SlideShare uma empresa Scribd logo
1 de 93
Jesse Wilkins, CRM, Information Certified
       Director, Systems of Engagement
                       AIIM International
   Introduction
   Review of relevant social technologies and
    use cases
   The social business roadmap
   Applying the social business roadmap to your
    organization
   Social media governance




                                               2
3
Era      Mainframe      Mini        PC       Internet    ???

                       Systems of Record
            1960-        1975-      1992-      2001-      2010-
 Years
            1975         1992       2001       2009       2015

 Typical                              A
            A batch     A dept                 A web
  thing                            documen                 ???
             trans      process                page
managed                               t

  Best                   Digital
 known       IBM        Equipme    Microsoft   Google      ???
company                    nt

Content
                         Image     Docume      Content
 mgmt      Microfilm                                       ???
                         Mgmt      nt Mgmt      Mgmt
 focus



                                                                  4
Systems of Record

Command and control


 Transaction-oriented


     Data-centric


  User learns system

 Security is key issue


                                                          5
                         Source = AIIM and TCG Advisors
“A new class of company is
emerging—one that uses
collaborative Web 2.0
technologies intensively to
connect the internal efforts of
employees and to extend the
organization’s reach to
customers, partners, and
suppliers.
We call this new kind of
company the networked
enterprise.”

                                  6
Systems of Engagement
                                                         Social and
  Era      Mainframe     Mini        PC       Internet
                                                           Cloud
                            Systems of Record
            1960-       1975-      1992-      2001-       2010-
 Years
            1975        1992       2001       2009        2015

 Typical                             A                      An
            A batch    A dept                 A web
  thing                           documen                interacti
             trans     process                page
managed                              t                      on
  Best                  Digital
                                                         Faceboo
 known       IBM       Equipme    Microsoft   Google
                                                            k
company                   nt
Content                                                   Social
                        Image     Docume      Content
 mgmt      Microfilm                                     Business
                        Mgmt      nt Mgmt      Mgmt
 focus                                                   Systems



                                                                  7
Systems of Record    Systems of Engagement

  Command and             Open and
      control             accessible
   Transaction-
                     Interaction-oriented
     oriented

Document-centric         User-centric

                         Ubiquitous
Limited deployment
                         deployment
    Central IT-
                       Self-provisioned
    provisioned


                                             8
Consideration         Systems of Record           Systems of Engagement

Focus                 Transactions                Interactions

Governance            Command & Control           Collaboration

Core Elements         Facts & Commitments         Ideas & Nuances

Value                 Single Source of Truth      Discovery & Dialog

Standard              Accurate & Complete         Immediate & Accessible

Content               Authored                    Communal

Primary Record Type   Documents                   Conversations

Searchability         Easy                        Hard

Usability             User is trained             User “knows”

Accessibility         Regulated & Contained       Ad Hoc & Open

Retention             Permanent                   Transient

Policy Focus          Security (Protect Assets)   Privacy (Protect Users)
                                                                            9
   Introduction
   Review of relevant social technologies and
    use cases
   The social business roadmap
   Applying the social business roadmap to your
    organization
   Social media governance




                                               10
Blogs




        11
 Internal announcements
 External announcements and press
  releases
 Project documentation
 Knowledge management
 Any broadcast-type communications




                                      12
Provide project updates




                          13
Provide organizational updates




                                 14
   “It is part text messaging and part
    blogging, with the ability to update on your
    cell phone or computer, but constrained to
    140 characters.”




   -- Ari Herzog, Ariwriter.com
                                                   15
                                                        15
16
17
18
19
     19
Source: Stewart Mader, www.ikiw.org
                                      20
Create agenda and minutes




                            21
22
23
24
25
26
Keep in touch




                27
Network and announce events




                              28
Share information




                    29
Find your next job




                     30
Respond to crises




                    31
Do answers to questions generally come from expected or unexpected sources?

                                        0%   5% 10% 15% 20% 25% 30% 35% 40% 45% 50%                      38% of
                                                                                                    organizations get
Almost entirely from expected sources
                                                                                                     half or more of
        Mostly from expected sources
                                                                                                      answers from
                                                                                                       unexpected
Equally from expected and unexpected
                                                                                                        sources.
              sources

     Mostly from unexpected sources

     Almost entirely from unexpected
                 sources




                                                                 N=90 Q&A users , excl. 22 Don’t Knows
                                                                                                                32
                                                    ©AIIM 2011
Our open innovation platform has been successful at: (Check all that apply)

                                        0%   10%   20%   30%     40%   50%    60%     70%      48% have surfaced
 Coming up with minor changes to our                                                            major changes to
          internal processes                                                                   internal processes
 Coming up with major changes to our                                                              through their
          internal processes                                                                    open innovation
 Coming up with minor changes to our                                                                platform.
          external offerings

 Coming up with major changes to our
          external offerings
                                                                                               34% have come up
                                                                                                  with major
                    Improving morale
                                                                                                   changes to
                                                                                               external offerings.
                        None of these




                                                                       N=84 Innovation users
                                                                                                            33
                                                    ©AIIM 2011
Before/after the social infrastructure was in place, how well did/do the Sales and
Marketing staff:
                                 % of Organizations “Poorly ” or “Very Poorly”
                                      0%   5%   10% 15% 20% 25% 30% 35% 40% 45%                          Poor sharing of
                                                                                                           knowledge
  Share knowledge and information?
                                                                                                         dropped from
                                                                              Before
                                                                                                           41% to 8%
                                                                              After
     Work together to execute basic                                                                  Poor working
           business processes?
                                                                                                   together dropped
                                                                                                         from
Communicate important updates and                                                                     21% to 4%
   new information to each other?




                                                                N=58 users, “Poorly ” or “Very Poorly”                34
                                                       ©AIIM 2011
   Introduction
   Review of relevant social technologies and
    use cases
   The social business roadmap
   Applying the social business roadmap to your
    organization
   Social media governance




                                               35
36
37
   Describes steps to
    implement social business
   NOT necessarily linear
   Will vary substantially
    between organizations




                                38
   Not a step in the roadmap, but necessary
    precursor to successful social business
    initiatives
    ◦ Transparency
    ◦ Trust
    ◦ Technology




                                               39
◦ Requires that the organization move from a culture
  of knowledge hoarding to one of knowledge
  sharing.




                                                   40
Requires that the organization trust its users to do what
is right, while supporting them with the training and
governance required for them to be accountable for that
trust.




                                                       41
Requires willingness to allow employees to experiment
with new tools and processes, trusting that they will not
abuse them and permitting them to “fail fast.”




                                                       42
   Experimental use of technologies
   “Under the radar”
   Proof of concept




                                       43
   Formalization of approach
   Social business assessment
   Planning and project management
   Internal marketing and communication
   Social business team
   Organization-specific
    roadmap




                                           44
   Identify desired capabilities and deployment
    options
   Procure and implement tools
   Develop and deliver
    training and support
   Build integration




                                              45
Source: Govloop.com

                      46
47
   Listen to conversations before jumping into
    them
   Look for tone and sentiment
   Watch for complaints
   Set up queries and alerts
   Empower community
    managers




                                              48
49
50
   Seed content into tools
   Use the tools!
   Consistent messaging across tools
   Be patient




                                        51
52
   Move from listening and broadcasting to
    engagement
   Plan for engagement
   Authenticity and personality key




                                              53
54
   The US Air Force’s
    Rules of Engagement
    for Blogging




                          55
56
   Policies and guidelines
   Restrictions on tools and content
   Internal monitoring
   Records management
   Legal issues




                                        57
58
59
60
   Encourage uptake of the tools
   Monitor efficacy of tools
   Measure and analyze tools and processes
   Identify changes to tools
    and new tools




                                              61
   Introduction
   Review of relevant social technologies and
    use cases
   The social business roadmap
   Applying the social business roadmap to your
    organization
   Social media governance




                                              62
   Strategy assessment
   Technology assessment
   External brand assessment
   Culture assessment
   Process assessment
   Governance assessment




                                63
   What are the goals and objectives?
   Who are the stakeholders?
   What are competitors doing?
   Who and where are the target audiences?




                                              64
   Is the organization already using social
    technologies?
    ◦ Commercial
    ◦ External
    ◦ Internal
   Are there any unofficial/unsanctioned
    implementations?
   Are there tools the organization wants to use
    but isn’t yet?


                                                65
   Are there unofficial accounts in place on
    commercial services?
   Are there any undesired accounts in place?
    ◦ Parody
    ◦ Complaint
   Does the organization have a way to monitor
    sentiment?




                                                 66
   Is the organization collaborative, open, and
    sharing?
   Are there incentives or disincentives for
    innovation?
   Does the organization restrict access to sites?




                                                 67
   Do any existing business processes use social
    technologies?
   What processes are likely candidates for
    social business applications?




                                               68
   Is there a social media policy in place?
   Are employees trained on it?
   Are there employees with dedicated
    governance responsibilities?




                                               69
70
   Introduction
   Review of relevant social technologies and
    use cases
   The social business roadmap
   Applying the social business roadmap to your
    organization
   Social media governance




                                               71
By the end of 2013, half of all
companies will have been asked
to produce material from social
media websites for e-discovery.

  Source: “Social Media Governance: An Ounce of
Prevention”, Gartner



                                                  72
Is a Facebook “like” a record?




                                 73
Prohibition is not realistic
                               74
   Ensures that employees know what is
    expected of them
   Provides guidelines for being more effective
   Reduces risk of someone posting
    inappropriate content
   Addresses legal and operational concerns




                                              75
   Determines overall strategic goals of
    organization
   Provides support for social media
    initiative(s)
   Determines need for policy guidance
   Determines need for enterprise solutions
   Supports – or doesn’t – transformation
    efforts


                                               76
   Governance roles required to ensure
    compliance with the framework
   Includes usual suspects…
   Also includes new roles
    ◦ Social media strategist
    ◦ Community managers
    ◦ Moderators




                                          77
   Social content is just another form of
    content
   Policy should provide a framework
    applicable to most or all social media tools
    – and to other content/communication-
    related technologies as well
   DON’T write a Facebook policy, a Twitter
    policy, etc.



                                                   78
Official vs. unofficial
Link to social media policy
                              79
Creation of official accounts




                                80
   Account details
    ◦   User name
    ◦   Picture
    ◦   Corporate logo usage
    ◦   Bio
    ◦   Contact information
   Friends/buddies/contacts
   Groups/fans/likes



                               81
   Whether posts will require approval
   Pictures and video
    ◦ By the organization
    ◦ By third parties
   Links (i.e. “sharing”)
   Applications and widgets
   Likes, retweets, etc.




                                          82
   Access to personal accounts using
    organizational resources
    (time, computers, network, etc.)
   Access to sites using personal devices
    (iPhone, tablet, etc.)




                                             83
   Acceptable and unacceptable groups
   Perception of approval




                                         84
   Offensive content
   Disparagement of the organization – or of
    competitors or others
   Slander or libel
   Sexual content
   Solicitations of commerce
   Threats
   Illegal activity
   Violation of copyright

                                                85
   Personnel-related information
   Financial information
   Confidential information
   Health information
   If you wouldn’t post it to your website or
    send via email, don’t post to FB or send via
    Twitter.




                                               86
Monitoring and reviewing comments
                                    87
   Whether the account is monitored for
    actionable content (screenshot)




               Public records
         Monitoring for public safety      88
   Conduct your own social media assessment
   Review/update/create social media
    governance framework
   Develop your own organization-specific
    roadmap
   Implement social business
    effectively, responsibly, and in a way that
    supports the goals of the business



                                                  89
90
Jesse Wilkins, CRM, Information Certified
Director, Systems of Engagement
AIIM International
      +1 (303) 574-0749 direct
      jwilkins@aiim.org
      http://www.twitter.com/jessewilkins
      http://www.linkedin.com/in/jessewilkins
      http://www.facebook.com/jessewilkins
      http://www.slideshare.net/jessewilkins


                                                91
   Available under Creative
    Commons – you can add to
    and expand




   www.aiim.org/roadmap




                               92
   2-day instructor-led or online course
   Includes:
    ◦ Specific governance elements for
      Facebook, Twitter, other social business tools
    ◦ Commercial vs. enterprise social technologies
    ◦ Capturing and managing social content
   Some courses live now, entire program live by
    Dec 2011
    http://www.aiim.org/Training/Essential%20Tr
    aining/Social-Media/Course%20Descriptions

                                                       93

Mais conteúdo relacionado

Mais procurados

2013 global security report
2013 global security report2013 global security report
2013 global security report
Yury Chemerkin
 
Wall street journal 22 sept 10 - perspectives on risk it
Wall street journal 22 sept 10  - perspectives on risk itWall street journal 22 sept 10  - perspectives on risk it
Wall street journal 22 sept 10 - perspectives on risk it
Messiernl
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
fphart
 
Virtualworks - Ebook
Virtualworks - EbookVirtualworks - Ebook
Virtualworks - Ebook
trulsjeppe
 

Mais procurados (20)

2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
2013 global security report
2013 global security report2013 global security report
2013 global security report
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
 
McAfee and AIIM Task Force Findings
McAfee and AIIM Task Force FindingsMcAfee and AIIM Task Force Findings
McAfee and AIIM Task Force Findings
 
Wall street journal 22 sept 10 - perspectives on risk it
Wall street journal 22 sept 10  - perspectives on risk itWall street journal 22 sept 10  - perspectives on risk it
Wall street journal 22 sept 10 - perspectives on risk it
 
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
 
Thinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensThinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social Lens
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
What does it take to engage employees and customers?
What does it take to engage employees and customers?What does it take to engage employees and customers?
What does it take to engage employees and customers?
 
THE 5 CHALLENGES
THE 5 CHALLENGESTHE 5 CHALLENGES
THE 5 CHALLENGES
 
The Best Analytics Tools
The Best Analytics ToolsThe Best Analytics Tools
The Best Analytics Tools
 
Cloud Computing in 3-D
Cloud Computing in 3-DCloud Computing in 3-D
Cloud Computing in 3-D
 
The ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologiesThe ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologies
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Virtualworks - Ebook
Virtualworks - EbookVirtualworks - Ebook
Virtualworks - Ebook
 
Cloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance DirectorCloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance Director
 
XEN App
XEN AppXEN App
XEN App
 

Semelhante a 20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization

Communication Collaboration Mobility Presentation Stn 2 24 11
Communication Collaboration Mobility Presentation   Stn 2 24 11Communication Collaboration Mobility Presentation   Stn 2 24 11
Communication Collaboration Mobility Presentation Stn 2 24 11
mcini
 

Semelhante a 20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization (20)

How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
Content Opportunities in Revolutionary Times
Content Opportunities in Revolutionary TimesContent Opportunities in Revolutionary Times
Content Opportunities in Revolutionary Times
 
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to Know
 
Information opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesInformation opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologies
 
Big data and big content
Big data and big contentBig data and big content
Big data and big content
 
20111206 AIIM Cornhusker Social Media Governance
20111206 AIIM Cornhusker Social Media Governance20111206 AIIM Cornhusker Social Media Governance
20111206 AIIM Cornhusker Social Media Governance
 
IBM Social Business Development for CXOs
IBM Social Business Development for CXOsIBM Social Business Development for CXOs
IBM Social Business Development for CXOs
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
Info360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John ManciniInfo360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John Mancini
 
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social business
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social businessLotusphere 2012: AD105 - Use IBM Domino and Xpages for your social business
Lotusphere 2012: AD105 - Use IBM Domino and Xpages for your social business
 
Staying Productive with Social Streams
Staying Productive with Social StreamsStaying Productive with Social Streams
Staying Productive with Social Streams
 
Selling Document Management to the Mid Market
Selling Document Management to the Mid MarketSelling Document Management to the Mid Market
Selling Document Management to the Mid Market
 
53 huddle noah sf 2012
53 huddle noah sf 201253 huddle noah sf 2012
53 huddle noah sf 2012
 
Communication Collaboration Mobility Presentation Stn 2 24 11
Communication Collaboration Mobility Presentation   Stn 2 24 11Communication Collaboration Mobility Presentation   Stn 2 24 11
Communication Collaboration Mobility Presentation Stn 2 24 11
 
Information Management on Mobile Steroids
Information Management on Mobile SteroidsInformation Management on Mobile Steroids
Information Management on Mobile Steroids
 
Lotusphere 2012 AD105
Lotusphere 2012 AD105Lotusphere 2012 AD105
Lotusphere 2012 AD105
 
Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011
 
Quantix virtualisation case study
Quantix virtualisation case studyQuantix virtualisation case study
Quantix virtualisation case study
 
Web Governance: Where Strategy Meets Structure
Web Governance: Where Strategy Meets StructureWeb Governance: Where Strategy Meets Structure
Web Governance: Where Strategy Meets Structure
 

Mais de Jesse Wilkins

Mais de Jesse Wilkins (20)

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization

  • 1. Jesse Wilkins, CRM, Information Certified Director, Systems of Engagement AIIM International
  • 2. Introduction  Review of relevant social technologies and use cases  The social business roadmap  Applying the social business roadmap to your organization  Social media governance 2
  • 3. 3
  • 4. Era Mainframe Mini PC Internet ??? Systems of Record 1960- 1975- 1992- 2001- 2010- Years 1975 1992 2001 2009 2015 Typical A A batch A dept A web thing documen ??? trans process page managed t Best Digital known IBM Equipme Microsoft Google ??? company nt Content Image Docume Content mgmt Microfilm ??? Mgmt nt Mgmt Mgmt focus 4
  • 5. Systems of Record Command and control Transaction-oriented Data-centric User learns system Security is key issue 5 Source = AIIM and TCG Advisors
  • 6. “A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers. We call this new kind of company the networked enterprise.” 6
  • 7. Systems of Engagement Social and Era Mainframe Mini PC Internet Cloud Systems of Record 1960- 1975- 1992- 2001- 2010- Years 1975 1992 2001 2009 2015 Typical A An A batch A dept A web thing documen interacti trans process page managed t on Best Digital Faceboo known IBM Equipme Microsoft Google k company nt Content Social Image Docume Content mgmt Microfilm Business Mgmt nt Mgmt Mgmt focus Systems 7
  • 8. Systems of Record Systems of Engagement Command and Open and control accessible Transaction- Interaction-oriented oriented Document-centric User-centric Ubiquitous Limited deployment deployment Central IT- Self-provisioned provisioned 8
  • 9. Consideration Systems of Record Systems of Engagement Focus Transactions Interactions Governance Command & Control Collaboration Core Elements Facts & Commitments Ideas & Nuances Value Single Source of Truth Discovery & Dialog Standard Accurate & Complete Immediate & Accessible Content Authored Communal Primary Record Type Documents Conversations Searchability Easy Hard Usability User is trained User “knows” Accessibility Regulated & Contained Ad Hoc & Open Retention Permanent Transient Policy Focus Security (Protect Assets) Privacy (Protect Users) 9
  • 10. Introduction  Review of relevant social technologies and use cases  The social business roadmap  Applying the social business roadmap to your organization  Social media governance 10
  • 11. Blogs 11
  • 12.  Internal announcements  External announcements and press releases  Project documentation  Knowledge management  Any broadcast-type communications 12
  • 15. “It is part text messaging and part blogging, with the ability to update on your cell phone or computer, but constrained to 140 characters.”  -- Ari Herzog, Ariwriter.com 15 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19 19
  • 20. Source: Stewart Mader, www.ikiw.org 20
  • 21. Create agenda and minutes 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. 26
  • 28. Network and announce events 28
  • 30. Find your next job 30
  • 32. Do answers to questions generally come from expected or unexpected sources? 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 38% of organizations get Almost entirely from expected sources half or more of Mostly from expected sources answers from unexpected Equally from expected and unexpected sources. sources Mostly from unexpected sources Almost entirely from unexpected sources N=90 Q&A users , excl. 22 Don’t Knows 32 ©AIIM 2011
  • 33. Our open innovation platform has been successful at: (Check all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 48% have surfaced Coming up with minor changes to our major changes to internal processes internal processes Coming up with major changes to our through their internal processes open innovation Coming up with minor changes to our platform. external offerings Coming up with major changes to our external offerings 34% have come up with major Improving morale changes to external offerings. None of these N=84 Innovation users 33 ©AIIM 2011
  • 34. Before/after the social infrastructure was in place, how well did/do the Sales and Marketing staff: % of Organizations “Poorly ” or “Very Poorly” 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Poor sharing of knowledge Share knowledge and information? dropped from Before 41% to 8% After Work together to execute basic Poor working business processes? together dropped from Communicate important updates and 21% to 4% new information to each other? N=58 users, “Poorly ” or “Very Poorly” 34 ©AIIM 2011
  • 35. Introduction  Review of relevant social technologies and use cases  The social business roadmap  Applying the social business roadmap to your organization  Social media governance 35
  • 36. 36
  • 37. 37
  • 38. Describes steps to implement social business  NOT necessarily linear  Will vary substantially between organizations 38
  • 39. Not a step in the roadmap, but necessary precursor to successful social business initiatives ◦ Transparency ◦ Trust ◦ Technology 39
  • 40. ◦ Requires that the organization move from a culture of knowledge hoarding to one of knowledge sharing. 40
  • 41. Requires that the organization trust its users to do what is right, while supporting them with the training and governance required for them to be accountable for that trust. 41
  • 42. Requires willingness to allow employees to experiment with new tools and processes, trusting that they will not abuse them and permitting them to “fail fast.” 42
  • 43. Experimental use of technologies  “Under the radar”  Proof of concept 43
  • 44. Formalization of approach  Social business assessment  Planning and project management  Internal marketing and communication  Social business team  Organization-specific roadmap 44
  • 45. Identify desired capabilities and deployment options  Procure and implement tools  Develop and deliver training and support  Build integration 45
  • 47. 47
  • 48. Listen to conversations before jumping into them  Look for tone and sentiment  Watch for complaints  Set up queries and alerts  Empower community managers 48
  • 49. 49
  • 50. 50
  • 51. Seed content into tools  Use the tools!  Consistent messaging across tools  Be patient 51
  • 52. 52
  • 53. Move from listening and broadcasting to engagement  Plan for engagement  Authenticity and personality key 53
  • 54. 54
  • 55. The US Air Force’s Rules of Engagement for Blogging 55
  • 56. 56
  • 57. Policies and guidelines  Restrictions on tools and content  Internal monitoring  Records management  Legal issues 57
  • 58. 58
  • 59. 59
  • 60. 60
  • 61. Encourage uptake of the tools  Monitor efficacy of tools  Measure and analyze tools and processes  Identify changes to tools and new tools 61
  • 62. Introduction  Review of relevant social technologies and use cases  The social business roadmap  Applying the social business roadmap to your organization  Social media governance 62
  • 63. Strategy assessment  Technology assessment  External brand assessment  Culture assessment  Process assessment  Governance assessment 63
  • 64. What are the goals and objectives?  Who are the stakeholders?  What are competitors doing?  Who and where are the target audiences? 64
  • 65. Is the organization already using social technologies? ◦ Commercial ◦ External ◦ Internal  Are there any unofficial/unsanctioned implementations?  Are there tools the organization wants to use but isn’t yet? 65
  • 66. Are there unofficial accounts in place on commercial services?  Are there any undesired accounts in place? ◦ Parody ◦ Complaint  Does the organization have a way to monitor sentiment? 66
  • 67. Is the organization collaborative, open, and sharing?  Are there incentives or disincentives for innovation?  Does the organization restrict access to sites? 67
  • 68. Do any existing business processes use social technologies?  What processes are likely candidates for social business applications? 68
  • 69. Is there a social media policy in place?  Are employees trained on it?  Are there employees with dedicated governance responsibilities? 69
  • 70. 70
  • 71. Introduction  Review of relevant social technologies and use cases  The social business roadmap  Applying the social business roadmap to your organization  Social media governance 71
  • 72. By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery. Source: “Social Media Governance: An Ounce of Prevention”, Gartner 72
  • 73. Is a Facebook “like” a record? 73
  • 74. Prohibition is not realistic 74
  • 75. Ensures that employees know what is expected of them  Provides guidelines for being more effective  Reduces risk of someone posting inappropriate content  Addresses legal and operational concerns 75
  • 76. Determines overall strategic goals of organization  Provides support for social media initiative(s)  Determines need for policy guidance  Determines need for enterprise solutions  Supports – or doesn’t – transformation efforts 76
  • 77. Governance roles required to ensure compliance with the framework  Includes usual suspects…  Also includes new roles ◦ Social media strategist ◦ Community managers ◦ Moderators 77
  • 78. Social content is just another form of content  Policy should provide a framework applicable to most or all social media tools – and to other content/communication- related technologies as well  DON’T write a Facebook policy, a Twitter policy, etc. 78
  • 79. Official vs. unofficial Link to social media policy 79
  • 80. Creation of official accounts 80
  • 81. Account details ◦ User name ◦ Picture ◦ Corporate logo usage ◦ Bio ◦ Contact information  Friends/buddies/contacts  Groups/fans/likes 81
  • 82. Whether posts will require approval  Pictures and video ◦ By the organization ◦ By third parties  Links (i.e. “sharing”)  Applications and widgets  Likes, retweets, etc. 82
  • 83. Access to personal accounts using organizational resources (time, computers, network, etc.)  Access to sites using personal devices (iPhone, tablet, etc.) 83
  • 84. Acceptable and unacceptable groups  Perception of approval 84
  • 85. Offensive content  Disparagement of the organization – or of competitors or others  Slander or libel  Sexual content  Solicitations of commerce  Threats  Illegal activity  Violation of copyright 85
  • 86. Personnel-related information  Financial information  Confidential information  Health information  If you wouldn’t post it to your website or send via email, don’t post to FB or send via Twitter. 86
  • 88. Whether the account is monitored for actionable content (screenshot) Public records Monitoring for public safety 88
  • 89. Conduct your own social media assessment  Review/update/create social media governance framework  Develop your own organization-specific roadmap  Implement social business effectively, responsibly, and in a way that supports the goals of the business 89
  • 90. 90
  • 91. Jesse Wilkins, CRM, Information Certified Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins 91
  • 92. Available under Creative Commons – you can add to and expand  www.aiim.org/roadmap 92
  • 93. 2-day instructor-led or online course  Includes: ◦ Specific governance elements for Facebook, Twitter, other social business tools ◦ Commercial vs. enterprise social technologies ◦ Capturing and managing social content  Some courses live now, entire program live by Dec 2011 http://www.aiim.org/Training/Essential%20Tr aining/Social-Media/Course%20Descriptions 93

Notas do Editor

  1. Slide 1: Title SlideInsert the ARMA approved title for your session (this title can be found in your contract or by visiting http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm Click on My Program Details for your finalized title.)Insert the facilitator’s name.If you choose, insert the facilitator’s job title and company name.Insert the Education Code. This also can be found on the website at: http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm
  2. Slide 2: Learning ObjectivesThe second slide of your presentation must be your ARMA approved learning objectives.(These learning objectives can be found in your contract or by visiting http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm)
  3. During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
  4. 1518We have spent the past several decades of IT investment focused on deploying 'systems of record.'  Transaction systems for global commerce . . . Financials, Order Processing, Inventory, HR, CRM, Supply Chain . . .Mainframes, minis, client-server, PC, Internet-enabled, SaaSDrove three decades of investmentData centers everywhereDatabases, OLTP, reporting and analyticsNetwork as a transport mechanismThese systems accomplished two important things: First, they centralized, standardized, and automated business transactions on a global basis, thereby better enabling world trade.  Second, they gave top management a global view of the state of the business, thereby better enabling global business management.   Spending on the Enterprise Content Management technologies that are at the core of Systems of Record will continue -- and will actually expand as these solutions become more available and relevant to small and mid-sized organizations
  5. 1050“A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers. We call this new kind of company the networked enterprise.”
  6. The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
  7. The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation.
  8. Slide 2: Learning ObjectivesThe second slide of your presentation must be your ARMA approved learning objectives.(These learning objectives can be found in your contract or by visiting http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm)
  9. Not just Twitter, but since it is by far the most successful at this point the examples for the first two sections will largely focus on it.
  10. Wikis are another really common example of Web 2.0 tools. Whereas blogs are designed for one-way broadcast-type communications, wikis are genuinely collaborative tools. The most well-known example of this is Wikipedia, the encyclopedia that anyone can edit. As I noted earlier Wikipedia includes more than 13 million articles in 260+ languages. Compare this with the EncyclopediaBrittanica, which includes some 65,000 articles in its 35-volume set. Wikis make it easy to collaborate on a particular document or deliverable – click Edit, make your changes, click Save or Publish. Changes are tracked to the individual character level, and for private wikis, can be integrated into your Active Directory or identity infrastructure so as to prohibit anonymous changes.
  11. Social sharing tools, as the name suggests, are tools useful for sharing particular types of content. The most well-known ones include YouTube, for sharing video; Flickr, for sharing photographs; Delicious, for sharing bookmarks; Box.net, for sharing files; and Slideshare, for sharing presentations and other documents. I will be posting this presentation to my Slideshare account later this week. Here is a screenshot of YouTube. You can see some of the social aspects of Youtube here, including ratings; the ability to mark it as a favorite; the ability to subscribe to updates either of the video or by the author; and the ability to share a video in a number of ways including sending a link or embedding it directly in another web application such as a blog or Facebook. Users can also comment on individual videos via text or by posting video responses. Most of the other social sharing tools offer similar capabilities. [twitter]Screenshot of YouTube as example of social sharing tool. Others include Box.net, Slideshare, Delicious, and Flickr.[/twitter]
  12. It’s LinkedIn (and other websites like it, like Plaxo)….
  13. Keep in touch with remote offices, colleagues, and even familyNetworking - personal, professional, career
  14. Learn new things. Lots of what folks post day-in and day-out is trivial. Then again, so is the RECMGMT-L listserv – and yet how many of you are on that and swear by the value you receive from it?
  15. 80% of companies use social media for recruitment – 95% use LinkedIn. And every recruiter and HR manager does due diligence on candidates using Google – and the top links for many are their profiles on LinkedIn, Facebook, etc.
  16. Because information can be easily augmented with photos, videos, and links
  17. Slide 2: Learning ObjectivesThe second slide of your presentation must be your ARMA approved learning objectives.(These learning objectives can be found in your contract or by visiting http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm)
  18. 1542: Question: What are the prerequisites for Social Business?0. Empowerment: personal projects, measure outcomes, freedom to experiment- Transparency requires that the organization move from a culture of knowledge hoarding to one of knowledge sharing.- Trust requires that the organization trust its users to do what is right, while supporting them with the training and governance required for them to be accountable for that trust.- And technology requires willingness to allow employees to experiment with new tools and processes, trusting that they will not abuse them and permitting them to “fail fast.”
  19. 1549
  20. Identifying what tools to use – here, wiki, blog, user ratings of appsSetting up navigation and classificationDeploying social sharing widgets (which ones, how)
  21. 1551 Monitoring/Listening: Viral implementationInitially the organization should spend time listening to the conversations taking place in and around a particular tool to get a sense of the nature of the tool, the content of the conversations, the target audiences, and who the leading participants are.This is perhaps more visible in externally focused processes but is important for internal ones as well.QUESTION: How do you support a viral adoption? Answer: rumors, communication, ambassadors, show people, show benefits- 4.1 Listen to internal sites and comments- 4.2 Listen to external sites and comments- 4.3 Set up queries and alerts- 4.4 Empower community managers
  22. http://www.onesocialmedia.com/2011/02/social-media-listening-in-real-time-case-study-toyota-of-des-moines/Social Media account manager was lucky enough to have seen this post only 5 minutes after it had been posted. Because the Facebook post was fairly recent, I decided to call someone at Toyota of Des Moines. I wanted to see if they could find the displeased customer before she left the dealership, in hopes that they could try to work through the issue with her in person. As luck would have it, the customer was still at the dealership at the time that I called to inform them of the post. They were able to talk with her, to let her know that they saw her Facebook post, and that they wanted to work through the issue with her. 
  23. 1553. Participation: Getting all relevant people to get involvedOnce the organization has done some listening it will be able to participate more meaningfully and should begin doing so according to what it has learned about the target market and the nature of the conversations on the various tools.QUESTION: How do you get all relevant people involved? Answer: Demonstrate benefits, carrot/stick, etc.- 5.1 Seed content into the tools5.2 Ensure consistent messaging across platformsAnd split this step into stages; e.g first get people to register
  24. Move from listening and broadcasting to engagementPlan for engagementTriage for comments, external mentionsEngagement on public, commercial, and third-party sitesAuthenticity and personality
  25. 1559 CNN iReporterhttp://ireport.cnn.com/community/assignmentCNN’s iReport assignment desk is an example of community evolution of technology and communication. Eachday and throughout the day as news breaks, the editors of the iReport page put up assignments to the citizenjournalists to help get real and participatory news live from wherever in the world it is happening. They haveembraced the evolution of technology by asking for submissions as the technology evolves and connecting itwith social media through hashtags on Twitter.This creates additional conversation around not only contributions, but the delivery medium itself. Those noteven connected to CNN are able to participate in the conversation because it is being held at the widest possibledistribution point or audience, out in the open on social media streams.
  26. 1610
  27. This is an example of a guideline for how to engage those that comment on your social media, and those that post or comment on third party sites. This triage chart from the American Society of Chemical Engineers is not for every user in the organization, but it can be quite useful for those responsible for monitoring and engaging comments about the organization such as public affairs.
  28. 1604
  29. Slide 2: Learning ObjectivesThe second slide of your presentation must be your ARMA approved learning objectives.(These learning objectives can be found in your contract or by visiting http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm)
  30. Slide 2: Learning ObjectivesThe second slide of your presentation must be your ARMA approved learning objectives.(These learning objectives can be found in your contract or by visiting http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm)
  31. The first step many organizations take to manage Web 2.0 is to try to block them. This is unrealistic for a number of reasons.
  32. Technology changes much faster than the law or policies can keep up with. That’s why it’s better to use a comprehensive policy that can cover new technologies as they appear.
  33. Official vs. unofficial includesDisclaimers (this is or is not official; disclaimer of responsibility if it isn’t)Also includes a link to his social media policy
  34. Whether approval is required to create an account (official only)It’s also useful, as CSU does, to list all the official accounts somewhere on the website.
  35. This includes things like:What user names are appropriate, and whether to use the organization as part of it (e.g. Dell_JeffW)Pictures – same thingBio – same thing, plus things like official account, name (and sometimes personal Twitter handle) of the person behind the account, etc. Different types of contact informationIt’s also valuable to have guidelines for what types of contacts are appropriate. An official federal government account could “friend” Barack Obama on Twitter, but probably shouldn’t friend his re-election campaign or the Democratic Party (and even if it did the Republican Party as well, it’s still problematic). Similarly, it might look a bit odd for an energy company account to “friend” a parody account like BPGlobalPR, or a competitor, or an unsavory group, etc.
  36. Pretty straightforward here. Three main points:If third party content is allowed, it should be reviewed so people don’t upload pornography, etc. If it is reviewed, the organization may have some responsibility to remove things that are inappropriate. This should be spelled out clearly and adhered to rigorously – all goes back to transparency. If an official account “likes” something on Facebook, or retweets something on Twitter, this could be considered approval or even recommendation – and if it’s something offensive, or illegal, or otherwise inappropriate, this could cause serious issues.
  37. The policy should outline what types of groups are appropriate and what types of groups should be out of bounds. This is especially important for official commercial accounts but could be applicable even to personal accounts where the connection could be made to the organization because of the employee’s visibility. For example, it would be inappropriate for an official in charge of elections to be a member of a Facebook group focused on reelecting one candidate or another. Moreover, there are any number of groups dedicated to patently offensive or illegal causes; having accounts associated with these types of groups could bring significant risk to the organization and its brand. ~Another related area involves conveying a perception of approval of content that might be controversial, offensive, or illegal. For example, both a Facebook “like” and retweeting content on Twitter are often perceived as approval of that content. If an official account or the personal account of a senior manager retweets a sexist joke or something that condones illegal drug use, that could also cause serious issues for the organization.
  38. Pretty straightforward
  39. Here’s an example of this from the Seattle Fire Dept – it clearly says “This site is not monitored. Call 911 for emergencies.” It also notes the applicability of public records laws and has a link to the main website.
  40. At this point I’d be pleased to entertain your questions.