SlideShare a Scribd company logo
1 of 24
Axios Systems

ITIL V3 Chief Architect’s
Practical Guide to
Leveraging Social Media for
IT Operations

Sharon Taylor, President
Aspect Group Inc.




                              1
Practical Guide to Leveraging Social Media for IT Operations

Agenda

   Social media in context
   Growth of social media
   Is social media a service?
   Business and social media
   Impact to the ITSM provider
   ITSM providers and social media
   Incidents, Problem, & Knowledge Management
   Challenges and risks to ITSM
   Expert advice
   assyst10 demonstration
   Q&A




                                                                   2
Social Media in Context




                          3
Growth of Social Media
 Twitter has 200 million users and generates 250 million tweets every day


 LinkedIn has 150 million users from 200 countries


 YouTube has over 4 billion videos viewed in a day



    53% of employers now                  75% of brand “likes”              43% of companies use
    research potential job                come from successful              blogging as a means
    candidates online on public           advertising within                of marketing
    social networks                       Facebook




                                                                                                   4
Is Social Media a Service?

 ITIL®’s definition of service…

“A means of delivering value to customers by
                                                           ✔
facilitating outcomes Customers want to achieve…          ✔
without the ownership of specific costs and risks”        ✔
We manage, support, communicate and use and use
Social media for achieving something.

Social media in all its forms is really a service asset




 ITIL® is a registered trade mark of the Cabinet Office




                                                               5
Business and Social Media
   Strengthen relationships with customers
   Enhance their brand awareness or preference
   Share information and ideas with customers
   Increase revenue by attracting new customers
   Leverage viral marketing
   Provide business transparency
   Create intellectual assets
   Conduct research
   Lower costs, enhance productivity
   Help people work better with each other




                                                   6
Impact to the ITSM Provider



• Understand the complexity
• Provide governance and policies for use
• Expert authority on exploiting social media
• Trusted advice and guidance
• Predict impact
• Administer security and access
• Influence decisions
All while managing the business RISK!!!




                                                7
ITSM Providers and Social Media

                                                                               Customers choose how to
                                                                               communicate
                             Service chat
                             Replace phone calls
                             Remote access
                                                                               Follow what is important
   User interface
   Knowledge base                                  Discussion groups
   Satisfaction surveys
   Service marketing
                                                   Problem teams
                                                   Collaboration
                                                   Professional forums
                                                                               Access on a variety of devices

                                                                               Communicate service status
                                                   Team collaboration
  Status updates
                          Service Desk
                                                                               Greater range and hence
                                                   Information sharing
  Change alerts                                    Topical advice and info
  Service info                                     Customer opinion platform


               Communication is multi-directional
                                                                               value for the customer
                     and collaborative




                                                                                                                8
Managing Incidents




                     9
Problem Management
Captures experience from across
the organization, not just in IT

Can leverage external
knowledge and experiences for       Crowdsource problem solving
                                    Publish workarounds
greater root cause identification   Identify trends
                                    Collaborative Root cause analysis

and triage
                                    Major incident status reporting
                                    User training and knowledge




Demonstrates transparency
within the organization at
commitment to collaboration          Problem management


over 'IT only' mindset

Location independent IT to IT
collaboration



                                                                        10
Problem Management




                     11
Problem Management


                     Invite Others




                                     12
Emerging Uses of Social Media within ITSM

ITSM tools using full integration with Social networking apps

      Automated ticketing from social platforms
      Peer to peer live support
      Monitoring support communication
      Collaboration between providers
      Push notifications to devices on social platforms
      Social sites dedicated to product knowledge
      Social profiles within ITSM tools
      Service catalogs hosted on social media platforms




                                                                13
Knowledge Management with an Edge

  Self help knowledge bases
                                                                        Monitoring




                                                  Virtual, collaborative
                                                  gamification for learning
Measuring, trending
                                                       Influencing behavior,
                                                       productivity, demand




                      Greater contributor to organizational goals


                                                                                     14
Dynamically Building Knowledge
   Quick Links to FAQs




                                                             Reviews


                         End users can open a new
                         incident/request if the knowledge
                         procedure did not satisfy their
                         needs




                   Procedures can contain both inline
                     images, hyperlinks and attachments.


                                                                       15
Challenges and Risks to ITSM

        Governance & Compliance

    Negative Exposure

 Process Integration

    Security

        Support

               ROI and Value




                                  16
Addressing Challenges and Risks

Ensure strategic objectives, compliance and use policies
are created or revisited with use of social media in mind



Examine how business and IT processes will change in your
organization with use of social media and revise process
workflows to incorporate this



Ensure that policies for when, how social media is used
and what is and is not considered acceptable use.



                                                            17
Addressing Challenges and Risks

Review the intended use of social media within the
context of your existing security management practices-
look for vulnerabilities that might emerge as a result of
introducing its use.




Understand the expectation your customers and staff have
for supporting this environment and factor these costs in as
part of overall IT service costs




                                                               18
Addressing Challenges and Risks


This is the same as introducing any new technology-ramp
up the skills, roles and work practices needed to support it




Develop a cost model just as you would for any service
and define what parameters will justify value and how they
will be measured




                                                               19
In Summary
The same guiding ITSM principles apply


       Cost, benefit, reward   People, processes,
       & return                products, partners




                               Measuring, outcomes,
       Attitudes, behaviors,
                               capability,
       cultural values,
                               performance




                                                      20
assyst10 Demonstration




   Jason Hopwood
   Senior Business Solutions Consultant – ITIL Master
   Axios Systems



                                                        21
Social IT Management - Our Approach
                                   Social IT Manager
Measurement
                                      Develops the Social
  Data Analysis                       Communications Infrastructure
                                                                                     Customer Support
  Reporting                           Overseas SM Activity
                                                                                            Monitoring
                                      Coordinates SM Activity
                                                                                            Support
                                      Provides Leadership + Support
                                                                                            Triage
IT PR + Reputation
                                                                                            Integration
       Mgmt
                                                                                            Feedback
Monitoring
Responding to Crises
Content, Events and Promotion                                   Axios assyst - Internal
                                                                Collaboration Hub

      Community Management
          Monitoring                                                          IT Marketing
          Responding to Inquires                                                 Research
          Content / Knowledge                                                    Content
          Triage                                                                 Development
          Integration                                                            Promotions
          Gamification


                                                                                                          22
Social IT Management – Reducing Support Costs




                                                23
Questions




Please connect with us on social media:
      @Axios_Systems

       /axios-systems

       /axios-systems

       /axiossystems

       blog.axiossystems.com
                                          24

More Related Content

What's hot

Marketing and Innovation - Linda Sharp
Marketing and Innovation - Linda SharpMarketing and Innovation - Linda Sharp
Marketing and Innovation - Linda SharpMarketingCamp
 
Social Media Lifecycle Management
Social Media Lifecycle ManagementSocial Media Lifecycle Management
Social Media Lifecycle ManagementBrent Spencer
 
M&A 2.0: Addressing "social aspects" of mergers and acquisitions
M&A 2.0: Addressing "social aspects" of mergers and acquisitionsM&A 2.0: Addressing "social aspects" of mergers and acquisitions
M&A 2.0: Addressing "social aspects" of mergers and acquisitionsAvinash Jhangiani
 
Assessing Social Media Risk for Healthcare Organizations
Assessing Social Media Risk for Healthcare OrganizationsAssessing Social Media Risk for Healthcare Organizations
Assessing Social Media Risk for Healthcare OrganizationsJoel Selzer
 
הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0reballattoun
 
Content Marketing and Social Selling
Content Marketing and Social SellingContent Marketing and Social Selling
Content Marketing and Social SellingMason Zimbler
 
Visual Fusion Overview Brochure
Visual Fusion Overview BrochureVisual Fusion Overview Brochure
Visual Fusion Overview BrochureIDV Solutions
 
Creating a Free and Open Source Software ecosystem to facilitate government F...
Creating a Free and Open Source Software ecosystem to facilitate government F...Creating a Free and Open Source Software ecosystem to facilitate government F...
Creating a Free and Open Source Software ecosystem to facilitate government F...Derek Keats
 
Business Cloud: The State of Play Shifts Rapidly
Business Cloud: The State of Play Shifts RapidlyBusiness Cloud: The State of Play Shifts Rapidly
Business Cloud: The State of Play Shifts RapidlyCapgemini
 
Is Social Media Missing from Your Competitive Intelligence?
Is Social Media Missing from Your Competitive Intelligence?Is Social Media Missing from Your Competitive Intelligence?
Is Social Media Missing from Your Competitive Intelligence?Crimson Marketing
 
Advocate Consulting - Company Overview
Advocate Consulting - Company OverviewAdvocate Consulting - Company Overview
Advocate Consulting - Company OverviewAdvocate Consulting
 
Understanding Social Business Excellence - Enterprise2.0Summit 2012, Paris
Understanding Social Business Excellence - Enterprise2.0Summit 2012, ParisUnderstanding Social Business Excellence - Enterprise2.0Summit 2012, Paris
Understanding Social Business Excellence - Enterprise2.0Summit 2012, ParisRawn Shah
 
Microsoft and the Business of Social Media
Microsoft and the Business of Social MediaMicrosoft and the Business of Social Media
Microsoft and the Business of Social MediaGage Marketing Group
 
Certification And Meaningful Use NCVHS April 29 2009
Certification And Meaningful Use NCVHS April 29 2009Certification And Meaningful Use NCVHS April 29 2009
Certification And Meaningful Use NCVHS April 29 2009Certification Commission
 
Connecting the dots social media across the customer journey
Connecting the dots  social media across the customer journeyConnecting the dots  social media across the customer journey
Connecting the dots social media across the customer journeyClicktools
 
Content Marketing Battle Cry: Let's Declare War on Collateral!
Content Marketing Battle Cry: Let's Declare War on Collateral!Content Marketing Battle Cry: Let's Declare War on Collateral!
Content Marketing Battle Cry: Let's Declare War on Collateral!Yesler
 

What's hot (19)

Marketing and Innovation - Linda Sharp
Marketing and Innovation - Linda SharpMarketing and Innovation - Linda Sharp
Marketing and Innovation - Linda Sharp
 
Social Media Lifecycle Management
Social Media Lifecycle ManagementSocial Media Lifecycle Management
Social Media Lifecycle Management
 
Os Kelly
Os KellyOs Kelly
Os Kelly
 
M&A 2.0: Addressing "social aspects" of mergers and acquisitions
M&A 2.0: Addressing "social aspects" of mergers and acquisitionsM&A 2.0: Addressing "social aspects" of mergers and acquisitions
M&A 2.0: Addressing "social aspects" of mergers and acquisitions
 
Assessing Social Media Risk for Healthcare Organizations
Assessing Social Media Risk for Healthcare OrganizationsAssessing Social Media Risk for Healthcare Organizations
Assessing Social Media Risk for Healthcare Organizations
 
הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0
 
Content Marketing and Social Selling
Content Marketing and Social SellingContent Marketing and Social Selling
Content Marketing and Social Selling
 
Visual Fusion Overview Brochure
Visual Fusion Overview BrochureVisual Fusion Overview Brochure
Visual Fusion Overview Brochure
 
Creating a Free and Open Source Software ecosystem to facilitate government F...
Creating a Free and Open Source Software ecosystem to facilitate government F...Creating a Free and Open Source Software ecosystem to facilitate government F...
Creating a Free and Open Source Software ecosystem to facilitate government F...
 
Business Cloud: The State of Play Shifts Rapidly
Business Cloud: The State of Play Shifts RapidlyBusiness Cloud: The State of Play Shifts Rapidly
Business Cloud: The State of Play Shifts Rapidly
 
Is Social Media Missing from Your Competitive Intelligence?
Is Social Media Missing from Your Competitive Intelligence?Is Social Media Missing from Your Competitive Intelligence?
Is Social Media Missing from Your Competitive Intelligence?
 
Disney Field Study
Disney Field StudyDisney Field Study
Disney Field Study
 
Advocate Consulting - Company Overview
Advocate Consulting - Company OverviewAdvocate Consulting - Company Overview
Advocate Consulting - Company Overview
 
Understanding Social Business Excellence - Enterprise2.0Summit 2012, Paris
Understanding Social Business Excellence - Enterprise2.0Summit 2012, ParisUnderstanding Social Business Excellence - Enterprise2.0Summit 2012, Paris
Understanding Social Business Excellence - Enterprise2.0Summit 2012, Paris
 
Mobco session
Mobco sessionMobco session
Mobco session
 
Microsoft and the Business of Social Media
Microsoft and the Business of Social MediaMicrosoft and the Business of Social Media
Microsoft and the Business of Social Media
 
Certification And Meaningful Use NCVHS April 29 2009
Certification And Meaningful Use NCVHS April 29 2009Certification And Meaningful Use NCVHS April 29 2009
Certification And Meaningful Use NCVHS April 29 2009
 
Connecting the dots social media across the customer journey
Connecting the dots  social media across the customer journeyConnecting the dots  social media across the customer journey
Connecting the dots social media across the customer journey
 
Content Marketing Battle Cry: Let's Declare War on Collateral!
Content Marketing Battle Cry: Let's Declare War on Collateral!Content Marketing Battle Cry: Let's Declare War on Collateral!
Content Marketing Battle Cry: Let's Declare War on Collateral!
 

Viewers also liked

2014 NA assyst User Forum Photo Gallery
2014 NA assyst User Forum Photo Gallery2014 NA assyst User Forum Photo Gallery
2014 NA assyst User Forum Photo GalleryAxios Systems
 
How to optimize IT for future business needs
How to optimize IT for future business needsHow to optimize IT for future business needs
How to optimize IT for future business needsAxios Systems
 
Integrating Service Catalog with the Business - Rapid and Relevant SLAs
Integrating Service Catalog with the Business - Rapid and Relevant SLAsIntegrating Service Catalog with the Business - Rapid and Relevant SLAs
Integrating Service Catalog with the Business - Rapid and Relevant SLAsAxios Systems
 
ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)Axios Systems
 
ITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionAxios Systems
 
Defining Services for a Service Catalog
Defining Services for a Service CatalogDefining Services for a Service Catalog
Defining Services for a Service CatalogAxios Systems
 
How to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectHow to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectAxios Systems
 
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...Axios Systems
 
ITSM Tool upgrade options
ITSM Tool upgrade optionsITSM Tool upgrade options
ITSM Tool upgrade optionsAxios Systems
 
BYOD Trends, Challenges, Pitfalls and Tips
BYODTrends, Challenges, Pitfalls and TipsBYODTrends, Challenges, Pitfalls and Tips
BYOD Trends, Challenges, Pitfalls and TipsAxios Systems
 
How to build the business case for Service Catalog
How to build the business case for Service CatalogHow to build the business case for Service Catalog
How to build the business case for Service CatalogAxios Systems
 
Boost your ITSM maturity with a service catalog
Boost your ITSM maturity with a service catalogBoost your ITSM maturity with a service catalog
Boost your ITSM maturity with a service catalogAxios Systems
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationAxios Systems
 
ITIL Practical Guide - Service Strategy
ITIL Practical Guide - Service StrategyITIL Practical Guide - Service Strategy
ITIL Practical Guide - Service StrategyAxios Systems
 
The sociability of the brand - A framework for social media marketing - Kurio...
The sociability of the brand - A framework for social media marketing - Kurio...The sociability of the brand - A framework for social media marketing - Kurio...
The sociability of the brand - A framework for social media marketing - Kurio...Kurio // The Social Media Age(ncy)
 
The value of cloud computing to ITSM
The value of cloud computing to ITSMThe value of cloud computing to ITSM
The value of cloud computing to ITSMPatrick Keogh
 

Viewers also liked (16)

2014 NA assyst User Forum Photo Gallery
2014 NA assyst User Forum Photo Gallery2014 NA assyst User Forum Photo Gallery
2014 NA assyst User Forum Photo Gallery
 
How to optimize IT for future business needs
How to optimize IT for future business needsHow to optimize IT for future business needs
How to optimize IT for future business needs
 
Integrating Service Catalog with the Business - Rapid and Relevant SLAs
Integrating Service Catalog with the Business - Rapid and Relevant SLAsIntegrating Service Catalog with the Business - Rapid and Relevant SLAs
Integrating Service Catalog with the Business - Rapid and Relevant SLAs
 
ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)
 
ITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionITIL Practical Guide - Service Transition
ITIL Practical Guide - Service Transition
 
Defining Services for a Service Catalog
Defining Services for a Service CatalogDefining Services for a Service Catalog
Defining Services for a Service Catalog
 
How to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectHow to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief Architect
 
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
 
ITSM Tool upgrade options
ITSM Tool upgrade optionsITSM Tool upgrade options
ITSM Tool upgrade options
 
BYOD Trends, Challenges, Pitfalls and Tips
BYODTrends, Challenges, Pitfalls and TipsBYODTrends, Challenges, Pitfalls and Tips
BYOD Trends, Challenges, Pitfalls and Tips
 
How to build the business case for Service Catalog
How to build the business case for Service CatalogHow to build the business case for Service Catalog
How to build the business case for Service Catalog
 
Boost your ITSM maturity with a service catalog
Boost your ITSM maturity with a service catalogBoost your ITSM maturity with a service catalog
Boost your ITSM maturity with a service catalog
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
ITIL Practical Guide - Service Strategy
ITIL Practical Guide - Service StrategyITIL Practical Guide - Service Strategy
ITIL Practical Guide - Service Strategy
 
The sociability of the brand - A framework for social media marketing - Kurio...
The sociability of the brand - A framework for social media marketing - Kurio...The sociability of the brand - A framework for social media marketing - Kurio...
The sociability of the brand - A framework for social media marketing - Kurio...
 
The value of cloud computing to ITSM
The value of cloud computing to ITSMThe value of cloud computing to ITSM
The value of cloud computing to ITSM
 

Similar to ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT Operations

Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011pchandor
 
Social Media for B2B Technology Marketers
Social Media for B2B Technology MarketersSocial Media for B2B Technology Marketers
Social Media for B2B Technology MarketersRacepoint Global
 
MarketSqr Supply Network Introduction
MarketSqr Supply Network IntroductionMarketSqr Supply Network Introduction
MarketSqr Supply Network IntroductionFrancois Naudé
 
Osc share point 2010 make you intranet successful - 17th feb 2012 - public
Osc   share point 2010 make you intranet successful - 17th feb 2012 - publicOsc   share point 2010 make you intranet successful - 17th feb 2012 - public
Osc share point 2010 make you intranet successful - 17th feb 2012 - publicLee_Ralph
 
Making the Pieces Fit: Marketing, Technology and the Expanding Web
Making the Pieces Fit: Marketing, Technology and the Expanding WebMaking the Pieces Fit: Marketing, Technology and the Expanding Web
Making the Pieces Fit: Marketing, Technology and the Expanding WebBluespire Marketing
 
Emerging technology trends for the entrepreneur
Emerging technology trends for the entrepreneurEmerging technology trends for the entrepreneur
Emerging technology trends for the entrepreneurBala Iyer
 
OpenQ webinar 8/27/12 SafeGuard SAFE social
OpenQ webinar 8/27/12 SafeGuard SAFE socialOpenQ webinar 8/27/12 SafeGuard SAFE social
OpenQ webinar 8/27/12 SafeGuard SAFE socialeaopenq
 
The Customer Experience Scenario
The Customer Experience ScenarioThe Customer Experience Scenario
The Customer Experience ScenarioEllery Wee
 
Stockholm Smarter Business social
Stockholm Smarter Business socialStockholm Smarter Business social
Stockholm Smarter Business socialallerhed
 
Delivering Exceptional Web Experiences In a Social World
Delivering Exceptional Web Experiences In a Social WorldDelivering Exceptional Web Experiences In a Social World
Delivering Exceptional Web Experiences In a Social WorldLuis Benitez
 
Social media measurement tools group 1
Social media measurement tools   group 1Social media measurement tools   group 1
Social media measurement tools group 1Sahil Surana
 
Software Exec Summit Social Business Deck 72011
Software Exec Summit Social Business Deck 72011Software Exec Summit Social Business Deck 72011
Software Exec Summit Social Business Deck 72011pchandor
 
2011 National BDPA Tech Conf Presenation Final
2011 National BDPA Tech Conf Presenation Final2011 National BDPA Tech Conf Presenation Final
2011 National BDPA Tech Conf Presenation FinalMJD Management Group
 
Social Sales Revolution - Dreamforce 2012
Social Sales Revolution - Dreamforce 2012Social Sales Revolution - Dreamforce 2012
Social Sales Revolution - Dreamforce 2012Jeremy Roberts
 
Service&support as a strategic imperative
Service&support as a strategic imperativeService&support as a strategic imperative
Service&support as a strategic imperativeCatalina Popa
 
Vertical Social Networks
Vertical Social NetworksVertical Social Networks
Vertical Social NetworksRebecca Lieb
 
Introduction to executive programs higher education exp
Introduction to executive programs higher education expIntroduction to executive programs higher education exp
Introduction to executive programs higher education expBruno Vianna
 

Similar to ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT Operations (20)

Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011
 
Social Media for B2B Technology Marketers
Social Media for B2B Technology MarketersSocial Media for B2B Technology Marketers
Social Media for B2B Technology Marketers
 
MarketSqr Supply Network Introduction
MarketSqr Supply Network IntroductionMarketSqr Supply Network Introduction
MarketSqr Supply Network Introduction
 
Webinar 10 applications of marketing automation
Webinar   10 applications of marketing automationWebinar   10 applications of marketing automation
Webinar 10 applications of marketing automation
 
Osc share point 2010 make you intranet successful - 17th feb 2012 - public
Osc   share point 2010 make you intranet successful - 17th feb 2012 - publicOsc   share point 2010 make you intranet successful - 17th feb 2012 - public
Osc share point 2010 make you intranet successful - 17th feb 2012 - public
 
Making the Pieces Fit: Marketing, Technology and the Expanding Web
Making the Pieces Fit: Marketing, Technology and the Expanding WebMaking the Pieces Fit: Marketing, Technology and the Expanding Web
Making the Pieces Fit: Marketing, Technology and the Expanding Web
 
Emerging technology trends for the entrepreneur
Emerging technology trends for the entrepreneurEmerging technology trends for the entrepreneur
Emerging technology trends for the entrepreneur
 
OpenQ webinar 8/27/12 SafeGuard SAFE social
OpenQ webinar 8/27/12 SafeGuard SAFE socialOpenQ webinar 8/27/12 SafeGuard SAFE social
OpenQ webinar 8/27/12 SafeGuard SAFE social
 
The Customer Experience Scenario
The Customer Experience ScenarioThe Customer Experience Scenario
The Customer Experience Scenario
 
Stockholm Smarter Business social
Stockholm Smarter Business socialStockholm Smarter Business social
Stockholm Smarter Business social
 
Delivering Exceptional Web Experiences In a Social World
Delivering Exceptional Web Experiences In a Social WorldDelivering Exceptional Web Experiences In a Social World
Delivering Exceptional Web Experiences In a Social World
 
Social media measurement tools group 1
Social media measurement tools   group 1Social media measurement tools   group 1
Social media measurement tools group 1
 
Software Exec Summit Social Business Deck 72011
Software Exec Summit Social Business Deck 72011Software Exec Summit Social Business Deck 72011
Software Exec Summit Social Business Deck 72011
 
Social Media Governance
Social Media GovernanceSocial Media Governance
Social Media Governance
 
Creating Business Value Through User Experience
Creating Business Value Through User ExperienceCreating Business Value Through User Experience
Creating Business Value Through User Experience
 
2011 National BDPA Tech Conf Presenation Final
2011 National BDPA Tech Conf Presenation Final2011 National BDPA Tech Conf Presenation Final
2011 National BDPA Tech Conf Presenation Final
 
Social Sales Revolution - Dreamforce 2012
Social Sales Revolution - Dreamforce 2012Social Sales Revolution - Dreamforce 2012
Social Sales Revolution - Dreamforce 2012
 
Service&support as a strategic imperative
Service&support as a strategic imperativeService&support as a strategic imperative
Service&support as a strategic imperative
 
Vertical Social Networks
Vertical Social NetworksVertical Social Networks
Vertical Social Networks
 
Introduction to executive programs higher education exp
Introduction to executive programs higher education expIntroduction to executive programs higher education exp
Introduction to executive programs higher education exp
 

More from Axios Systems

How to reduce unplanned work and increase customer value
How to reduce unplanned work and increase customer valueHow to reduce unplanned work and increase customer value
How to reduce unplanned work and increase customer valueAxios Systems
 
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Axios Systems
 
IT Service Management for 2020: Transform the Customer Experience through Sel...
IT Service Management for 2020: Transform the Customer Experience through Sel...IT Service Management for 2020: Transform the Customer Experience through Sel...
IT Service Management for 2020: Transform the Customer Experience through Sel...Axios Systems
 
Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...
Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...
Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...Axios Systems
 
Pink Elephant and Axios Systems Webinar: How to unlock service excellence wit...
Pink Elephant and Axios Systems Webinar: How to unlock service excellence wit...Pink Elephant and Axios Systems Webinar: How to unlock service excellence wit...
Pink Elephant and Axios Systems Webinar: How to unlock service excellence wit...Axios Systems
 
Axios Systems Webinar: Position Your Organization for Enterprise Service Mana...
Axios Systems Webinar: Position Your Organization for Enterprise Service Mana...Axios Systems Webinar: Position Your Organization for Enterprise Service Mana...
Axios Systems Webinar: Position Your Organization for Enterprise Service Mana...Axios Systems
 
Webinar: Enterprise Service Management 101
Webinar: Enterprise Service Management 101Webinar: Enterprise Service Management 101
Webinar: Enterprise Service Management 101Axios Systems
 
Webinar: Improve your ITSM delivery with AI Chatbots
Webinar: Improve your ITSM delivery with AI ChatbotsWebinar: Improve your ITSM delivery with AI Chatbots
Webinar: Improve your ITSM delivery with AI ChatbotsAxios Systems
 
Pink elephant webinar: how ITSM maturity enables or disables your transformat...
Pink elephant webinar: how ITSM maturity enables or disables your transformat...Pink elephant webinar: how ITSM maturity enables or disables your transformat...
Pink elephant webinar: how ITSM maturity enables or disables your transformat...Axios Systems
 
Stephen Mann Webinar: Is it time to change your ITSM tool?
Stephen Mann Webinar: Is it time to change your ITSM tool?Stephen Mann Webinar: Is it time to change your ITSM tool?
Stephen Mann Webinar: Is it time to change your ITSM tool?Axios Systems
 
Axios Systems assyst RUG2017 - Personalisation of assyst v2.0
Axios Systems assyst RUG2017 - Personalisation of assyst v2.0Axios Systems assyst RUG2017 - Personalisation of assyst v2.0
Axios Systems assyst RUG2017 - Personalisation of assyst v2.0Axios Systems
 
Axios Systems assyst RUG2017 - Digital Transformation: Keeping pace with the ...
Axios Systems assyst RUG2017 - Digital Transformation: Keeping pace with the ...Axios Systems assyst RUG2017 - Digital Transformation: Keeping pace with the ...
Axios Systems assyst RUG2017 - Digital Transformation: Keeping pace with the ...Axios Systems
 
Axios Systems 2017 UK assyst Regional User Groups
Axios Systems 2017 UK assyst Regional User GroupsAxios Systems 2017 UK assyst Regional User Groups
Axios Systems 2017 UK assyst Regional User GroupsAxios Systems
 
Standard Bank - Implementation of assyst ITSM software
Standard Bank - Implementation of assyst ITSM softwareStandard Bank - Implementation of assyst ITSM software
Standard Bank - Implementation of assyst ITSM softwareAxios Systems
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB EnigmaAxios Systems
 
ITSM Essentials for Managing the Cloud
ITSM Essentials for Managing the CloudITSM Essentials for Managing the Cloud
ITSM Essentials for Managing the CloudAxios Systems
 
ITSM & the Cloud, what does it mean for you?
ITSM & the Cloud, what does it mean for you?ITSM & the Cloud, what does it mean for you?
ITSM & the Cloud, what does it mean for you?Axios Systems
 

More from Axios Systems (17)

How to reduce unplanned work and increase customer value
How to reduce unplanned work and increase customer valueHow to reduce unplanned work and increase customer value
How to reduce unplanned work and increase customer value
 
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
 
IT Service Management for 2020: Transform the Customer Experience through Sel...
IT Service Management for 2020: Transform the Customer Experience through Sel...IT Service Management for 2020: Transform the Customer Experience through Sel...
IT Service Management for 2020: Transform the Customer Experience through Sel...
 
Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...
Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...
Axios Systems Webinar: 10 quick wins to transform your IT Service Desk from g...
 
Pink Elephant and Axios Systems Webinar: How to unlock service excellence wit...
Pink Elephant and Axios Systems Webinar: How to unlock service excellence wit...Pink Elephant and Axios Systems Webinar: How to unlock service excellence wit...
Pink Elephant and Axios Systems Webinar: How to unlock service excellence wit...
 
Axios Systems Webinar: Position Your Organization for Enterprise Service Mana...
Axios Systems Webinar: Position Your Organization for Enterprise Service Mana...Axios Systems Webinar: Position Your Organization for Enterprise Service Mana...
Axios Systems Webinar: Position Your Organization for Enterprise Service Mana...
 
Webinar: Enterprise Service Management 101
Webinar: Enterprise Service Management 101Webinar: Enterprise Service Management 101
Webinar: Enterprise Service Management 101
 
Webinar: Improve your ITSM delivery with AI Chatbots
Webinar: Improve your ITSM delivery with AI ChatbotsWebinar: Improve your ITSM delivery with AI Chatbots
Webinar: Improve your ITSM delivery with AI Chatbots
 
Pink elephant webinar: how ITSM maturity enables or disables your transformat...
Pink elephant webinar: how ITSM maturity enables or disables your transformat...Pink elephant webinar: how ITSM maturity enables or disables your transformat...
Pink elephant webinar: how ITSM maturity enables or disables your transformat...
 
Stephen Mann Webinar: Is it time to change your ITSM tool?
Stephen Mann Webinar: Is it time to change your ITSM tool?Stephen Mann Webinar: Is it time to change your ITSM tool?
Stephen Mann Webinar: Is it time to change your ITSM tool?
 
Axios Systems assyst RUG2017 - Personalisation of assyst v2.0
Axios Systems assyst RUG2017 - Personalisation of assyst v2.0Axios Systems assyst RUG2017 - Personalisation of assyst v2.0
Axios Systems assyst RUG2017 - Personalisation of assyst v2.0
 
Axios Systems assyst RUG2017 - Digital Transformation: Keeping pace with the ...
Axios Systems assyst RUG2017 - Digital Transformation: Keeping pace with the ...Axios Systems assyst RUG2017 - Digital Transformation: Keeping pace with the ...
Axios Systems assyst RUG2017 - Digital Transformation: Keeping pace with the ...
 
Axios Systems 2017 UK assyst Regional User Groups
Axios Systems 2017 UK assyst Regional User GroupsAxios Systems 2017 UK assyst Regional User Groups
Axios Systems 2017 UK assyst Regional User Groups
 
Standard Bank - Implementation of assyst ITSM software
Standard Bank - Implementation of assyst ITSM softwareStandard Bank - Implementation of assyst ITSM software
Standard Bank - Implementation of assyst ITSM software
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB Enigma
 
ITSM Essentials for Managing the Cloud
ITSM Essentials for Managing the CloudITSM Essentials for Managing the Cloud
ITSM Essentials for Managing the Cloud
 
ITSM & the Cloud, what does it mean for you?
ITSM & the Cloud, what does it mean for you?ITSM & the Cloud, what does it mean for you?
ITSM & the Cloud, what does it mean for you?
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT Operations

  • 1. Axios Systems ITIL V3 Chief Architect’s Practical Guide to Leveraging Social Media for IT Operations Sharon Taylor, President Aspect Group Inc. 1
  • 2. Practical Guide to Leveraging Social Media for IT Operations Agenda  Social media in context  Growth of social media  Is social media a service?  Business and social media  Impact to the ITSM provider  ITSM providers and social media  Incidents, Problem, & Knowledge Management  Challenges and risks to ITSM  Expert advice  assyst10 demonstration  Q&A 2
  • 3. Social Media in Context 3
  • 4. Growth of Social Media Twitter has 200 million users and generates 250 million tweets every day LinkedIn has 150 million users from 200 countries YouTube has over 4 billion videos viewed in a day 53% of employers now 75% of brand “likes” 43% of companies use research potential job come from successful blogging as a means candidates online on public advertising within of marketing social networks Facebook 4
  • 5. Is Social Media a Service? ITIL®’s definition of service… “A means of delivering value to customers by ✔ facilitating outcomes Customers want to achieve… ✔ without the ownership of specific costs and risks” ✔ We manage, support, communicate and use and use Social media for achieving something. Social media in all its forms is really a service asset ITIL® is a registered trade mark of the Cabinet Office 5
  • 6. Business and Social Media  Strengthen relationships with customers  Enhance their brand awareness or preference  Share information and ideas with customers  Increase revenue by attracting new customers  Leverage viral marketing  Provide business transparency  Create intellectual assets  Conduct research  Lower costs, enhance productivity  Help people work better with each other 6
  • 7. Impact to the ITSM Provider • Understand the complexity • Provide governance and policies for use • Expert authority on exploiting social media • Trusted advice and guidance • Predict impact • Administer security and access • Influence decisions All while managing the business RISK!!! 7
  • 8. ITSM Providers and Social Media Customers choose how to communicate Service chat Replace phone calls Remote access Follow what is important User interface Knowledge base Discussion groups Satisfaction surveys Service marketing Problem teams Collaboration Professional forums Access on a variety of devices Communicate service status Team collaboration Status updates Service Desk Greater range and hence Information sharing Change alerts Topical advice and info Service info Customer opinion platform Communication is multi-directional value for the customer and collaborative 8
  • 10. Problem Management Captures experience from across the organization, not just in IT Can leverage external knowledge and experiences for Crowdsource problem solving Publish workarounds greater root cause identification Identify trends Collaborative Root cause analysis and triage Major incident status reporting User training and knowledge Demonstrates transparency within the organization at commitment to collaboration Problem management over 'IT only' mindset Location independent IT to IT collaboration 10
  • 12. Problem Management Invite Others 12
  • 13. Emerging Uses of Social Media within ITSM ITSM tools using full integration with Social networking apps Automated ticketing from social platforms Peer to peer live support Monitoring support communication Collaboration between providers Push notifications to devices on social platforms Social sites dedicated to product knowledge Social profiles within ITSM tools Service catalogs hosted on social media platforms 13
  • 14. Knowledge Management with an Edge Self help knowledge bases Monitoring Virtual, collaborative gamification for learning Measuring, trending Influencing behavior, productivity, demand Greater contributor to organizational goals 14
  • 15. Dynamically Building Knowledge Quick Links to FAQs Reviews End users can open a new incident/request if the knowledge procedure did not satisfy their needs Procedures can contain both inline images, hyperlinks and attachments. 15
  • 16. Challenges and Risks to ITSM Governance & Compliance Negative Exposure Process Integration Security Support ROI and Value 16
  • 17. Addressing Challenges and Risks Ensure strategic objectives, compliance and use policies are created or revisited with use of social media in mind Examine how business and IT processes will change in your organization with use of social media and revise process workflows to incorporate this Ensure that policies for when, how social media is used and what is and is not considered acceptable use. 17
  • 18. Addressing Challenges and Risks Review the intended use of social media within the context of your existing security management practices- look for vulnerabilities that might emerge as a result of introducing its use. Understand the expectation your customers and staff have for supporting this environment and factor these costs in as part of overall IT service costs 18
  • 19. Addressing Challenges and Risks This is the same as introducing any new technology-ramp up the skills, roles and work practices needed to support it Develop a cost model just as you would for any service and define what parameters will justify value and how they will be measured 19
  • 20. In Summary The same guiding ITSM principles apply Cost, benefit, reward People, processes, & return products, partners Measuring, outcomes, Attitudes, behaviors, capability, cultural values, performance 20
  • 21. assyst10 Demonstration Jason Hopwood Senior Business Solutions Consultant – ITIL Master Axios Systems 21
  • 22. Social IT Management - Our Approach Social IT Manager Measurement Develops the Social Data Analysis Communications Infrastructure Customer Support Reporting Overseas SM Activity Monitoring Coordinates SM Activity Support Provides Leadership + Support Triage IT PR + Reputation Integration Mgmt Feedback Monitoring Responding to Crises Content, Events and Promotion Axios assyst - Internal Collaboration Hub Community Management Monitoring IT Marketing Responding to Inquires Research Content / Knowledge Content Triage Development Integration Promotions Gamification 22
  • 23. Social IT Management – Reducing Support Costs 23
  • 24. Questions Please connect with us on social media: @Axios_Systems /axios-systems /axios-systems /axiossystems blog.axiossystems.com 24

Editor's Notes

  1. Managing Incidents Requests Communicating with customers Communicating with service tiers Lower costs More responsive Better SLA management
  2. Social Collaboration – Crowdsourcing for the IT User Complex Incidents and Changes often require multiple skilled resources to work together to resolve and/or process them. However, those same highly skilled personnel are often employed doing other things when their input might be required. It is this issue that social collaboration for IT users is meant to resolve. When logging a particular ticket, IT users may choose to create a collaborative session and invite multiple resources to work together to solve a complex issue. IT users may then log onto that particular session and iron out details in a short order. Should some users be unavailable, the collaborative session will act similarly to a bulletin board allowing messages and ideas to be posted and responded to as users are available. If the session resolves the issue, it may be nominated for inclusion in the Knowledge Base. At this point, it would simply be routed to the Knowledge Manager who would format it appropriately, and add it to the Knowledge Base.
  3. Breaking down silos – cross functional teams collaborating. Different skills, disciplines. Launch a session instead of email Capturing a typical conversation that might otherwise be happening on multiple sources like email, phone, etc. By using social media, we can now make this searchable and this helps to ensure we continue to follow process workflow =
  4. Peer to Peer Support For IT this allows an individual to handle multiple issues / requests at once and provide instant support increasing customer satisfaction. For Business Users (End Users) this means they still perform revenue producing activities while working through support issues. IT –to- IT collaboration Helps solve complex issues rapidly reducing support time / cost as well as increasing the uptime and availability of critical business services thus increasing end user satisfaction, business productivity and leaving a more positive perception of IT. Crowd sourced Community Support This feature can reduce the cost of support by avoiding phone and email to resolve issues. It also allows users to maximize their usage of key business applications and in turn increase their productivity and their business ’ revenue
  5. Governance & compliance Applying corporate or IT governance to externally owned and managed assets Negative exposure or poorly managed use of social media can threaten business reputation, security, policies   Mitigate these risks by ensuring strategic objectives and compliance and use policies are created or revisited with the added use of social media in mind. Process integration Within ITSM and business the use of social media transforms how processes are executed Failing to spend effort on integrating processes with social media use   Mitigate this risk by revisiting how business and IT processes are changes in your organization with the added use of social media and revise process workflows to incorporate this. Public exposure Staff use of public social media can trigger instant and sometimes overwhelming reactions from staff, followers, customers, etc. The use of public social media creates instant opinion driven reaction and can spiral into negative exposure for business and ITSM   Mitigate this risk by ensuring that policies for when, how social media is used and what is and is not considered acceptable use. ROI Use of social media without carefully planned implementation can create unexpected costs Uncontrolled, un monitored use and ITSM support costs for business customer use of social media can add hidden service costs   Mitigate this risk by first understanding the expectation your customers and staff have for supporting this environment and factor these costs in as part of overall IT service costs. Security Still the number one concern with externally managed environments is the security. Failing to consider the organization security needs can expose IT and the business to vulnerabilities   Mitigate this risk by reviewing the intended use of social media within the context of how it fits into your existing security management practices and look for vulnerabilities that might emerge as a result of introducing its use. Support Business expectation for IT to support their use of social media IT not having the capability, knowledge or skills to adequately manage and support the use of social media within.   Mitigate this risk by taking the approach that this is the same as introducing any new technology and ramping up the skills, roles and work practices needed to support it. Value Ensuring value for the use of social media Lack of defined measures to quantify value for money.   Mitigate this risk by developing a cost model just as you would for a service and define what parameters will justify value and how they will be measured.