Computer Parts in French - Les parties de l'ordinateur.pptx
Introduction au community management
1. Introduction au community management
Jacques Folon
Associated partner Edge Consulting
Chargé de cours ICHEC
Maître de conférences Université de Liège
SOURCE: http://ictkm.files.wordpress.com/2009/07/social-media-bandwagon1.jpg
Prof. invité Université de Metz
4. La formation en Community management
• Introduction au Community Management : du Web 1.0 vers le Web 2.0
• Ce qui a changé avec le Web 2.0
• Le consomm’acteur du Web 2.0
• L’e-réputation
• La stratégie de présence efficace sur le web 2.0
• Les outils de mesure
• Le métier de Community Manager
• Case studies
5. TABLE DES MATIERES
1) INTRODUCTION : LE MONDE A CHANGE!
2) LA GENERATION Y (MYTHE OU REALITE)
3) LE WEB 2.0
4) LE NOUVEAU CONSOM-ACTEUR
5) L’INNOVATION ET L’INTELLIGENCE COLLECTIVE
6) LES MEDIA SOCIAUX ET QUELQUES RISQUES SPECIFIQUES
7) CONCLUSION
12. “Les espè ces qui survivent
ne sont pas les espè ces les
plus fortes, ni les plus
intelligentes, mais celles qui
s’adaptent le mieux aux
changements”
Charles Darwin
13. Rappel de ce qu’était
l’entreprise au XX siècle
ème
14. Management concentré
sur l’efficacité…
SOURCE: www.entrepriseglobale.biz Jean-Yves Huwart
15. …et la réduction des coûts
SOURCE: www.entrepriseglobale.biz Jean-Yves Huwart
41. Comment les Babyboomer’s childrens
Echo-boomers
E-Generation
Digital Natives
désigner ? Facebook Generation
Gen Y
Génération 2001
Génération accélération
Génération des transparents
Génération entropique
Génération Internet
Génération Moi
Génération texto/SMS
Génération WWW
Generation Y not?
Génération Zapping
Great Generation
Homo Zappiens
i-Generation
Millenials
Net Generation
Nexters
http://www.zazzle.be/generation_y_pas_tshirt-235332731462770922 Nintendo Generation
Nouveaux androïdes
Sunshine Generation
42. Quand faut-il être né pour en faire partie?
La période pour définir cette génération Y est
très variable, elle comprend (selon les auteurs)
les personnes nées:
•Entre 1974 et 1994
•De 1978 à 1998 pour ceux qui les caractérisent
d’Echo-boomer
•De 1978 à 1988
•Ou de 1978 à 1995
•Ceux qui sont nés après 1980
•Entre 1980 et 2000
•Ou après 1982
•ou plus précisément de 1982 à 2003
http://funnyscrapcodes.blogspot.com/2009/10/embed-code-funny-stuff-funny-scraps.html
•Entre 1990 et 2000
•...
BARRER LA MENTION INUTILE !
43. Un concept
défini de façon
aussi variable et
contradictoire
existe-t-il ??
http://www.madmoizelle.com/generation-y-temoignage-43730
44. POUR CEUX QUI N’AIMENT PAS LES GRAFFITIS
TRADUCTION: MYTHES DE LA GENERATION Y
45.
46. Les jeunes
sont
multitâches
http://lolwithgod.com/2011/07/14/
49. Writing in the British Journalof Education Technology
in 2008,
a group of academics l by Sue Bennett of the
ed
University of Wolongong set out to debunk the
l
whol idea of digitalnatives,
e
arguing that there may be “as much variation within
the digital native generation as between the
generations”.
50. • Michael anthropologypioneered Kansas State University, is also
cultural
Wesch, who
classes at
the use of new media in his
sceptical, saying that many of his incoming students have only a
superficial familiarity with the digital tools that they use regularly,
especially when it comes to the tools’ social and political
potential.
• Only a small fraction of students are no better or worse at using
natives, in other words. The rest
may count as true digital
technology than the rest of the population.
• Et donc comme les enseignants …
51. Ils sont la
génération
Internet...
http://www.superstock.com/stock-photos-images/1851-2962
57. How Do We Communicate Today?
• I can write you a letter by post mail.
• I can write you a letter by email, without any regard for capitalization and punctuation.
• I can send you a message via Xbox Live or on my Wii.
• I can call you.
– From my office phone or mobile device.
– From my computer running Skype.
• We can instant message (AOL, Yahoo!, Google)
• I cn txt u, LOL.
• We can video conference.
• I can be your Facebook friend.
• I can access your Myspace page.
• I can follow you on Twitter.
• I can actually visit you in person?!
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
87. Cette nouvelle dé finition s’accompagne d’un certain nombre de postulats :
•Les pratiques d’Entreprise 2.0 vont se dé velopper au sein des entreprises
•avec ou sans l’accord de la direction (grâ à des initiatives personnelles) ;
ce
•Les meilleurs ré sultats sont obtenus avec des pratiques plus sophistiqué es que les blogs et les wikis ;
•L’Entreprise 2.0 est avant tout une question de mentalité plutô t que de logiciel ;
•La majeure partie des entreprises devront faire un gros effort d’é ducation et de pé dagogie ;
•Les bé né fices lié s aux pratiques d’entreprise 2.0 peuvent ê é normes
tre
•mais ne s’engrangent qu’au fur et à mesure ;
•Les pratiques d’Entreprise 2.0 ne remettent pas en cause les systè mes d’information traditionnels ;
•Les pratiques d’Entreprise 2.0 vont faire naî tre de nouvelles formes de collaboration.
http://www.fredcavazza.net/2007/11/06/une-nouvelle-definition-de-lentreprise-20/
88. A o tn g b ln f t ta I
d pio is l aa d a e h nT
o sr ,
ep c l inag c m a ie
s eiay l e o p n s
l r
109. AMI ? FAN ? LIKE?
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
110. Why Use Social Media?
• Provides a sense of community
• Seen as a forum to postulate views
• Fun way to stay connected with old friends or make new friends
• Forum for communication and collaboration
• Allows for self-expression and self-representation
• “Democratizing innovation”
• “Crowdsourcing”
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
112. What Are The Security Risks?
• Malware distribution
• Cyber-bullying (“trolling,” emotional abuse)
• “Shelf-life” of information (lives forever in cyberspace)
• Privacy concerns
• Information about you that you post
• Information about you that others post
• Information about you the social networking sites collect and share with others
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
113. What Are The Security Risks?
• Can result in
• social engineering,
• identity theft,
• financial fraud,
• infected computers,
• child abuse,
• sexual predation,
• defamation,
• lawsuits,
• mad boyfriend/girlfriend/spouse/
parent,
• embarrassment,
• …
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
119. Take my stuff, please!
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
120. Law of Unintended Consequences
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
121. Malware
Distribution
• Similar to other threats that can lead to downloading/installing
malware
• Malicious ads
• Clickjacking (aka “likejacking”)
• Wall posts, inbox or chat messages with malicious links from
“Friends” (hijacked user account)
• “My wallet was stolen and I’m stuck in Rome. Send me cas now.”
• Spam email pretending to be from Facebook admins
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
122. That Important “P” Word
PRIVACY…
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
123. Who’s LOOKING?
• Friendsfamily
• Friends of friendsfamily
• Parents
• Employers and co-workers
• CareerBuilder.com study – 45% of
employers
use social networks to screen job
candidates
• Customers
• Universities
• Marketing companiesvendors
• Criminalshackers
• Government agencies (IRS, SRS!)
• EVERYONE ELSE
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
124. 3 Party Applications
rd
•Games, quizzes, cutesie stuff
•Untested by Facebook – anyone can
write one
•No Terms and Conditions – you either
allow or you don’t
•Installation gives the developers
rights to look at your profile and
overrides your privacy settings!
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
126. Social Networking at Work
• Does your COMPANY have a policy? Is incidental personal use allowed? At
what point does it exceed “incidental”? Discuss it with your supervisor
• Staff posting work-related information without authorization, or posting
work-related information on personal pages
• Should also be conscious of branding, making it clear whether the page is
an official institutional page
• Possible data loss (inadvertent or malicious)
• Damage to reputation (personal or institutional)
• Regulatory compliance issues (e.g., FERPA, HIPAA)
• Personal rights issues (free speech, academic freedom)
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
127. Ethical
Issues Sho
uld
acc you
bos ept
ses you
u req ’ fr r
o e
y n ues ien
u ld eo t? d
S o
h som or
d s f How much
n
ie wo rk
fr o ? should you
w h o u
y research job
applicants?
Source: The Risks of Social Networking IT Security Roundtable Harvard Townsend
Chief Information Security Officer Kansas State University
128. la veille sur internet
comment aller à la pêche à l’information ?
agrégate
ur web de surface SIGNAUX
FORTS ⋀
macro-web
sites de médias et
d’institutions
-
-
-
-
meso-web
blogs et sites
personnels
micro-web
forums, microblogs,
plate-formes
de partage de
contenus
⋁
web des profondeurs SIGNAUX
http://www.slideshare.net/loichay/la-veille-sur-internet-en-5-tapes-cls
FAIBLES
133. CONCLUSIONS
• LA GESTION DES COMMUNAUTES ET DE LA
REPUTATION SONT DEVENUES ESSENTIELLES
• LA VEILLE EST IMPORTANTE
• NECESSITE DE FORMATION ET INFORMATION
• GUIDE DE BONNES PRATIQUES
• NE PAS OUBLIER LA GESTION DES RISQUES
134. Jacques Folon
+ 32 475 98 21 15
Jacques.folon@ichec.be
135. Vous avez des questions ?
Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/ 135
Notas do Editor
Beware!!
I’m very uneasy with faculty friending students, even if done to use FB for class work, because of the personal information that exposes to each other Blurs personal and professional boundaries But reality is that’s where the students live so can be effective way to communicate with them. No good answer…