SlideShare a Scribd company logo
1 of 17
Social Media & Social Networking:A Cautionary Tale Michael Gotta Senior Technology Solutions ManagerEnterprise Social Software
The Social Side Of The Internet 75% of respondents are active in some kind of voluntary group or organization 68% of respondents (internet users & non-users alike) said the internet has had a major impact on the ability of groups to communicate with members  60% of respondents said the internet has had a major impact on the ability of groups to connect with other groups  59% of respondents said the internet has had a major impact on the ability of groups to impact society at large 62% of respondents said that the internet has had a major impact on the ability of groups to draw attention to an issue 59% of respondents said the internet has had a major impact on the ability of groups to organize activities Source: Pew Internet http://www.pewinternet.org/Press-Releases/2011/Social-Side-of-the-Internet.aspx
Social Networking & Social Media: Leverage new tools & literacies to enable new ways of working 3000 friends 100 fan pages 50 groups Has Own Channel Blogs Daily Following  325 Followers 915
Organizations Face Internal TensionAn Unequivocal “Yes” Or “No” Is Often Not The Answer Scale organizational expertise Lack of policy-based management Improve business processes Weak identity assurance Break down silos and barriers Inadequate security controls Benefits Risks Catalyze employee engagement Questionable privacy protections Address generational shifts Misuse by employees Improve talent & learning initiatives Unanticipated data disclosure Satisfy technology expectations Potential for “social engineering”
Leverage Use Case Scenarios: Shift The Discussion From “OR” to “AND” Observe and listen to employees, experts, and management regarding use of social tools Construct use case scenarios from those representative stories Identify decision and enforcement points where risks can be mitigated Plan, execute, adjust
Use Case #1: “Social Claims”Profiles may be viewed as a trusted information source Employee profiles populated with information from trusted enterprise systems My “Enterprise Identity” Mike Gotta EMPLOYEE #: LABOR GRADE: COST CENTER: Additional information entered by employees regarding skills, interests, expertise, experience DEPT: GROUP: My “Claimed Identity” JOB TITLE: EXPERTISE: HOBBIES: Information viewed as “trusted” but claims are not verified which can lead to risk scenarios EDUCATION: INTERESTS:  PERSONAL TAGS: COMMUNITIES: FOLLOWING: COLLEAGUES: Add fields to profile where data goes through vetting process; pre-populate profile with other credentialing information
Use Case #2: Profile ProliferationMultiple profiles creates maintenance and data integrity issues My Primary Profile DiversityCommunity Profile Selling Into HealthcareCommunity Profile Customer InnovationCommunity Profile Profiles are becoming a common feature across many vendor products EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: Jane Doe Jane Doe Jane Doe Jane Doe DEPT: DEPT: DEPT: DEPT: JOB TITLE: JOB TITLE: JOB TITLE: JOB TITLE: EXPERTISE: EXPERTISE: EXPERTISE: EXPERTISE: COLLEAGUES: COLLEAGUES: COLLEAGUES: COLLEAGUES: PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS Employees create/maintain multiple “persona’s” based on technology silos Incomplete, abandoned, or inaccurate profiles due to redundancy creates risk  Look for ways to federate, synchronize, or otherwise reduce number of user profiles Selling Into HealthcareCommunity CustomerInnovationCommunity DiversityCommunity
Automating profile updates can ease maintenance efforts by employees, increasing adoption Use Case #3: Automatic Social UpdatesLack of notice and consent can create privacy and HR issues My Profile #1 EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Vendor products are monitoring user activities and adding those actions to profiles without user intervention Restricted Access Unintended consequences can occur leading to HR-related issues such as diversity bias Activity Stream Activity Stream Public Access John Doe: Joined Community: “Selling Into Healthcare Community” John Doe: Joined Updated Wiki:“Best Ways To Respond To An RFP” John Doe: Joined Community: “Diversity Outreach Community” John Doe: Joined Community Forum: “It Gets Better Awareness Campaign” Include requirements for user-defined profile controls and management of profile updates from system activities/events DiversityCommunity Selling Into HealthcareCommunity
Use Case #4: Information LeakageOpen discourse can lead to sharing of inaccurate / sensitive data E-Mail Client ActivityStream Sender Name Subject My Profile #1 Micro-blogging / activity feeds are becoming a popular means of sharing information Sender Name Subject EMPLOYEE #: John Doe Activity Stream Activity Stream Activity Stream DEPT: JOB TITLE: EXPERTISE: Sender Name Subject Status update: xxxxxxxx Status update: xxxxxxxxx Status update: xxxxxxxxx Mike Jones: “Heading to the airport to meet with Company ABC on cross-selling biz deal” John Doe: “Working on a acquisition deal, need to work late tonight… stay tuned!” Fred Smith: “&#%^%$* we just lost Company XYZ account… Betty Smith: @Bob Jones that patient ID number is 123456789 Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace Sally Jones: I heard we might have a layoff by quarter end? David Brown: @SalesTeam I posted the new product discounting policy to the sales strategy community Mike Jones: “Does anyone know the best way to get an SOW processed in 2 days? I have an urgent need…” John Doe: “Hi, I’m a new remote employee – wondering who else is working in the marketing department!” Fred Smith: “Just figured out a workaround to a problem with our field group – ping me if interested…” Betty Smith: “We’re starting an innovation community on data quality – let me know if you’re interested” Bob Jones: “Does anyone know what IWE stands for?” Sally Jones: “Great article on social media risks http://xxxxxxx” David Brown: “@Sally, thx, we’re updating our policies now” COLLEAGUES: ACTIVITY STREAM Information shared in a public stream may be re-posted to profiles or other entities subscribing to that stream Public conversations or events published via other systems can create confidentiality and audit/archival concerns Policy, role, and rule-based approaches that create common treatments across applications are warranted
Use Case #5: Connected IdentitiesDisplay of public profiles can have unintended consequences Employee personal use of social media is becoming more commonplace E-Mail Client “ThePublicMe” Re: Partnering Opportunity Bill Smith Sent: Thu 03/01/11 To:     John Doe We’ve discussed the proposal and have decided to pass at this time… Sender Name Subject Sender Name Subject An increasing number of tools aggregate Facebook, LinkedIn & Twitter information to display in applications like e-Mail Sender Name Subject Mixing public and enterprise data can give a false sense of validity and context creating trust and privacy issues My Profile #1 “TheWorkMe” EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Examine how the public data is aggregated; re-visit consent issues; provide users with an opt-out option Jon Doe’s social datadisplayed here
Use Case #6: Oversight: Approved UseSanctioned use of social media can still require controls FINRA/SEC FTCGuidelines Regulatory and other policies can place enterprise constraints on use of social media  Notices &Disclaimers Name: Profile: Web Site: Listed SocialMedia Following Guidelines are often “gray” and leave use of many features open to interpretation regarding compliance EU PrivacyRegulations HIPAA Lists By Favorites Alternative clients, widgets, message notifications…  Message Types ,[object Object]
@ Messages
ReTweets
Direct MessagesConsumer and enterprise software providers often lack end-to-end capabilities  Combine a mix of policy, monitoring, audit, and tooling tactics to mitigate risks to an acceptable level Embedded Policy-based Management withexternal integrations (security, compliance…)
Use Case #7: Oversight: Personal UseWell-intentioned use may not excuse enterprise liability My Blog My LinkedIn Regulatory and other policies can also place constraints on personal use of social media  Employee As “Brand Ambassador” Profile ,[object Object]
Websites
SummaryThePublicMe Building a “personal brand” as an employee may seem like a worthwhile endeavor My YouTube My Twitter Status Updates & Activity Stream Third-Party Content &Applications Groups & Discussions Forums Enterprise policies or regulatory statutes may apply to personal use of social media, raising potential compliance concerns Jobs & Answers Contact Settings (Interested In…) Opportunities, Expertise Requests, Consulting Offers Re-visit policy, code of ethics, and social media guidelines. Educate employees on risks. Leverage monitoring tools. Alternative clients, widgets, message notifications…

More Related Content

What's hot

Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingDavid Stephens
 
futurethink: Future of Social Networks
futurethink: Future of Social Networksfuturethink: Future of Social Networks
futurethink: Future of Social Networksfuturethink
 
Nonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for GoogleNonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for GoogleCity Vision University
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Denys Malengreau
 
Build Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationBuild Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationJoe Barnes
 
Smashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEOSmashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEOBrightEdge
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change InitiativesSteven Wardell
 
Understanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate AmericaUnderstanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate AmericaKathy Kacher
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking AnalysisMia Horrigan
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social SoftwareRalph Paglia
 
Investor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a MustInvestor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a MustPeter Einarsson
 
Social Is The Next Search 2010
Social Is The Next Search 2010Social Is The Next Search 2010
Social Is The Next Search 2010Plínio Okamoto
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship managementPlínio Okamoto
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 

What's hot (20)

Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
futurethink: Future of Social Networks
futurethink: Future of Social Networksfuturethink: Future of Social Networks
futurethink: Future of Social Networks
 
Nonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for GoogleNonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for Google
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020
 
Build Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationBuild Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective Communication
 
Smashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEOSmashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEO
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change Initiatives
 
Understanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate AmericaUnderstanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate America
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking Analysis
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software
 
Investor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a MustInvestor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a Must
 
Social Is The Next Search 2010
Social Is The Next Search 2010Social Is The Next Search 2010
Social Is The Next Search 2010
 
Final report
Final reportFinal report
Final report
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 

Similar to Social Media & Social Networking: A Cautionary Tale

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)Mike Mintz
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business IssuesJeff Johnson
 
Social Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjurySocial Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjuryPaul Smith
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the WorkplaceEric Swenson
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the WorkplaceEric Swenson
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd Marchguestca2060b
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Social media rocketmatter
Social media rocketmatterSocial media rocketmatter
Social media rocketmatterNatalie Alesi
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Managementtwhiteman
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Presentation big data and social media final_video
Presentation big data and social media final_videoPresentation big data and social media final_video
Presentation big data and social media final_videoramikaurraminder
 
How Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social MediaHow Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social MediaCarolyn Elefant
 

Similar to Social Media & Social Networking: A Cautionary Tale (20)

Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business Issues
 
Social Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjurySocial Media, Employment, and Brain Injury
Social Media, Employment, and Brain Injury
 
#Legal social
#Legal social#Legal social
#Legal social
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Social media rocketmatter
Social media rocketmatterSocial media rocketmatter
Social media rocketmatter
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Management
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Presentation big data and social media final_video
Presentation big data and social media final_videoPresentation big data and social media final_video
Presentation big data and social media final_video
 
How Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social MediaHow Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social Media
 
Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
 
Case Study Of RHEAL
Case Study Of RHEALCase Study Of RHEAL
Case Study Of RHEAL
 

More from Mike Gotta

Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Mike Gotta
 
Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking Mike Gotta
 
Enterprise social graph aii m final
Enterprise social graph aii m finalEnterprise social graph aii m final
Enterprise social graph aii m finalMike Gotta
 
Driving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesDriving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesMike Gotta
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalMike Gotta
 
H C I Business Relationships Learning Final
H C I  Business  Relationships  Learning  FinalH C I  Business  Relationships  Learning  Final
H C I Business Relationships Learning FinalMike Gotta
 
Bg Social Networks
Bg Social NetworksBg Social Networks
Bg Social NetworksMike Gotta
 
Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The EdgeMike Gotta
 
Global Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceGlobal Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceMike Gotta
 

More from Mike Gotta (9)

Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
 
Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking
 
Enterprise social graph aii m final
Enterprise social graph aii m finalEnterprise social graph aii m final
Enterprise social graph aii m final
 
Driving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesDriving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative Technologies
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity Final
 
H C I Business Relationships Learning Final
H C I  Business  Relationships  Learning  FinalH C I  Business  Relationships  Learning  Final
H C I Business Relationships Learning Final
 
Bg Social Networks
Bg Social NetworksBg Social Networks
Bg Social Networks
 
Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The Edge
 
Global Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceGlobal Collaboration: Both Art & Science
Global Collaboration: Both Art & Science
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Social Media & Social Networking: A Cautionary Tale

  • 1. Social Media & Social Networking:A Cautionary Tale Michael Gotta Senior Technology Solutions ManagerEnterprise Social Software
  • 2. The Social Side Of The Internet 75% of respondents are active in some kind of voluntary group or organization 68% of respondents (internet users & non-users alike) said the internet has had a major impact on the ability of groups to communicate with members 60% of respondents said the internet has had a major impact on the ability of groups to connect with other groups 59% of respondents said the internet has had a major impact on the ability of groups to impact society at large 62% of respondents said that the internet has had a major impact on the ability of groups to draw attention to an issue 59% of respondents said the internet has had a major impact on the ability of groups to organize activities Source: Pew Internet http://www.pewinternet.org/Press-Releases/2011/Social-Side-of-the-Internet.aspx
  • 3. Social Networking & Social Media: Leverage new tools & literacies to enable new ways of working 3000 friends 100 fan pages 50 groups Has Own Channel Blogs Daily Following 325 Followers 915
  • 4. Organizations Face Internal TensionAn Unequivocal “Yes” Or “No” Is Often Not The Answer Scale organizational expertise Lack of policy-based management Improve business processes Weak identity assurance Break down silos and barriers Inadequate security controls Benefits Risks Catalyze employee engagement Questionable privacy protections Address generational shifts Misuse by employees Improve talent & learning initiatives Unanticipated data disclosure Satisfy technology expectations Potential for “social engineering”
  • 5. Leverage Use Case Scenarios: Shift The Discussion From “OR” to “AND” Observe and listen to employees, experts, and management regarding use of social tools Construct use case scenarios from those representative stories Identify decision and enforcement points where risks can be mitigated Plan, execute, adjust
  • 6. Use Case #1: “Social Claims”Profiles may be viewed as a trusted information source Employee profiles populated with information from trusted enterprise systems My “Enterprise Identity” Mike Gotta EMPLOYEE #: LABOR GRADE: COST CENTER: Additional information entered by employees regarding skills, interests, expertise, experience DEPT: GROUP: My “Claimed Identity” JOB TITLE: EXPERTISE: HOBBIES: Information viewed as “trusted” but claims are not verified which can lead to risk scenarios EDUCATION: INTERESTS: PERSONAL TAGS: COMMUNITIES: FOLLOWING: COLLEAGUES: Add fields to profile where data goes through vetting process; pre-populate profile with other credentialing information
  • 7. Use Case #2: Profile ProliferationMultiple profiles creates maintenance and data integrity issues My Primary Profile DiversityCommunity Profile Selling Into HealthcareCommunity Profile Customer InnovationCommunity Profile Profiles are becoming a common feature across many vendor products EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: Jane Doe Jane Doe Jane Doe Jane Doe DEPT: DEPT: DEPT: DEPT: JOB TITLE: JOB TITLE: JOB TITLE: JOB TITLE: EXPERTISE: EXPERTISE: EXPERTISE: EXPERTISE: COLLEAGUES: COLLEAGUES: COLLEAGUES: COLLEAGUES: PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS Employees create/maintain multiple “persona’s” based on technology silos Incomplete, abandoned, or inaccurate profiles due to redundancy creates risk Look for ways to federate, synchronize, or otherwise reduce number of user profiles Selling Into HealthcareCommunity CustomerInnovationCommunity DiversityCommunity
  • 8. Automating profile updates can ease maintenance efforts by employees, increasing adoption Use Case #3: Automatic Social UpdatesLack of notice and consent can create privacy and HR issues My Profile #1 EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Vendor products are monitoring user activities and adding those actions to profiles without user intervention Restricted Access Unintended consequences can occur leading to HR-related issues such as diversity bias Activity Stream Activity Stream Public Access John Doe: Joined Community: “Selling Into Healthcare Community” John Doe: Joined Updated Wiki:“Best Ways To Respond To An RFP” John Doe: Joined Community: “Diversity Outreach Community” John Doe: Joined Community Forum: “It Gets Better Awareness Campaign” Include requirements for user-defined profile controls and management of profile updates from system activities/events DiversityCommunity Selling Into HealthcareCommunity
  • 9. Use Case #4: Information LeakageOpen discourse can lead to sharing of inaccurate / sensitive data E-Mail Client ActivityStream Sender Name Subject My Profile #1 Micro-blogging / activity feeds are becoming a popular means of sharing information Sender Name Subject EMPLOYEE #: John Doe Activity Stream Activity Stream Activity Stream DEPT: JOB TITLE: EXPERTISE: Sender Name Subject Status update: xxxxxxxx Status update: xxxxxxxxx Status update: xxxxxxxxx Mike Jones: “Heading to the airport to meet with Company ABC on cross-selling biz deal” John Doe: “Working on a acquisition deal, need to work late tonight… stay tuned!” Fred Smith: “&#%^%$* we just lost Company XYZ account… Betty Smith: @Bob Jones that patient ID number is 123456789 Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace Sally Jones: I heard we might have a layoff by quarter end? David Brown: @SalesTeam I posted the new product discounting policy to the sales strategy community Mike Jones: “Does anyone know the best way to get an SOW processed in 2 days? I have an urgent need…” John Doe: “Hi, I’m a new remote employee – wondering who else is working in the marketing department!” Fred Smith: “Just figured out a workaround to a problem with our field group – ping me if interested…” Betty Smith: “We’re starting an innovation community on data quality – let me know if you’re interested” Bob Jones: “Does anyone know what IWE stands for?” Sally Jones: “Great article on social media risks http://xxxxxxx” David Brown: “@Sally, thx, we’re updating our policies now” COLLEAGUES: ACTIVITY STREAM Information shared in a public stream may be re-posted to profiles or other entities subscribing to that stream Public conversations or events published via other systems can create confidentiality and audit/archival concerns Policy, role, and rule-based approaches that create common treatments across applications are warranted
  • 10. Use Case #5: Connected IdentitiesDisplay of public profiles can have unintended consequences Employee personal use of social media is becoming more commonplace E-Mail Client “ThePublicMe” Re: Partnering Opportunity Bill Smith Sent: Thu 03/01/11 To: John Doe We’ve discussed the proposal and have decided to pass at this time… Sender Name Subject Sender Name Subject An increasing number of tools aggregate Facebook, LinkedIn & Twitter information to display in applications like e-Mail Sender Name Subject Mixing public and enterprise data can give a false sense of validity and context creating trust and privacy issues My Profile #1 “TheWorkMe” EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Examine how the public data is aggregated; re-visit consent issues; provide users with an opt-out option Jon Doe’s social datadisplayed here
  • 11.
  • 14. Direct MessagesConsumer and enterprise software providers often lack end-to-end capabilities Combine a mix of policy, monitoring, audit, and tooling tactics to mitigate risks to an acceptable level Embedded Policy-based Management withexternal integrations (security, compliance…)
  • 15.
  • 17. SummaryThePublicMe Building a “personal brand” as an employee may seem like a worthwhile endeavor My YouTube My Twitter Status Updates & Activity Stream Third-Party Content &Applications Groups & Discussions Forums Enterprise policies or regulatory statutes may apply to personal use of social media, raising potential compliance concerns Jobs & Answers Contact Settings (Interested In…) Opportunities, Expertise Requests, Consulting Offers Re-visit policy, code of ethics, and social media guidelines. Educate employees on risks. Leverage monitoring tools. Alternative clients, widgets, message notifications…
  • 18. Social network analysis is used to identify relation structures between people Use Case #8: Deciphering RelationshipsSocial analytics can identify patterns that thwart policies R&DDept. Ideation Community Access to social analytics is becoming more widespread, available to all end users in some cases Unfettered analysis of social data can lead to accidental or intentional abuse as well as social engineering attacks Business DevelopmentTeam Ensure social analytic tools include access controls, audit trails, and policy support to limit capabilities Node20 Node24 Node19 Node21 Node22 Node 23 Node18 Node14 Node13 Node15 Node16 Node17 Node 2 Node 4 Node5 Node6 Node 9 Node 8 Node12 Node11 Node10 Node 1 Node 3 Node 7
  • 19. People Definea governance model that make sense; ensure enforcement is visible Balanced privacy considerations (enterprise and employee) Create feedback loops for employee ideas and concerns Process Update policies, terms of use, and code of ethics; consider specific guidelines for social media and social networking Make sure you have end-to-end processes with defined roles, responsibilities, and metrics in place for assessing risks – prioritize employee communication Audit data handling procedures to ensure proper management of social data Technology Adopt a “platform approach” towards social media and social networking Make embedded policy-based management services a priority capability Favor platforms that integrate with security, identity, and compliance systems Recommendations
  • 20. Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach Identity and security needs should be viewed just as positively as goals for openness and transparency A decision-making framework and governance model is an essential component of any strategy; policies and procedures need to focus on the human element and avoid technology as a panacea Adopt a platform approach – prioritize solutions with embedded policy management and strong integration capabilities IT teams that should be viewed as key stakeholders include: Groups responsible for CRM, collaboration, content, and community efforts Identity management and security groups Information (records) management and business intelligence groups Summary
  • 21.
  • 22. What role is there for privacy? What “controls” should be afforded to “owners” of one’s own social data?
  • 23. Should we record things when we don’t have to?
  • 24. Is automating the aggregation of information and correlating it sometimes “wrong” without consent?
  • 25.