SlideShare uma empresa Scribd logo
1 de 25
ON THE BUSINESS OF SOCIAL MEDIA
 Benchmarks, Best Practices and Preliminary Next
Steps for Creating Corporate Social Media Adoption

                 January 20, 2011
Being Social


  A social network is a social structure made up
  of individuals (or organizations) called
  "nodes", which are tied (connected) by one or
  more specific types of interdependency, such
  as friendship, kinship, common interest,
  financial exchange, dislike, or relationships of
  beliefs, knowledge or prestige.
  –Wikipedia (as of 1/19/2010)
Being Social

 Social Media is the content, ideas, information and
  updates shared via social networks
 Social sharing is as old as campfire stories, traveling
  minstrels and early newspapers—Stories uncontrolled by
  central authorities and spread amongst communities of
  shared interests
 In the past decade there has been explosive technological
  growth in the development and adoption of socially
  connected applications, platforms, devices and networks
  (Social Computing)
 The viral spread of social media offers challenges and
  opportunities to corporations, and its adoption or
  prohibition should be carefully considered
When considering how to enable social
media in your organization, it’s
important to consider previous
technology revolutions
Let’s Start with the Desk Phone

 Prior to WWII, the office phone was just that — a single phone
  for a group of workers, usually controlled by a manager
 In the post war period, phone technology advanced to the point
  where it was possible to place a phone on every desk
 But there were arguments against a phone for every desk
      It decreases productivity: employees will spend their time chatting with friends
       and families
      It compromises security: employees can share company secrets from the privacy
       of their offices
      It’s an unnecessary expense: other than convenience, how would a phone
       improve the bottom-line (No ROI)
 It took about 20 years before corporate culture caught up with
  technology and recognized the value of the desk phone. By the
  mid-seventies, it was hard to imagine a workplace without a
  phone on every desk but it was a nearly 30-year process.
Other Important Tech Revolutions Then Followed

 Fortunately, the adoption process has been repeated
 for new technologies at an increasingly rapid pace




 Number of years from practical business use to wide-scale deployment
      Personal PCs (15 years)
      Mobile Phones (10 years)
      Email (7 years)
And the Revolution Continues Today

The pace has exponentially accelerated during the
social media era


Students only 2004               2005          2006
Public access 2006




                     CNN made YouTube a core
                     component of the 2008
                     Presidential Debates
Social Media Adoption by Generation
                  Digital Natives




Generations 2010, Pew Research Center 12/16/2010
Millennials = Digital Natives = Current and Future Employees


                                     Accenture found that
                                     millennials make heavy use of
                                     social networking sites while
                                     on the job, whether their
                                     employers allow them to or
                                     not. According to the report,
                                     45 percent of employed
   They’ve never known a
   world without computers           millennials use social
   Are intensely collaborative
   Adept at multitasking
                                     networking sites when they’re
   Social networking is an           at work, but only 32 percent
   essential communications
   channel                           say that access to social
   They are the future
   employees and leaders of          networks is supported by
   industry
                                     their IT departments.
                                     Cisco 2010 Midyear Security Report
The Failure of Social Media Prohibition




                         A recent survey from Cisco found that when
                         workers want access to social networking
                         technologies, they’ll get it— even if it means
                         circumventing corporate policy.
                         The study reported that 50 percent of end
                         users admitted that they ignored company
                         policy prohibiting use of social media tools
                         at least once a week, and 27 percent said
                         they change the settings on corporate
                         devices to access prohibited applications.


                          According to a Gartner Inc. social media security expert
                          Andrew Walls, banning Facebook, and other social
                          networking services like LinkedIn and Twitter, is an
                          exercise in futility… Securing social media in the
                          enterprise is not a responsibility that should fall to
                          information security teams.
                          Social networks are being victimized by the same malware
                          plaguing email and websites. "So if I'm going to block
                          social media on the basis of malware distribution," Walls
                          asked hypothetically, "why not block email?"
Social Media Access by Company Size

100%

90%

80%

70%                                                                          Block Access

60%
                                                                             Control/Restrict
50%

40%                                                                          Monitor Use

30%
                                                                             No Policy
20%

10%

 0%
       Small (<100)         Medium (100-1000)          Large (>1000)
                  Organization Size (number of employees)
                                                McAfee Web 2.0 Report 2010
Adoption and Use of Social Media by Industries

                                                Question: Which of the following
                                                indicates your organization’s use social
                                                media in any way for business purposes.
                                                By social media, we mean Web based
                                                channels and technologies such as
                                                Facebook, Twitter, blogs, YouTube,
                                                discussion forums,
                                                online communities, etc.




                          The New Conversation:
                          Taking Social Media from Talk to Action
                          Harvard Business Review Analytic Services
Employee Access to Social Media at Major
Corporations (and the US Army)




Allows       Allows       Allows            Allows




Allows       Allows       Allows            Allows



                         Note: GE and Honeywell info not
                         available so we’re obtaining it
                         through unconventional means
Blocks
A Closer Look at Some of these Companies

There’s a great deal of commonality between the policies of
companies successfully allowing social media access. This
speaks to the normalization of these channels and the fact that
effective social media management is largely a matter of
adapting pre-existing policies into a set of common sense
guidelines.

Many policies & guidelines are available for review at
SocialMediaGovernance.com
http://www.ibm.com/blogs/zz/en/guidelines.html


    IBM produced its initial guidelines in 2005. They have released
     subsequent updates in 2008 and 2010
    These guidelines have been produced with the involvement of
     IBMers . A wiki was created to allow for the collective wisdom
     of the organization to be captured and considered
    Although initially focusing on Social Networking, it has evolved
     to encompass all forms of Social Computing

Introduction: Responsible engagement in innovation and dialogue
Online collaboration platforms are fundamentally changing the way IBMers
work and engage with each other, clients and partners.
IBM is increasingly exploring how online discourse through social
computing can empower IBMers as global professionals, innovators and
citizens. These individual interactions represent a new model: not mass
communications, but masses of communicators. Through these interactions,
IBM’s greatest asset—the expertise of its employees—can be shared with
clients, shareholders, and the communities in which it operates.
 Siemens has managed to build a diverse range of official
  and unofficial social media voices and points of presence
  without having a formal Social Media policy. However,
  they have a strong set of business conduct guidelines that
  employees adhere to in their communications.
 Dozens of Twitter profiles and Facebook properties exist
  to support the disparate business units across the world.
 Siemens is currently contemplating options for enterprise-
  wide social media policies.
http://www.slideshare.net/USArmySocialMedia/army-social-media-
                handbook-2011




 In 2009, the US Army ordered its network managers to
   give soldiers access to social media sites like
   Facebook, Flickr, and Twitter. That move reverses a
   long trend of blocking Web 2.0 access from military
   networks.
      It is “the intent of senior Army leaders to leverage social media as a
       medium to allow soldiers to ‘tell the Army story’ and to facilitate the
       dissemination of strategic, unclassified information,” says the order,
       obtained by Danger Room. Therefore, “the social media sites available
       from the Army homepage will be made accessible from all campus area
       networks.
http://www.wired.com/dangerroom/2009/06/army-orders-bases-stop-blocking-twitter-
facebook-flickr/
 Boeing does not have a specific Social Media policy.
  Employees are governed by Boeing’s Use of Company
  Property policy and other applicable employee policies.


 Can I use my Boeing-issued computer to join or access a social
 networking site?
 Answer: Boeing-issued computers are provided for the conduct of
 company business. Limited/infrequent access to social networking
 internet sites from the Boeing network is currently allowed
 within the guidelines set forth within PRO 10 (3B #2), The End
 User Security
 Handbook, and PRO-3439 (Release of Information Outside The Boeing
 Company). In addition, employees are strongly encouraged to seek
 management authorization prior to utilizing Boeing resources for
 social networking use.
http://www.es.northropgrumman.com/ourvalues/assets/TYInternet.pdf



      Northrop Grumman does an excellent job of adapting its Social
       Media policies to a defense contractor environment; it allows
       social media usage while encouraging appropriate paranoia.

Some personal use of the Internet is acceptable and must comply with company policy and Standards of Business
conduct. Employee use of the Internet for personal reasons must not:
• Be done during working time, preempt company business, or compromise other employees’ productivity
• Compromise security or the company’s reputation
• Create a hostile working environment or set a poor behavioral example
• Use of the Internet for personal business use, such as running a consulting or side business, is considered
   misuse of company resources and is prohibited.

“Social media sites can be used by cyber spies to engage in espionage and gather information on potential
targets for cyber crime. In order to minimize the chance that you will be targeted by cyber spies, the
following best practices should be employed when using social media sites on the Internet:
       Do not use your Northrop Grumman e-mail address as the e-mail address associated with social media site
       used for personal use.
       Do not publish your affiliation with Northrop Grumman on social media sites used for personal use.
       Do not post detailed information about your job. Remember that company procedure prohibits posting or
       discussing proprietary information, trade secrets, private company information, classified data or
       information subject to export control requirements.
       Secure your profiles so that they are not visible to “everyone” or searchable via public search engines
       (e.g., Google).

When joining these communities, the “public” part of your profile (which may include the picture associated
with the account, personal information, and friends list) may be visible to everyone who is part of the
community, including non-employees and foreign nationals.”
Applying the Social Dimension to the Lockheed Martin Mission



    Lockheed Martin has opted-out of allowing open
     access to public Social Networking in favor of
     creating a behind-the-firewall, private community to
     “fill workforce needs”
“Lockheed is working on coming up with a broad social-networking policy, Dahlen
said, but today blocks access to most of the popular public social-networking
sites.”
“Although Lockheed Martin isn't keen on employees using public social networks
like Facebook or YouTube in the course of their jobs, the high-tech company is
rolling out an internal social network designed by its own engineers for business
collaboration.”
 “Called "Unity," (later renamed Eureka Streams) the Lockheed Martin social
 network combines blogging, Wiki functions, personal pages and group forums that
 glitter with the kind of multimedia that keeps youthful employees engaged and
 their elders agog. But far from being eye-candy entertainment, Unity is seen as
 the company's evolving foundation for project interactions and the front-end to a
 document repository.”
Key Elements of an Effective Social Media Policy

                                                  Many policies/guidelines are very
                                                   similar in content and structure
                                                  Forrester Research has
                                                   conducted a fair amount of
                                                   research and identified many of
                                                   the core tenets of effective
                                                   social media policies that could
                                                   serve as a good source for ███
                                                  ███ has the opportunity to build
                                                   upon the collective wisdom of
                                                   others to create a unique vision
                                                   on how to guide and empower
                                                   the entire organization on Social
                                                   Media




            Source: Forrester Research, Inc.
Establishing a Social Media Policy: Who’s Job is It?
   The creation of an effective corporate social media policy requires the support and
   participation of all functional groups and key stakeholders from the very start of the process.
   C-Level involvement is essential to demonstrate the importance of these guidelines, and to
   promote their enterprise-wide deployment




                                                   Source: Forrester Research, Inc.
It’s a Collaborative Process




   It’s important that no one team “owns” social media—all core
    functional groups must be involved in creating, promoting and evolving
    the policies
   Whenever possible, provide opportunities for input from business units
    and employees
   Build upon existing ███ & ██ employee policies and procedures.
      Use this as an opportunity to update existing policies to streamline
       procedures
Potential Initial Next Steps:

 Engage with successful leaders like IBM and GM, and 3rd
  Party experts like Forrester, to gain knowledge,
  perspective and insights for action plan.
 Consider who’d comprise the internal committee.
 Utilize wikis, surveys or workgroups to gather the input
  from employees from the different ███ organizations.
 Recognize the special requirements that may be required
  for employees engaged in confidential/defense related
  projects.
 Consider weaving social features into internal systems to
  encourage behind-the-firewall collaboration.
The Social Networking Spectrum

Social networks
span a wide
range of
community types
and missions ...
it would be
impossible to
have a unique
policy for each
network or
platform.

In fact, many
traditional news
and information
sites now
integrate social
networking
features and
content.
                                     THE
                                     CONVERSATION
                                     PRISM
                                     By Brian Solis & JESS3

Mais conteúdo relacionado

Mais procurados

Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticlePete Modigliani
 
Social Networking in Government
Social Networking in GovernmentSocial Networking in Government
Social Networking in Governmentguest2343f9
 
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGE
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGESOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGE
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGEijcsit
 
Mcafee web20-balancingact
Mcafee web20-balancingactMcafee web20-balancingact
Mcafee web20-balancingactDigital Pymes
 
347 wk01 2013 copy
347 wk01 2013 copy347 wk01 2013 copy
347 wk01 2013 copyGuy Richards
 
Leverage social media for customer interaction
Leverage social media for customer interactionLeverage social media for customer interaction
Leverage social media for customer interactionInfo-Tech Research Group
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesIOSR Journals
 
2011 shift index social media activity
2011 shift index   social media activity2011 shift index   social media activity
2011 shift index social media activityUday Abdurrahman
 
20130318 socialmediaingov-craigthomler-130319003343-phpapp02
20130318 socialmediaingov-craigthomler-130319003343-phpapp0220130318 socialmediaingov-craigthomler-130319003343-phpapp02
20130318 socialmediaingov-craigthomler-130319003343-phpapp02Fayecel Abdelkarim
 
Social media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthSocial media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthCraig Thomler
 
Kaplan & Haenlein - Users of the world, unite - the challenges and opportunit...
Kaplan & Haenlein - Users of the world, unite - the challenges and opportunit...Kaplan & Haenlein - Users of the world, unite - the challenges and opportunit...
Kaplan & Haenlein - Users of the world, unite - the challenges and opportunit...ESCP Exchange
 
Social Media and Local Governments
Social Media and Local GovernmentsSocial Media and Local Governments
Social Media and Local GovernmentsMariana Salazar
 
What Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTWWhat Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTWDavid Terrar
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAyelet Baron
 
Micro Blogging In The Enterprise Final
Micro Blogging In The Enterprise FinalMicro Blogging In The Enterprise Final
Micro Blogging In The Enterprise FinalIan McNairn
 
Consumption Trends China 2013
Consumption Trends China 2013Consumption Trends China 2013
Consumption Trends China 2013Kantar Media CIC
 

Mais procurados (20)

Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 Article
 
Social Networking in Government
Social Networking in GovernmentSocial Networking in Government
Social Networking in Government
 
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGE
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGESOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGE
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGE
 
Mcafee web20-balancingact
Mcafee web20-balancingactMcafee web20-balancingact
Mcafee web20-balancingact
 
347 wk01 2013 copy
347 wk01 2013 copy347 wk01 2013 copy
347 wk01 2013 copy
 
Leverage social media for customer interaction
Leverage social media for customer interactionLeverage social media for customer interaction
Leverage social media for customer interaction
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking Sites
 
A3 cecconi
A3 cecconiA3 cecconi
A3 cecconi
 
Web2.0 report McAfee
Web2.0 report McAfeeWeb2.0 report McAfee
Web2.0 report McAfee
 
2011 shift index social media activity
2011 shift index   social media activity2011 shift index   social media activity
2011 shift index social media activity
 
20130318 socialmediaingov-craigthomler-130319003343-phpapp02
20130318 socialmediaingov-craigthomler-130319003343-phpapp0220130318 socialmediaingov-craigthomler-130319003343-phpapp02
20130318 socialmediaingov-craigthomler-130319003343-phpapp02
 
Social media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthSocial media in government - presentation to NSW Health
Social media in government - presentation to NSW Health
 
Kaplan & Haenlein - Users of the world, unite - the challenges and opportunit...
Kaplan & Haenlein - Users of the world, unite - the challenges and opportunit...Kaplan & Haenlein - Users of the world, unite - the challenges and opportunit...
Kaplan & Haenlein - Users of the world, unite - the challenges and opportunit...
 
Social Media and Local Governments
Social Media and Local GovernmentsSocial Media and Local Governments
Social Media and Local Governments
 
What Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTWWhat Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTW
 
(2011) Case Study: Using Social Media to Promote an Academic Laboratory
(2011) Case Study: Using Social Media to Promote an Academic Laboratory(2011) Case Study: Using Social Media to Promote an Academic Laboratory
(2011) Case Study: Using Social Media to Promote an Academic Laboratory
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
 
Micro Blogging In The Enterprise Final
Micro Blogging In The Enterprise FinalMicro Blogging In The Enterprise Final
Micro Blogging In The Enterprise Final
 
Consumption Trends China 2013
Consumption Trends China 2013Consumption Trends China 2013
Consumption Trends China 2013
 
Professionalism Online: The Effect of Resumes and Social Media on Perceived W...
Professionalism Online: The Effect of Resumes and Social Media on Perceived W...Professionalism Online: The Effect of Resumes and Social Media on Perceived W...
Professionalism Online: The Effect of Resumes and Social Media on Perceived W...
 

Destaque

Midtermpresentatie 2 wilbert
Midtermpresentatie 2 wilbertMidtermpresentatie 2 wilbert
Midtermpresentatie 2 wilberttrancilian
 
Ten Suggestions for Social Media for Business
Ten Suggestions for Social Media for BusinessTen Suggestions for Social Media for Business
Ten Suggestions for Social Media for BusinessDoug Winfield
 
電子傳播期末專題
電子傳播期末專題電子傳播期末專題
電子傳播期末專題Kaitre
 
Midtermpresentatie 2 wilbert
Midtermpresentatie 2 wilbertMidtermpresentatie 2 wilbert
Midtermpresentatie 2 wilberttrancilian
 
OpenER, OER @OUNL
OpenER, OER @OUNLOpenER, OER @OUNL
OpenER, OER @OUNLguest2503e3
 
JUANSÉ_CIDBA_TRABAJOFINAL_C160102_05_TEMA4
JUANSÉ_CIDBA_TRABAJOFINAL_C160102_05_TEMA4JUANSÉ_CIDBA_TRABAJOFINAL_C160102_05_TEMA4
JUANSÉ_CIDBA_TRABAJOFINAL_C160102_05_TEMA4Juanse.archivo
 
How to Promote Content to Drive More Sales with Facebook Ads
How to Promote Content to Drive More Sales with Facebook AdsHow to Promote Content to Drive More Sales with Facebook Ads
How to Promote Content to Drive More Sales with Facebook AdsAaron Zakowski
 
It勉強会と気軽に付き合おう
It勉強会と気軽に付き合おうIt勉強会と気軽に付き合おう
It勉強会と気軽に付き合おうはなずきん Hana
 
Midtermpresentatie 2
Midtermpresentatie 2Midtermpresentatie 2
Midtermpresentatie 2trancilian
 
5 Audiences You Need To Be Targeting With Facebook Ads
5 Audiences You Need To Be Targeting With Facebook Ads5 Audiences You Need To Be Targeting With Facebook Ads
5 Audiences You Need To Be Targeting With Facebook AdsAaron Zakowski
 
「子供がハッカーに興味をもった時に備えて」考える会オープニング
「子供がハッカーに興味をもった時に備えて」考える会オープニング「子供がハッカーに興味をもった時に備えて」考える会オープニング
「子供がハッカーに興味をもった時に備えて」考える会オープニングはなずきん Hana
 
子供とネットを考える会の合言葉
子供とネットを考える会の合言葉子供とネットを考える会の合言葉
子供とネットを考える会の合言葉はなずきん Hana
 
7 Habits of Highly Effective Facebook Ads - SMX Israel
7 Habits of Highly Effective Facebook Ads - SMX Israel7 Habits of Highly Effective Facebook Ads - SMX Israel
7 Habits of Highly Effective Facebook Ads - SMX IsraelAaron Zakowski
 

Destaque (16)

Midtermpresentatie 2 wilbert
Midtermpresentatie 2 wilbertMidtermpresentatie 2 wilbert
Midtermpresentatie 2 wilbert
 
Banco de Dados em Grafos
Banco de Dados em GrafosBanco de Dados em Grafos
Banco de Dados em Grafos
 
Ten Suggestions for Social Media for Business
Ten Suggestions for Social Media for BusinessTen Suggestions for Social Media for Business
Ten Suggestions for Social Media for Business
 
電子傳播期末專題
電子傳播期末專題電子傳播期末專題
電子傳播期末專題
 
Midtermpresentatie 2 wilbert
Midtermpresentatie 2 wilbertMidtermpresentatie 2 wilbert
Midtermpresentatie 2 wilbert
 
OpenER, OER @OUNL
OpenER, OER @OUNLOpenER, OER @OUNL
OpenER, OER @OUNL
 
JUANSÉ_CIDBA_TRABAJOFINAL_C160102_05_TEMA4
JUANSÉ_CIDBA_TRABAJOFINAL_C160102_05_TEMA4JUANSÉ_CIDBA_TRABAJOFINAL_C160102_05_TEMA4
JUANSÉ_CIDBA_TRABAJOFINAL_C160102_05_TEMA4
 
How to Promote Content to Drive More Sales with Facebook Ads
How to Promote Content to Drive More Sales with Facebook AdsHow to Promote Content to Drive More Sales with Facebook Ads
How to Promote Content to Drive More Sales with Facebook Ads
 
It勉強会と気軽に付き合おう
It勉強会と気軽に付き合おうIt勉強会と気軽に付き合おう
It勉強会と気軽に付き合おう
 
10picstory
10picstory10picstory
10picstory
 
Midtermpresentatie 2
Midtermpresentatie 2Midtermpresentatie 2
Midtermpresentatie 2
 
5 Audiences You Need To Be Targeting With Facebook Ads
5 Audiences You Need To Be Targeting With Facebook Ads5 Audiences You Need To Be Targeting With Facebook Ads
5 Audiences You Need To Be Targeting With Facebook Ads
 
「子供がハッカーに興味をもった時に備えて」考える会オープニング
「子供がハッカーに興味をもった時に備えて」考える会オープニング「子供がハッカーに興味をもった時に備えて」考える会オープニング
「子供がハッカーに興味をもった時に備えて」考える会オープニング
 
Web GIS e Python
Web GIS e PythonWeb GIS e Python
Web GIS e Python
 
子供とネットを考える会の合言葉
子供とネットを考える会の合言葉子供とネットを考える会の合言葉
子供とネットを考える会の合言葉
 
7 Habits of Highly Effective Facebook Ads - SMX Israel
7 Habits of Highly Effective Facebook Ads - SMX Israel7 Habits of Highly Effective Facebook Ads - SMX Israel
7 Habits of Highly Effective Facebook Ads - SMX Israel
 

Semelhante a On The Business of social media

socialmedia-egov
socialmedia-egovsocialmedia-egov
socialmedia-egovknowhowgr
 
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docxCOMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docxdrandy1
 
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docxCOMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docxcargillfilberto
 
IDC event flash on Socialite launch
IDC event flash on Socialite launchIDC event flash on Socialite launch
IDC event flash on Socialite launchActiance, Inc.
 
A Study On The Changing Trends In Social Media And Its Impact Globally
A Study On The Changing Trends In Social Media And Its Impact GloballyA Study On The Changing Trends In Social Media And Its Impact Globally
A Study On The Changing Trends In Social Media And Its Impact GloballyAlicia Edwards
 
Unisys social computing services nov2012
Unisys social computing services nov2012Unisys social computing services nov2012
Unisys social computing services nov2012Unisys Corporation
 
Social technologies
Social technologiesSocial technologies
Social technologiesJulia Ilyina
 
Using Social Media2
Using Social Media2Using Social Media2
Using Social Media2Jane Hart
 
Huddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media toolsHuddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media toolsAndy McLoughlin
 
Social media marketing from a bottom up perspective
Social media marketing from a bottom up perspectiveSocial media marketing from a bottom up perspective
Social media marketing from a bottom up perspectiveMaxim Boiko Savenko
 
Reputation management in the era of social media
Reputation management in the era of social mediaReputation management in the era of social media
Reputation management in the era of social mediaMHP Communications
 
Reputation Management In The Era Of Social Media
Reputation Management In The Era Of Social MediaReputation Management In The Era Of Social Media
Reputation Management In The Era Of Social MediaBen Maynard
 
Reputation Management in era of social media
Reputation Management in era of social mediaReputation Management in era of social media
Reputation Management in era of social mediaBen Maynard
 
Chapter9d McHaney 2nd edition
Chapter9d McHaney 2nd editionChapter9d McHaney 2nd edition
Chapter9d McHaney 2nd editionRoger McHaney
 
Overview of Web 2.0 in the Government
Overview of Web 2.0 in the GovernmentOverview of Web 2.0 in the Government
Overview of Web 2.0 in the GovernmentAlex Pline
 

Semelhante a On The Business of social media (20)

socialmedia-egov
socialmedia-egovsocialmedia-egov
socialmedia-egov
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docxCOMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
 
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docxCOMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
 
IDC event flash on Socialite launch
IDC event flash on Socialite launchIDC event flash on Socialite launch
IDC event flash on Socialite launch
 
A Study On The Changing Trends In Social Media And Its Impact Globally
A Study On The Changing Trends In Social Media And Its Impact GloballyA Study On The Changing Trends In Social Media And Its Impact Globally
A Study On The Changing Trends In Social Media And Its Impact Globally
 
Unisys social computing services nov2012
Unisys social computing services nov2012Unisys social computing services nov2012
Unisys social computing services nov2012
 
India hardy presentation
India hardy   presentationIndia hardy   presentation
India hardy presentation
 
Social technologies
Social technologiesSocial technologies
Social technologies
 
Using Social Media2
Using Social Media2Using Social Media2
Using Social Media2
 
Huddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media toolsHuddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media tools
 
Social media marketing from a bottom up perspective
Social media marketing from a bottom up perspectiveSocial media marketing from a bottom up perspective
Social media marketing from a bottom up perspective
 
Reputation management in the era of social media
Reputation management in the era of social mediaReputation management in the era of social media
Reputation management in the era of social media
 
Reputation Management In The Era Of Social Media
Reputation Management In The Era Of Social MediaReputation Management In The Era Of Social Media
Reputation Management In The Era Of Social Media
 
Reputation Management in era of social media
Reputation Management in era of social mediaReputation Management in era of social media
Reputation Management in era of social media
 
Pxc3889608
Pxc3889608Pxc3889608
Pxc3889608
 
Chapter7d McHaney
Chapter7d McHaneyChapter7d McHaney
Chapter7d McHaney
 
Chapter9d McHaney 2nd edition
Chapter9d McHaney 2nd editionChapter9d McHaney 2nd edition
Chapter9d McHaney 2nd edition
 
Overview of Web 2.0 in the Government
Overview of Web 2.0 in the GovernmentOverview of Web 2.0 in the Government
Overview of Web 2.0 in the Government
 

Último

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Último (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

On The Business of social media

  • 1. ON THE BUSINESS OF SOCIAL MEDIA Benchmarks, Best Practices and Preliminary Next Steps for Creating Corporate Social Media Adoption January 20, 2011
  • 2. Being Social A social network is a social structure made up of individuals (or organizations) called "nodes", which are tied (connected) by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, or relationships of beliefs, knowledge or prestige. –Wikipedia (as of 1/19/2010)
  • 3. Being Social  Social Media is the content, ideas, information and updates shared via social networks  Social sharing is as old as campfire stories, traveling minstrels and early newspapers—Stories uncontrolled by central authorities and spread amongst communities of shared interests  In the past decade there has been explosive technological growth in the development and adoption of socially connected applications, platforms, devices and networks (Social Computing)  The viral spread of social media offers challenges and opportunities to corporations, and its adoption or prohibition should be carefully considered
  • 4. When considering how to enable social media in your organization, it’s important to consider previous technology revolutions
  • 5. Let’s Start with the Desk Phone  Prior to WWII, the office phone was just that — a single phone for a group of workers, usually controlled by a manager  In the post war period, phone technology advanced to the point where it was possible to place a phone on every desk  But there were arguments against a phone for every desk  It decreases productivity: employees will spend their time chatting with friends and families  It compromises security: employees can share company secrets from the privacy of their offices  It’s an unnecessary expense: other than convenience, how would a phone improve the bottom-line (No ROI)  It took about 20 years before corporate culture caught up with technology and recognized the value of the desk phone. By the mid-seventies, it was hard to imagine a workplace without a phone on every desk but it was a nearly 30-year process.
  • 6. Other Important Tech Revolutions Then Followed Fortunately, the adoption process has been repeated for new technologies at an increasingly rapid pace Number of years from practical business use to wide-scale deployment  Personal PCs (15 years)  Mobile Phones (10 years)  Email (7 years)
  • 7. And the Revolution Continues Today The pace has exponentially accelerated during the social media era Students only 2004 2005 2006 Public access 2006 CNN made YouTube a core component of the 2008 Presidential Debates
  • 8. Social Media Adoption by Generation Digital Natives Generations 2010, Pew Research Center 12/16/2010
  • 9. Millennials = Digital Natives = Current and Future Employees Accenture found that millennials make heavy use of social networking sites while on the job, whether their employers allow them to or not. According to the report, 45 percent of employed They’ve never known a world without computers millennials use social Are intensely collaborative Adept at multitasking networking sites when they’re Social networking is an at work, but only 32 percent essential communications channel say that access to social They are the future employees and leaders of networks is supported by industry their IT departments. Cisco 2010 Midyear Security Report
  • 10. The Failure of Social Media Prohibition A recent survey from Cisco found that when workers want access to social networking technologies, they’ll get it— even if it means circumventing corporate policy. The study reported that 50 percent of end users admitted that they ignored company policy prohibiting use of social media tools at least once a week, and 27 percent said they change the settings on corporate devices to access prohibited applications. According to a Gartner Inc. social media security expert Andrew Walls, banning Facebook, and other social networking services like LinkedIn and Twitter, is an exercise in futility… Securing social media in the enterprise is not a responsibility that should fall to information security teams. Social networks are being victimized by the same malware plaguing email and websites. "So if I'm going to block social media on the basis of malware distribution," Walls asked hypothetically, "why not block email?"
  • 11. Social Media Access by Company Size 100% 90% 80% 70% Block Access 60% Control/Restrict 50% 40% Monitor Use 30% No Policy 20% 10% 0% Small (<100) Medium (100-1000) Large (>1000) Organization Size (number of employees) McAfee Web 2.0 Report 2010
  • 12. Adoption and Use of Social Media by Industries Question: Which of the following indicates your organization’s use social media in any way for business purposes. By social media, we mean Web based channels and technologies such as Facebook, Twitter, blogs, YouTube, discussion forums, online communities, etc. The New Conversation: Taking Social Media from Talk to Action Harvard Business Review Analytic Services
  • 13. Employee Access to Social Media at Major Corporations (and the US Army) Allows Allows Allows Allows Allows Allows Allows Allows Note: GE and Honeywell info not available so we’re obtaining it through unconventional means Blocks
  • 14. A Closer Look at Some of these Companies There’s a great deal of commonality between the policies of companies successfully allowing social media access. This speaks to the normalization of these channels and the fact that effective social media management is largely a matter of adapting pre-existing policies into a set of common sense guidelines. Many policies & guidelines are available for review at SocialMediaGovernance.com
  • 15. http://www.ibm.com/blogs/zz/en/guidelines.html  IBM produced its initial guidelines in 2005. They have released subsequent updates in 2008 and 2010  These guidelines have been produced with the involvement of IBMers . A wiki was created to allow for the collective wisdom of the organization to be captured and considered  Although initially focusing on Social Networking, it has evolved to encompass all forms of Social Computing Introduction: Responsible engagement in innovation and dialogue Online collaboration platforms are fundamentally changing the way IBMers work and engage with each other, clients and partners. IBM is increasingly exploring how online discourse through social computing can empower IBMers as global professionals, innovators and citizens. These individual interactions represent a new model: not mass communications, but masses of communicators. Through these interactions, IBM’s greatest asset—the expertise of its employees—can be shared with clients, shareholders, and the communities in which it operates.
  • 16.  Siemens has managed to build a diverse range of official and unofficial social media voices and points of presence without having a formal Social Media policy. However, they have a strong set of business conduct guidelines that employees adhere to in their communications.  Dozens of Twitter profiles and Facebook properties exist to support the disparate business units across the world.  Siemens is currently contemplating options for enterprise- wide social media policies.
  • 17. http://www.slideshare.net/USArmySocialMedia/army-social-media- handbook-2011  In 2009, the US Army ordered its network managers to give soldiers access to social media sites like Facebook, Flickr, and Twitter. That move reverses a long trend of blocking Web 2.0 access from military networks.  It is “the intent of senior Army leaders to leverage social media as a medium to allow soldiers to ‘tell the Army story’ and to facilitate the dissemination of strategic, unclassified information,” says the order, obtained by Danger Room. Therefore, “the social media sites available from the Army homepage will be made accessible from all campus area networks. http://www.wired.com/dangerroom/2009/06/army-orders-bases-stop-blocking-twitter- facebook-flickr/
  • 18.  Boeing does not have a specific Social Media policy. Employees are governed by Boeing’s Use of Company Property policy and other applicable employee policies. Can I use my Boeing-issued computer to join or access a social networking site? Answer: Boeing-issued computers are provided for the conduct of company business. Limited/infrequent access to social networking internet sites from the Boeing network is currently allowed within the guidelines set forth within PRO 10 (3B #2), The End User Security Handbook, and PRO-3439 (Release of Information Outside The Boeing Company). In addition, employees are strongly encouraged to seek management authorization prior to utilizing Boeing resources for social networking use.
  • 19. http://www.es.northropgrumman.com/ourvalues/assets/TYInternet.pdf  Northrop Grumman does an excellent job of adapting its Social Media policies to a defense contractor environment; it allows social media usage while encouraging appropriate paranoia. Some personal use of the Internet is acceptable and must comply with company policy and Standards of Business conduct. Employee use of the Internet for personal reasons must not: • Be done during working time, preempt company business, or compromise other employees’ productivity • Compromise security or the company’s reputation • Create a hostile working environment or set a poor behavioral example • Use of the Internet for personal business use, such as running a consulting or side business, is considered misuse of company resources and is prohibited. “Social media sites can be used by cyber spies to engage in espionage and gather information on potential targets for cyber crime. In order to minimize the chance that you will be targeted by cyber spies, the following best practices should be employed when using social media sites on the Internet: Do not use your Northrop Grumman e-mail address as the e-mail address associated with social media site used for personal use. Do not publish your affiliation with Northrop Grumman on social media sites used for personal use. Do not post detailed information about your job. Remember that company procedure prohibits posting or discussing proprietary information, trade secrets, private company information, classified data or information subject to export control requirements. Secure your profiles so that they are not visible to “everyone” or searchable via public search engines (e.g., Google). When joining these communities, the “public” part of your profile (which may include the picture associated with the account, personal information, and friends list) may be visible to everyone who is part of the community, including non-employees and foreign nationals.”
  • 20. Applying the Social Dimension to the Lockheed Martin Mission  Lockheed Martin has opted-out of allowing open access to public Social Networking in favor of creating a behind-the-firewall, private community to “fill workforce needs” “Lockheed is working on coming up with a broad social-networking policy, Dahlen said, but today blocks access to most of the popular public social-networking sites.” “Although Lockheed Martin isn't keen on employees using public social networks like Facebook or YouTube in the course of their jobs, the high-tech company is rolling out an internal social network designed by its own engineers for business collaboration.” “Called "Unity," (later renamed Eureka Streams) the Lockheed Martin social network combines blogging, Wiki functions, personal pages and group forums that glitter with the kind of multimedia that keeps youthful employees engaged and their elders agog. But far from being eye-candy entertainment, Unity is seen as the company's evolving foundation for project interactions and the front-end to a document repository.”
  • 21. Key Elements of an Effective Social Media Policy  Many policies/guidelines are very similar in content and structure  Forrester Research has conducted a fair amount of research and identified many of the core tenets of effective social media policies that could serve as a good source for ███  ███ has the opportunity to build upon the collective wisdom of others to create a unique vision on how to guide and empower the entire organization on Social Media Source: Forrester Research, Inc.
  • 22. Establishing a Social Media Policy: Who’s Job is It? The creation of an effective corporate social media policy requires the support and participation of all functional groups and key stakeholders from the very start of the process. C-Level involvement is essential to demonstrate the importance of these guidelines, and to promote their enterprise-wide deployment Source: Forrester Research, Inc.
  • 23. It’s a Collaborative Process  It’s important that no one team “owns” social media—all core functional groups must be involved in creating, promoting and evolving the policies  Whenever possible, provide opportunities for input from business units and employees  Build upon existing ███ & ██ employee policies and procedures.  Use this as an opportunity to update existing policies to streamline procedures
  • 24. Potential Initial Next Steps:  Engage with successful leaders like IBM and GM, and 3rd Party experts like Forrester, to gain knowledge, perspective and insights for action plan.  Consider who’d comprise the internal committee.  Utilize wikis, surveys or workgroups to gather the input from employees from the different ███ organizations.  Recognize the special requirements that may be required for employees engaged in confidential/defense related projects.  Consider weaving social features into internal systems to encourage behind-the-firewall collaboration.
  • 25. The Social Networking Spectrum Social networks span a wide range of community types and missions ... it would be impossible to have a unique policy for each network or platform. In fact, many traditional news and information sites now integrate social networking features and content. THE CONVERSATION PRISM By Brian Solis & JESS3