Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Benefits and Risks of Social Technologies

6.741 Aufrufe

Veröffentlicht am

This presentation describes how you can use social technologies to transform key business processes, but also required governance to reduce risks. For more information www.aiim.org

Veröffentlicht in: Technologie, Business
  • Loggen Sie sich ein, um Kommentare anzuzeigen.

Benefits and Risks of Social Technologies

  1. 1. Benefits and Risks of Social Technologies?<br />AtleSkjekkeland<br />AIIM Vice President<br />@skjekkeland<br />
  2. 2.
  3. 3. What is Social Business?<br />
  4. 4. Everything is Social<br />Cluetrain Manifesto – updated:<br />Markets [and organizations] are conversations.<br />
  5. 5. Using Social to Engage Customers?<br />
  6. 6.
  7. 7.
  8. 8. Why should you care?<br />BECAUSE 57% FEEL BETTER SERVED BY COMPANIES THAT CONNECT WITH THEM VIA SOCIAL MEDIA.<br /> Source: 2008 Cone Business in Social Media Study<br />
  9. 9. Role of Social Media<br />Good<br />Good<br />OK<br />Good<br />Good<br />OK<br />Good<br />OK<br />Bad<br />Good<br />Good<br />OK<br />Good<br />OK<br />Good<br />Source: CMO<br />
  10. 10. Using Social to Empower Staff?<br />Social Networking<br />Wiki<br />Blogs<br />Micro-blogging<br />Instant Messenger<br />RSS <br />Video calls<br />
  11. 11. “I expect to use the same type of networking tools with my business colleagues as I do with my friends and family.”<br />18-30<br />47%<br />31-45<br />37%<br />>45<br />31%<br />Source: AIIM<br />
  12. 12. Source: John Newton, Alfresco<br />
  13. 13. 13<br />Business benefits?<br />13<br />IBM Confidential<br />
  14. 14. Integration into business processes<br />Source: Forrester<br />
  15. 15. http://www.constellationrg.com/22136/research-summary-introducing-the-43-use-cases-for-social-business-social-enterprise/<br />
  16. 16. Source: http://www.mckinseyquarterly.com/How_companies_are_benefiting_from_Web_20_McKinsey_Global_Survey_Results_2432<br />
  17. 17. Use Case: Enterprise Q&A <br /> Do answers to questions generally come from expected or unexpected sources?<br />N=90 Q&A users , excl. 22 Don’t Knows<br />
  18. 18. Use Case: Innovation<br />Our open innovation platform has been successful at: (Check all that apply)<br />N=84 Innovation users <br />
  19. 19. Use Case: Sales & Marketing Collaboration<br />Before/after the social infrastructure was in place, how well did/do the Sales and Marketing staff:<br />% of Organizations “Fairly Well” or “Very Well”<br />N=58 users, “Fairly Well” + “Very Well” <br />
  20. 20. Issues<br /> What would you say are the THREE biggest issues you’ve found with social business/E2.0 applications in your organization?<br />N=398, 10+ emps<br />
  21. 21. How to implement?<br />
  22. 22. What’s wrong with enterprise IT?<br />
  23. 23. A New Set of Requirements…<br />leverage consumer applications proven to augment existing work processes<br />specifically targeted to business requirements and opportunities<br />access with only a browser and an internet connection<br />no reliance on proprietary systems or technology<br />development based on open industry standards<br />built upon a semantic web framework<br />embraces and enables BYOC model<br />no operating system dependency<br />provides web service capabilities<br />tuned options for mobile devices<br />no browser dependency<br />no net cost increase<br />no desktop footprint<br />100% cloud ready<br />Source: http://wordofpie.com/2010/03/04/some-outright-cool-stuff/<br />
  24. 24. US Federal Government <br />Source: http://www.slideshare.net/whitehouse/charting-a-course-for-transformation<br />
  25. 25. Required Governance?<br />
  26. 26. Systems of Engagement<br />Systems of Record<br />
  27. 27. Considered remedies:<br />87% Social Media Policy<br />86% Employ training<br />85% Capturing confidential data<br />85% Data loss prevention<br />84% Data management technology<br />82% Archive sensitive info<br />Source: Symantec http://bit.ly/niAPxy<br />
  28. 28.
  29. 29. Spear Phishing is an attack targeting a specific user or group of users, and attempts to deceive the user into performing an action that launches an attack, such as opening a document or clicking a link<br />The second concern regarding social media use by federal employees is Social Engineering, which relies on exploiting the human element of trust<br />Advances in web applicationtechnologies allow attackers to use new techniques against social media websites not previously possible in email. <br />
  30. 30. Policies and Procedures<br />
  31. 31.
  32. 32. The US Air Force’s Rules of Engagement for Blogging<br />
  33. 33. “You will lose control – Get used to it!”JP Rangaswami – Chief Scientist, Salesforce<br />Inside the Enterprise<br />Outside the Firewall<br />Good Heavens!<br />Put that Tweet in a System of Record!<br />Chill Seymour!<br />We don’t need you anyway!<br />IT<br />Users<br />Source: John Newton, Alfresco<br />
  34. 34. Governance Framework<br />1. Prevent<br /><ul><li> Risk assessments
  35. 35. Training
  36. 36. Policies & procedures
  37. 37. Executive commitment</li></ul>3. Respond<br /><ul><li> Investigation
  38. 38. Communication
  39. 39. Improvements
  40. 40. Employee discipline</li></ul>2. Detect<br /><ul><li> Audit
  41. 41. Ombudsman
  42. 42. Monitoring</li></li></ul><li>Strategies for Success?<br />
  43. 43. Creating a Groundswell Strategy<br />What are your customers [or staff] ready for?<br />What are your goals?<br />How do you want relationships with your customers [or staff] to change?<br />What applications should be build?<br />
  44. 44.
  45. 45.
  46. 46. Source: http://www.fastcompany.com/1732616/behaviorgraphics-discovering-the-me-in-social-media<br />
  47. 47. Selecting the right social software<br />Source: http://www.constellationrg.com/21762/monday’s-musings-a-working-vendor-landscape-for-social-business/<br />
  48. 48. How to get started?<br />www.aiim.org/roadmap<br />
  49. 49. Plan the Future – Get Educated!<br />Online, Public and Private Classes Available.Visit www.aiim.org/training<br />Email: training@aiim.org <br />
  50. 50. Thank You!<br />Atle Skjekkeland<br />Vice President<br />AIIM<br />Email: askjekkeland@aiim.org<br />Twitter: Skjekkeland<br />

×