SlideShare uma empresa Scribd logo
1 de 47
Jesse Wilkins, CIP, CRM
      AIIM International
     February 14, 2012
Systems of Engagement
                                                         Social and
  Era      Mainframe     Mini        PC       Internet
                                                           Cloud
                            Systems of Record
            1960-       1975-      1992-      2001-       2010-
 Years
            1975        1992       2001       2009        2015

 Typical                             A                      An
            A batch    A dept                 A web
  thing                           documen                interacti
             trans     process                page
managed                              t                      on
  Best                  Digital
                                                         Faceboo
 known       IBM       Equipme    Microsoft   Google
                                                            k
company                   nt
Content                                                   Social
                        Image     Docume      Content
 mgmt      Microfilm                                     Business
                        Mgmt      nt Mgmt      Mgmt
 focus                                                   Systems



                                                                  2
Consideration         Systems of Record           Systems of Engagement

Focus                 Transactions                Interactions

Governance            Command & Control           Collaboration

Core Elements         Facts & Commitments         Ideas & Nuances

Value                 Single Source of Truth      Discovery & Dialog

Standard              Accurate & Complete         Immediate & Accessible

Content               Authored                    Communal

Primary Record Type   Documents                   Conversations

Searchability         Easy                        Hard

Usability             User is trained             User “knows”

Accessibility         Regulated & Contained       Ad Hoc & Open

Retention             Permanent                   Transient

Policy Focus          Security (Protect Assets)   Privacy (Protect Users)
                                                                            3
4
   Describes steps to
    implement social business
   NOT necessarily linear
   Will vary substantially
    between organizations




                                5
   Not a step in the roadmap, but necessary
    precursor to successful social business
    initiatives
    ◦ Transparency
    ◦ Trust
    ◦ Technology




                                               6
◦ Requires that the organization move from a culture
  of knowledge hoarding to one of knowledge
  sharing.




                                                       7
Requires that the organization trust its users to do what
is right, while supporting them with the training and
governance required for them to be accountable for that
trust.




                                                        8
Requires willingness to allow employees to experiment
with new tools and processes, trusting that they will not
abuse them and permitting them to “fail fast.”




                                                        9
10
   Experimental use of technologies
   “Under the radar”
   Proof of concept




                                       11
   Formalization of approach
   Social business assessment
   Planning and project management
   Internal marketing and communication
   Social business team
   Organization-specific
    roadmap




                                           12
   Identify desired capabilities and deployment
    options
   Procure and implement tools
   Develop and deliver
    training and support
   Build integration




                                              13
Source: Govloop.com

                      14
15
   Listen to conversations before jumping into
    them
   Look for tone and sentiment
   Watch for complaints
   Set up queries and alerts
   Empower community
    managers




                                              16
17
18
   Seed content into tools
   Use the tools!
   Consistent messaging across tools
   Be patient




                                        19
20
   Move from listening and broadcasting to
    engagement
   Plan for engagement
   Authenticity and personality key




                                              21
22
23
   Policies and guidelines
   Restrictions on tools and content
   Internal monitoring
   Records management
   Legal issues




                                        24
25
26
27
   Encourage uptake of the tools
   Monitor efficacy of tools
   Measure and analyze tools and processes
   Identify changes to tools
    and new tools




                                              28
29
 Is the information unique and not
  available anywhere else?
 Is the tool being used in relation to an
  organization’s work?
 Is there a business need for the
  information?
 Does it document a transaction or
  decision?

                                         30
31
   Blog post
    ◦ Comments?
    ◦ Updates?
   Individual Tweet
    ◦ Links and shortened URLS?
   Wiki article
    ◦ The article?
    ◦ Its changes over time?
   It depends….


              Prepare for production
                                       32
33
   Commercial and hosted sites store
    information outside the firewall
    ◦ Little control over how it is stored
    ◦ Little control over how long it is stored
    ◦ Geographic and jurisdictional issues
   First step is to save content locally




                                                  34
Take a screenshot of content
                               35
   Archive selected items locally
    ◦ Use search queries and monitoring




      Store selected items locally using
            search queries or RSS
                                           36
Store locally using built-in tools
                                     37
Store locally using third-party service
                                          38
Store locally using APIs
                           39
   Use Word or Notepad to draft content
    updates and save *that*




                                       40
41
• And many others

                    42
43
Jesse Wilkins, CIP, CRM
Director, Research and Development
AIIM International
      +1 (303) 574-0749 direct
      jwilkins@aiim.org
      http://www.twitter.com/jessewilkins
      http://www.linkedin.com/in/jessewilkins
      http://www.facebook.com/jessewilkins
      http://www.slideshare.net/jessewilkins


                                                44
   2-day instructor-led or online course
   Includes:
    ◦ Specific governance elements for Facebook, Twitter,
      other social business tools
    ◦ Commercial vs. enterprise social technologies
    ◦ Capturing and managing social content
    http://www.aiim.org/Training/Essential%20Trainin
    g/Social-Media/Course%20Descriptions




                                                       45
PROFESSIONAL CERTIFICATION covering the broad
                       based body of knowledge that every information
                       professional needs to understand.

                       www.aiim.org/certification

                       Enterprise search, Business intelligence, Master
    Access/ Use
                       data management, Text analytics
                       Information capture, BPM, KM, Email
 Capture/Manage
                       management, Content management
                       Collaboration, Social media, Info workplace, IM,
Collaborate/Deliver
                       Telecommuting support, Web conferencing
                       Security, RM, Data privacy, DRM, Archiving,
  Secure/Preserve
                       eDiscovery
                       Info architecture, Technical architecture, Cloud
Architecture/Systems
                       computing, Mobile apps, Websites and portals
                       Strategic planning, Building business case, Impl
  Plan/Implement
                       planning, Req def, Solution design, Change mgmt
                                                                          46
20120214 ARMA Cincinnati Social Media Governance

Mais conteúdo relacionado

Destaque

Simone ernestine lucie marie bertrand de beauvoir
Simone ernestine lucie marie bertrand de beauvoirSimone ernestine lucie marie bertrand de beauvoir
Simone ernestine lucie marie bertrand de beauvoirtevidu
 
Is Social Media Making Us Dumb?
Is Social Media Making Us Dumb?Is Social Media Making Us Dumb?
Is Social Media Making Us Dumb?Rich Blank
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
 
20130602 ARMA Canada Conducting a Social Business Assessment
20130602 ARMA Canada Conducting a Social Business Assessment20130602 ARMA Canada Conducting a Social Business Assessment
20130602 ARMA Canada Conducting a Social Business AssessmentJesse Wilkins
 
Lumina Spark by Saskia Kehrer
Lumina Spark by Saskia KehrerLumina Spark by Saskia Kehrer
Lumina Spark by Saskia KehrerSaskia Kehrer
 

Destaque (8)

Simone ernestine lucie marie bertrand de beauvoir
Simone ernestine lucie marie bertrand de beauvoirSimone ernestine lucie marie bertrand de beauvoir
Simone ernestine lucie marie bertrand de beauvoir
 
Is Social Media Making Us Dumb?
Is Social Media Making Us Dumb?Is Social Media Making Us Dumb?
Is Social Media Making Us Dumb?
 
Citas Gandhi
Citas GandhiCitas Gandhi
Citas Gandhi
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
 
20130602 ARMA Canada Conducting a Social Business Assessment
20130602 ARMA Canada Conducting a Social Business Assessment20130602 ARMA Canada Conducting a Social Business Assessment
20130602 ARMA Canada Conducting a Social Business Assessment
 
Lumina Spark by Saskia Kehrer
Lumina Spark by Saskia KehrerLumina Spark by Saskia Kehrer
Lumina Spark by Saskia Kehrer
 
Gd1
Gd1Gd1
Gd1
 

Mais de Jesse Wilkins

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptxJesse Wilkins
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
 

Mais de Jesse Wilkins (20)

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

20120214 ARMA Cincinnati Social Media Governance

  • 1. Jesse Wilkins, CIP, CRM AIIM International February 14, 2012
  • 2. Systems of Engagement Social and Era Mainframe Mini PC Internet Cloud Systems of Record 1960- 1975- 1992- 2001- 2010- Years 1975 1992 2001 2009 2015 Typical A An A batch A dept A web thing documen interacti trans process page managed t on Best Digital Faceboo known IBM Equipme Microsoft Google k company nt Content Social Image Docume Content mgmt Microfilm Business Mgmt nt Mgmt Mgmt focus Systems 2
  • 3. Consideration Systems of Record Systems of Engagement Focus Transactions Interactions Governance Command & Control Collaboration Core Elements Facts & Commitments Ideas & Nuances Value Single Source of Truth Discovery & Dialog Standard Accurate & Complete Immediate & Accessible Content Authored Communal Primary Record Type Documents Conversations Searchability Easy Hard Usability User is trained User “knows” Accessibility Regulated & Contained Ad Hoc & Open Retention Permanent Transient Policy Focus Security (Protect Assets) Privacy (Protect Users) 3
  • 4. 4
  • 5. Describes steps to implement social business  NOT necessarily linear  Will vary substantially between organizations 5
  • 6. Not a step in the roadmap, but necessary precursor to successful social business initiatives ◦ Transparency ◦ Trust ◦ Technology 6
  • 7. ◦ Requires that the organization move from a culture of knowledge hoarding to one of knowledge sharing. 7
  • 8. Requires that the organization trust its users to do what is right, while supporting them with the training and governance required for them to be accountable for that trust. 8
  • 9. Requires willingness to allow employees to experiment with new tools and processes, trusting that they will not abuse them and permitting them to “fail fast.” 9
  • 10. 10
  • 11. Experimental use of technologies  “Under the radar”  Proof of concept 11
  • 12. Formalization of approach  Social business assessment  Planning and project management  Internal marketing and communication  Social business team  Organization-specific roadmap 12
  • 13. Identify desired capabilities and deployment options  Procure and implement tools  Develop and deliver training and support  Build integration 13
  • 15. 15
  • 16. Listen to conversations before jumping into them  Look for tone and sentiment  Watch for complaints  Set up queries and alerts  Empower community managers 16
  • 17. 17
  • 18. 18
  • 19. Seed content into tools  Use the tools!  Consistent messaging across tools  Be patient 19
  • 20. 20
  • 21. Move from listening and broadcasting to engagement  Plan for engagement  Authenticity and personality key 21
  • 22. 22
  • 23. 23
  • 24. Policies and guidelines  Restrictions on tools and content  Internal monitoring  Records management  Legal issues 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. Encourage uptake of the tools  Monitor efficacy of tools  Measure and analyze tools and processes  Identify changes to tools and new tools 28
  • 29. 29
  • 30.  Is the information unique and not available anywhere else?  Is the tool being used in relation to an organization’s work?  Is there a business need for the information?  Does it document a transaction or decision? 30
  • 31. 31
  • 32. Blog post ◦ Comments? ◦ Updates?  Individual Tweet ◦ Links and shortened URLS?  Wiki article ◦ The article? ◦ Its changes over time?  It depends…. Prepare for production 32
  • 33. 33
  • 34. Commercial and hosted sites store information outside the firewall ◦ Little control over how it is stored ◦ Little control over how long it is stored ◦ Geographic and jurisdictional issues  First step is to save content locally 34
  • 35. Take a screenshot of content 35
  • 36. Archive selected items locally ◦ Use search queries and monitoring Store selected items locally using search queries or RSS 36
  • 37. Store locally using built-in tools 37
  • 38. Store locally using third-party service 38
  • 40. Use Word or Notepad to draft content updates and save *that* 40
  • 41. 41
  • 42. • And many others 42
  • 43. 43
  • 44. Jesse Wilkins, CIP, CRM Director, Research and Development AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins 44
  • 45. 2-day instructor-led or online course  Includes: ◦ Specific governance elements for Facebook, Twitter, other social business tools ◦ Commercial vs. enterprise social technologies ◦ Capturing and managing social content http://www.aiim.org/Training/Essential%20Trainin g/Social-Media/Course%20Descriptions 45
  • 46. PROFESSIONAL CERTIFICATION covering the broad based body of knowledge that every information professional needs to understand. www.aiim.org/certification Enterprise search, Business intelligence, Master Access/ Use data management, Text analytics Information capture, BPM, KM, Email Capture/Manage management, Content management Collaboration, Social media, Info workplace, IM, Collaborate/Deliver Telecommuting support, Web conferencing Security, RM, Data privacy, DRM, Archiving, Secure/Preserve eDiscovery Info architecture, Technical architecture, Cloud Architecture/Systems computing, Mobile apps, Websites and portals Strategic planning, Building business case, Impl Plan/Implement planning, Req def, Solution design, Change mgmt 46

Notas do Editor

  1. Slide 1: Title SlideInsert the ARMA approved title for your session (this title can be found in your contract or by visiting http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm Click on My Program Details for your finalized title.)Insert the facilitator’s name.If you choose, insert the facilitator’s job title and company name.Insert the Education Code. This also can be found on the website at: http://www.arma.org/learningcenter/facilitator/programdetails/index.cfm
  2. The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
  3. 1542: Question: What are the prerequisites for Social Business?0. Empowerment: personal projects, measure outcomes, freedom to experiment- Transparency requires that the organization move from a culture of knowledge hoarding to one of knowledge sharing.- Trust requires that the organization trust its users to do what is right, while supporting them with the training and governance required for them to be accountable for that trust.- And technology requires willingness to allow employees to experiment with new tools and processes, trusting that they will not abuse them and permitting them to “fail fast.”
  4. 1549
  5. Identifying what tools to use – here, wiki, blog, user ratings of appsSetting up navigation and classificationDeploying social sharing widgets (which ones, how)
  6. 1551 Monitoring/Listening: Viral implementationInitially the organization should spend time listening to the conversations taking place in and around a particular tool to get a sense of the nature of the tool, the content of the conversations, the target audiences, and who the leading participants are.This is perhaps more visible in externally focused processes but is important for internal ones as well.QUESTION: How do you support a viral adoption? Answer: rumors, communication, ambassadors, show people, show benefits- 4.1 Listen to internal sites and comments- 4.2 Listen to external sites and comments- 4.3 Set up queries and alerts- 4.4 Empower community managers
  7. http://www.onesocialmedia.com/2011/02/social-media-listening-in-real-time-case-study-toyota-of-des-moines/Social Media account manager was lucky enough to have seen this post only 5 minutes after it had been posted. Because the Facebook post was fairly recent, I decided to call someone at Toyota of Des Moines. I wanted to see if they could find the displeased customer before she left the dealership, in hopes that they could try to work through the issue with her in person. As luck would have it, the customer was still at the dealership at the time that I called to inform them of the post. They were able to talk with her, to let her know that they saw her Facebook post, and that they wanted to work through the issue with her. 
  8. 1553. Participation: Getting all relevant people to get involvedOnce the organization has done some listening it will be able to participate more meaningfully and should begin doing so according to what it has learned about the target market and the nature of the conversations on the various tools.QUESTION: How do you get all relevant people involved? Answer: Demonstrate benefits, carrot/stick, etc.- 5.1 Seed content into the tools5.2 Ensure consistent messaging across platformsAnd split this step into stages; e.g first get people to register
  9. Move from listening and broadcasting to engagementPlan for engagementTriage for comments, external mentionsEngagement on public, commercial, and third-party sitesAuthenticity and personality
  10. 1559 CNN iReporterhttp://ireport.cnn.com/community/assignmentCNN’s iReport assignment desk is an example of community evolution of technology and communication. Eachday and throughout the day as news breaks, the editors of the iReport page put up assignments to the citizenjournalists to help get real and participatory news live from wherever in the world it is happening. They haveembraced the evolution of technology by asking for submissions as the technology evolves and connecting itwith social media through hashtags on Twitter.This creates additional conversation around not only contributions, but the delivery medium itself. Those noteven connected to CNN are able to participate in the conversation because it is being held at the widest possibledistribution point or audience, out in the open on social media streams.
  11. This is an example of a guideline for how to engage those that comment on your social media, and those that post or comment on third party sites. This triage chart from the American Society of Chemical Engineers is not for every user in the organization, but it can be quite useful for those responsible for monitoring and engaging comments about the organization such as public affairs.
  12. 1604
  13. The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information:Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
  14. Prepare for discovery. This means having the same type of data map you have in place inside the organization, but with listings of all the services you use, the accounts used there, etc. At a minimum you should list any official use of services and official accounts. It also means understanding the process for getting at that information in the event of litigation, FOIA request, etc. The time to put that process in place is before the subpoena is received. For hosted tools, such as FB or Twitter, it may mean taking periodic snapshots of what is posted to them. Right now there aren’t a lot of tools that do this; one way that can be effective is to capture the RSS feeds generated by these tools. As updates are made, they are published through the RSS feed, which can be saved locally. It might also require working with the third-party vendor in the event that some information or some updates are not available through RSS – for example, web-based email. It’s also important to note that at least for commercial solutions there is very little ability to put or enforce legal holds or to prevent a user from deleting an account, at least without a subpoena and without doing it before the user knows to delete it. [twitter]Prepare for discovery in advance, including listing official use of services and accounts.[/twitter]
  15. As we just noted, the records management or communications policies (or both) should address the use of these tools. We’ll look at some examples of policies over the next few slides. At a minimum, the policy should address: Identity, relationship, and transparency – is the account official or unofficial?Security, confidentiality, and sensitive informationComments and responses to commentsResponding to others’ posts on commercial sitesAccuracy and ethicsMonitoring and auditing[twitter]Address these tools in the records or communications policies (or both). [/twitter]
  16. How to capture content will depend first on one key variable: where is it stored? The vast majority of social media sites are either hosted solutions or commercial ones – that is, users’ data is not stored inside the organization’s firewall, but on some third party data center outside the control of the organization. This can present a significant issue because how and how long the data is stored is almost entirely dependent on the site’s Terms of Service. If the Terms are changed from retention for 7 years to retention for 2 weeks, or to permanently, it presents a real problem for the records program. And depending on the site this is almost certainly non-negotiable with the exception of governmental entities with the force of the law behind them. ~It’s also the case that some regulatory regimes have geographical aspects that, for example, require particular content to be stored inside a country’s boundaries, or prohibit it from being stored in certain countries’ boundaries. This can present issues for services that store information in the cloud and that might have numerous data centers spread around the world. ~Once the organization has determined what to capture, the next step then is to save that information locally. This is almost always a copy – in other words, saving social content from Facebook does *not* delete it from there. There are a number of ways to accomplish this that we will review over the rest of this module.
  17. Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it. [twitter]Consider implementing enterprise versions. FB is FB, but internal tools might be more appropriate.[/twitter]
  18. At this point I’d be pleased to entertain your questions.