SlideShare a Scribd company logo
1 of 76
Social Media, Permission Boundaries and User Adoption:How to Choose Social Media Features for Your Company or Software(Will people use it or not –Facebook or MySpace)
An evolving framework for making choices on social networking features that people will use
Who Am I ? Product Manager and Lead Spokesperson for Vertabase Project Management Software. Former Wall Street Analyst. Economist by training  (London School of Economics and University of Michigan). http://www.vertabase.com/blog/16/
So ,[object Object]
MySpace beat GeoCities and AOL
Google beat Yahoo
Twitter is in a totally different league and is kicking butt
You Tube is in a totally different league and is kicking butt (though MySpace still has a place)
LinkedIn lives in its own successful little world
Skype is an entire Universe
AIM is trying to survive (while MSN has a much bigger and wealthier parent to take care of it)
FourSquare is the latest flavor of the day
Wikis still abound
Message boards are still very active
And Blogs Abound –and are beating Newspapers. ,[object Object]
Meanwhile Someone in your company sees all this happening and says “we need that” and now you’ve got to build it or buy it.
[object Object]
And why.
What will work.
There are many companies that will sell your organization social media in a box. And a lot of organizations are buying. But then it falls flat on its face and nothing happens with it. Never gets touched.,[object Object]
Don't focus on technology. Focus on people's behavior. Up to know, this has meant studying the type of relationship someone has with someone else.
Don't focus on the advertiser.  Almost all of the research and studies have been from the perspective of the advertiser or the ad platform. Is it any wonder it has been framed as “how can we understand the consumer so we can better connect with them.”
I propose a new framework for determining what to build or buy.
Specifically This talk explores the factors that influence user adoption of social media in a system. It talks about the current research on social media and proposes a framework for helping make choices on what social media aspects to include in your system.
Where Current Research Falls Short ,[object Object]
BUT
It does not help you select the right tools or features for a piece of software (or really, any system).
This kind of analysis hasn’t been a predictor or indicator of what will or will not work.
Knowing that most people have 150 weak ties doesn’t help you pick features. It doesn’t determine whether you’ll be Facebook or MySpace.,[object Object]
As You All Well Know ,[object Object]
Pick the feature/the tool that works and has the biggest impact.
btw, you can't force people to use a tool just because it makes sense to you or management. People will make their own adoption decisions.,[object Object]
In the case of social media this translates into  “is it easier for the user to conduct the key parts of their relationship with another person or group of people using the tool.” In other words: Is it easier or harder for them to make the social transaction.
If it is easier, cheaper and faster, they will use it.
If not, not. Not even if you try to “make” them.
How Do We Define Cost? ,[object Object]
We are only now learning about the implications of connecting ourselves and information to others and to other information online.
This was one of the first problems formal economics tackled “how do we define or measure cost” so we are starting from the right point.,[object Object]
It’s a general category that encompasses a lot but is still valuable for helping define and select the cost side of the adoption equation.
Note: The social transaction, will identify the “goal” or desired outcome of the transaction i.e. the benefit side of the equation.,[object Object]
It is the cost/benefit boundary against which the use/don’t use decision is made for a social media component of a system.
It incorporates the type of relationship, specifics about that relationship, privacy, boundaries and the cost of managing those aspects online.,[object Object]
Context and Control
There are tons of physical and temporal cues
And physical and temporal separations
That provide context to your behavior
Information is not as fluid in RL.  There is no “hot” information (like hot money)
We are already good at controlling and managing our personas and actions in RL.
This is something we develop over time and can continue to refine (part of human development).,[object Object]
All of these aspects are managed in physical world, we know how to so  this. But online just starting and the cost of managing can be high and inconvenient and consequences big.
The environment itself is just being built and so is our understanding of it.,[object Object]
These are all encompassed in Permission Boundaries ,[object Object]
We don’t have to worry about these in real world since there is a perception that information is far easier to control, different groups don’t cross as easily, information is less fluid in RL and there are many visual, spatial and temporal cues we have to be able to define and control our permission boundaries.
However, even in RL this can cross –the dis at the end of the movie 8 Mile.,[object Object]
Permission Boundaries You’ll know it when you see it. As we talk about relationships, we’ll come to a more solid definition.
This is very complicated & very broad.  ,[object Object]
There are a ton of different social transactions that happen.
Instead of trying to come up with a single unified theory of all human behavior that translates seamlessly to an evolving online environment.
Let’s focus on the single discrete transactions and build up from there.,[object Object]
To start, though, let’s look at the current research on relationships.
Types of Relationships This is where a huge amount of research has been done on social networking and social media. Strong Ties, Weak Ties and Temporary Ties.
Relationship Types ,[object Object]
He pulled from published information and internally research from Google.
We’ll start by summarizing the findings.
http://www.slideshare.net/padday/the-real-life-social-network-v2,[object Object]
They looked at 342 different groups (that people identified when they mapped out their social networks)
only 12% of the contained the word "friend" in it.
only 3% were called simply "friends"
85% of the groups did not contain the word “friends”
61% of the group names were unique.,[object Object]
Let’s Look at the Bonds Connecting People Then
Strong Ties Defined. A study of 3,000 randomly chosen Americans showed that the average American has just four strong ties.  Most had between two and six.
Another study of 1,178 adults found that on average, people had about 10 friends they meet or speak with at least weekly.
In another study, researchers analyzed all the photographs posted on Facebook pages in one college.  When they looked at how many friends people had (based on who was in their photos), the average was 6.6
The average number of friends on Facebook is 130, and many users have many more.  Yet despite having hundreds of friends, most people on Facebook only interact regularly with 4 to 6 people.
As We See Many research studies have shown that the vast majority of usage on social networks is with small numbers of strong ties.  So What? Doesn’t Help With Tool Selection Doesn’t have any predictive value.

More Related Content

What's hot

Social Information Architecture Workshop
Social Information Architecture WorkshopSocial Information Architecture Workshop
Social Information Architecture Workshopgsmith
 
Digital Revolution Alert
Digital Revolution AlertDigital Revolution Alert
Digital Revolution AlertSei Mani
 
20 Signs You're Probably Not Working For a Social Business
20 Signs You're Probably Not Working For a Social Business20 Signs You're Probably Not Working For a Social Business
20 Signs You're Probably Not Working For a Social BusinessPaul Taylor
 
Build Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationBuild Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationJoe Barnes
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
Social Processes Part 2 - show me the money
Social Processes Part 2 - show me the moneySocial Processes Part 2 - show me the money
Social Processes Part 2 - show me the moneyMark Masterson
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading servicesFabernovel
 
Social media mktg practice v8
Social media mktg practice v8Social media mktg practice v8
Social media mktg practice v8suresh sood
 
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...Joe McCarthy
 
Razorfish Digital Brand Experience
Razorfish Digital Brand ExperienceRazorfish Digital Brand Experience
Razorfish Digital Brand ExperienceDan St. Peter
 
Study of eZ Publish Community
Study of eZ Publish CommunityStudy of eZ Publish Community
Study of eZ Publish CommunityRobin Teigland
 
We're in this together! Summary Interview Findings for the eZ Publish Community
We're in this together!  Summary Interview Findings for the eZ Publish CommunityWe're in this together!  Summary Interview Findings for the eZ Publish Community
We're in this together! Summary Interview Findings for the eZ Publish CommunityPaul Di Gangi
 
Hyper-Social Organization Canada Book Tour
Hyper-Social Organization Canada Book TourHyper-Social Organization Canada Book Tour
Hyper-Social Organization Canada Book TourHuman 1.0
 
Social computing and knowledge creation
Social computing and knowledge creationSocial computing and knowledge creation
Social computing and knowledge creationMiia Kosonen
 
Minnesota Planned Giving Council
Minnesota Planned Giving CouncilMinnesota Planned Giving Council
Minnesota Planned Giving Counciljmstremcha
 
CM258 - Class 4 net neutrality
CM258 - Class 4  net neutrality CM258 - Class 4  net neutrality
CM258 - Class 4 net neutrality erikasawyershu
 
CoCollage UW iSchool 20090515
CoCollage UW iSchool 20090515CoCollage UW iSchool 20090515
CoCollage UW iSchool 20090515Joe McCarthy
 
Situated Community Technology C&T 2009
Situated Community Technology C&T 2009Situated Community Technology C&T 2009
Situated Community Technology C&T 2009Joe McCarthy
 

What's hot (20)

Digital Tattoo for Teacher Candidates at UBC
Digital Tattoo for Teacher Candidates at UBC Digital Tattoo for Teacher Candidates at UBC
Digital Tattoo for Teacher Candidates at UBC
 
Social Information Architecture Workshop
Social Information Architecture WorkshopSocial Information Architecture Workshop
Social Information Architecture Workshop
 
Digital Revolution Alert
Digital Revolution AlertDigital Revolution Alert
Digital Revolution Alert
 
20 Signs You're Probably Not Working For a Social Business
20 Signs You're Probably Not Working For a Social Business20 Signs You're Probably Not Working For a Social Business
20 Signs You're Probably Not Working For a Social Business
 
Build Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective CommunicationBuild Your Brand: Make A Name For Yourself Through Effective Communication
Build Your Brand: Make A Name For Yourself Through Effective Communication
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Social Processes Part 2 - show me the money
Social Processes Part 2 - show me the moneySocial Processes Part 2 - show me the money
Social Processes Part 2 - show me the money
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social Intelligence
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading services
 
Social media mktg practice v8
Social media mktg practice v8Social media mktg practice v8
Social media mktg practice v8
 
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...
 
Razorfish Digital Brand Experience
Razorfish Digital Brand ExperienceRazorfish Digital Brand Experience
Razorfish Digital Brand Experience
 
Study of eZ Publish Community
Study of eZ Publish CommunityStudy of eZ Publish Community
Study of eZ Publish Community
 
We're in this together! Summary Interview Findings for the eZ Publish Community
We're in this together!  Summary Interview Findings for the eZ Publish CommunityWe're in this together!  Summary Interview Findings for the eZ Publish Community
We're in this together! Summary Interview Findings for the eZ Publish Community
 
Hyper-Social Organization Canada Book Tour
Hyper-Social Organization Canada Book TourHyper-Social Organization Canada Book Tour
Hyper-Social Organization Canada Book Tour
 
Social computing and knowledge creation
Social computing and knowledge creationSocial computing and knowledge creation
Social computing and knowledge creation
 
Minnesota Planned Giving Council
Minnesota Planned Giving CouncilMinnesota Planned Giving Council
Minnesota Planned Giving Council
 
CM258 - Class 4 net neutrality
CM258 - Class 4  net neutrality CM258 - Class 4  net neutrality
CM258 - Class 4 net neutrality
 
CoCollage UW iSchool 20090515
CoCollage UW iSchool 20090515CoCollage UW iSchool 20090515
CoCollage UW iSchool 20090515
 
Situated Community Technology C&T 2009
Situated Community Technology C&T 2009Situated Community Technology C&T 2009
Situated Community Technology C&T 2009
 

Similar to Social Media Features for Adoption

Social media naiop - new version
Social media   naiop - new versionSocial media   naiop - new version
Social media naiop - new versionASAE
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social SoftwareRalph Paglia
 
11 Social Media Trends
11 Social Media Trends11 Social Media Trends
11 Social Media TrendsRick Mans
 
3 Myths of Social Work
3 Myths of Social Work3 Myths of Social Work
3 Myths of Social WorkXMPRO
 
Change Management - History and Future
Change Management - History and FutureChange Management - History and Future
Change Management - History and FutureHolger Nauheimer
 
CoopGrocer185_fearing
CoopGrocer185_fearingCoopGrocer185_fearing
CoopGrocer185_fearingHolly Fearing
 
Social Media Primer For Large Corporations
Social Media Primer For Large CorporationsSocial Media Primer For Large Corporations
Social Media Primer For Large CorporationsCarsten Cumbrowski
 
Measuring Enterprise Social & O365 - DSMLF Article
Measuring Enterprise Social & O365 - DSMLF ArticleMeasuring Enterprise Social & O365 - DSMLF Article
Measuring Enterprise Social & O365 - DSMLF ArticleSteve Crompton
 
Accelerating your corporate reputation with social media: transform your busi...
Accelerating your corporate reputation with social media: transform your busi...Accelerating your corporate reputation with social media: transform your busi...
Accelerating your corporate reputation with social media: transform your busi...Tamera Kremer
 
Social Media Lure And Limits
Social Media Lure And LimitsSocial Media Lure And Limits
Social Media Lure And LimitsBill Albing
 
IT Spring - So this application is your friend? - Whitepaper
IT Spring - So this application is your friend? - WhitepaperIT Spring - So this application is your friend? - Whitepaper
IT Spring - So this application is your friend? - WhitepaperRick Mans
 
Running head RESPONSE .docx
Running head RESPONSE                              .docxRunning head RESPONSE                              .docx
Running head RESPONSE .docxtoltonkendal
 
Web analytics for Marketing & Communications - Best Practice Methodologies fo...
Web analytics for Marketing & Communications - Best Practice Methodologies fo...Web analytics for Marketing & Communications - Best Practice Methodologies fo...
Web analytics for Marketing & Communications - Best Practice Methodologies fo...Glide Technologies
 
Justice institute v1 short 2
Justice institute v1 short 2Justice institute v1 short 2
Justice institute v1 short 2LeslieDickout
 
Justice Institute V1 Short 2
Justice Institute V1 Short 2Justice Institute V1 Short 2
Justice Institute V1 Short 2LeslieDickout
 
Free Printable Writing Paper With Borders
Free Printable Writing Paper With BordersFree Printable Writing Paper With Borders
Free Printable Writing Paper With BordersMonica Rivera
 
Organizations and individuals must be aware of the vulnerabilities o.docx
Organizations and individuals must be aware of the vulnerabilities o.docxOrganizations and individuals must be aware of the vulnerabilities o.docx
Organizations and individuals must be aware of the vulnerabilities o.docxhoney690131
 

Similar to Social Media Features for Adoption (20)

5 Requirementsfor Enterpris Social Software
5 Requirementsfor Enterpris Social Software5 Requirementsfor Enterpris Social Software
5 Requirementsfor Enterpris Social Software
 
Social media naiop - new version
Social media   naiop - new versionSocial media   naiop - new version
Social media naiop - new version
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software
 
5 Requirementsfor Enterpris Social Software
5 Requirementsfor Enterpris Social Software5 Requirementsfor Enterpris Social Software
5 Requirementsfor Enterpris Social Software
 
11 Social Media Trends
11 Social Media Trends11 Social Media Trends
11 Social Media Trends
 
3 Myths of Social Work
3 Myths of Social Work3 Myths of Social Work
3 Myths of Social Work
 
Change Management - History and Future
Change Management - History and FutureChange Management - History and Future
Change Management - History and Future
 
CoopGrocer185_fearing
CoopGrocer185_fearingCoopGrocer185_fearing
CoopGrocer185_fearing
 
Social Media Primer For Large Corporations
Social Media Primer For Large CorporationsSocial Media Primer For Large Corporations
Social Media Primer For Large Corporations
 
Measuring Enterprise Social & O365 - DSMLF Article
Measuring Enterprise Social & O365 - DSMLF ArticleMeasuring Enterprise Social & O365 - DSMLF Article
Measuring Enterprise Social & O365 - DSMLF Article
 
Accelerating your corporate reputation with social media: transform your busi...
Accelerating your corporate reputation with social media: transform your busi...Accelerating your corporate reputation with social media: transform your busi...
Accelerating your corporate reputation with social media: transform your busi...
 
Social Media Lure And Limits
Social Media Lure And LimitsSocial Media Lure And Limits
Social Media Lure And Limits
 
IT Spring - So this application is your friend? - Whitepaper
IT Spring - So this application is your friend? - WhitepaperIT Spring - So this application is your friend? - Whitepaper
IT Spring - So this application is your friend? - Whitepaper
 
Running head RESPONSE .docx
Running head RESPONSE                              .docxRunning head RESPONSE                              .docx
Running head RESPONSE .docx
 
Work 2.0 Tech Best Practices Aenc
Work 2.0   Tech Best Practices   AencWork 2.0   Tech Best Practices   Aenc
Work 2.0 Tech Best Practices Aenc
 
Web analytics for Marketing & Communications - Best Practice Methodologies fo...
Web analytics for Marketing & Communications - Best Practice Methodologies fo...Web analytics for Marketing & Communications - Best Practice Methodologies fo...
Web analytics for Marketing & Communications - Best Practice Methodologies fo...
 
Justice institute v1 short 2
Justice institute v1 short 2Justice institute v1 short 2
Justice institute v1 short 2
 
Justice Institute V1 Short 2
Justice Institute V1 Short 2Justice Institute V1 Short 2
Justice Institute V1 Short 2
 
Free Printable Writing Paper With Borders
Free Printable Writing Paper With BordersFree Printable Writing Paper With Borders
Free Printable Writing Paper With Borders
 
Organizations and individuals must be aware of the vulnerabilities o.docx
Organizations and individuals must be aware of the vulnerabilities o.docxOrganizations and individuals must be aware of the vulnerabilities o.docx
Organizations and individuals must be aware of the vulnerabilities o.docx
 

Recently uploaded

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Recently uploaded (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Social Media Features for Adoption

  • 1. Social Media, Permission Boundaries and User Adoption:How to Choose Social Media Features for Your Company or Software(Will people use it or not –Facebook or MySpace)
  • 2. An evolving framework for making choices on social networking features that people will use
  • 3. Who Am I ? Product Manager and Lead Spokesperson for Vertabase Project Management Software. Former Wall Street Analyst. Economist by training (London School of Economics and University of Michigan). http://www.vertabase.com/blog/16/
  • 4.
  • 7. Twitter is in a totally different league and is kicking butt
  • 8. You Tube is in a totally different league and is kicking butt (though MySpace still has a place)
  • 9. LinkedIn lives in its own successful little world
  • 10. Skype is an entire Universe
  • 11. AIM is trying to survive (while MSN has a much bigger and wealthier parent to take care of it)
  • 12. FourSquare is the latest flavor of the day
  • 14. Message boards are still very active
  • 15.
  • 16. Meanwhile Someone in your company sees all this happening and says “we need that” and now you’ve got to build it or buy it.
  • 17.
  • 20.
  • 21. Don't focus on technology. Focus on people's behavior. Up to know, this has meant studying the type of relationship someone has with someone else.
  • 22. Don't focus on the advertiser. Almost all of the research and studies have been from the perspective of the advertiser or the ad platform. Is it any wonder it has been framed as “how can we understand the consumer so we can better connect with them.”
  • 23. I propose a new framework for determining what to build or buy.
  • 24. Specifically This talk explores the factors that influence user adoption of social media in a system. It talks about the current research on social media and proposes a framework for helping make choices on what social media aspects to include in your system.
  • 25.
  • 26. BUT
  • 27. It does not help you select the right tools or features for a piece of software (or really, any system).
  • 28. This kind of analysis hasn’t been a predictor or indicator of what will or will not work.
  • 29.
  • 30.
  • 31. Pick the feature/the tool that works and has the biggest impact.
  • 32.
  • 33. In the case of social media this translates into “is it easier for the user to conduct the key parts of their relationship with another person or group of people using the tool.” In other words: Is it easier or harder for them to make the social transaction.
  • 34. If it is easier, cheaper and faster, they will use it.
  • 35. If not, not. Not even if you try to “make” them.
  • 36.
  • 37. We are only now learning about the implications of connecting ourselves and information to others and to other information online.
  • 38.
  • 39. It’s a general category that encompasses a lot but is still valuable for helping define and select the cost side of the adoption equation.
  • 40.
  • 41. It is the cost/benefit boundary against which the use/don’t use decision is made for a social media component of a system.
  • 42.
  • 44. There are tons of physical and temporal cues
  • 45. And physical and temporal separations
  • 46. That provide context to your behavior
  • 47. Information is not as fluid in RL. There is no “hot” information (like hot money)
  • 48. We are already good at controlling and managing our personas and actions in RL.
  • 49.
  • 50. All of these aspects are managed in physical world, we know how to so  this. But online just starting and the cost of managing can be high and inconvenient and consequences big.
  • 51.
  • 52.
  • 53. We don’t have to worry about these in real world since there is a perception that information is far easier to control, different groups don’t cross as easily, information is less fluid in RL and there are many visual, spatial and temporal cues we have to be able to define and control our permission boundaries.
  • 54.
  • 55. Permission Boundaries You’ll know it when you see it. As we talk about relationships, we’ll come to a more solid definition.
  • 56.
  • 57. There are a ton of different social transactions that happen.
  • 58. Instead of trying to come up with a single unified theory of all human behavior that translates seamlessly to an evolving online environment.
  • 59.
  • 60. To start, though, let’s look at the current research on relationships.
  • 61. Types of Relationships This is where a huge amount of research has been done on social networking and social media. Strong Ties, Weak Ties and Temporary Ties.
  • 62.
  • 63. He pulled from published information and internally research from Google.
  • 64. We’ll start by summarizing the findings.
  • 65.
  • 66. They looked at 342 different groups (that people identified when they mapped out their social networks)
  • 67. only 12% of the contained the word "friend" in it.
  • 68. only 3% were called simply "friends"
  • 69. 85% of the groups did not contain the word “friends”
  • 70.
  • 71. Let’s Look at the Bonds Connecting People Then
  • 72. Strong Ties Defined. A study of 3,000 randomly chosen Americans showed that the average American has just four strong ties. Most had between two and six.
  • 73. Another study of 1,178 adults found that on average, people had about 10 friends they meet or speak with at least weekly.
  • 74. In another study, researchers analyzed all the photographs posted on Facebook pages in one college. When they looked at how many friends people had (based on who was in their photos), the average was 6.6
  • 75. The average number of friends on Facebook is 130, and many users have many more. Yet despite having hundreds of friends, most people on Facebook only interact regularly with 4 to 6 people.
  • 76. As We See Many research studies have shown that the vast majority of usage on social networks is with small numbers of strong ties. So What? Doesn’t Help With Tool Selection Doesn’t have any predictive value.
  • 77.
  • 78. 80% of phone calls are made to the same 4 people.
  • 79. The phone was a facilitator –cheaper and easier to conduct the social transaction.
  • 80.
  • 81. Technology Enables But Doesn’t Build Ties Studies in online gaming show that gamers are most often playing with strong ties who they already know.
  • 82. Maybe Strong Ties, Does Tell Us Something Strong ties often wield the most influence over people's decisions. For example, they are often the biggest factor in purchase decisions.
  • 83. Or Not But not all strong ties have same effect. I wouldn’t ask my mother for a clothing recommendation but she is a very strong tie (and she buys me clothes in December anyway : )
  • 84. So we are back in the world of the nuance of social interactions. Not all strong ties are equal in all social transactions. But at least we learned that technology enables us to transact socially with people we already know, if its cheaper and easier. If it makes sense against our permission boundary
  • 85. Permission Boundary Break (with a transaction snuck in) That’s a detail of permission boundary. What kind of products or advice you would take from which people. And what would you expect to give/be asked for, from whom. That transaction alone, getting product advice, could be a huge matrix and Ph.D. study.
  • 86. One Path For Empirical Research Is to create a pick a particular social transaction and map the permission boundary for it.
  • 87. Key Concept When we talk about cheapest and easiest, we’re talking about COST in terms of permission boundaries. The cost includes managing one’s profile / identity as overhead. Privacy impacts RL impacts like finding a job or a spouse.
  • 88.
  • 89. Some people you met recently.
  • 90. Typically, we communicate with weak ties infrequently.
  • 91.
  • 92. This number has been consistent throughout history.
  • 93. Neolithic farming villages tended to separate into two once they reached 150 inhabitants.
  • 94. The Roman army was split into groups of 150 so that everyone in the group knew each other. (That’s why the movie 300 was twice the fun of other sandal and sword movies.)Source: Paul Adams Preso
  • 95.
  • 96. There is evidence that when online games involving social interaction reach about 150 active users, group cohesion collapses, resulting in dissatisfaction and defection.
  • 97. Similarly, Wikipedia involvement tends to plateau at about 150 active administrators.Source: Paul Adams Preso
  • 98. Paul Adams Says: Online social networks make it easier to reconnect and catch up with weak ties We can now look at what they've been up to via their online social network profile. This lets us easily communicate with them - it gives us a lightweight route to get back in touch. This is a powerful route when we're sourcing new information.
  • 99.
  • 100. It is ready made to customize and requires almost no effort.
  • 101.
  • 102. It allowed people to do this.
  • 104. Much less worries and hassles about privacy (a factor in permission boundaries) than MySpace
  • 105. But now that’s changed and the personalized/controlled experience is becoming diluted.
  • 106.
  • 107.
  • 108. Twitter is pure personalization of “info in” (search)
  • 109. Facebook is personalization of “info in” (search) and “info out” (customized, targeted micro publishing)
  • 110.
  • 111.
  • 112. Some young adults use email to communicate with their strongest ties because their social network is overloaded with information from lots of different people, and their message might not be noticed.
  • 113.
  • 114. Status updates are often perceived as a narcissistic activity. But research has indicated that they support important social functions. People have four primary reasons for updating their status:
  • 115. - People update their status to shape how others perceive them.
  • 116. - People update their status to maintain and grow relationships.
  • 117. - People update their status to share content that others might find valuable.
  • 118.
  • 119.
  • 120. These are ties that are explicitly connected to one time or very infrequent social transactions.
  • 121. To me, its like trying to lump all the unknown “friend” categories into one bucket.
  • 122. To me, its far more valuable, in terms of tool and feature selection, to drop that category.
  • 123.
  • 124. That’s why the less you need to manage of it, the better.
  • 125. This is a key to how “elastic” a permission boundary is in social network system. The lower the overhead is to manage identity and privacy (i.e. the user assumes the system is doing it for them) the more elastic the permission boundary i.e. the more free the information will flow in and out. The boundary will bend to allow more to pass in and out.
  • 126.
  • 127.
  • 128. Or that it should be a requirement on your RFP for a solution you are purchasing.
  • 129. It means that you need to understand the full import of the transaction you are asking or allowing users to conduct on your network.
  • 130.
  • 131.
  • 132. 44% take steps to limit the amount of personal information available about them online
  • 133. 71% change their privacy settings
  • 134. 47% delete unwanted comments on their profiles
  • 135. 41% remove their name from photos
  • 136.
  • 137.
  • 138. Because they don't have the visual or environmental cues that being in a physical environment have.
  • 139. Because its totally new. And changing every day.
  • 140.
  • 141. Let's imagine these girls were gossiping about this guy. When he comes over, they stop. Their conversation isn't persistent.
  • 142. But if this gossip happens on their Facebook walls, and it does, then it remains there for the guy to find at any point in time. Not only that, but it could be weeks old, or months, or even years.Source: Paul Adams Preso
  • 143.
  • 144. In 2010, this grew to over 70%
  • 145. Not to mention cyber-bullying.
  • 146.
  • 147. Planning a party or club event or FNM or WoW
  • 149. Sharing project information (a tricky one wrt context)
  • 150. Just chatting (texting, IM or chat)
  • 151. Keeping up with others (posts)
  • 152. Projecting a persona, pretending (posts or 2nd Life)
  • 153. Finding a relationship with someone
  • 154. Keeping track of company acronyms (wiki)
  • 155.
  • 156. Users will adopt or not adopt based on cost/benefit
  • 157. The cost is weighed against their permission boundaries (which tries to capture the nuanced and complex nature of people’s relationships with each other)
  • 158.
  • 159. We are learning about it and adapting as it evolves.
  • 160. Keep in mind though: VL is mostly driven by commercial interests and will only exist as long it is economically sensible for it to exist.
  • 161. Commercial players, government and others can change the playing field in a minute.
  • 162.