SlideShare a Scribd company logo
1 of 17
Social Media & Social Networking:A Cautionary Tale Michael Gotta Senior Technology Solutions ManagerEnterprise Social Software
The Social Side Of The Internet 75% of respondents are active in some kind of voluntary group or organization 68% of respondents (internet users & non-users alike) said the internet has had a major impact on the ability of groups to communicate with members  60% of respondents said the internet has had a major impact on the ability of groups to connect with other groups  59% of respondents said the internet has had a major impact on the ability of groups to impact society at large 62% of respondents said that the internet has had a major impact on the ability of groups to draw attention to an issue 59% of respondents said the internet has had a major impact on the ability of groups to organize activities Source: Pew Internet http://www.pewinternet.org/Press-Releases/2011/Social-Side-of-the-Internet.aspx
Social Networking & Social Media: Leverage new tools & literacies to enable new ways of working 3000 friends 100 fan pages 50 groups Has Own Channel Blogs Daily Following  325 Followers 915
Organizations Face Internal TensionAn Unequivocal “Yes” Or “No” Is Often Not The Answer Scale organizational expertise Lack of policy-based management Improve business processes Weak identity assurance Break down silos and barriers Inadequate security controls Benefits Risks Catalyze employee engagement Questionable privacy protections Address generational shifts Misuse by employees Improve talent & learning initiatives Unanticipated data disclosure Satisfy technology expectations Potential for “social engineering”
Leverage Use Case Scenarios: Shift The Discussion From “OR” to “AND” Observe and listen to employees, experts, and management regarding use of social tools Construct use case scenarios from those representative stories Identify decision and enforcement points where risks can be mitigated Plan, execute, adjust
Use Case #1: “Social Claims”Profiles may be viewed as a trusted information source Employee profiles populated with information from trusted enterprise systems My “Enterprise Identity” Mike Gotta EMPLOYEE #: LABOR GRADE: COST CENTER: Additional information entered by employees regarding skills, interests, expertise, experience DEPT: GROUP: My “Claimed Identity” JOB TITLE: EXPERTISE: HOBBIES: Information viewed as “trusted” but claims are not verified which can lead to risk scenarios EDUCATION: INTERESTS:  PERSONAL TAGS: COMMUNITIES: FOLLOWING: COLLEAGUES: Add fields to profile where data goes through vetting process; pre-populate profile with other credentialing information
Use Case #2: Profile ProliferationMultiple profiles creates maintenance and data integrity issues My Primary Profile DiversityCommunity Profile Selling Into HealthcareCommunity Profile Customer InnovationCommunity Profile Profiles are becoming a common feature across many vendor products EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: Jane Doe Jane Doe Jane Doe Jane Doe DEPT: DEPT: DEPT: DEPT: JOB TITLE: JOB TITLE: JOB TITLE: JOB TITLE: EXPERTISE: EXPERTISE: EXPERTISE: EXPERTISE: COLLEAGUES: COLLEAGUES: COLLEAGUES: COLLEAGUES: PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS Employees create/maintain multiple “persona’s” based on technology silos Incomplete, abandoned, or inaccurate profiles due to redundancy creates risk  Look for ways to federate, synchronize, or otherwise reduce number of user profiles Selling Into HealthcareCommunity CustomerInnovationCommunity DiversityCommunity
Automating profile updates can ease maintenance efforts by employees, increasing adoption Use Case #3: Automatic Social UpdatesLack of notice and consent can create privacy and HR issues My Profile #1 EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Vendor products are monitoring user activities and adding those actions to profiles without user intervention Restricted Access Unintended consequences can occur leading to HR-related issues such as diversity bias Activity Stream Activity Stream Public Access John Doe: Joined Community: “Selling Into Healthcare Community” John Doe: Joined Updated Wiki:“Best Ways To Respond To An RFP” John Doe: Joined Community: “Diversity Outreach Community” John Doe: Joined Community Forum: “It Gets Better Awareness Campaign” Include requirements for user-defined profile controls and management of profile updates from system activities/events DiversityCommunity Selling Into HealthcareCommunity
Use Case #4: Information LeakageOpen discourse can lead to sharing of inaccurate / sensitive data E-Mail Client ActivityStream Sender Name Subject My Profile #1 Micro-blogging / activity feeds are becoming a popular means of sharing information Sender Name Subject EMPLOYEE #: John Doe Activity Stream Activity Stream Activity Stream DEPT: JOB TITLE: EXPERTISE: Sender Name Subject Status update: xxxxxxxx Status update: xxxxxxxxx Status update: xxxxxxxxx Mike Jones: “Heading to the airport to meet with Company ABC on cross-selling biz deal” John Doe: “Working on a acquisition deal, need to work late tonight… stay tuned!” Fred Smith: “&#%^%$* we just lost Company XYZ account… Betty Smith: @Bob Jones that patient ID number is 123456789 Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace Sally Jones: I heard we might have a layoff by quarter end? David Brown: @SalesTeam I posted the new product discounting policy to the sales strategy community Mike Jones: “Does anyone know the best way to get an SOW processed in 2 days? I have an urgent need…” John Doe: “Hi, I’m a new remote employee – wondering who else is working in the marketing department!” Fred Smith: “Just figured out a workaround to a problem with our field group – ping me if interested…” Betty Smith: “We’re starting an innovation community on data quality – let me know if you’re interested” Bob Jones: “Does anyone know what IWE stands for?” Sally Jones: “Great article on social media risks http://xxxxxxx” David Brown: “@Sally, thx, we’re updating our policies now” COLLEAGUES: ACTIVITY STREAM Information shared in a public stream may be re-posted to profiles or other entities subscribing to that stream Public conversations or events published via other systems can create confidentiality and audit/archival concerns Policy, role, and rule-based approaches that create common treatments across applications are warranted
Use Case #5: Connected IdentitiesDisplay of public profiles can have unintended consequences Employee personal use of social media is becoming more commonplace E-Mail Client “ThePublicMe” Re: Partnering Opportunity Bill Smith Sent: Thu 03/01/11 To:     John Doe We’ve discussed the proposal and have decided to pass at this time… Sender Name Subject Sender Name Subject An increasing number of tools aggregate Facebook, LinkedIn & Twitter information to display in applications like e-Mail Sender Name Subject Mixing public and enterprise data can give a false sense of validity and context creating trust and privacy issues My Profile #1 “TheWorkMe” EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Examine how the public data is aggregated; re-visit consent issues; provide users with an opt-out option Jon Doe’s social datadisplayed here
Use Case #6: Oversight: Approved UseSanctioned use of social media can still require controls FINRA/SEC FTCGuidelines Regulatory and other policies can place enterprise constraints on use of social media  Notices &Disclaimers Name: Profile: Web Site: Listed SocialMedia Following Guidelines are often “gray” and leave use of many features open to interpretation regarding compliance EU PrivacyRegulations HIPAA Lists By Favorites Alternative clients, widgets, message notifications…  Message Types ,[object Object]
@ Messages
ReTweets
Direct MessagesConsumer and enterprise software providers often lack end-to-end capabilities  Combine a mix of policy, monitoring, audit, and tooling tactics to mitigate risks to an acceptable level Embedded Policy-based Management withexternal integrations (security, compliance…)
Use Case #7: Oversight: Personal UseWell-intentioned use may not excuse enterprise liability My Blog My LinkedIn Regulatory and other policies can also place constraints on personal use of social media  Employee As “Brand Ambassador” Profile ,[object Object]
Websites
SummaryThePublicMe Building a “personal brand” as an employee may seem like a worthwhile endeavor My YouTube My Twitter Status Updates & Activity Stream Third-Party Content &Applications Groups & Discussions Forums Enterprise policies or regulatory statutes may apply to personal use of social media, raising potential compliance concerns Jobs & Answers Contact Settings (Interested In…) Opportunities, Expertise Requests, Consulting Offers Re-visit policy, code of ethics, and social media guidelines. Educate employees on risks. Leverage monitoring tools. Alternative clients, widgets, message notifications…

More Related Content

What's hot

Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingDavid Stephens
 
futurethink: Future of Social Networks
futurethink: Future of Social Networksfuturethink: Future of Social Networks
futurethink: Future of Social Networksfuturethink
 
Nonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for GoogleNonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for GoogleCity Vision University
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Denys Malengreau
 
Build Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationBuild Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationJoe Barnes
 
Smashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEOSmashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEOBrightEdge
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change InitiativesSteven Wardell
 
Understanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate AmericaUnderstanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate AmericaKathy Kacher
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking AnalysisMia Horrigan
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social SoftwareRalph Paglia
 
Investor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a MustInvestor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a MustPeter Einarsson
 
Social Is The Next Search 2010
Social Is The Next Search 2010Social Is The Next Search 2010
Social Is The Next Search 2010Plínio Okamoto
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship managementPlínio Okamoto
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 

What's hot (20)

Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
futurethink: Future of Social Networks
futurethink: Future of Social Networksfuturethink: Future of Social Networks
futurethink: Future of Social Networks
 
Nonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for GoogleNonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for Google
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020
 
Build Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationBuild Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective Communication
 
Smashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEOSmashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEO
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change Initiatives
 
Understanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate AmericaUnderstanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate America
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking Analysis
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software
 
Investor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a MustInvestor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a Must
 
Social Is The Next Search 2010
Social Is The Next Search 2010Social Is The Next Search 2010
Social Is The Next Search 2010
 
Final report
Final reportFinal report
Final report
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 

Similar to Social Media & Social Networking: A Cautionary Tale

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)Mike Mintz
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business IssuesJeff Johnson
 
Social Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjurySocial Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjuryPaul Smith
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the WorkplaceEric Swenson
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the WorkplaceEric Swenson
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd Marchguestca2060b
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Social media rocketmatter
Social media rocketmatterSocial media rocketmatter
Social media rocketmatterNatalie Alesi
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Managementtwhiteman
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Presentation big data and social media final_video
Presentation big data and social media final_videoPresentation big data and social media final_video
Presentation big data and social media final_videoramikaurraminder
 
How Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social MediaHow Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social MediaCarolyn Elefant
 

Similar to Social Media & Social Networking: A Cautionary Tale (20)

Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business Issues
 
Social Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjurySocial Media, Employment, and Brain Injury
Social Media, Employment, and Brain Injury
 
#Legal social
#Legal social#Legal social
#Legal social
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Social media rocketmatter
Social media rocketmatterSocial media rocketmatter
Social media rocketmatter
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Management
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Presentation big data and social media final_video
Presentation big data and social media final_videoPresentation big data and social media final_video
Presentation big data and social media final_video
 
How Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social MediaHow Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social Media
 
Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
 
Case Study Of RHEAL
Case Study Of RHEALCase Study Of RHEAL
Case Study Of RHEAL
 

More from Mike Gotta

Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Mike Gotta
 
Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking Mike Gotta
 
Enterprise social graph aii m final
Enterprise social graph aii m finalEnterprise social graph aii m final
Enterprise social graph aii m finalMike Gotta
 
Driving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesDriving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesMike Gotta
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalMike Gotta
 
H C I Business Relationships Learning Final
H C I  Business  Relationships  Learning  FinalH C I  Business  Relationships  Learning  Final
H C I Business Relationships Learning FinalMike Gotta
 
Bg Social Networks
Bg Social NetworksBg Social Networks
Bg Social NetworksMike Gotta
 
Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The EdgeMike Gotta
 
Global Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceGlobal Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceMike Gotta
 

More from Mike Gotta (9)

Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
 
Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking
 
Enterprise social graph aii m final
Enterprise social graph aii m finalEnterprise social graph aii m final
Enterprise social graph aii m final
 
Driving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesDriving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative Technologies
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity Final
 
H C I Business Relationships Learning Final
H C I  Business  Relationships  Learning  FinalH C I  Business  Relationships  Learning  Final
H C I Business Relationships Learning Final
 
Bg Social Networks
Bg Social NetworksBg Social Networks
Bg Social Networks
 
Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The Edge
 
Global Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceGlobal Collaboration: Both Art & Science
Global Collaboration: Both Art & Science
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Social Media & Social Networking: A Cautionary Tale

  • 1. Social Media & Social Networking:A Cautionary Tale Michael Gotta Senior Technology Solutions ManagerEnterprise Social Software
  • 2. The Social Side Of The Internet 75% of respondents are active in some kind of voluntary group or organization 68% of respondents (internet users & non-users alike) said the internet has had a major impact on the ability of groups to communicate with members 60% of respondents said the internet has had a major impact on the ability of groups to connect with other groups 59% of respondents said the internet has had a major impact on the ability of groups to impact society at large 62% of respondents said that the internet has had a major impact on the ability of groups to draw attention to an issue 59% of respondents said the internet has had a major impact on the ability of groups to organize activities Source: Pew Internet http://www.pewinternet.org/Press-Releases/2011/Social-Side-of-the-Internet.aspx
  • 3. Social Networking & Social Media: Leverage new tools & literacies to enable new ways of working 3000 friends 100 fan pages 50 groups Has Own Channel Blogs Daily Following 325 Followers 915
  • 4. Organizations Face Internal TensionAn Unequivocal “Yes” Or “No” Is Often Not The Answer Scale organizational expertise Lack of policy-based management Improve business processes Weak identity assurance Break down silos and barriers Inadequate security controls Benefits Risks Catalyze employee engagement Questionable privacy protections Address generational shifts Misuse by employees Improve talent & learning initiatives Unanticipated data disclosure Satisfy technology expectations Potential for “social engineering”
  • 5. Leverage Use Case Scenarios: Shift The Discussion From “OR” to “AND” Observe and listen to employees, experts, and management regarding use of social tools Construct use case scenarios from those representative stories Identify decision and enforcement points where risks can be mitigated Plan, execute, adjust
  • 6. Use Case #1: “Social Claims”Profiles may be viewed as a trusted information source Employee profiles populated with information from trusted enterprise systems My “Enterprise Identity” Mike Gotta EMPLOYEE #: LABOR GRADE: COST CENTER: Additional information entered by employees regarding skills, interests, expertise, experience DEPT: GROUP: My “Claimed Identity” JOB TITLE: EXPERTISE: HOBBIES: Information viewed as “trusted” but claims are not verified which can lead to risk scenarios EDUCATION: INTERESTS: PERSONAL TAGS: COMMUNITIES: FOLLOWING: COLLEAGUES: Add fields to profile where data goes through vetting process; pre-populate profile with other credentialing information
  • 7. Use Case #2: Profile ProliferationMultiple profiles creates maintenance and data integrity issues My Primary Profile DiversityCommunity Profile Selling Into HealthcareCommunity Profile Customer InnovationCommunity Profile Profiles are becoming a common feature across many vendor products EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: Jane Doe Jane Doe Jane Doe Jane Doe DEPT: DEPT: DEPT: DEPT: JOB TITLE: JOB TITLE: JOB TITLE: JOB TITLE: EXPERTISE: EXPERTISE: EXPERTISE: EXPERTISE: COLLEAGUES: COLLEAGUES: COLLEAGUES: COLLEAGUES: PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS Employees create/maintain multiple “persona’s” based on technology silos Incomplete, abandoned, or inaccurate profiles due to redundancy creates risk Look for ways to federate, synchronize, or otherwise reduce number of user profiles Selling Into HealthcareCommunity CustomerInnovationCommunity DiversityCommunity
  • 8. Automating profile updates can ease maintenance efforts by employees, increasing adoption Use Case #3: Automatic Social UpdatesLack of notice and consent can create privacy and HR issues My Profile #1 EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Vendor products are monitoring user activities and adding those actions to profiles without user intervention Restricted Access Unintended consequences can occur leading to HR-related issues such as diversity bias Activity Stream Activity Stream Public Access John Doe: Joined Community: “Selling Into Healthcare Community” John Doe: Joined Updated Wiki:“Best Ways To Respond To An RFP” John Doe: Joined Community: “Diversity Outreach Community” John Doe: Joined Community Forum: “It Gets Better Awareness Campaign” Include requirements for user-defined profile controls and management of profile updates from system activities/events DiversityCommunity Selling Into HealthcareCommunity
  • 9. Use Case #4: Information LeakageOpen discourse can lead to sharing of inaccurate / sensitive data E-Mail Client ActivityStream Sender Name Subject My Profile #1 Micro-blogging / activity feeds are becoming a popular means of sharing information Sender Name Subject EMPLOYEE #: John Doe Activity Stream Activity Stream Activity Stream DEPT: JOB TITLE: EXPERTISE: Sender Name Subject Status update: xxxxxxxx Status update: xxxxxxxxx Status update: xxxxxxxxx Mike Jones: “Heading to the airport to meet with Company ABC on cross-selling biz deal” John Doe: “Working on a acquisition deal, need to work late tonight… stay tuned!” Fred Smith: “&#%^%$* we just lost Company XYZ account… Betty Smith: @Bob Jones that patient ID number is 123456789 Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace Sally Jones: I heard we might have a layoff by quarter end? David Brown: @SalesTeam I posted the new product discounting policy to the sales strategy community Mike Jones: “Does anyone know the best way to get an SOW processed in 2 days? I have an urgent need…” John Doe: “Hi, I’m a new remote employee – wondering who else is working in the marketing department!” Fred Smith: “Just figured out a workaround to a problem with our field group – ping me if interested…” Betty Smith: “We’re starting an innovation community on data quality – let me know if you’re interested” Bob Jones: “Does anyone know what IWE stands for?” Sally Jones: “Great article on social media risks http://xxxxxxx” David Brown: “@Sally, thx, we’re updating our policies now” COLLEAGUES: ACTIVITY STREAM Information shared in a public stream may be re-posted to profiles or other entities subscribing to that stream Public conversations or events published via other systems can create confidentiality and audit/archival concerns Policy, role, and rule-based approaches that create common treatments across applications are warranted
  • 10. Use Case #5: Connected IdentitiesDisplay of public profiles can have unintended consequences Employee personal use of social media is becoming more commonplace E-Mail Client “ThePublicMe” Re: Partnering Opportunity Bill Smith Sent: Thu 03/01/11 To: John Doe We’ve discussed the proposal and have decided to pass at this time… Sender Name Subject Sender Name Subject An increasing number of tools aggregate Facebook, LinkedIn & Twitter information to display in applications like e-Mail Sender Name Subject Mixing public and enterprise data can give a false sense of validity and context creating trust and privacy issues My Profile #1 “TheWorkMe” EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Examine how the public data is aggregated; re-visit consent issues; provide users with an opt-out option Jon Doe’s social datadisplayed here
  • 11.
  • 14. Direct MessagesConsumer and enterprise software providers often lack end-to-end capabilities Combine a mix of policy, monitoring, audit, and tooling tactics to mitigate risks to an acceptable level Embedded Policy-based Management withexternal integrations (security, compliance…)
  • 15.
  • 17. SummaryThePublicMe Building a “personal brand” as an employee may seem like a worthwhile endeavor My YouTube My Twitter Status Updates & Activity Stream Third-Party Content &Applications Groups & Discussions Forums Enterprise policies or regulatory statutes may apply to personal use of social media, raising potential compliance concerns Jobs & Answers Contact Settings (Interested In…) Opportunities, Expertise Requests, Consulting Offers Re-visit policy, code of ethics, and social media guidelines. Educate employees on risks. Leverage monitoring tools. Alternative clients, widgets, message notifications…
  • 18. Social network analysis is used to identify relation structures between people Use Case #8: Deciphering RelationshipsSocial analytics can identify patterns that thwart policies R&DDept. Ideation Community Access to social analytics is becoming more widespread, available to all end users in some cases Unfettered analysis of social data can lead to accidental or intentional abuse as well as social engineering attacks Business DevelopmentTeam Ensure social analytic tools include access controls, audit trails, and policy support to limit capabilities Node20 Node24 Node19 Node21 Node22 Node 23 Node18 Node14 Node13 Node15 Node16 Node17 Node 2 Node 4 Node5 Node6 Node 9 Node 8 Node12 Node11 Node10 Node 1 Node 3 Node 7
  • 19. People Definea governance model that make sense; ensure enforcement is visible Balanced privacy considerations (enterprise and employee) Create feedback loops for employee ideas and concerns Process Update policies, terms of use, and code of ethics; consider specific guidelines for social media and social networking Make sure you have end-to-end processes with defined roles, responsibilities, and metrics in place for assessing risks – prioritize employee communication Audit data handling procedures to ensure proper management of social data Technology Adopt a “platform approach” towards social media and social networking Make embedded policy-based management services a priority capability Favor platforms that integrate with security, identity, and compliance systems Recommendations
  • 20. Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach Identity and security needs should be viewed just as positively as goals for openness and transparency A decision-making framework and governance model is an essential component of any strategy; policies and procedures need to focus on the human element and avoid technology as a panacea Adopt a platform approach – prioritize solutions with embedded policy management and strong integration capabilities IT teams that should be viewed as key stakeholders include: Groups responsible for CRM, collaboration, content, and community efforts Identity management and security groups Information (records) management and business intelligence groups Summary
  • 21.
  • 22. What role is there for privacy? What “controls” should be afforded to “owners” of one’s own social data?
  • 23. Should we record things when we don’t have to?
  • 24. Is automating the aggregation of information and correlating it sometimes “wrong” without consent?
  • 25.