willbe apparent from the description and drawings, and from the claims.

DRAWING DESCRIPTIONS

FIG. 1 is a block diagram of an implementation of a information exchangetool.

FIG. 2 is a block diagram of a knowledge group identification (KGI)module associated with an information exchange tool.

FIG. 3 is a block diagram of a communications tool (CT) moduleassociated with an information exchange tool.

FIG. 4 is a block diagram of an analysis and reporting (AR) moduleassociated with an information exchange tool.

FIG. 5 is a flow chart of an implementation of an human capitalinformation management module associated with an information exchangetool.

FIG. 6 is a flow chart of an implementation of a distribution listmanagement module associated with an information exchange tool.

FIG. 7 is a flow chart of an implementation of a relationship identifierand communications module associated with an information exchange tool.

Like reference symbols in the various drawings indicate like elements.

DETAILED DESCRIPTION

FIG. 1 is a block diagram of a computer system 10 for implementing aninformation exchange tool 20. The tool 20 includes a human capitalinformation mining (HCIM) module 25, a distribution list management(DLM) module 70 and a relationship identifier and communications (RIC)module 80.

The HCIM module 25 further includes a knowledge group identificationmodule (KGI) 30, a communications tool (CT) module 40 and an analysisand reporting (AR) module 60. In one implementation, the KGI module 30can search explicitly defined data (e.g. SAP's ERP (Enterprise ResourcePlanning) product) and implicit data such as information extracted fromemails. For example, the module can search for information related tothe members of the enterprise by using an enterprise resource planning(ERP) system 22 and data sources 23 containing explicit and implicitdata related to employees of an enterprise. In one implementation, theERP system 22 can include human resources (HR) master data of employeesof the enterprise (e.g. job position, cost center, seniority) and eventinformation such as Work and Life events affecting employees of anenterprise.

Life and work events may be defined as inflection points in the path ofan employee's career or personal life, which may cause a change in anemployee's status from the employer's perspective. These changes oftenrequire communication between employer and employee, to convey detailsand/or action items regarding the new status. Such changes may includePromotion, Birth of a child, Marriage, Salary increase, Expiration ofprofessional certification, Divorce, Change of Position, or otherchanges. A Life and Work event may trigger workflows, such as the Lifeand Work event for “Marriage” may trigger a workflow for “Benefitsenrollment” and “Change of dependent information via employee selfservice.”

The KGI module 30 may allow the user to define certain attributes of atarget (knowledge) group 26 the user wishes to communicate with, andhave a list of people extracted that fits the search attribute criteria.The KGI module 30 identifies a target group 26 having a common attributesuch as expertise in a technical area and creates a list of membersbelonging to the group. The KGI module 30 can search explicit andimplicit data sources. Explicit data sources can include explicitlydefined data such as data from SAP's ERP system. Implicit data sourcescan include implicitly defined data such as information extracted fromemails.

The CT module 40 provides communication techniques for exchanginginformation with a group such as by providing applications for sending arequest to the group using a template based on a survey-sheet, aquestionnaire or other template. For example, information (e.g., anannouncement) may be pushed to a list of people or take the form of arequest for information (e.g., pull information) such as a survey. Theinformation may be exchanged over one or more communication channelssuch a computer network, the Internet, an intranet, an extranet, email,voice-mail or other communications channel. In one implementation, theCT module 40 can log communications such as the exchange of informationwith the target group.

In one implementation, the AR module 60 may allow the savedcommunications to be extracted, assimilated and analyzed (e.g., SAP'sBusiness Intelligence product). The AR module 60 provides informationstorage, access and analysis functionality for receiving and analyzing aresponse to the information from the group.

The DLM module 70 may permit an enterprise to create and save a dynamiclist of members in the enterprise based on a common attribute sharedamong the members. By defining a target group based on one or moreattributes rather than explicitly defining the members, the group mayvary depending on when the search is run. The DLM module 70 retrievesmember data from the ERP system 22 and/or data sources 23 and uses theKGI module 30 to create a dynamic list of members having a commonattribute. The list can be updated based on a change to a characteristicof the members in the enterprise such as a change in the number ofindividuals in the list. The DLM module 70 uses the services of the CTmodule 40 to exchange information with the members of the list over acommunications channel. The DLM module 70 also employs the services ofthe AR module 60 to analyze and report the results of responses from themembers of the group.

The RIC module 80 may allow an enterprise to identify members having arelationship with other members in an enterprise. The module performs asearch to extract a target group and then using the extracted targetgroup to run a secondary relationship evaluation process to derive asecondary group from the target group. The disclosed techniques may beapplicable in the context of human resources management where the groupsand relationships relate to people, e.g., managers or administrativepersonnel associated with each of the target group members of employees.Secondary and possibly further levels of relationship evaluations may beperformed using the results (group) of the previous search orrelationship evaluation. The functionality of the module also can relateto other objects and their relationships. The RIC module 80 employs thefunctionality of KGI module 30 to identify groups as well as theservices of the CT module 40 to send members in the second group arequest for information related to the members of the first group. Forexample, the request can include a set of questions related to themembers such as their depth of experience in a technical area. Like theDLM module 70, the RIC module 80 employs the services of the AR module60 to analyze and report responses from the members of the group.

Human Capital Information Mining

FIG. 2 is a block diagram of an implementation of a KGI module 30associated with the HCIM module 25 of FIG. 1. The KGI module 30 mayallow a user to enter parameters such as data related to commonattributes. The KGI module 30 can use the common attributes to identifya group having those attributes. The KGI module 30 comprises acombination of hardware and software modules including a user-interface32, a KGI Kernel 34 and data sources 36. The user-interface 32 may allowa user to display data from the tool 20 and to provide data to the tool.For example, the user can enter a request (including common attributes)to be used for identifying a group sharing those attributes. Inresponse, the tool 20 can return a list of members and display the listof members in the group to the user through the user-interface 32.Common attributes can include user definable parameters for identifyinga group such as, for example, special knowledge areas, work experience,academic expertise, position in the enterprise, work situation or othercommon attributes.

The KGI Kernel 34 includes an application module 34 a, an interpretationmodule 34 b and an exchange module 34 c. The application module 34 aincludes functionality for receiving user requests and forwarding therequests to the interpretation module 34 b. The application module 34 aalso receives/handles requests from calling applications as well aspackages knowledge group contents for the calling applications. Callingapplications can include, for example, the DLM module 70 and the RICmodule 80.

The interpretation module 34 b is responsible for receiving andprocessing requests from the application module 34 a. For example, theinterpretation module 34 b can receive data containers holding theresults of the request from the exchange module 34 c and evaluates thecontents of the containers. Data containers provide a data structure forexchanging data between modules. The interpretation module 34 bdetermines potential data sources 36 for satisfying the requests andreturns a knowledge group (i.e. a list of people satisfying the userrequest) to the application module 34 a.

The exchange module 34 c provides an interface layer between theinterpretation module 34 b and the data sources 36. For instance, theexchange module 34 c can receive data requests from the interpretationmodule 34 b and perform communication functions (requests for data) withthe data sources 36 as well as handle protocols, data formats or othercommunications functions. The exchange module 34 c also can return datacontainers to the interpretation module 34 b in a generic format.

The information exchange tool 20 also can employ the data sources 36 forsearching for information related to the members of the enterprise. Forexample, the tool 20 can use the data sources 36 to gather commonattribute information related to members of the enterprise as well storethe information for subsequent access to identify a knowledge group.Data sources 36 can include data providers such as, for example, mailsystems 36 a, expert finder 36 b, one or more human resource (HR)systems 36 c, project systems 36 d or other data providers. The mailsystems 36 a can include data derived from email, voice-mail,traditional mail or other mail related sources. The expert finder 36 b,such as Expert Finder provided by SAP, can be used to create a knowledgegroup or dynamic distribution list of members of the group. The expertfinder 36 b includes a static distribution list that is updatedperiodically and provides implicit member information based on priorcommunications, such as emails, exchanged with the members of theenterprise.

Implicit member information may be defined as information that infers,but does not directly state, interest, expertise or responsibility of anindividual regarding a certain subject. For example: Over 50 emailsmentioning “Section ABC Compliance” are written by a software engineerin a short time frame. Implicit membership of this employee to the groupof company engineers with a professional interest in legislationaffecting “Section ABC Compliance” can be inferred from thisinformation. On the other hand, explicit member information may bedefined as information that states by definition an interest, expertiseor responsibility of an individual regarding a certain subject. Forexample: Under ‘Areas of Expertise’ in a company's skills database, thevalue “Section ABC Compliance” is stored for an individual softwareengineer. Or, the position “Java Developer” has a mandatory requirementof Java expertise, and therefore any individual stated to be in thisposition is automatically stated to have this expertise.

The HR systems 36 c can provide detailed information related to theemployees of the enterprise. For example, the HR systems 36 c cancontain work relationship data (e.g. cost center, product line),personnel number data (e.g. change tracking, data entry), relationshipinformation (e.g. employee's supervisor or manager) or otherinformation. Information related to projects with which individuals ofthe enterprise have been involved can be stored in project systems 36 d.

As mentioned above, the information exchange tool 20 also can extractemployee information from an existing ERP system 22 of the enterprise.The ERP system 22 provides static employee information that is updatedperiodically and provides explicit member data. The ERP system 22 alsomay include a search engine for searching a database for member data.The database can be used to store and retrieve member data using aunique static member identifier such as an employee number or asocial-security-number.

FIG. 3 is a block diagram of an implementation of a CT module 40associated with the HCIM module 25 shown in FIG. 1. Once the KGI module30 has identified a group having common attributes, the CT module 40 caninitiate specific and or structured communication with the members ofthe group and monitor responses from the members. The CT module 40includes a user-interface 42, a CT Kernel 44, a database 46 and contentproviders 48. Like user-interface 32 of KGI module 30, theuser-interface 42 of CT module 40 allows the user to interact with thefunctionality of the CT module.

Structured communication may be defined as communications whereinpossible responses to queries are predefined. For example, a multiplechoice question, or a type restricted response (e.g. Query: “Indicatethe number of people available on this date?”, Response: “6”.) Answerscan be immediately quantified. Lack of response can also be quantified.Unstructured communication is defined as communications where possibleresponses to queries are undefined. The query can includes a questioninviting a free form response. (e.g. Query: “Do you have any concernsabout the project?”, Response (free form): maybe a “Yes”, a “No”, a listof concerns, or a response addressing a tangential subject.) Text basedemail is most commonly unstructured communication. Responses tounstructured queries may be highly subject to interpretation, and aredifficult to quantify when received in large number. Lack of response isalso difficult to quantify (the recipient may respond without actuallyaddressing the question).

The CT Kernel 44 includes a content generator module 44 a, an exchangemodule 44 b, a distribution module 44 c and a tracking/logging module 44d. The content generator module 44 a is responsible for the creation ofcommunication content that is ultimately distributed to the members of agroup identified by KGI module 30. The content generator module 44 ahandles this function by receiving requests for content from thedistribution module 44 c, sending the requests to the content providers48 through the exchange module 44 b, and returning links to appropriatetypes of content generated by the content providers 48.

The exchange module 44 b acts as an interface to the content providers48. The exchange module 44 b also can launch application programsassociated with the content providers 48, handle different aspects ofthe content providers such as communication protocols, and format andbundle content in a common format and return links to the content.

The distribution module 44 c is responsible for distributingcommunications content (e.g. survey embedded in an email) to members ofthe group identified by KGI module 30. The distribution module 44 c alsohandles requests/accepts knowledge group lists from KGI module 30 aswell as requests from the content generator 44 a for content supplied bythe content providers 48. The tracking/logging module 44 d performsfunctions for managing communications with members of a knowledge group.For example, the module 44 d can log communications sent by thedistribution module 44 c (i.e. who sent what), track (i.e. monitor whoresponded to the communications) and store responses in the database 46or other functions. The database 46 can be used to track and store theresponses from the members in a group that have received communicationsfrom the distribution module 44 c.

Content providers 48 can include applications for supplyingcommunication content such as surveys from a survey generator 48 a,voice-mail messages from a voice interaction generator 48 b, textmessages from a text editor 48 c, hardcopy letters, hypertext markuplanguage (HTML) pages, or other content generation techniques. Thesurvey generator 48 a is capable of creating surveys such assatisfaction surveys, opinion surveys, performance feedback surveys orother surveys.

FIG. 4 is a block diagram of an implementation of an AR module 60associated with the HCIM module 25 shown in FIG. 1. The AR module 60 canprovide functionality such as information storage, information access,information analysis and reporting functionality. The AR module 60includes a user-interface 62, a business intelligence module 64 and adatabase 66. The user-interface 62 is similar to the user-interface 32of KGI module 30 in that it can allow a user to display data and enterdata for use with the AR module 60. In one implementation, the AR module60 can employ an authorization/roles concept to make informationprovided by the CT module 40 easily accessible to specific users of theenterprise. In addition, transparent storage and access can be achievedthrough Portals integration.

The business intelligence module 64 can handle reporting and analysis ofdata based on responses from individuals who have received and respondedto communications content. An example of a business intelligence module64 is the business warehouse (BW) business intelligence tool provided bySAP. The database 66 can be used for storage and retrieval of raw dataderived from responses from recipients of communications content. Forexample, original data from the results of a survey can be stored forlater retrieval and analysis.

FIG. 5 is a flow chart 100 of an implementation of an HCIM module 25 ofFIG. 1. The HCIM module 25 is capable of “mining” human capitalinformation by identifying a target group, distributing information tothe target group, receiving structured feedback from the group, andanalyzing the feedback.

To illustrate, assume that an enterprise has approved a project thatrequires individuals with knowledge in a particular programminglanguage. The HCIM module 25 can define (102) one or more attributes ofa target group (i.e., a group having a common attribute associated withan enterprise). Continuing with the example, a team leader responsiblefor staffing the project can access the KGI module 30 of module 25 (seeFIG. 2) through user-interface 32 and enter a request for individualshaving knowledge of a particular programming language.

The HCIM module 25 can extract (104) a target group by searching on ormore explicit and implicit data sources according to the definedattributes. For example, the HCIM can use the KGI module 30 to searchexplicit and implicit data sources 36 (see FIG. 2) to extract a list ofmembers having knowledge of a particular language (i.e. knowledgegroup).

Once a knowledge group has been identified (or defined), the HCIM module25 can communicate (106) with the extracted target group. For example,the user can exchange information with the target group by accessing theCT module 40 (see FIG. 3) of the HCIM module 25 through theuser-interface 42 to create content directed to the knowledge group. Thecontent generator 48 can be used to create email messages embedded witha survey. The survey can have questions such as the depth of theindividuals experience using a particular language. The contentdistribution module 44 c distributes the surveys to the knowledge group.The tracking/logging module 44 d logs recipients of a survey and tracksand stores responses to the survey.

The user then can access the HCIM module 25 to log and analyze (108)some of the communications. For example, the AR module 60 can providelogging, analysis and reporting tools so that the user can view responseinformation from different perspectives. For example, the businessintelligence module 64 can employ statistical techniques to generatereports based on the responses to the survey. As a result using theinformation exchange tool, the user may be able to quickly identify andcommunicate with a target group, analyze the data received from membersthe group and make a decision regarding the individuals.

Distribution List Management

FIG. 6 is a flow chart 200 of an implementation of a DLM module 70associated with the information exchange tool 20 of FIG. 1. The DLMmodule 70 is capable of establishing a target group by providingdistribution lists based on a feature that is common to a group ratherthan a static identifier such as an identification number assigned to anemployee of an enterprise (e.g. social-security-number). To illustrate,assume that a user is interested in creating a distribution list ofmembers who have a common attribute such as members who work in aparticular cost center in an enterprise. The user accesses the tool 20to define (202) information associated with attributes for a targetgroup. In this case, members who work in a cost center, from amongmembers in an enterprise.

The user can then save (204) the defined attribute information forsubsequent communications. For example, the KGI module 30 searches datasources 36 (see FIG. 2) as well as the ERP system 22 to extract a listof members who work in the cost center. The CT module 40 communicatescontent, such as an email, to the members of the list and the AR module60 analyzes and reports responses received from the members.

Assume further that the user intends to send a subsequent email messageto the members of the distribution list. The tool 20 then searches (206)explicit and implicit data sources for people having the definedattributes. For example, the list of members can be based on a change tomembers in the enterprise. In this example, the KGI module 30 conducts asearch of the data sources 36 to determine whether any additionalmembers satisfy the common attribute of working in a particular costcenter. As a result, the distribution list is updated to reflect thecurrent state of the members of the enterprise.

Once the distribution list has been updated, the user can proceed toaccess the tool 20 to exchange information with the members of the listover a communications channel. In this example, the members can be sentanother email over a computer network.

The techniques of the DLM module 70 can be applied to one or more of thefollowing applications. Conventional email systems have specificpredefined or explicit user-defined distribution lists. Suchdistribution lists may involve static identifiers such as anidentification number or an e-mail address. These static distributionlists may be generated at a specific point of time—either manually or byexecuted programs. The creation and on-going maintenance of thesedistribution lists may be time consuming and therefore expensive.Between the creation of the static distribution list and the usage ofthe distribution list, the distribution list may no longer be current.

Such conventional distribution lists may be limited by the expenseinvolved in their creation and maintenance. They remain broad in scope,and therefore are normally only used for the most general purposes(broadcast communication to a general populace). For example: CompanyABC wants to send information to employees with more than 5 years ofcompany seniority to determine whether they may be eligible for daycare.Building the static distribution list is very time consuming. Theprocess is inefficient for such a one-time e-mail. In another example:Company XYZ manually created a distribution list for all expatriatesworking in the US. A person is assigned to update the distribution liston an on-going basis. Due to human error, the distribution list may beincomplete and incorrect at the time of initial creation (individualserroneously included or excluded). Incompleteness and incorrectnessincreases over time with expatriate turnover.

The systems and techniques described here may be able to solve theseproblems through the use of the DLM module 70. The module solves theproblem through the creation of distribution lists that are defined bytheir membership criteria, rather than by their membership. Rather thansaving a list of email addresses, the DLM module 70 saves a set ofmembership criteria (i.e. rather than store a list of the fifty peoplewho reported to Department X on January 1st, the module saves thecriteria “reports to Department X”). At the time the DLM distributionlist is used to send a message, the DLM module 70 connects to an ERPsystem 22 containing the up-to-date organizational information, findsthe individuals who currently satisfy the membership criteria, and sendsthe message to those individuals.

An aspect of the DLM module 70 is its integration with an ERP system 22.An ERP system 22 may store up-to-date organizational information and themay be updated periodically as part of an enterprise's normal businessprocesses. The DLM module 70 uses the up-to-date data in the ERPsystem(s) 22 to identify those individuals who currently satisfy themembership criteria of a distribution list, at the time the distributionlist is actually used to send a message.

The KGI module 30 provides the connectivity to the ERP system(s). At thetime of the distribution list usage, the common features of the groupwill be evaluated by the KGI component. The search pattern assigned to adistribution list will be passed to the KGI component. Using the searchpattern, the KGI component will “search” the applicable ERP system(s)and return the identification numbers and/or the e-mail addresses of themembers adhering to search pattern.

For example, a company may create a distribution list for allexpatriates working in the United States (US) by entering contract type“expatriate” and work location “US.” The search pattern “contracttype=expatriate” and “work location=US” will be assigned to thedistribution list. Using the distribution list will result in thedetermination of all employees within the company with contract type“expatriate” and work location “US” at the time of usage. Fordetermination of these employees, the DLM module 70 will pass the commonfeatures of the group to the KGI component. The KGI component thanprovides the identification numbers and/or the e-mail addresses of thegroup members.

In another example, a company desires to send information to determineavailability of employer provided day care for eligible employees (i.e.,employees with more than 5 years of company seniority). Entering companyseniority “more than 5 years” and number of children “more than 0” willassign the search pattern “company seniority >5 years” and “number ofchildren >0” to the distribution list. In another example: an companywants to send product information to its customer base. A distributionlist with the criteria “Purchase category=HR software” and “Number oflicenses >500” is created. The DLM uses information stored in thecompany's Customer Relationship Management (CRM) system to retrieve theinformation, receives a list of customer contacts, and sends theinformation to the contact addresses. When additional information issent out the following month using the same DLM distribution list, newcustomers acquired in the interim are automatically included in themailing.

The DLM module 70 may provide one or more of the following advantages.The DLM may be able to provide a distribution list membership that iscurrent and complete. The DLM module 70 also may allow the creation ofdistribution lists that would otherwise be too specific (i.e. too costlyand inefficient) to be of use employing existing techniques. Moreover,the DLM 70 may allow on-the-spot user-creation of distribution lists atthe time of communication. An administrator no longer has to createdistribution lists in advance, no longer limiting their use, since thegeneric lists may be adequate for the purpose of the individual user.)

Relationship Identifier and Communications

FIG. 7 is a flow chart 300 of an implementation of a RIC module 80associated with the information exchange tool 20 shown FIG. 1. The RICmodule 80 is capable of identifying members in an enterprise having arelationship (e.g., worker and manager) with other members in anenterprise. To illustrate, assume that a team leader is seekingindividuals having a certain technical experience to work on theproject. The team leader would access the tool 20 and enter a requestfor individuals having a common attribute such as technical experienceusing a programming language needed for the project. The tool 20proceeds to identify (302) a first group of objects (members) in anenterprise by searching the ERP system 22 or other member data source.In this example, the user can access the functionality of the KGI module30 to define individuals having certain technical experience and returna list of those individuals.

The RIC module 80 uses (304) uses at least some of the attributes tosearch data sources 36 including explicit and implicit data sources.However, in this example, the team leader is interested in contactingthe managers of these individuals instead of the actual individuals. Forexample, the KGI module may have identified 300 members (knowledgegroup) having the required technical experience, but only 30 members(managers) who have a management relationship with the knowledge group.Communicating with the managers directly can reduce the amount ofcommunications exchanged because there are typically fewer managers thanthere are individuals who are managed.

Once the first group of individuals has been identified, the team leadercan access the tool 20 and the results of the search above (304) toperform a relationship evaluation (306) to derive a secondary group ofobjects. In this example, the second group corresponds to managers ofthe individuals in the first group. The KGI module 30 searches datasources 36 for managers (second group) of the individuals of the firstgroup and returns a list of those managers.

Once the second group has been identified, the tool 20 can allow themembers in the second group to send a request for information related tothe members of the first group. In this example, the team leaderaccesses the content generator 44 a of the CT module 30 to createcontent such as an email containing a survey. The distribution module 44c sends the email to the members of the second group over acommunications channel such as a computer network. As a result of thetool, the team leader can now quickly create a survey with structuredquestion sets such as the following: “On a scale of 1 to 5, which ofthese individuals could be made available in a specified timeframe?”;“Does the knowledge the individuals have actually fit the requirementsof the project?”; and “Which of the individuals would be willing torelocate to the US?”

Consequently, the team leader may be able to communicate with themanagers (second group), which represent a smaller number of individualscompared to the actual individuals (first group), and thus can make adecision quickly regarding individuals eligible to work on the project.Without the tool, the team leader, with perhaps email and telephone ashis only communication methods, would have to individually find andcategorize the answers to his questions from the first group. Moreover,without the tool, the team leader may only after extensive emailexchanges and interviews with the individuals and their managers, havebeen able to assemble a project team.

An underlying task of the disclosed techniques may involve building agroup of individuals (e.g. for the purpose of communication such asemail, mailing, etc.), using the criteria of their relationships withother individuals.

The techniques of the RIC module 80 can be applied to otherapplications. For example, a human resources (HR) manager may be able toidentify managers of all employees who work at a certain officelocation; a Finance Department can communicate with the AdministrativeAssistants of all managers who have recently had a certain expenditurecharged to their cost centers; a Project Manager can communicate withall HR representatives, who are responsible for Managers, who haveparticular experience in an area in their organizational units. Thesemethods also can be used to build a distribution list of individuals,for the purpose of communication (email, mailing, etc.), using thecriteria of their relationships with other individuals, and findrelationships between individuals in an organization.

These techniques may include a process that derives a secondary groupfrom a primary group of individuals, using their relationships asdefined in an ERP system. An ERP system can store up-to-dateorganizational information; the data in these systems is updatedconstantly as part of an enterprises daily business processes. Theprocess uses the “relationship” information implicitly stored in suchERP systems to build the secondary grouping. This process can be carriedon indefinitely for example the secondary grouping can be used to form atertiary grouping, etc.) For instance, in ERP HR systems, the “workingaddress” of an employee as well as the employee's organizational unitmay be defined. Each organizational unit may have a manager defined asits “person responsible”. Using this information, the RelationshipIdentifier can build a list of all Managers who are responsible foremployees working at a certain office location. (For example, such alist would be used to advise managers that computers systems at theoffice location are expected to be unavailable for a certain timeperiod, which may affect the productivity of their employees.)

These techniques also may allow the evaluation of relationships betweenindividuals. Conventional “search or ad hoc query engines” may allowspecific searches, but may lack the ability to determine severalrelationships among people (e.g., the HR manager, administrativeassistant, safety inspector, line supervisor, project members, etc.).The RIC module 80 may allow a flexible evaluation of relationships of aprimary group to determine a secondary group. Moreover, the process canbe performed in an iterative manner. The secondary group can be used asinput to derive a third group, ad infinitum (e.g. the first group is aset of factory line workers, the secondary group is the set of allinspection officers responsible for their line(s), the third group isthe set of reporting managers of the inspection officers, etc.).

Examples of Specific Applications for the Disclosed Techniques

The techniques disclosed herein can be used in one or more of thefollowing applications. In one example, the techniques can providesupport for “Expertise Location.” For instance, an internal managementteam responsible for evaluating new product ideas requires backgroundinformation on an innovative “Information Mining” proposal. Using theKGI module 30 of the information exchange tool, the team can quicklyidentify knowledge groups within their company who may be able to answerquestions about the feasibility and desirability of the new product.They design and distribute a quick survey, tailor made for eachknowledge group, using the functionality of CT module 40 of the tool 20.They evaluate the feedback from the members of the group through the ARmodule 60 of the tool 20. Consequently, the team can approve theproposal with more confidence.

The techniques disclosed herein can facilitate “Roles distribution.” Forinstance, an Account Manager observes a recurring problem ofunder/over-estimation of implementation costs by AccountRepresentatives. Potential customers or prospects may be hesitant toestablish a relationship or an account with the Account Representativeunless they can provide the prospects reliable information associatedwith implementation time and cost related to a project. The AccountManager accesses the functionality of the CT module 30 of theinformation exchange tool 20 to design and send a strategic survey toall consultants in the field with implementation experience for thatproduct. The survey includes questions directed to the consultants suchas sector and size of their customers, the implementation time and cost,and the areas where problems were encountered. The AR module 60 of thetool 20 monitors and analyzes response to the survey providing theAccount Manager with a reliable set of data to make improved request forproposal (RFP) replies to prospects. The AR module 60 of the tool 20also can make this data available throughout the sales organization.

The techniques also can permit “ERP integration.” For example, acorporate buyer needs to measure his company's decision for buyingvarious new automotive care products. The buyer uses the company'scurrent inventory management system (e.g. the MM inventory managementsystem provided by SAP) to determine why there has been a slow movementof the goods ordered. The buyer would like to conduct a survey todetermine the reason for the high inventory level and to propose a salespromotion plan. The buyer can access the CT module 40 of the informationexchange tool 20 to generate and send a survey to all accountrepresentatives responsible for retail and automotive accounts with aspecified annual billing. The AR module 60 manages the responses to thesurvey and makes this data available to others in the buyer'sdepartment. Also using the KGI module 30 of the tool 20, the buyer canform a knowledge group audience for his sales promotion plan, and “push”(i.e. distribute) this information out to the interested parties.

In another “ERP integration” example, assume that an HR manager needs todecide whether child-care services would be valuable at his company, forseveral locations. He can use the information exchange tool 20 to send asurvey to all full-time employees with dependents under the age of 12and ask whether they would use such services if they cost $X, $Y or $Z,how often would they use the services, and how much they currently payfor childcare. The HR Manager can use existing data from the ERP system22 (no query required) to incorporate the location and employment statusof the respondent. Using the compiled data, the HR Manager can use thefunctionality of the AR module 60 to quickly determine the best-fitsolution for his company and his employees.

The techniques disclosed herein also can support “Data Persistency.” Toillustrate, assume that manager of a finance department in an enterpriseneeds to measure the internal satisfaction of the cost center managersregarding financial services provided. The manager submits uses the CTmodule 40 of the information exchange tool 20 to generate aquestionnaire to all cost center managers within the company. Theresults of the survey can be processed by the AR module 60 to determinedeficits and fine-tune the financial service offerings. A year afterthis initiative, a new Finance Manager has the original data of thefirst survey available (stored through AR module 60 of the tool 20), andcan build on this information in a follow-up initiative.

In another “Data Persistency” application, the techniques disclosedherein can be used to trigger an automatic survey. For instance, assumethat a company is interested in measuring the feedback of theiremployees regarding the training they received. After a training classprovided within the company, a record of the employee's attendance isrecorded in Master Data of an enterprise's ERP system 22. The data entrytriggers an automatic survey from the CT module 30 of the informationexchange tool 20 which is sent out to the employee. The survey containsquestions related to the trainer, the educational content and thefacilities provided. The AR module 60 of the tool 20 can be used toanalyze the results of the survey to evaluate benchmark training offeredagainst an average and to determine future actions. At some future time(e.g., half a year after completion of the class), an automaticfollow-up survey is sent out to all participants, asking for example,“How have you been able to apply the content of the class within yourdaily work?” The information may then be used to fine-tune trainingofferings according to the current needs of the company.

The techniques disclosed herein can be used to facilitate “SurveyManagement.” For instance, assume that an organizational unit of thecompany plans to attend a technical seminar, but funding is tight. Theinformation exchange tool 20 can be used to generate a survey askingquestions about the exact number of attendees, lodging andtransportation requirements, etc. A high participation rate is requiredfor accurate cost planning. Using the CT module 40 of the tool 20,managers with low participation rates are contacted and reminded tostress the importance of the survey to their employees.

In another example of “Survey Management”, the techniques can be used totrigger “on-the-spot” surveys such as an exit survey. For instance,after being involved in an expatriate assignment, a survey is triggeredby the work/life event “Return from Assignment” and automaticallysubmitted to an employee. The results from these surveys are collectedon an ongoing basis and stored by the AR module 60 of the informationexchange tool 20. Aggregate survey results for any give time period canbe viewed at any time by the HR department to determine possibledeficiencies with the expatriate process.

In another application, the techniques disclosed herein can be used tofor “Event Triggers for information distribution.” For instance,following a life event, such as the birth of a child, an informationalemail is sent to the employee, informing them of company benefits fordependents. The email can provide a link to a “Benefits Enrollment” Webpage of the company's Intranet with instructions for changing employeestatus and benefits. Similarly, following a work event, such as a changein position, standard safety procedures and responsibilities associatedwith the new position can be automatically distributed to the employeeand the employee's current manager. A record of the informationdistributed is stored in the AR module 60 of the information exchangetool 20, providing an automatic “paper trail.”

It should be understood that the above applications representillustrative examples. One skilled in the art would comprehend that thetechniques disclosed herein can be employed in other applications.

The systems and techniques described here can be implemented in digitalelectronic circuitry, or in computer hardware, firmware, software, or incombinations of them. The systems and techniques described here can beimplemented as a computer program product, i.e., a computer programtangibly embodied in an information carrier, e.g., in a machine-readablestorage device or in a propagated signal, for execution by, or tocontrol the operation of, data processing apparatus, e.g., aprogrammable processor, a computer, or multiple computers. A computerprogram can be written in any form of programming language, includingcompiled or interpreted languages, and it can be deployed in any form,including as a stand-alone program or as a module, component,subroutine, or other unit suitable for use in a computing environment. Acomputer program can be deployed to be executed on one computer or onmultiple computers at one site or distributed across multiple sites andinterconnected by a communication network.

Method steps of the systems and techniques described here can beperformed by one or more programmable processors executing a computerprogram to perform functions of the disclosed techniques by operating oninput data and generating output. Method steps can also be performed by,and apparatus of the disclosed techniques can be implemented as, specialpurpose logic circuitry, e.g., an FPGA (field programmable gate array)or an ASIC (application-specific integrated circuit).

Processors suitable for the execution of a computer program include, byway of example, both general and special purpose microprocessors, andany one or more processors of any kind of digital computer. Generally, aprocessor will receive instructions and data from a read-only memory ora random access memory or both. The essential elements of a computer area processor for executing instructions and one or more memory devicesfor storing instructions and data. Generally, a computer will alsoinclude, or be operatively coupled to receive data from or transfer datato, or both, one or more mass storage devices for storing data, e.g.,magnetic, magneto-optical disks, or optical disks. Information carrierssuitable for embodying computer program instructions and data includeall forms of non-volatile memory, including by way of examplesemiconductor memory devices, e.g., EPROM, EEPROM, and flash memorydevices; magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor andthe memory can be supplemented by, or incorporated in special purposelogic circuitry.

To provide for interaction with a user, the systems and techniquesdescribed here can be implemented on a computer having a display devicesuch as a CRT (cathode ray tube) or LCD (liquid crystal display) monitorfor displaying information to the user and a keyboard and a pointingdevice such as a mouse or a trackball by which the user can provideinput to the computer. Other kinds of devices can be used to provide forinteraction with a user as well; for example, feedback provided to theuser can be any form of sensory feedback, such as visual feedback,auditory feedback, or tactile feedback; and input from the user can bereceived in any form, including acoustic, speech, or tactile input.

The systems and techniques described here can be implemented in acomputing system that includes a back-end component, e.g., as a dataserver, or that includes a middleware component, e.g., an applicationserver, or that includes a front-end component, e.g., a client computerhaving a graphical user interface or an Web browser through which a usercan interact with an implementation of the disclosed techniques, or anycombination of such back-end, middleware, or front-end components. Thecomponents of the system can be interconnected by any form or medium ofdigital data communication, e.g., a communication network. Examples ofcommunication networks include a local area network (“LAN”), a wide areanetwork (“WAN”), and the Internet.

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other.

Other embodiments are within the scope of the following claims.

1. A method of identifying a target group, the method comprising:defining attributes of a first group of objects; using at least some ofthe defined attributes to search at least one of explicit and implicitdata sources for the first group of objects; and using results of thesearch to perform a relationship evaluation to derive a secondary groupof objects.
 2. The method of claim 1 further comprising using theresults of a previous relationship evaluation to perform a subsequentrelationship evaluation to derive a subsequent group of objects.
 3. Themethod of claim 1 wherein the first group of objects includes a firstgroup of people and the secondary group of objects includes a secondarygroup of people having a management relationship with the first group ofpeople.
 4. The method of claim 1 further comprising sending over acommunications channel a request to the secondary group of objectsinformation related to the first group of objects.
 5. The method ofclaim 1 further comprising communicating with the secondary groupincluding sending to the secondary group an information request based onat least one of a survey and a questionnaire.
 6. The method of claim 1further comprising accessing an enterprise resource planning system todefine information associated with one or more attributes for a firstgroup of objects.
 7. The method of claim 1 wherein defining attributesincludes defining attributes based on at least one of special knowledgearea, work experience, academic experience, position, and work situationassociated with the first group of objects.
 8. The method of claim 1further comprising communicating with the secondary group over at leastone of a computer network, wireless, the Internet, an Intranet,electronic-mail and voice-mail.
 9. The method of claim 1 furthercomprising communicating with the secondary group including sending tothe secondary group at least one of structured communication whereinpossible responses to queries are predefined and unstructuredcommunication wherein possible responses to queries are not predefined.10. The method of claim 1 further comprising communicating with thesecondary group including distributing information to the secondarygroup, and receiving feedback from the secondary group.
 11. The methodof claim 1 wherein searching explicit data sources include searchingdata sources having explicitly defined attribute information.
 12. Themethod of claim 1 wherein searching implicit data sources includesearching data sources having implicitly defined attribute information.13. An article comprising a machine-readable medium storingmachine-readable instructions that, when applied to the machine, causethe machine to perform operations comprising: define attributes of afirst group of objects; use at least some of the defined attributes tosearch at least one of explicit and implicit data sources for the firstgroup of objects; and use results of the search to perform arelationship evaluation to derive a secondary group of objects.
 14. Thearticle of claim 13 further comprising instructions to use the resultsof a previous relationship evaluation to perform a subsequentrelationship evaluation to derive a subsequent group of objects.
 15. Thearticle of claim 13 wherein the first group of objects includes a firstgroup of people and the secondary group of objects includes a secondarygroup of people having a management relationship with the first group ofpeople.
 16. The article of claim 13 further comprising instructions tosend over a communications channel a request to the secondary group ofobjects information related to the first group of objects.
 17. Thearticle of claim 13 further comprising instructions to communicate withthe secondary group includes instructions to send to the secondary groupan information request based on at least one of a survey and aquestionnaire.
 18. The article of claim 13 further comprisinginstructions to access an enterprise resource planning system to defineinformation associated with one or more attributes for a first group ofobjects.
 19. The article of claim 13 wherein defining attributesincludes instructions to define attributes based on at least one ofspecial knowledge area, work experience, academic experience, position,and work situation associated with the first group of objects.
 20. Thearticle of claim 13 further comprising instructions to communicate withthe secondary group over at least one of a computer network, wireless,the Internet, an Intranet, electronic-mail and voice-mail.
 21. Thearticle of claim 13 further comprising instructions to communicate withthe secondary group including instructions to send to the secondarygroup at least one of structured communication wherein possibleresponses to queries are predefined and unstructured communicationwherein possible responses to queries are not predefined.
 22. Thearticle of claim 13 further comprising instructions to communicate withthe secondary group includes instructions to distribute information tothe secondary group, and receive feedback from the secondary group. 23.The article of claim 13 wherein instructions to search explicit datasources includes instructions to search data sources having explicitlydefined attribute information.
 24. The article of claim 13 whereininstructions to search implicit data sources includes instructions tosearch data sources having implicitly defined attribute information. 25.A system for establishing a target group, the system comprising one ormore computers configured to perform operations comprising: definingattributes of a first group of objects; using at least some of thedefined attributes to search at least one of explicit and implicit datasources for the first group of objects; and using results of the searchto perform a relationship evaluation to derive a secondary group ofobjects.
 26. The system of claim 25 further comprising using the resultsof a previous relationship evaluation to perform a subsequentrelationship evaluation to derive a subsequent group of objects.
 27. Thesystem of claim 25 wherein the first group of objects includes a firstgroup of people and the secondary group of objects includes a secondarygroup of people having a management relationship with the first group ofpeople.
 28. The system of claim 25 further comprising sending over acommunications channel a request to the secondary group of objectsinformation related to the first group of objects.
 29. The system ofclaim 25 further comprising communicating with the secondary groupincluding sending to the secondary group an information request based onat least one of a survey and a questionnaire.
 30. The system of claim 25further comprising accessing an enterprise resource planning system todefine information associated with one or more attributes for a firstgroup of objects.
 31. The system of claim 25 wherein defining attributesincludes defining attributes based on at least one of special knowledgearea, work experience, academic experience, position, and work situationassociated with the first group of objects.
 32. The system of claim 25further comprising communicating with the secondary group over at leastone of a computer network, wireless, the Internet, an Intranet,electronic-mail and voice-mail.
 33. The system of claim 25 furthercomprising communicating with the secondary group including sending tothe secondary group at least one of structured communication whereinpossible responses to queries are predefined and unstructuredcommunication wherein possible responses to queries are not predefined.34. The system of claim 25 further comprising communicating with thesecondary group including distributing information to the secondarygroup, and receiving feedback from the secondary group.
 35. The systemof claim 25 wherein searching explicit data sources include searchingdata sources having explicitly defined attribute information.
 36. Thesystem of claim 25 wherein searching implicit data sources includesearching data sources having implicitly defined attribute information.