Network Weaving

Monday, October 08, 2007

The etiquette of introductions

There is an etiquette to connecting with people we don't know (people in our 2nd and 3rd circles). In conversation with June and Valdis, I find out they know all kinds of people who are potentially interesting or important to me. I don't know how I fit into the world of these relationships they have built trust equity with.

It becomes a matter of courtesy, and core to our trust together, to let them know my intentions to connect with people in their close circles who they have revealed to me. They reveal their cherished connections because they trust that I will act in ways that honor their relationships and ours.

The best scenario is that they make the introductions they feel comfortable making. Of course, this can't apply when I have an accidental conversation with one of their close circle people, only realizing later that we have June's or Valdis' mutual trust in common.

In so-called "social network websites" where I can view someone's "736 closest friends" and start instantly connecting with/spamming them, I am violating introduction etiquette and risking the integrity and continuity of trust in all of the relationships involved.

Every introduction is an act of trust and trustworthiness. If I introduce you to one of my trusted friends or colleagues, it is in trust, that I am making a trustworthy introduction relative to the trust equity in our relationship.


  • My courtesy rule for making introductions is to communicate with each of the individuals personally as to whether they would be willing to be introduced. If both are amenable, I then send an e-mail to both of them that shows their e-addresses and sums up a few sentences why I think each of them might be of interest to the other. I ask them to let me know what comes of the introduction. It's almost always successful and I hear back from both parties.

    By Anonymous Kate, at 12/31/2007 9:31 PM  

  • There is a lot of room here for anthropological analysis of the strategies and tactics used and how different clusters deploy each. My curiosity metric is high.

    By Blogger flatbackground, at 4/25/2008 7:20 PM  

Post a Comment

<< Home