SlideShare a Scribd company logo
1 of 17
Social Media & Social Networking:A Cautionary Tale Michael Gotta Senior Technology Solutions ManagerEnterprise Social Software
The Social Side Of The Internet 75% of respondents are active in some kind of voluntary group or organization 68% of respondents (internet users & non-users alike) said the internet has had a major impact on the ability of groups to communicate with members  60% of respondents said the internet has had a major impact on the ability of groups to connect with other groups  59% of respondents said the internet has had a major impact on the ability of groups to impact society at large 62% of respondents said that the internet has had a major impact on the ability of groups to draw attention to an issue 59% of respondents said the internet has had a major impact on the ability of groups to organize activities Source: Pew Internet http://www.pewinternet.org/Press-Releases/2011/Social-Side-of-the-Internet.aspx
Social Networking & Social Media: Leverage new tools & literacies to enable new ways of working 3000 friends 100 fan pages 50 groups Has Own Channel Blogs Daily Following  325 Followers 915
Organizations Face Internal TensionAn Unequivocal “Yes” Or “No” Is Often Not The Answer Scale organizational expertise Lack of policy-based management Improve business processes Weak identity assurance Break down silos and barriers Inadequate security controls Benefits Risks Catalyze employee engagement Questionable privacy protections Address generational shifts Misuse by employees Improve talent & learning initiatives Unanticipated data disclosure Satisfy technology expectations Potential for “social engineering”
Leverage Use Case Scenarios: Shift The Discussion From “OR” to “AND” Observe and listen to employees, experts, and management regarding use of social tools Construct use case scenarios from those representative stories Identify decision and enforcement points where risks can be mitigated Plan, execute, adjust
Use Case #1: “Social Claims”Profiles may be viewed as a trusted information source Employee profiles populated with information from trusted enterprise systems My “Enterprise Identity” Mike Gotta EMPLOYEE #: LABOR GRADE: COST CENTER: Additional information entered by employees regarding skills, interests, expertise, experience DEPT: GROUP: My “Claimed Identity” JOB TITLE: EXPERTISE: HOBBIES: Information viewed as “trusted” but claims are not verified which can lead to risk scenarios EDUCATION: INTERESTS:  PERSONAL TAGS: COMMUNITIES: FOLLOWING: COLLEAGUES: Add fields to profile where data goes through vetting process; pre-populate profile with other credentialing information
Use Case #2: Profile ProliferationMultiple profiles creates maintenance and data integrity issues My Primary Profile DiversityCommunity Profile Selling Into HealthcareCommunity Profile Customer InnovationCommunity Profile Profiles are becoming a common feature across many vendor products EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: Jane Doe Jane Doe Jane Doe Jane Doe DEPT: DEPT: DEPT: DEPT: JOB TITLE: JOB TITLE: JOB TITLE: JOB TITLE: EXPERTISE: EXPERTISE: EXPERTISE: EXPERTISE: COLLEAGUES: COLLEAGUES: COLLEAGUES: COLLEAGUES: PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS Employees create/maintain multiple “persona’s” based on technology silos Incomplete, abandoned, or inaccurate profiles due to redundancy creates risk  Look for ways to federate, synchronize, or otherwise reduce number of user profiles Selling Into HealthcareCommunity CustomerInnovationCommunity DiversityCommunity
Automating profile updates can ease maintenance efforts by employees, increasing adoption Use Case #3: Automatic Social UpdatesLack of notice and consent can create privacy and HR issues My Profile #1 EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Vendor products are monitoring user activities and adding those actions to profiles without user intervention Restricted Access Unintended consequences can occur leading to HR-related issues such as diversity bias Activity Stream Activity Stream Public Access John Doe: Joined Community: “Selling Into Healthcare Community” John Doe: Joined Updated Wiki:“Best Ways To Respond To An RFP” John Doe: Joined Community: “Diversity Outreach Community” John Doe: Joined Community Forum: “It Gets Better Awareness Campaign” Include requirements for user-defined profile controls and management of profile updates from system activities/events DiversityCommunity Selling Into HealthcareCommunity
Use Case #4: Information LeakageOpen discourse can lead to sharing of inaccurate / sensitive data E-Mail Client ActivityStream Sender Name Subject My Profile #1 Micro-blogging / activity feeds are becoming a popular means of sharing information Sender Name Subject EMPLOYEE #: John Doe Activity Stream Activity Stream Activity Stream DEPT: JOB TITLE: EXPERTISE: Sender Name Subject Status update: xxxxxxxx Status update: xxxxxxxxx Status update: xxxxxxxxx Mike Jones: “Heading to the airport to meet with Company ABC on cross-selling biz deal” John Doe: “Working on a acquisition deal, need to work late tonight… stay tuned!” Fred Smith: “&#%^%$* we just lost Company XYZ account… Betty Smith: @Bob Jones that patient ID number is 123456789 Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace Sally Jones: I heard we might have a layoff by quarter end? David Brown: @SalesTeam I posted the new product discounting policy to the sales strategy community Mike Jones: “Does anyone know the best way to get an SOW processed in 2 days? I have an urgent need…” John Doe: “Hi, I’m a new remote employee – wondering who else is working in the marketing department!” Fred Smith: “Just figured out a workaround to a problem with our field group – ping me if interested…” Betty Smith: “We’re starting an innovation community on data quality – let me know if you’re interested” Bob Jones: “Does anyone know what IWE stands for?” Sally Jones: “Great article on social media risks http://xxxxxxx” David Brown: “@Sally, thx, we’re updating our policies now” COLLEAGUES: ACTIVITY STREAM Information shared in a public stream may be re-posted to profiles or other entities subscribing to that stream Public conversations or events published via other systems can create confidentiality and audit/archival concerns Policy, role, and rule-based approaches that create common treatments across applications are warranted
Use Case #5: Connected IdentitiesDisplay of public profiles can have unintended consequences Employee personal use of social media is becoming more commonplace E-Mail Client “ThePublicMe” Re: Partnering Opportunity Bill Smith Sent: Thu 03/01/11 To:     John Doe We’ve discussed the proposal and have decided to pass at this time… Sender Name Subject Sender Name Subject An increasing number of tools aggregate Facebook, LinkedIn & Twitter information to display in applications like e-Mail Sender Name Subject Mixing public and enterprise data can give a false sense of validity and context creating trust and privacy issues My Profile #1 “TheWorkMe” EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Examine how the public data is aggregated; re-visit consent issues; provide users with an opt-out option Jon Doe’s social datadisplayed here
Use Case #6: Oversight: Approved UseSanctioned use of social media can still require controls FINRA/SEC FTCGuidelines Regulatory and other policies can place enterprise constraints on use of social media  Notices &Disclaimers Name: Profile: Web Site: Listed SocialMedia Following Guidelines are often “gray” and leave use of many features open to interpretation regarding compliance EU PrivacyRegulations HIPAA Lists By Favorites Alternative clients, widgets, message notifications…  Message Types ,[object Object]
@ Messages
ReTweets
Direct MessagesConsumer and enterprise software providers often lack end-to-end capabilities  Combine a mix of policy, monitoring, audit, and tooling tactics to mitigate risks to an acceptable level Embedded Policy-based Management withexternal integrations (security, compliance…)
Use Case #7: Oversight: Personal UseWell-intentioned use may not excuse enterprise liability My Blog My LinkedIn Regulatory and other policies can also place constraints on personal use of social media  Employee As “Brand Ambassador” Profile ,[object Object]
Websites
SummaryThePublicMe Building a “personal brand” as an employee may seem like a worthwhile endeavor My YouTube My Twitter Status Updates & Activity Stream Third-Party Content &Applications Groups & Discussions Forums Enterprise policies or regulatory statutes may apply to personal use of social media, raising potential compliance concerns Jobs & Answers Contact Settings (Interested In…) Opportunities, Expertise Requests, Consulting Offers Re-visit policy, code of ethics, and social media guidelines. Educate employees on risks. Leverage monitoring tools. Alternative clients, widgets, message notifications…

More Related Content

What's hot

Social Is The Next Search 2010
Social Is The Next Search 2010Social Is The Next Search 2010
Social Is The Next Search 2010
Plínio Okamoto
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
Plínio Okamoto
 

What's hot (20)

Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
futurethink: Future of Social Networks
futurethink: Future of Social Networksfuturethink: Future of Social Networks
futurethink: Future of Social Networks
 
Nonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for GoogleNonprofit Knowledge Graph Proposal for Google
Nonprofit Knowledge Graph Proposal for Google
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020
 
Build Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationBuild Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective Communication
 
Smashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEOSmashing SIlos: UX is the New SEO
Smashing SIlos: UX is the New SEO
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change Initiatives
 
Understanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate AmericaUnderstanding the Value of On-Line Social Networks in Corporate America
Understanding the Value of On-Line Social Networks in Corporate America
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking Analysis
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software
 
Investor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a MustInvestor Relations & Social Media - To Rethink is a Must
Investor Relations & Social Media - To Rethink is a Must
 
Social Is The Next Search 2010
Social Is The Next Search 2010Social Is The Next Search 2010
Social Is The Next Search 2010
 
Final report
Final reportFinal report
Final report
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 

Similar to Social Media & Social Networking: A Cautionary Tale

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
STO STRATEGY
 
Social media rocketmatter
Social media rocketmatterSocial media rocketmatter
Social media rocketmatter
Natalie Alesi
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
STO STRATEGY
 
Presentation big data and social media final_video
Presentation big data and social media final_videoPresentation big data and social media final_video
Presentation big data and social media final_video
ramikaurraminder
 

Similar to Social Media & Social Networking: A Cautionary Tale (20)

Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business Issues
 
Social Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjurySocial Media, Employment, and Brain Injury
Social Media, Employment, and Brain Injury
 
#Legal social
#Legal social#Legal social
#Legal social
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Social media rocketmatter
Social media rocketmatterSocial media rocketmatter
Social media rocketmatter
 
Technow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk ManagementTechnow 2011 Presentation on Social Media Policies & Risk Management
Technow 2011 Presentation on Social Media Policies & Risk Management
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Presentation big data and social media final_video
Presentation big data and social media final_videoPresentation big data and social media final_video
Presentation big data and social media final_video
 
How Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social MediaHow Lawyers Can Harness the Power of Social Media
How Lawyers Can Harness the Power of Social Media
 
Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
 
Case Study Of RHEAL
Case Study Of RHEALCase Study Of RHEAL
Case Study Of RHEAL
 

More from Mike Gotta

Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity Final
Mike Gotta
 
H C I Business Relationships Learning Final
H C I  Business  Relationships  Learning  FinalH C I  Business  Relationships  Learning  Final
H C I Business Relationships Learning Final
Mike Gotta
 

More from Mike Gotta (9)

Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
 
Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking Architecting the Building Blocks of Enterprise Social Networking
Architecting the Building Blocks of Enterprise Social Networking
 
Enterprise social graph aii m final
Enterprise social graph aii m finalEnterprise social graph aii m final
Enterprise social graph aii m final
 
Driving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesDriving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative Technologies
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity Final
 
H C I Business Relationships Learning Final
H C I  Business  Relationships  Learning  FinalH C I  Business  Relationships  Learning  Final
H C I Business Relationships Learning Final
 
Bg Social Networks
Bg Social NetworksBg Social Networks
Bg Social Networks
 
Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The Edge
 
Global Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceGlobal Collaboration: Both Art & Science
Global Collaboration: Both Art & Science
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Social Media & Social Networking: A Cautionary Tale

  • 1. Social Media & Social Networking:A Cautionary Tale Michael Gotta Senior Technology Solutions ManagerEnterprise Social Software
  • 2. The Social Side Of The Internet 75% of respondents are active in some kind of voluntary group or organization 68% of respondents (internet users & non-users alike) said the internet has had a major impact on the ability of groups to communicate with members 60% of respondents said the internet has had a major impact on the ability of groups to connect with other groups 59% of respondents said the internet has had a major impact on the ability of groups to impact society at large 62% of respondents said that the internet has had a major impact on the ability of groups to draw attention to an issue 59% of respondents said the internet has had a major impact on the ability of groups to organize activities Source: Pew Internet http://www.pewinternet.org/Press-Releases/2011/Social-Side-of-the-Internet.aspx
  • 3. Social Networking & Social Media: Leverage new tools & literacies to enable new ways of working 3000 friends 100 fan pages 50 groups Has Own Channel Blogs Daily Following 325 Followers 915
  • 4. Organizations Face Internal TensionAn Unequivocal “Yes” Or “No” Is Often Not The Answer Scale organizational expertise Lack of policy-based management Improve business processes Weak identity assurance Break down silos and barriers Inadequate security controls Benefits Risks Catalyze employee engagement Questionable privacy protections Address generational shifts Misuse by employees Improve talent & learning initiatives Unanticipated data disclosure Satisfy technology expectations Potential for “social engineering”
  • 5. Leverage Use Case Scenarios: Shift The Discussion From “OR” to “AND” Observe and listen to employees, experts, and management regarding use of social tools Construct use case scenarios from those representative stories Identify decision and enforcement points where risks can be mitigated Plan, execute, adjust
  • 6. Use Case #1: “Social Claims”Profiles may be viewed as a trusted information source Employee profiles populated with information from trusted enterprise systems My “Enterprise Identity” Mike Gotta EMPLOYEE #: LABOR GRADE: COST CENTER: Additional information entered by employees regarding skills, interests, expertise, experience DEPT: GROUP: My “Claimed Identity” JOB TITLE: EXPERTISE: HOBBIES: Information viewed as “trusted” but claims are not verified which can lead to risk scenarios EDUCATION: INTERESTS: PERSONAL TAGS: COMMUNITIES: FOLLOWING: COLLEAGUES: Add fields to profile where data goes through vetting process; pre-populate profile with other credentialing information
  • 7. Use Case #2: Profile ProliferationMultiple profiles creates maintenance and data integrity issues My Primary Profile DiversityCommunity Profile Selling Into HealthcareCommunity Profile Customer InnovationCommunity Profile Profiles are becoming a common feature across many vendor products EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: EMPLOYEE #: Jane Doe Jane Doe Jane Doe Jane Doe DEPT: DEPT: DEPT: DEPT: JOB TITLE: JOB TITLE: JOB TITLE: JOB TITLE: EXPERTISE: EXPERTISE: EXPERTISE: EXPERTISE: COLLEAGUES: COLLEAGUES: COLLEAGUES: COLLEAGUES: PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS PERSONAL TAGS Employees create/maintain multiple “persona’s” based on technology silos Incomplete, abandoned, or inaccurate profiles due to redundancy creates risk Look for ways to federate, synchronize, or otherwise reduce number of user profiles Selling Into HealthcareCommunity CustomerInnovationCommunity DiversityCommunity
  • 8. Automating profile updates can ease maintenance efforts by employees, increasing adoption Use Case #3: Automatic Social UpdatesLack of notice and consent can create privacy and HR issues My Profile #1 EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Vendor products are monitoring user activities and adding those actions to profiles without user intervention Restricted Access Unintended consequences can occur leading to HR-related issues such as diversity bias Activity Stream Activity Stream Public Access John Doe: Joined Community: “Selling Into Healthcare Community” John Doe: Joined Updated Wiki:“Best Ways To Respond To An RFP” John Doe: Joined Community: “Diversity Outreach Community” John Doe: Joined Community Forum: “It Gets Better Awareness Campaign” Include requirements for user-defined profile controls and management of profile updates from system activities/events DiversityCommunity Selling Into HealthcareCommunity
  • 9. Use Case #4: Information LeakageOpen discourse can lead to sharing of inaccurate / sensitive data E-Mail Client ActivityStream Sender Name Subject My Profile #1 Micro-blogging / activity feeds are becoming a popular means of sharing information Sender Name Subject EMPLOYEE #: John Doe Activity Stream Activity Stream Activity Stream DEPT: JOB TITLE: EXPERTISE: Sender Name Subject Status update: xxxxxxxx Status update: xxxxxxxxx Status update: xxxxxxxxx Mike Jones: “Heading to the airport to meet with Company ABC on cross-selling biz deal” John Doe: “Working on a acquisition deal, need to work late tonight… stay tuned!” Fred Smith: “&#%^%$* we just lost Company XYZ account… Betty Smith: @Bob Jones that patient ID number is 123456789 Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace Sally Jones: I heard we might have a layoff by quarter end? David Brown: @SalesTeam I posted the new product discounting policy to the sales strategy community Mike Jones: “Does anyone know the best way to get an SOW processed in 2 days? I have an urgent need…” John Doe: “Hi, I’m a new remote employee – wondering who else is working in the marketing department!” Fred Smith: “Just figured out a workaround to a problem with our field group – ping me if interested…” Betty Smith: “We’re starting an innovation community on data quality – let me know if you’re interested” Bob Jones: “Does anyone know what IWE stands for?” Sally Jones: “Great article on social media risks http://xxxxxxx” David Brown: “@Sally, thx, we’re updating our policies now” COLLEAGUES: ACTIVITY STREAM Information shared in a public stream may be re-posted to profiles or other entities subscribing to that stream Public conversations or events published via other systems can create confidentiality and audit/archival concerns Policy, role, and rule-based approaches that create common treatments across applications are warranted
  • 10. Use Case #5: Connected IdentitiesDisplay of public profiles can have unintended consequences Employee personal use of social media is becoming more commonplace E-Mail Client “ThePublicMe” Re: Partnering Opportunity Bill Smith Sent: Thu 03/01/11 To: John Doe We’ve discussed the proposal and have decided to pass at this time… Sender Name Subject Sender Name Subject An increasing number of tools aggregate Facebook, LinkedIn & Twitter information to display in applications like e-Mail Sender Name Subject Mixing public and enterprise data can give a false sense of validity and context creating trust and privacy issues My Profile #1 “TheWorkMe” EMPLOYEE #: John Doe DEPT: JOB TITLE: EXPERTISE: COLLEAGUES: COMMUNITIES Examine how the public data is aggregated; re-visit consent issues; provide users with an opt-out option Jon Doe’s social datadisplayed here
  • 11.
  • 14. Direct MessagesConsumer and enterprise software providers often lack end-to-end capabilities Combine a mix of policy, monitoring, audit, and tooling tactics to mitigate risks to an acceptable level Embedded Policy-based Management withexternal integrations (security, compliance…)
  • 15.
  • 17. SummaryThePublicMe Building a “personal brand” as an employee may seem like a worthwhile endeavor My YouTube My Twitter Status Updates & Activity Stream Third-Party Content &Applications Groups & Discussions Forums Enterprise policies or regulatory statutes may apply to personal use of social media, raising potential compliance concerns Jobs & Answers Contact Settings (Interested In…) Opportunities, Expertise Requests, Consulting Offers Re-visit policy, code of ethics, and social media guidelines. Educate employees on risks. Leverage monitoring tools. Alternative clients, widgets, message notifications…
  • 18. Social network analysis is used to identify relation structures between people Use Case #8: Deciphering RelationshipsSocial analytics can identify patterns that thwart policies R&DDept. Ideation Community Access to social analytics is becoming more widespread, available to all end users in some cases Unfettered analysis of social data can lead to accidental or intentional abuse as well as social engineering attacks Business DevelopmentTeam Ensure social analytic tools include access controls, audit trails, and policy support to limit capabilities Node20 Node24 Node19 Node21 Node22 Node 23 Node18 Node14 Node13 Node15 Node16 Node17 Node 2 Node 4 Node5 Node6 Node 9 Node 8 Node12 Node11 Node10 Node 1 Node 3 Node 7
  • 19. People Definea governance model that make sense; ensure enforcement is visible Balanced privacy considerations (enterprise and employee) Create feedback loops for employee ideas and concerns Process Update policies, terms of use, and code of ethics; consider specific guidelines for social media and social networking Make sure you have end-to-end processes with defined roles, responsibilities, and metrics in place for assessing risks – prioritize employee communication Audit data handling procedures to ensure proper management of social data Technology Adopt a “platform approach” towards social media and social networking Make embedded policy-based management services a priority capability Favor platforms that integrate with security, identity, and compliance systems Recommendations
  • 20. Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach Identity and security needs should be viewed just as positively as goals for openness and transparency A decision-making framework and governance model is an essential component of any strategy; policies and procedures need to focus on the human element and avoid technology as a panacea Adopt a platform approach – prioritize solutions with embedded policy management and strong integration capabilities IT teams that should be viewed as key stakeholders include: Groups responsible for CRM, collaboration, content, and community efforts Identity management and security groups Information (records) management and business intelligence groups Summary
  • 21.
  • 22. What role is there for privacy? What “controls” should be afforded to “owners” of one’s own social data?
  • 23. Should we record things when we don’t have to?
  • 24. Is automating the aggregation of information and correlating it sometimes “wrong” without consent?
  • 25.