Social media control at the workplace- delphi

244 views
146 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
244
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • From Word of Mouth to VIRTUALFrom Monologue to DialogueWhy is social media gaining popularity?
  • From Word of Mouth to VIRTUALFrom Monologue to Dialogue
  • From Word of Mouth to VIRTUALFrom Monologue to Dialogue
  • Social media control at the workplace- delphi

    1. 1. Human Resources Social Media 1
    2. 2. Security Classification What is Social Media? - “Interactions/conversations among people” to create, share, and exchange - “Information and Ideas” - in “virtual communities and networks” - Fusion of „Sociology‟ and “Technology” 2 From This To This
    3. 3. Security Classification What is Social Media? 3
    4. 4. Security Classification Forms of Social Media 4
    5. 5. Security Classification The Big FIVE 5 Facebook Launched: 2004 Users: 1110 MIO FB popularity increased in 2008 Age profile: 72% users in 13 – 34 age group Twitter Launched: 2006 Users: 200+ MIO Justin Beiber – 42.2 MIO followers Average tweets everyday – 58 MIO LinkedIn Launched: 2002 Users: 225+ MIO One of the few professional networking sites 46% of the users are in 25 – 44 age group You Tube Launched: 2005 Users: 1 billion/month 100 hours of video uploaded every minute #2 search engine after Google Blogging Launched: late 1990s Approx 200 MIO blogs 73% of active internet users have read a blog
    6. 6. Security Classification Is social media a time wasting platform for new generation employees? • Many organizations fear that social media causes distraction • Organizations that permit free access are a minority • HR uses social network for hiring • Marketing and Communications also uses it effectively 6
    7. 7. Security Classification Should we control the social media access during working hours? • Smart phones circumvent need to have computer to access. Hence there are organizations that follows the policy of surrendering smart phones during work hours • Most organizations follow hierarchical approach • Functions like Communications and Marketing gets easy access • Some controls are desirable 7
    8. 8. Security Classification How do we create a reasonable boundary between work and social media? • A social media policy • Training • A "social media" officer – to authorize content for posting official messages 8

    ×