SlideShare uma empresa Scribd logo
1 de 33
Social media and collaborative technologies:
Information management dream or nightmare?
Louise Spiteri
School of Information Management
Dalhousie University
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Why do enterprises use social
media?
Too much effort has been exerted on platform knowledge rather than
developing a business strategy. Significant time and money has already been
spent collecting Facebook fans, followers on twitter and engagement using a
healthy dose of trivia and emotive images—but for what purpose?
~http://www.information-management.com/news/enterprise-social-media-is-more-than-
fun-and-games-10023862-1.html
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Use of social media, 1
• For organizations social media application provide the
opportunity to integrate information and opinions from citizens
or clients into the policy making process in innovative ways
• The traditional information creation, vetting and approval
process includes multiple steps and does not provide the
opportunity for real-time feedback cycles as social media
applications demand.
• Social media tools have the potential to increase the degree of
transparency, accountability and collaborative content creation.
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Use of social media, 2
• Representation of the organization on all available
channels. The representation objective is to be as inclusive
as possible and reach audiences in their social spaces they
frequent on a daily basis.
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
What is the role of the Records and
Information Management
(RIM)professional in enterprise use of
social media?
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Social media and RIM, 1
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Social media and RIM, 2
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
A place at the social media table: Why do we
need to be there?
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Increasing need for RIM, 1
• Since social media are based on the collaboration of their
users, social media management is a collaborative venture as
well.
• Realizing shared organizational goals by sharing
knowledge, learning, and building consensus across
departments is yet another social media management
competency.
• Interdepartmental coordination allows the leveraging of tools
and techniques into the organization’s social media culture and
into its products and services. It ensures that a consistent
message is delivered through its social media channels
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Increasing need for RIM, 2
• It is essential that policies and practices in organizations be
updated in order to ensure that essential records generated
through social media technologies are retained and protected
accordingly.
• As social computing tools become increasingly integrated into
company infrastructure, stakeholders must consider how
existing records management policies can be expanded and
extended in order to address social computing
content, examine how companies review current practices in
light of evolving social computing technologies, and provide
guidance in policies to support the use of these technologies
within the company.
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Main challenges of social media
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Social media strategies
What kind of
social
media?
Letting go
Participation Maintenance
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Social media strategies, 1
What kind of social media? Do you need to utilize social networking
sites, blogs, real-time updates (e.g., Twitter), social news sites, media-
sharing sites, review/directory sites, virtual worlds, or display ads on
social media sites
Examine the characteristics of the type of social media you
want to have a presence on and how those characteristics fit
what you're trying to accomplish to help choose the ones that
will work best for you.
Letting go
Once you engage in a conversation with customers, you have
to give up control. Is your company willing to do that?
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Social media strategies, 2
Participation. How do you plan to drive people to your social
media presence?
Maintenance. Who will maintain your social media presence?
• You must have something to say and someone to say it
on a regular basis.
Measurement. How do you measure success or failure?
• What happens if you don't get there?
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Are we ready?
• only 13% of respondents utilize a
records management plan for social
networking sites.
• 53% responded that a plan was not yet
in place, while at least one-third of the
survey participants were unsure about
their organization's use of a plan.
There is a low level of
preparedness within
the ranks of RIM
professionals
regarding social
networks. The results
of a recent survey of
more than 400
enterprises, conducted
by AIIM, show that:
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
RIM challenges ,1
What is a social media record? Social media content is difficult to
define as a record. Agencies are still grappling with records
management for email, much less wikis and blogs.
• The social media content that is record material must be
identified as such by system users if there is no automation
support for records identification (largely absent from current
social media applications).
• Social media systems do not generally lend themselves to
handling system content as business records that may require
separate handling and application of business rules.
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
RIM challenges ,2
• Much of the social media content is in the public domain
and, therefore, not under control of the agency, which may cause
difficulty in capturing content.
• Social Media Metadata: Applying metadata to tag social media
content for retrieval is difficult. Most agencies use manual methods of
adding metadata for social media content.
• Governance: Organizations need to listen to what is said about
them, both by employees and clients or the general public. Policies
need to be in place to deal with multiple types of
scenarios, e.g., responding to a compliment or dealing with an
employee who just posted something inappropriate or sensitive.
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
RIM challenges, 3
Social Media Scheduling/ Disposition: The lack of control
of the content makes scheduling and disposition of records
difficult.
Privacy & Security: How do you maintain and protect the
privacy and security of information pertaining to your
employees and your organization?
Staffing and Education: Education is needed to implement a
successful social media records policy.
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Best practices, 1
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Best practices, 2
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Guidelines for social media policies, 1
• Remind employees to familiarize themselves with the employment
agreement and policies included in the employee handbook.
State that the policy applies to multi-media, social networking
websites, blogs and wikis for both professional and personal use.
Internet postings should not disclose any information that is
confidential or proprietary to the company or to any third party that
has disclosed information to the company.
If an employee comments on any aspect of the company's business
they must clearly identify themselves as an employee and include a
disclaimer.
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Guidelines for social media policies, 2
The disclaimer should be something like "the views
expressed are mine alone and do not necessarily reflect the
views of (your company’s name)."
Internet postings should not include company logos or
trademarks unless permission is asked for and granted.
Internet postings must respect copyright, privacy, fair use,
financial disclosure, and other applicable laws.
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Guidelines for social media policies, 3
Employees should neither claim nor imply that they are
speaking on the company's behalf.
Corporate blogs, Facebook pages, Twitter accounts, etc.,
could require approval when the employee is posting about
the company and the industry.
That the company reserves the right to request the certain
subjects are avoided, withdraw certain posts, and remove
inappropriate comments.
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Examples of social media policies
Canada Post
Dell
Government of New Zealand
Transport Canada
Government of Canada
Government of Alberta
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Examples of corporate social media sites
Halifax Regional Police:
http://www.facebook.com/HalifaxRegionalPolice
https://twitter.com/HfxRegPolice
Environment Canada:
http://www.facebook.com/environmentcan
https://twitter.com/environmentca
The Shopping Channel:
http://www.facebook.com/TheShoppingChannel
https://twitter.com/theShoppingChan
http://www.youtube.com/user/TheShoppingChannel?feature=watch
http://pinterest.com/shoppingchannel/
http://www.theshoppingchannelblog.com/
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Archiving Facebook
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Archiving Twitter
Maritime Access,
Privacy, Security and
Records Management
Workshop 2013
Twitter archive
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Source for infographics
http://pinterest.com/pin/112097478196551490/
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013
Questions?
Louise Spiteri, PhD
Louise.Spiteri@dal.ca
@dalsimnews
My About Me Profile
Maritime
Access, Privacy, Security
and Records
Management Workshop
2013

Mais conteúdo relacionado

Mais procurados

Social Media
Social MediaSocial Media
Social MediaJ.L+C.L
 
tcs analysis and commentary on web through social media
tcs analysis and commentary on web through social mediatcs analysis and commentary on web through social media
tcs analysis and commentary on web through social mediaVeer Pratap Singh
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceMike Lesczinski
 
Sample of Social Media policy - HR
Sample of Social Media policy - HR Sample of Social Media policy - HR
Sample of Social Media policy - HR Moses Gomes
 
Bus450 Social Media Human Resource Management
Bus450 Social Media Human Resource ManagementBus450 Social Media Human Resource Management
Bus450 Social Media Human Resource ManagementSimon Fraser University
 
Social networking
Social networkingSocial networking
Social networkingavernkm
 
Digital Media Usage in the Workplace: Policy Guidance
Digital Media Usage in the Workplace: Policy GuidanceDigital Media Usage in the Workplace: Policy Guidance
Digital Media Usage in the Workplace: Policy GuidanceEric Schwartzman
 
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...EY Finland
 
The role of social networking sites in recruitment
The role of social networking sites in recruitmentThe role of social networking sites in recruitment
The role of social networking sites in recruitmentMonika S
 
Integrating social media and getting leadership buy in
Integrating social media and getting leadership buy in Integrating social media and getting leadership buy in
Integrating social media and getting leadership buy in Shashi Bellamkonda
 
Social Media Employee Policies
Social Media Employee PoliciesSocial Media Employee Policies
Social Media Employee PoliciesAnvil Media, Inc.
 
Leverage the Power of Social Media for Your Business: Presented by Cisco
Leverage the Power of Social Media for Your Business: Presented by CiscoLeverage the Power of Social Media for Your Business: Presented by Cisco
Leverage the Power of Social Media for Your Business: Presented by CiscoSquareOne|Consulting
 
Social Media Marketing – India Trends Study 2013 [Report]
 Social Media Marketing – India Trends Study 2013 [Report] Social Media Marketing – India Trends Study 2013 [Report]
Social Media Marketing – India Trends Study 2013 [Report]Social Samosa
 
Worforce 2.0 - Presentation University of Texas School of Communications
Worforce 2.0 - Presentation University of Texas School of CommunicationsWorforce 2.0 - Presentation University of Texas School of Communications
Worforce 2.0 - Presentation University of Texas School of CommunicationsThinktwice Communications
 
How Social Media influence in purchasing decision of Buyer
How Social Media influence in purchasing decision of BuyerHow Social Media influence in purchasing decision of Buyer
How Social Media influence in purchasing decision of BuyerNirav Mevcha
 

Mais procurados (20)

Social Media
Social MediaSocial Media
Social Media
 
Social Media Guidelines for Employees
Social Media Guidelines for EmployeesSocial Media Guidelines for Employees
Social Media Guidelines for Employees
 
tcs analysis and commentary on web through social media
tcs analysis and commentary on web through social mediatcs analysis and commentary on web through social media
tcs analysis and commentary on web through social media
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media Governance
 
Sample of Social Media policy - HR
Sample of Social Media policy - HR Sample of Social Media policy - HR
Sample of Social Media policy - HR
 
Bus450 Social Media Human Resource Management
Bus450 Social Media Human Resource ManagementBus450 Social Media Human Resource Management
Bus450 Social Media Human Resource Management
 
Social networking
Social networkingSocial networking
Social networking
 
Digital Media Usage in the Workplace: Policy Guidance
Digital Media Usage in the Workplace: Policy GuidanceDigital Media Usage in the Workplace: Policy Guidance
Digital Media Usage in the Workplace: Policy Guidance
 
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...
 
The role of social networking sites in recruitment
The role of social networking sites in recruitmentThe role of social networking sites in recruitment
The role of social networking sites in recruitment
 
Integrating social media and getting leadership buy in
Integrating social media and getting leadership buy in Integrating social media and getting leadership buy in
Integrating social media and getting leadership buy in
 
Social Media Employee Policies
Social Media Employee PoliciesSocial Media Employee Policies
Social Media Employee Policies
 
Socialnetworking
SocialnetworkingSocialnetworking
Socialnetworking
 
Social Media MTL Conference Ppt
Social Media MTL Conference PptSocial Media MTL Conference Ppt
Social Media MTL Conference Ppt
 
13
1313
13
 
Leverage the Power of Social Media for Your Business: Presented by Cisco
Leverage the Power of Social Media for Your Business: Presented by CiscoLeverage the Power of Social Media for Your Business: Presented by Cisco
Leverage the Power of Social Media for Your Business: Presented by Cisco
 
Social Media Marketing – India Trends Study 2013 [Report]
 Social Media Marketing – India Trends Study 2013 [Report] Social Media Marketing – India Trends Study 2013 [Report]
Social Media Marketing – India Trends Study 2013 [Report]
 
Assignment For JakaSoft
Assignment For JakaSoftAssignment For JakaSoft
Assignment For JakaSoft
 
Worforce 2.0 - Presentation University of Texas School of Communications
Worforce 2.0 - Presentation University of Texas School of CommunicationsWorforce 2.0 - Presentation University of Texas School of Communications
Worforce 2.0 - Presentation University of Texas School of Communications
 
How Social Media influence in purchasing decision of Buyer
How Social Media influence in purchasing decision of BuyerHow Social Media influence in purchasing decision of Buyer
How Social Media influence in purchasing decision of Buyer
 

Destaque

Social media is my business module 3
Social media is my business   module 3Social media is my business   module 3
Social media is my business module 3Jeff Yaniga
 
seurakuntaopisto sosiaalinen media
seurakuntaopisto sosiaalinen mediaseurakuntaopisto sosiaalinen media
seurakuntaopisto sosiaalinen mediafellowmedia
 
End of silos_OpSource_webinar
End of silos_OpSource_webinarEnd of silos_OpSource_webinar
End of silos_OpSource_webinarOpSource
 
What Users Want (or Why Webpages Are Dead)
What Users Want (or Why Webpages Are Dead)What Users Want (or Why Webpages Are Dead)
What Users Want (or Why Webpages Are Dead)Forum One
 

Destaque (6)

Social media is my business module 3
Social media is my business   module 3Social media is my business   module 3
Social media is my business module 3
 
Maximize Demosphere XXV
Maximize Demosphere XXVMaximize Demosphere XXV
Maximize Demosphere XXV
 
Greece TT Preso
Greece TT PresoGreece TT Preso
Greece TT Preso
 
seurakuntaopisto sosiaalinen media
seurakuntaopisto sosiaalinen mediaseurakuntaopisto sosiaalinen media
seurakuntaopisto sosiaalinen media
 
End of silos_OpSource_webinar
End of silos_OpSource_webinarEnd of silos_OpSource_webinar
End of silos_OpSource_webinar
 
What Users Want (or Why Webpages Are Dead)
What Users Want (or Why Webpages Are Dead)What Users Want (or Why Webpages Are Dead)
What Users Want (or Why Webpages Are Dead)
 

Semelhante a Social media 2013 06-12

Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013KINSHIP digital
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & EmployeesJohn Theriault
 
Taking social networking to the next level
Taking social networking to the next levelTaking social networking to the next level
Taking social networking to the next levelAndrea Baker
 
The Impact of Social Media at the Workplace.pptx
The Impact of Social Media at the Workplace.pptxThe Impact of Social Media at the Workplace.pptx
The Impact of Social Media at the Workplace.pptxSaumya876452
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work PlacePepovski Darko
 
Community Engagement: The New Social Media Mantra for Academic Libraries?
Community Engagement: The New Social Media Mantra for Academic Libraries?Community Engagement: The New Social Media Mantra for Academic Libraries?
Community Engagement: The New Social Media Mantra for Academic Libraries?Louise Spiteri
 
Social media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamSocial media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamCraig Thomler
 
Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementNexgate
 
How to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsHow to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsSocialengine India
 
Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Craig Thomler
 
Social Media Management Systems: How to Build a Case for Adoption and Choose ...
Social Media Management Systems: How to Build a Case for Adoption and Choose ...Social Media Management Systems: How to Build a Case for Adoption and Choose ...
Social Media Management Systems: How to Build a Case for Adoption and Choose ...Shoutlet, a Spredfast Company
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Social Media for Development: Transforming Society and Governance
Social Media for Development: Transforming Society and GovernanceSocial Media for Development: Transforming Society and Governance
Social Media for Development: Transforming Society and GovernanceRichard Grimaldo
 
Social business-roadmap2011
Social business-roadmap2011Social business-roadmap2011
Social business-roadmap2011Claude Super
 
Building trust on your brands using social media tools
Building trust on your brands using social media toolsBuilding trust on your brands using social media tools
Building trust on your brands using social media toolsVaradharajan Krishnamoorthy
 

Semelhante a Social media 2013 06-12 (20)

Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & Employees
 
Taking social networking to the next level
Taking social networking to the next levelTaking social networking to the next level
Taking social networking to the next level
 
The Impact of Social Media at the Workplace.pptx
The Impact of Social Media at the Workplace.pptxThe Impact of Social Media at the Workplace.pptx
The Impact of Social Media at the Workplace.pptx
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
Community Engagement: The New Social Media Mantra for Academic Libraries?
Community Engagement: The New Social Media Mantra for Academic Libraries?Community Engagement: The New Social Media Mantra for Academic Libraries?
Community Engagement: The New Social Media Mantra for Academic Libraries?
 
Social Web Policy Guide
Social Web Policy GuideSocial Web Policy Guide
Social Web Policy Guide
 
Social media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamSocial media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov stream
 
Vivienne Storey
Vivienne StoreyVivienne Storey
Vivienne Storey
 
Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk Management
 
How to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsHow to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platforms
 
Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013
 
Social Media Management Systems: How to Build a Case for Adoption and Choose ...
Social Media Management Systems: How to Build a Case for Adoption and Choose ...Social Media Management Systems: How to Build a Case for Adoption and Choose ...
Social Media Management Systems: How to Build a Case for Adoption and Choose ...
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Social Media for Development: Transforming Society and Governance
Social Media for Development: Transforming Society and GovernanceSocial Media for Development: Transforming Society and Governance
Social Media for Development: Transforming Society and Governance
 
Social business-roadmap2011
Social business-roadmap2011Social business-roadmap2011
Social business-roadmap2011
 
AIIM Social Business Roadmap
AIIM Social Business RoadmapAIIM Social Business Roadmap
AIIM Social Business Roadmap
 
Building trust on your brands using social media tools
Building trust on your brands using social media toolsBuilding trust on your brands using social media tools
Building trust on your brands using social media tools
 

Mais de Louise Spiteri

Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security Louise Spiteri
 
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...Louise Spiteri
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?Louise Spiteri
 
Records Continuum Model
Records Continuum ModelRecords Continuum Model
Records Continuum ModelLouise Spiteri
 
Social Discovery Tools: Cataloguing Meets User Convenience
Social Discovery Tools: Cataloguing Meets User ConvenienceSocial Discovery Tools: Cataloguing Meets User Convenience
Social Discovery Tools: Cataloguing Meets User ConvenienceLouise Spiteri
 
Social tagging, facets, and social spaces
Social tagging, facets, and social spacesSocial tagging, facets, and social spaces
Social tagging, facets, and social spacesLouise Spiteri
 
Concept theory and the role of conceptual coherence in assessments of similarity
Concept theory and the role of conceptual coherence in assessments of similarityConcept theory and the role of conceptual coherence in assessments of similarity
Concept theory and the role of conceptual coherence in assessments of similarityLouise Spiteri
 
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...Louise Spiteri
 
The Public Library Catalogue as a Social Space
The Public Library Catalogue as a Social SpaceThe Public Library Catalogue as a Social Space
The Public Library Catalogue as a Social SpaceLouise Spiteri
 
RDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dotsRDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dotsLouise Spiteri
 
Ala alise preparing lis professionals_spiteri_2012-01-18
Ala alise preparing lis professionals_spiteri_2012-01-18Ala alise preparing lis professionals_spiteri_2012-01-18
Ala alise preparing lis professionals_spiteri_2012-01-18Louise Spiteri
 
Indexing presentation 2013 06-04
Indexing presentation 2013 06-04Indexing presentation 2013 06-04
Indexing presentation 2013 06-04Louise Spiteri
 

Mais de Louise Spiteri (13)

Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security
 
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
 
Records Continuum Model
Records Continuum ModelRecords Continuum Model
Records Continuum Model
 
Social Discovery Tools: Cataloguing Meets User Convenience
Social Discovery Tools: Cataloguing Meets User ConvenienceSocial Discovery Tools: Cataloguing Meets User Convenience
Social Discovery Tools: Cataloguing Meets User Convenience
 
Social tagging, facets, and social spaces
Social tagging, facets, and social spacesSocial tagging, facets, and social spaces
Social tagging, facets, and social spaces
 
Concept theory and the role of conceptual coherence in assessments of similarity
Concept theory and the role of conceptual coherence in assessments of similarityConcept theory and the role of conceptual coherence in assessments of similarity
Concept theory and the role of conceptual coherence in assessments of similarity
 
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
 
The Public Library Catalogue as a Social Space
The Public Library Catalogue as a Social SpaceThe Public Library Catalogue as a Social Space
The Public Library Catalogue as a Social Space
 
RDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dotsRDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dots
 
Ala alise preparing lis professionals_spiteri_2012-01-18
Ala alise preparing lis professionals_spiteri_2012-01-18Ala alise preparing lis professionals_spiteri_2012-01-18
Ala alise preparing lis professionals_spiteri_2012-01-18
 
Indexing presentation 2013 06-04
Indexing presentation 2013 06-04Indexing presentation 2013 06-04
Indexing presentation 2013 06-04
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Social media 2013 06-12

  • 1. Social media and collaborative technologies: Information management dream or nightmare? Louise Spiteri School of Information Management Dalhousie University Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 2. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 3. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 4. Why do enterprises use social media? Too much effort has been exerted on platform knowledge rather than developing a business strategy. Significant time and money has already been spent collecting Facebook fans, followers on twitter and engagement using a healthy dose of trivia and emotive images—but for what purpose? ~http://www.information-management.com/news/enterprise-social-media-is-more-than- fun-and-games-10023862-1.html Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 5. Use of social media, 1 • For organizations social media application provide the opportunity to integrate information and opinions from citizens or clients into the policy making process in innovative ways • The traditional information creation, vetting and approval process includes multiple steps and does not provide the opportunity for real-time feedback cycles as social media applications demand. • Social media tools have the potential to increase the degree of transparency, accountability and collaborative content creation. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 6. Use of social media, 2 • Representation of the organization on all available channels. The representation objective is to be as inclusive as possible and reach audiences in their social spaces they frequent on a daily basis. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 7. What is the role of the Records and Information Management (RIM)professional in enterprise use of social media? Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 8. Social media and RIM, 1 Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 9. Social media and RIM, 2 Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 10. A place at the social media table: Why do we need to be there? Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 11. Increasing need for RIM, 1 • Since social media are based on the collaboration of their users, social media management is a collaborative venture as well. • Realizing shared organizational goals by sharing knowledge, learning, and building consensus across departments is yet another social media management competency. • Interdepartmental coordination allows the leveraging of tools and techniques into the organization’s social media culture and into its products and services. It ensures that a consistent message is delivered through its social media channels Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 12. Increasing need for RIM, 2 • It is essential that policies and practices in organizations be updated in order to ensure that essential records generated through social media technologies are retained and protected accordingly. • As social computing tools become increasingly integrated into company infrastructure, stakeholders must consider how existing records management policies can be expanded and extended in order to address social computing content, examine how companies review current practices in light of evolving social computing technologies, and provide guidance in policies to support the use of these technologies within the company. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 13. Main challenges of social media Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 14. Social media strategies What kind of social media? Letting go Participation Maintenance Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 15. Social media strategies, 1 What kind of social media? Do you need to utilize social networking sites, blogs, real-time updates (e.g., Twitter), social news sites, media- sharing sites, review/directory sites, virtual worlds, or display ads on social media sites Examine the characteristics of the type of social media you want to have a presence on and how those characteristics fit what you're trying to accomplish to help choose the ones that will work best for you. Letting go Once you engage in a conversation with customers, you have to give up control. Is your company willing to do that? Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 16. Social media strategies, 2 Participation. How do you plan to drive people to your social media presence? Maintenance. Who will maintain your social media presence? • You must have something to say and someone to say it on a regular basis. Measurement. How do you measure success or failure? • What happens if you don't get there? Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 17. Are we ready? • only 13% of respondents utilize a records management plan for social networking sites. • 53% responded that a plan was not yet in place, while at least one-third of the survey participants were unsure about their organization's use of a plan. There is a low level of preparedness within the ranks of RIM professionals regarding social networks. The results of a recent survey of more than 400 enterprises, conducted by AIIM, show that: Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 18. RIM challenges ,1 What is a social media record? Social media content is difficult to define as a record. Agencies are still grappling with records management for email, much less wikis and blogs. • The social media content that is record material must be identified as such by system users if there is no automation support for records identification (largely absent from current social media applications). • Social media systems do not generally lend themselves to handling system content as business records that may require separate handling and application of business rules. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 19. RIM challenges ,2 • Much of the social media content is in the public domain and, therefore, not under control of the agency, which may cause difficulty in capturing content. • Social Media Metadata: Applying metadata to tag social media content for retrieval is difficult. Most agencies use manual methods of adding metadata for social media content. • Governance: Organizations need to listen to what is said about them, both by employees and clients or the general public. Policies need to be in place to deal with multiple types of scenarios, e.g., responding to a compliment or dealing with an employee who just posted something inappropriate or sensitive. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 20. RIM challenges, 3 Social Media Scheduling/ Disposition: The lack of control of the content makes scheduling and disposition of records difficult. Privacy & Security: How do you maintain and protect the privacy and security of information pertaining to your employees and your organization? Staffing and Education: Education is needed to implement a successful social media records policy. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 21. Best practices, 1 Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 22. Best practices, 2 Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 23. Guidelines for social media policies, 1 • Remind employees to familiarize themselves with the employment agreement and policies included in the employee handbook. State that the policy applies to multi-media, social networking websites, blogs and wikis for both professional and personal use. Internet postings should not disclose any information that is confidential or proprietary to the company or to any third party that has disclosed information to the company. If an employee comments on any aspect of the company's business they must clearly identify themselves as an employee and include a disclaimer. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 24. Guidelines for social media policies, 2 The disclaimer should be something like "the views expressed are mine alone and do not necessarily reflect the views of (your company’s name)." Internet postings should not include company logos or trademarks unless permission is asked for and granted. Internet postings must respect copyright, privacy, fair use, financial disclosure, and other applicable laws. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 25. Guidelines for social media policies, 3 Employees should neither claim nor imply that they are speaking on the company's behalf. Corporate blogs, Facebook pages, Twitter accounts, etc., could require approval when the employee is posting about the company and the industry. That the company reserves the right to request the certain subjects are avoided, withdraw certain posts, and remove inappropriate comments. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 26. Examples of social media policies Canada Post Dell Government of New Zealand Transport Canada Government of Canada Government of Alberta Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 27. Examples of corporate social media sites Halifax Regional Police: http://www.facebook.com/HalifaxRegionalPolice https://twitter.com/HfxRegPolice Environment Canada: http://www.facebook.com/environmentcan https://twitter.com/environmentca The Shopping Channel: http://www.facebook.com/TheShoppingChannel https://twitter.com/theShoppingChan http://www.youtube.com/user/TheShoppingChannel?feature=watch http://pinterest.com/shoppingchannel/ http://www.theshoppingchannelblog.com/ Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 28. Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 29. Archiving Facebook Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 30. Archiving Twitter Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 31. Twitter archive Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 32. Source for infographics http://pinterest.com/pin/112097478196551490/ Maritime Access, Privacy, Security and Records Management Workshop 2013
  • 33. Questions? Louise Spiteri, PhD Louise.Spiteri@dal.ca @dalsimnews My About Me Profile Maritime Access, Privacy, Security and Records Management Workshop 2013

Notas do Editor

  1. For organizations social media application provide the opportunity to integrate information and opinions from citizens or clients into the policy making process in innovative waysThe traditional information creation, vetting and approval process includes multiple steps and does not provide the opportunity for real-time feedback cycles as social media applications demand. Social media tools have the potential to increase the degree of transparency, accountability and collaborative content creation.Representation of the organization on all available channels. The representation objective is to be as inclusive as possible and reach audiences in their social spaces they frequent on a daily basis.
  2. Do you need to utilize social networking sites, blogs, real-time updates (e.g., Twitter), social news sites, media-sharing sites, review/directory sites, virtual worlds, or display ads on social media sitesExamine the characteristics of the type of social media you want to have a presence on and how those characteristics fit what you're trying to accomplish to help choose the ones that will work best for you.Participation. How do you plan to drive people to your social media presence? Maintenance. Who will maintain your social media presence? You must have something to say and someone to say it on a regular basis.Measurement. How do you measure success or failure? What happens if you don't get there?Once you engage in a conversation with customers, you have to give up control. Is your company willing to do that?
  3. I have not had much luck with this feature, as it keeps getting stuck on “pending.” S