SlideShare a Scribd company logo
Managing Content Generated by Social Media Tools as Records Jesse Wilkins, CRM April 27, 2011
International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology  Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org  About AIIM
Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Director, ARMA International Board of  	Directors (2007-2010) Frequent industry speaker and author AIIM ERM Expert Blogger Instructor for AIIM Certificate Programs Jesse Wilkins, CRM 3
    By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery.        Source: “Social Media Governance: An Ounce of Prevention”, Gartner  It’s just a fad….
Is a Facebook “like” a record?
Introduction to Web 2.0 Web 2.0 technologies Web 2.0 issues and challenges Managing Web 2.0 content as records Agenda
Introduction to Web 2.0
“Web 2.0 is the business revolution in the computer industry caused by the move to the internet as platform, and an attempt to understand the rules for success on that new platform. Chief among those rules is this: Build applications that harness network effects to get better the more people use them.” -- Tim O’Reilly, 12/10/2006 Web 2.0
“Enterprise 2.0 is the use of emergent social software platforms within companies, or between companies and their partners or customers.”  -- Andrew McAfee, 5/2006
“Working where you want, when you want,  and being able to conduct real business.” blognation Canada
Systems of Record
Systems of Engagement Systems of Record
Web 2.0 technologies
Blogs Microblogs Wikis Social networking Social sharing Types of Web 2.0 tools
Started as online diaries Today used more as lightweight CMS Hides complexity of Web publishing Generally arranged in chronological order, most recent at top What’s a blog? 15
Blogs
Provide project updates
Provide organizational updates
“It is part text messaging and part blogging, with the ability to update on your cell phone or computer, but constrained to 140 characters.”  -- Ari Herzog, Ariwriter.com Defining microblogging 19
Announcements
Links to resources
Collaborative website Organized as linked articles Hides complexity of HTML from users Easy to add and link articles Easy to correct mistakes Wiki-wiki 23
Wikis 24
Source: Stewart Mader, www.ikiw.org How do you use a wiki?
Create agenda and minutes
Wikis are more archival than email, less process than Word.                   -- Mike Cannon-Brookes Co-founder and CEO of Atlassian
Social Networking Social Networking
Keep in touch
Network and announce events
Share information
Find your next job
Respond to crises
Respond to crises
Services dedicated to sharing particular types of information Often allow subscription to a particular user or keyword Often allow rating and adding to favorites Easy to link to and embed in other websites What is social sharing?
Social sharing
Use cases: social sharing
Use cases: social sharing
Use cases: social sharing
Social content management issues
How do you know it’s accurate? You don’t. It isn’t. But it’s self-correcting.
Security issues
Connectivity issues
The “Shadow IT department”
Boundary issues Friending your boss might be a career-limiting move NOT friending your boss might be a career-limiting move Should you friend  	your spouse? Teacher-student 	issues
Limited control over content
Professionalism of content Professionalism of content
Productivity issues Productivity issues
Privacy issues Privacy issues
Work updates
Other issues Unusual profile names or pictures Groups “Liberals/Conservatives for X” “I bet I can find X people who [insert belief here] Other “bad role model” stuff Pictures of alcohol use/abuse Sexually graphic or obscene materials Criticism of family, friends, current/past employers
Managing social content as records
Prohibition is not realistic
“…fully networked enterprises are not only more likely to be market leaders or to be gaining market share but also use management practices that lead to margins higher than those of companies using the Web in more limited ways…”
[Social content on external sites] will be archived and retained for the required period of time in accordance with the DIR Records Retention Schedule.
Address in policies
Whether the account is monitored for actionable content (screenshot)
Is the information unique and not available anywhere else? Does it contain evidence of an agency’s policies, business, mission, etc.? Is the tool being used in relation to an agency’s work? Is there a business need for the information? Does it document a transaction or decision? Is it a record?
Individual social network status updates or Tweets? The entire stream over a given period? Many of these tools do not lend themselves to metadata…. Policy and consistency are key What is the record?
Determine whether content is unique If it’s already being captured elsewhere, treat as a duplicate record or as a non-record A note about co-creation Duplication
Take a snapshot of record content
Archive entire stream locally
Records management in brief Archive selected items locally Use search queries and monitoring Store selected items locally using search queries or RSS
Use the native backup to store locally Store locally using built-in tools
Use a third-party service to store locally Store locally using third-party service
Store locally using API Store locally using APIs
Use e.g. Word to draft content updates and save *that* as a record Draft content locally
Implement enterprise versions
Implement a compliance solution ,[object Object],[object Object]
Web 2.0 is here Prohibition is not a realistic option Web 2.0 tools can add significant value to the organization And they can be managed as records  Lead your organization to use them effectively Conclusion
Jesse Wilkins, CRM, CDIA+ Director, Systems of Engagement AIIM International              +1 (303) 574-0749 direct 		jwilkins@aiim.org  		http://www.twitter.com/jessewilkins 		http://www.linkedin.com/in/jessewilkins 		http://www.facebook.com/jessewilkins 		http://www.slideshare.net/jessewilkins For more information
“How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”, Patricia Franks, Ph.D., IBM Center for The Business of Government, 2010 “Electronic Records Management: Blogs, Wikis, Facebook, Twitter, & Managing Public Records”, Washington State Archives, September 2009 Additional Resources
“Managing Social Media Records”, U.S. Department of Energy, September 2010 http://cio.energy.gov/documents/Social_Media_Records_and_You_v2_JD.pdf “Best Practices Study of Social Media Records Policies”, ACT-IAC, April 2011 http://www.actgov.org/knowledgebank/whitepapers/Documents/Shared%20Interest%20Groups/Collaboration%20and%20Transformation%20SIG/Best%20Practices%20of%20Social%20Media%20Records%20Policies%20-%20CT%20SIG%20-%2003-31-11%20(3).pdf Additional Resources
NARA Bulletin 2011-02, “Guidance on Managing Records in Web 2.0/Social Media Platforms”, October 2010 http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html “A Report on Federal Web 2.0 Use and Value”, National Archives and Records Administration, 2010 http://www.archives.gov/records-mgmt/resources/web2.0-use.pdf Additional Resources

More Related Content

What's hot

Web 2.0
Web 2.0Web 2.0
Web 2.0
Ankit Saxena
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
Kyle Mathews
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
LoudClick.net
 
Government of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaGovernment of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaJesse Wilkins
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at Workplace
John Macasio
 
Rebooting the Enterprise with Blogs, Wikis and other Social Software
Rebooting the Enterprise with Blogs, Wikis and other Social SoftwareRebooting the Enterprise with Blogs, Wikis and other Social Software
Rebooting the Enterprise with Blogs, Wikis and other Social Software
James Dellow
 
Web 2.0 In The Enterprise
Web 2.0 In The EnterpriseWeb 2.0 In The Enterprise
Web 2.0 In The Enterprise
Lyndon Cerejo
 
Fyronic seminar-software factorymeeting-sls
Fyronic seminar-software factorymeeting-slsFyronic seminar-software factorymeeting-sls
Fyronic seminar-software factorymeeting-sls
Franky Redant
 
Cheryl McKinnon - Speaker Bio
Cheryl McKinnon - Speaker BioCheryl McKinnon - Speaker Bio
Cheryl McKinnon - Speaker Bio
Cheryl McKinnon
 
Companies benefit from Web 2.0 investment
Companies benefit from Web 2.0 investmentCompanies benefit from Web 2.0 investment
Companies benefit from Web 2.0 investment
Sustainly
 
L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011
Giuseppe Sindoni
 
Web 1.0 and Web 2.0
Web 1.0 and Web 2.0Web 1.0 and Web 2.0
Web 1.0 and Web 2.0
Caroline Cerveny
 
Web2 0 Ppt
Web2 0 PptWeb2 0 Ppt
Web2 0 Ppt
surenth
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
Julian Ranger
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Acs Presentation Thinking Outside Of Inbox V2
Acs Presentation   Thinking Outside Of Inbox V2Acs Presentation   Thinking Outside Of Inbox V2
Acs Presentation Thinking Outside Of Inbox V2Johnny Teoh
 
Presentation to CS299 on Web 2.0
Presentation to CS299 on Web 2.0Presentation to CS299 on Web 2.0
Presentation to CS299 on Web 2.0
Doug Cornelius
 
Gov 2.0 - eGovernment Social Media Platform Deployments and Future Opportunities
Gov 2.0 - eGovernment Social Media Platform Deployments and Future OpportunitiesGov 2.0 - eGovernment Social Media Platform Deployments and Future Opportunities
Gov 2.0 - eGovernment Social Media Platform Deployments and Future Opportunities
NIC Inc | EGOV
 

What's hot (19)

Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
 
Government of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaGovernment of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social Media
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at Workplace
 
Rebooting the Enterprise with Blogs, Wikis and other Social Software
Rebooting the Enterprise with Blogs, Wikis and other Social SoftwareRebooting the Enterprise with Blogs, Wikis and other Social Software
Rebooting the Enterprise with Blogs, Wikis and other Social Software
 
Web 2.0 In The Enterprise
Web 2.0 In The EnterpriseWeb 2.0 In The Enterprise
Web 2.0 In The Enterprise
 
Fyronic seminar-software factorymeeting-sls
Fyronic seminar-software factorymeeting-slsFyronic seminar-software factorymeeting-sls
Fyronic seminar-software factorymeeting-sls
 
Cheryl McKinnon - Speaker Bio
Cheryl McKinnon - Speaker BioCheryl McKinnon - Speaker Bio
Cheryl McKinnon - Speaker Bio
 
Companies benefit from Web 2.0 investment
Companies benefit from Web 2.0 investmentCompanies benefit from Web 2.0 investment
Companies benefit from Web 2.0 investment
 
L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011
 
Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
Web 1.0 and Web 2.0
Web 1.0 and Web 2.0Web 1.0 and Web 2.0
Web 1.0 and Web 2.0
 
Web2 0 Ppt
Web2 0 PptWeb2 0 Ppt
Web2 0 Ppt
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Acs Presentation Thinking Outside Of Inbox V2
Acs Presentation   Thinking Outside Of Inbox V2Acs Presentation   Thinking Outside Of Inbox V2
Acs Presentation Thinking Outside Of Inbox V2
 
Presentation to CS299 on Web 2.0
Presentation to CS299 on Web 2.0Presentation to CS299 on Web 2.0
Presentation to CS299 on Web 2.0
 
Gov 2.0 - eGovernment Social Media Platform Deployments and Future Opportunities
Gov 2.0 - eGovernment Social Media Platform Deployments and Future OpportunitiesGov 2.0 - eGovernment Social Media Platform Deployments and Future Opportunities
Gov 2.0 - eGovernment Social Media Platform Deployments and Future Opportunities
 

Similar to 20110427 ARMA Houston Keynote Records Management 2.0

Managing Web 2.0 Records.
Managing Web 2.0 Records.Managing Web 2.0 Records.
Managing Web 2.0 Records.
AIIM International
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20
Jesse Wilkins
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
Jesse Wilkins
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
Jesse Wilkins
 
Intranet 2.0 by Toby Ward, Prescient Digital Media
Intranet 2.0 by Toby Ward, Prescient Digital MediaIntranet 2.0 by Toby Ward, Prescient Digital Media
Intranet 2.0 by Toby Ward, Prescient Digital Media
Prescient Digital Media
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
Centre for Advanced Management Education
 
20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro
Jesse Wilkins
 
Fyronic seminar at Nehra
Fyronic seminar at NehraFyronic seminar at Nehra
Fyronic seminar at Nehra
Franky Redant
 
20110208 ARMA Cincinnati RM 2.0
20110208 ARMA Cincinnati RM 2.020110208 ARMA Cincinnati RM 2.0
20110208 ARMA Cincinnati RM 2.0
Jesse Wilkins
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceSharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
Joel Oleson
 
Why Web 2.0 : Challenges and Opportunities for the Legal Sector
Why Web 2.0 : Challenges and Opportunities for the Legal SectorWhy Web 2.0 : Challenges and Opportunities for the Legal Sector
Why Web 2.0 : Challenges and Opportunities for the Legal Sector
James Mullan
 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshare
Franky Redant
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
Atle Skjekkeland
 
Web 2.0 Workshop
Web 2.0 WorkshopWeb 2.0 Workshop
Web 2.0 Workshop
Sean Boiling
 
Imitation: Sincerest Form of Flattery or Bad Move? (Adopting Web 2.0 Patterns)
Imitation: Sincerest Form of Flattery or Bad Move? (Adopting Web 2.0 Patterns)Imitation: Sincerest Form of Flattery or Bad Move? (Adopting Web 2.0 Patterns)
Imitation: Sincerest Form of Flattery or Bad Move? (Adopting Web 2.0 Patterns)
John Yesko
 
Enterprise 20 Summary
Enterprise 20 SummaryEnterprise 20 Summary
Enterprise 20 Summary
amruta moktali
 
Justice institute v1 short 2
Justice institute v1 short 2Justice institute v1 short 2
Justice institute v1 short 2LeslieDickout
 
Justice Institute V1 Short 2
Justice Institute V1 Short 2Justice Institute V1 Short 2
Justice Institute V1 Short 2LeslieDickout
 

Similar to 20110427 ARMA Houston Keynote Records Management 2.0 (20)

Managing Web 2.0 Records.
Managing Web 2.0 Records.Managing Web 2.0 Records.
Managing Web 2.0 Records.
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
Intranet 2.0 by Toby Ward, Prescient Digital Media
Intranet 2.0 by Toby Ward, Prescient Digital MediaIntranet 2.0 by Toby Ward, Prescient Digital Media
Intranet 2.0 by Toby Ward, Prescient Digital Media
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro
 
Fyronic seminar at Nehra
Fyronic seminar at NehraFyronic seminar at Nehra
Fyronic seminar at Nehra
 
20110208 ARMA Cincinnati RM 2.0
20110208 ARMA Cincinnati RM 2.020110208 ARMA Cincinnati RM 2.0
20110208 ARMA Cincinnati RM 2.0
 
Web 20 For Acra
Web 20 For AcraWeb 20 For Acra
Web 20 For Acra
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceSharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
 
Why Web 2.0 : Challenges and Opportunities for the Legal Sector
Why Web 2.0 : Challenges and Opportunities for the Legal SectorWhy Web 2.0 : Challenges and Opportunities for the Legal Sector
Why Web 2.0 : Challenges and Opportunities for the Legal Sector
 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshare
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
Web 2.0 Workshop
Web 2.0 WorkshopWeb 2.0 Workshop
Web 2.0 Workshop
 
Imitation: Sincerest Form of Flattery or Bad Move? (Adopting Web 2.0 Patterns)
Imitation: Sincerest Form of Flattery or Bad Move? (Adopting Web 2.0 Patterns)Imitation: Sincerest Form of Flattery or Bad Move? (Adopting Web 2.0 Patterns)
Imitation: Sincerest Form of Flattery or Bad Move? (Adopting Web 2.0 Patterns)
 
Enterprise 20 Summary
Enterprise 20 SummaryEnterprise 20 Summary
Enterprise 20 Summary
 
Justice institute v1 short 2
Justice institute v1 short 2Justice institute v1 short 2
Justice institute v1 short 2
 
Justice Institute V1 Short 2
Justice Institute V1 Short 2Justice Institute V1 Short 2
Justice Institute V1 Short 2
 

More from Jesse Wilkins

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
Jesse Wilkins
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
Jesse Wilkins
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
Jesse Wilkins
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
Jesse Wilkins
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
Jesse Wilkins
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
Jesse Wilkins
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
Jesse Wilkins
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
Jesse Wilkins
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
Jesse Wilkins
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
Jesse Wilkins
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
Jesse Wilkins
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
Jesse Wilkins
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
Jesse Wilkins
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
Jesse Wilkins
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
Jesse Wilkins
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
Jesse Wilkins
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
Jesse Wilkins
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
Jesse Wilkins
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
Jesse Wilkins
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
Jesse Wilkins
 

More from Jesse Wilkins (20)

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

20110427 ARMA Houston Keynote Records Management 2.0

  • 1. Managing Content Generated by Social Media Tools as Records Jesse Wilkins, CRM April 27, 2011
  • 2. International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org About AIIM
  • 3. Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Director, ARMA International Board of Directors (2007-2010) Frequent industry speaker and author AIIM ERM Expert Blogger Instructor for AIIM Certificate Programs Jesse Wilkins, CRM 3
  • 4. By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery. Source: “Social Media Governance: An Ounce of Prevention”, Gartner It’s just a fad….
  • 5. Is a Facebook “like” a record?
  • 6. Introduction to Web 2.0 Web 2.0 technologies Web 2.0 issues and challenges Managing Web 2.0 content as records Agenda
  • 8. “Web 2.0 is the business revolution in the computer industry caused by the move to the internet as platform, and an attempt to understand the rules for success on that new platform. Chief among those rules is this: Build applications that harness network effects to get better the more people use them.” -- Tim O’Reilly, 12/10/2006 Web 2.0
  • 9. “Enterprise 2.0 is the use of emergent social software platforms within companies, or between companies and their partners or customers.” -- Andrew McAfee, 5/2006
  • 10. “Working where you want, when you want, and being able to conduct real business.” blognation Canada
  • 12. Systems of Engagement Systems of Record
  • 14. Blogs Microblogs Wikis Social networking Social sharing Types of Web 2.0 tools
  • 15. Started as online diaries Today used more as lightweight CMS Hides complexity of Web publishing Generally arranged in chronological order, most recent at top What’s a blog? 15
  • 16. Blogs
  • 19. “It is part text messaging and part blogging, with the ability to update on your cell phone or computer, but constrained to 140 characters.” -- Ari Herzog, Ariwriter.com Defining microblogging 19
  • 20.
  • 23. Collaborative website Organized as linked articles Hides complexity of HTML from users Easy to add and link articles Easy to correct mistakes Wiki-wiki 23
  • 25. Source: Stewart Mader, www.ikiw.org How do you use a wiki?
  • 26. Create agenda and minutes
  • 27. Wikis are more archival than email, less process than Word. -- Mike Cannon-Brookes Co-founder and CEO of Atlassian
  • 35. Services dedicated to sharing particular types of information Often allow subscription to a particular user or keyword Often allow rating and adding to favorites Easy to link to and embed in other websites What is social sharing?
  • 37. Use cases: social sharing
  • 38. Use cases: social sharing
  • 39. Use cases: social sharing
  • 41. How do you know it’s accurate? You don’t. It isn’t. But it’s self-correcting.
  • 44. The “Shadow IT department”
  • 45. Boundary issues Friending your boss might be a career-limiting move NOT friending your boss might be a career-limiting move Should you friend your spouse? Teacher-student issues
  • 47. Professionalism of content Professionalism of content
  • 51. Other issues Unusual profile names or pictures Groups “Liberals/Conservatives for X” “I bet I can find X people who [insert belief here] Other “bad role model” stuff Pictures of alcohol use/abuse Sexually graphic or obscene materials Criticism of family, friends, current/past employers
  • 53. Prohibition is not realistic
  • 54. “…fully networked enterprises are not only more likely to be market leaders or to be gaining market share but also use management practices that lead to margins higher than those of companies using the Web in more limited ways…”
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. [Social content on external sites] will be archived and retained for the required period of time in accordance with the DIR Records Retention Schedule.
  • 62.
  • 64. Whether the account is monitored for actionable content (screenshot)
  • 65. Is the information unique and not available anywhere else? Does it contain evidence of an agency’s policies, business, mission, etc.? Is the tool being used in relation to an agency’s work? Is there a business need for the information? Does it document a transaction or decision? Is it a record?
  • 66. Individual social network status updates or Tweets? The entire stream over a given period? Many of these tools do not lend themselves to metadata…. Policy and consistency are key What is the record?
  • 67. Determine whether content is unique If it’s already being captured elsewhere, treat as a duplicate record or as a non-record A note about co-creation Duplication
  • 68. Take a snapshot of record content
  • 70. Records management in brief Archive selected items locally Use search queries and monitoring Store selected items locally using search queries or RSS
  • 71. Use the native backup to store locally Store locally using built-in tools
  • 72. Use a third-party service to store locally Store locally using third-party service
  • 73. Store locally using API Store locally using APIs
  • 74. Use e.g. Word to draft content updates and save *that* as a record Draft content locally
  • 76.
  • 77. Web 2.0 is here Prohibition is not a realistic option Web 2.0 tools can add significant value to the organization And they can be managed as records Lead your organization to use them effectively Conclusion
  • 78. Jesse Wilkins, CRM, CDIA+ Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins For more information
  • 79. “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”, Patricia Franks, Ph.D., IBM Center for The Business of Government, 2010 “Electronic Records Management: Blogs, Wikis, Facebook, Twitter, & Managing Public Records”, Washington State Archives, September 2009 Additional Resources
  • 80. “Managing Social Media Records”, U.S. Department of Energy, September 2010 http://cio.energy.gov/documents/Social_Media_Records_and_You_v2_JD.pdf “Best Practices Study of Social Media Records Policies”, ACT-IAC, April 2011 http://www.actgov.org/knowledgebank/whitepapers/Documents/Shared%20Interest%20Groups/Collaboration%20and%20Transformation%20SIG/Best%20Practices%20of%20Social%20Media%20Records%20Policies%20-%20CT%20SIG%20-%2003-31-11%20(3).pdf Additional Resources
  • 81. NARA Bulletin 2011-02, “Guidance on Managing Records in Web 2.0/Social Media Platforms”, October 2010 http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html “A Report on Federal Web 2.0 Use and Value”, National Archives and Records Administration, 2010 http://www.archives.gov/records-mgmt/resources/web2.0-use.pdf Additional Resources
  • 82. Florida Social Media Toolkit http://sites.google.com/site/flsocmed/ “Friends, Followers, and Feeds: A National Survey of Social Media Use in Government”, NASCIO, September 2010 http://www.nascio.org/publications/documents/NASCIO-SocialMedia.pdf Texas Dept of Information Resources Social Media Policy http://www.texas.gov/en/about/Pages/social-media-policy.aspx Additional Resources
  • 83. Compliance Building Social Media Policies Database http://www.compliancebuilding.com/about/publications/social-media-policies/ 57 Social Media Policy Examples and Resources http://www.socialmediatoday.com/davefleet/151761/57-social-media-policy-examples-and-resources Web 2.0 Governance Policies and Best Practices http://govsocmed.pbworks.com/w/page/15060450/Web-2-0-Governance-Policies-and-Best-Practices Additional Resources
  • 84. Social Media Governance policy database http://socialmediagovernance.com/policies.php “Analysis of Social Media Policies: Lessons and Best Practices”, Chris Boudreaux, December 2009 http://socialmediagovernance.com Additional Resources

Editor's Notes

  1. [twitter]Introduction to Web 2.0[/twitter]
  2. Now let’s turn to some definitions. And we begin with Web 2.0. The first references to Web 2.0 occurred as early as 1999, but it wasn’t until Tim O’Reilly’s inaugural Web 2.0 Conference in 2004 that the term really started to stick. Tim has redefined Web 2.0 on a number of occasions and seems to be happiest with this one. I won’t read the entire thing to you, but I do want to focus your attention on the last line: “Build applications that harness network effects to get better the more people use them.” This really started with fax – the first person to buy a fax was pretty gullible, no? So was the second. But once that tipping point hit, fax became an amazing business tool that many companies today consider a critical part of their communications infrastructure. Amazon doesn’t work nearly as well without recommendations, and “People who bought this also bought…..”, and lists, and all the other social functionality embedded in it. Wikipedia with only one author is Microsoft Word with a bad user interface. [twitter]Tim O’Reilly’s definition of Web 2.0: build apps that get better the more people use them. http://is.gd/87biX [/twitter]
  3. Andrew McAfee is generally accepted to have coined the term Enterprise 2.0 in 2006. His definition has gone through a number of refinements; in May 2006 he came up with this definition for Enterprise 2.0 2.0 (his term). [twitter]Andrew McAfee: E2.0 is the use of emergent social software platforms within companies, or between companies and their partners or customers.[/twitter]
  4. It’s also true that Web 2.0 is profoundly changing the way we work. You can work on a computer at your work, home, or Internet café, a laptop at the airport, a tablet PC at the local starbucks, or on your iPhone in a pub. It generally requires Web access, though even this is starting to change, but the tools are lightweight enough and the computers are both mobile enough and powerful enough to let you “work where you want, when you want, and be able to conduct real business.“[twitter]Web 2.0:work where you want, when you want, and be able to conduct real business. – blognation Canada[/twitter]
  5. During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
  6. The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
  7. Not just Twitter, but since it is by far the most successful at this point the examples for the first two sections will largely focus on it.
  8. Wikipedia: 3 million+ articles in EnglishMore than 13 million in 264 languagesWiktionary:1,306,000+ definitions in EnglishWikiQuote: 16,900+ quotationsWikitravel: 22,000+ destination guidesLyricwiki: 879,000+ song lyrics!
  9. Wikis are another really common example of Web 2.0 tools. Whereas blogs are designed for one-way broadcast-type communications, wikis are genuinely collaborative tools. The most well-known example of this is Wikipedia, the encyclopedia that anyone can edit. As I noted earlier Wikipedia includes more than 13 million articles in 260+ languages. Compare this with the EncyclopediaBrittanica, which includes some 65,000 articles in its 35-volume set. Wikis make it easy to collaborate on a particular document or deliverable – click Edit, make your changes, click Save or Publish. Changes are tracked to the individual character level, and for private wikis, can be integrated into your Active Directory or identity infrastructure so as to prohibit anonymous changes.
  10. And finally, we come to social networking. This term describes sites that allow users to interact with other users. Individual users can update their status, add contacts, publish photos and blogs, share links, and do many other activities. Common examples of these include Facebook, which claims more than 400 million users world-wide; LinkedIn; Myspace; and any number of custom social networks. Here is ARMA’s custom social network, iConference. It’s built on top of the Ning engine, which supports more than 1.8 million social networks and adds more than 4,000 new networks every day. You can see here it supports photo sharing, event announcements and planning, blogs, and a forum. iConference has groups set up for specific topics including education, government, and energy. The forum also has a special area set up to ask questions of the 2010 candidates for the Board of Directors.
  11. Keep in touch with remote offices, colleagues, and even familyNetworking - personal, professional, career
  12. Learn new things. Lots of what folks post day-in and day-out is trivial. Then again, so is the RECMGMT-L listserv – and yet how many of you are on that and swear by the value you receive from it?
  13. 80% of companies use social media for recruitment – 95% use LinkedIn. And every recruiter and HR manager does due diligence on candidates using Google – and the top links for many are their profiles on LinkedIn, Facebook, etc.
  14. Because people are amazingly altruistic in a crisis. Not directly related but see Haiti relief effort: text = $10 donation to Red Cross. Quick, easy, Tweetable, FB-able, etc.
  15. Here is a screenshot of YouTube. You can see some of the social aspects of Youtube here, including ratings; the ability to mark it as a favorite; the ability to subscribe to updates either of the video or by the author; and the ability to share a video in a number of ways including sending a link or embedding it directly in another web application such as a blog or Facebook. Users can also comment on individual videos via text or by posting video responses. Most of the other social sharing tools offer similar capabilities.
  16. Social sharing tools, as the name suggests, are tools useful for sharing particular types of content. The most well-known ones include YouTube, for sharing video; Flickr, for sharing photographs; Delicious, for sharing bookmarks; Box.net, for sharing files; and Slideshare, for sharing presentations and other documents. I will be posting this presentation to my Slideshare account later this week. Here is a screenshot of YouTube. You can see some of the social aspects of Youtube here, including ratings; the ability to mark it as a favorite; the ability to subscribe to updates either of the video or by the author; and the ability to share a video in a number of ways including sending a link or embedding it directly in another web application such as a blog or Facebook. Users can also comment on individual videos via text or by posting video responses. Most of the other social sharing tools offer similar capabilities. [twitter]Screenshot of YouTube as example of social sharing tool. Others include Box.net, Slideshare, Delicious, and Flickr.[/twitter]
  17. This is delicious, which is used to share all kinds of bookmarks. It’s great for accessing your bookmarks from another computer such as an internet kiosk, but it’s even more valuable as a filter. As you see here, you can see bookmarks related to a particular topic and how many times it’s been bookmarked, which is one way to gauge its value to others. You can also post a link to your delicious page and others can access your bookmarks directly.
  18. [twitter] Web 2.0 considerations and issues[/twitter]
  19. Security issues are probably the ones most often cited. Every day seems to bring another high-profile data breach. It’s important to remember that in the overwhelming majority of these cases the breach is not due to third-party hackers – instead, it’s often done by someone on the inside such as a disgruntled employee or former employee whose access was not revoked. And the next most common avenue for breaking into an application is through social engineering – guessing users’ weak passwords like “password” or “12345”, etc. Many of the larger Web 2.0 services offer physical and logical security comparable to, if not better than, what the organization provides because there is no way for rogue employees to directly access the system, the database, etc. [twitter]Web 2.0 tools are perceived to be less secure but not always the case.[/twitter]
  20. It may seem obvious that a Web 2.0 tool requires internet connectivity to work, but organizations do not always think through the ramifications of that. An employee for an organization that moves entirely to Google Apps and Gmail, for example, would not be able to do any work on a plane and would have to either buy an air modem or buy or find Wifi internet access. And if connectivity should drop in the middle of drafting a long report, it is entirely possible that any unsaved work would be lost. Some services can work offline and synchronize, but these are still few and far between. [twitter]Web 2.0 tools have to be connected to work – no connection, no access.[/twitter]
  21. Technology often moves from the consumer space to the enterprise – consider everything from CDs to instant messaging. But often the technologies require very technology-savvy users, a bit of hacking about, and at least the tacit acceptance if not outright assistance of IT to implement. Web 2.0 is sometimes referred to as “Shadow IT” because it is so easy to implement and use without IT’s assistance. Many of these tools are free, or extremely low cost. The software that runs Wikipedia for example is open source (and therefore essentially free). It’s a complicated product – but if you don’t need that scalability and robustness, you can set up a very feature-rich yet intuitive wiki from pbWorks or Wikispaces for very low cost in about 15 minutes. And most of the other tools we discussed earlier are similar. [twitter] Web 2.0 is sometimes referred to as “Shadow IT” because it is so easy to implement and use without IT’s assistance.[/twitter]
  22. Photo uploadsLikesCommentsAdding to new Groups in FacebookLocation checkins- Anyone have a younger brother with an attitude? 
  23. [twitter] Web 2.0 considerations and issues[/twitter]
  24. The first step many organizations take to manage Web 2.0 is to try to block them. This is unrealistic for a number of reasons.
  25. Moving into mainstream
  26. FacebookflickrYoutubeTwitterGet satisfaction
  27. TwitterFacebookFlickrYouTubeGet Satisfaction
  28. Categories…Administrative RecordsElectronic Data Processing RecordsPersonnel RecordsFiscal RecordsSupport Services Records
  29. The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information:Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
  30. The next step is to determine exactly what is the record and must therefore be retained. Again, this will likely vary not just by content, but also by the nature of the tool. An individual social network status update or Tweet could rise to the level of a record, though I suspect this will be uncommon; in the case of a protracted discussion on someone’s wall or via Twitter, it might be the entire stream of updates on a particular topic or over a given period. This is analogous to determining when an instant message is a record. Many of these tools don’t really have metadata in the traditional sense. Twitter, for example, has the following public metadata: SenderMentions (the @ or DM it is addressed to, and could be more than one)A unique Twitter IDAn in-response-to Twitter ID if it uses the Twitter Reply capabilityA ReTweet ID if it was ReTweetedDate and time sentThe client used to send the update, if knownAny hashtags could be considered metadataBut note what there isn’t: No subject line or topic, no mechanism for filing it, no keywords (except maybe the hashtag). Other systems may offer more or less metadata but it is difficult to access some of that, even if it is retained by the system or commercial provider. The key is to have a records policy that is broad enough to encompass all of these tools and that stresses the content and context of information rather than its format. And as we noted earlier, just because it exists does not make it a record per se.[twitter] The next step is to determine exactly what is the record and must therefore be retained. [/twitter]
  31. Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it.
  32. At this point I’d be pleased to entertain your questions.
  33. In conclusion, Web 2.0 is not something coming down the road or over the horizon – it’s here today and is probably in your organization, whether you know about it or not. It is all but impossible to effectively prohibit them – and the tools can significantly improve an organization’s collaboration and knowledge sharing, thereby adding value to the organization. It is incumbent on records management professionals to step up and lead your organizations in the effective use and management of these tools.