3 Tips for Managing Risky User Activity in 2015ObserveIT
The single biggest security risk in 2015 will be your users. Whether it’s malicious or negligent activity, 69 percent of reported security incidents involve a trusted insider. What’s more, 84 percent of insider security incidents involve everyday business users - those with no admin rights. You have not one but hundreds—perhaps thousands—of these users who need to access to critical applications and data every day.
Check out these slides from a webinar with David Monahan, Research Director at Enterprise Management Associates (EMA), to learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks. David is a senior Information Security Executive with nearly 20 years of experience. He has diverse experience with security, audit and compliance, and user risk in a wide range of industries.
Basic security awareness training for small and midsize businesses focusing on social engineering tactics and concepts. Customizable for individual organizations
CompTIA 11th Annual Information Security TrendsCompTIA
Organizations are overwhelmingly confident in their readiness to combat security threats, but may not be prepared for dangers linked to new technology models and increasingly sophisticated threats, according to a new study released by CompTIA, the non-profit association for the information technology industry.
Led by CompTIA Market Research, learn how the mobility trend is affecting IT departments and processes. Part II of this discussion centers on challenges beyond the devices themselves.
3 Tips for Managing Risky User Activity in 2015ObserveIT
The single biggest security risk in 2015 will be your users. Whether it’s malicious or negligent activity, 69 percent of reported security incidents involve a trusted insider. What’s more, 84 percent of insider security incidents involve everyday business users - those with no admin rights. You have not one but hundreds—perhaps thousands—of these users who need to access to critical applications and data every day.
Check out these slides from a webinar with David Monahan, Research Director at Enterprise Management Associates (EMA), to learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks. David is a senior Information Security Executive with nearly 20 years of experience. He has diverse experience with security, audit and compliance, and user risk in a wide range of industries.
Basic security awareness training for small and midsize businesses focusing on social engineering tactics and concepts. Customizable for individual organizations
CompTIA 11th Annual Information Security TrendsCompTIA
Organizations are overwhelmingly confident in their readiness to combat security threats, but may not be prepared for dangers linked to new technology models and increasingly sophisticated threats, according to a new study released by CompTIA, the non-profit association for the information technology industry.
Led by CompTIA Market Research, learn how the mobility trend is affecting IT departments and processes. Part II of this discussion centers on challenges beyond the devices themselves.
This session at the ARMA Central Iowa Spring Seminar introduced the various classes of social business tools including blogs, Twitter, wikis, social sharing, and social networking.
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
This final session at the ARMA Central Iowa Spring Seminar focused on enterprise social business software capabilities and considerations and described steps to capture social content as records.
This power point pres will be useful for all the budding PhD aspirants who are preparing for their viva irrespective of their subject. Good Luck & All the Best !
This workshop delivered July 20, 2011 at FOSE 2011 described the elements of a social media governance framework, identified structural and policy statements to include in the social media policy, and describes strategies for capturing and managing social media-generated content as records.
This presentation from the 2011 NARA E-Records Forum in Austin provided guidance on how to manage social business content as part of a records program.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
This session at the ARMA Central Iowa Spring Seminar introduced the various classes of social business tools including blogs, Twitter, wikis, social sharing, and social networking.
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
This final session at the ARMA Central Iowa Spring Seminar focused on enterprise social business software capabilities and considerations and described steps to capture social content as records.
This power point pres will be useful for all the budding PhD aspirants who are preparing for their viva irrespective of their subject. Good Luck & All the Best !
This workshop delivered July 20, 2011 at FOSE 2011 described the elements of a social media governance framework, identified structural and policy statements to include in the social media policy, and describes strategies for capturing and managing social media-generated content as records.
This presentation from the 2011 NARA E-Records Forum in Austin provided guidance on how to manage social business content as part of a records program.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
The roadmap is designed as a framework – that is, it addresses a wide variety of issues and challenges, not all of which will be applicable to every organization. Organizations are encouraged to use this roadmap as a starting point, but to customize it to their particular circumstances including their regulatory environment, organizational culture, level of familiarity with different tools, and of course their overall strategic goals and objectives.
Organizations that follow this roadmap will move from tactical, ad hoc, and suboptimal approaches to social business technologies to a more strategic and systematic implementation.
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...Jesse Wilkins
This presentation introduced enterprise use cases for social media, described the difference between commercial and enterprise social technologies, and provided specific steps to take to manage social content as records.
The presentation delivered to the ARMA Dallas Chapter by Jesse Wilkins, AIIM Director, Systems of Engagement. The presentation looks at methods of managing web 2.0 records, such as Facebook, Twitter and everything in between.
Mapping Roles and Responsibilities for Social Media Risk ManagementNexgate
Social media has quickly proven to be a tremendous resource for marketing, human resources, support, and many other business functions. However, that same communications tool can also introduce a significant amount of risk to an organization – risk to corporate compliance, from security threats, employee error and abuse, and much more.
View the slides from Alan Webber, Principal at Asymmetric Insights, John Hair, Director, IT Advisory for KPMG, Chris Walker, Partner at Connect Marketing, and Devin Redmond, Co-Founder & CEO of Nexgate and their webcast on organizational roles and responsibilities in social risk management. Our expert panel shared their insights into how to define and manage enterprise social risk across your social media marketing teams.
You can watch a recording of the webcast here: http://nexgate.com/resources/webcast-roles-and-responsibilities-for-social-risk-management/
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
This luncheon keynote at the ARMA Houston Spring Seminar introduced Web 2.0 concepts and issues and provided attendees with specific steps for managing social content as part of the records program.
Manage your Online Reputation with Simplify360Simplify360
Find out why Simplify360 is a complete social business intelligence platform for all your needs.How we intelligently work on data to help you manage your brand image.
Reach us on http://s360.us/WLDoza for a free demo of our product.
Or drop us a mail at contact@simplify360.com
This presentation explains Information Governance. Learn what it takes to improve the value of information, manage information risks, and reduce information costs.
This presentations takes you behind the scenes on recent enterprise social projects from corporate and public sector organisations, discussing social business in 2014 and beyond.
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Northeast Ohio Chapter on April 9, 2024, outlined the purpose and benefits of building a RIM Playbook, described the elements of a playbook, described the elements of a ply, and outlined the steps to take to build a playbook.
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Milwaukee chapter on April 25, 2024, reviewed the 6 eras of records management, defined the characteristics of the age of privacy, outlined the concepts of defensible disposition and data minimization, and presented a recommendation to move in the direction of purpose-based retention and a personal information retention schedule.
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Oklahoma chapter on February 15, 2024, introduced attendees to the idea of a business and RIM playbook. Attendees learned about the benefits of a playbook, the elements of a playbook, and the elements of a play. The session concluded with a review of the process for building a playbook from scratch.
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
This presentation, delivered virtually to the ARMA Chattanooga chapter on February 13, 2024, described the elements of a business assessment, a technical assessment, and a maturity assessment in support of an information management initiative.
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
This presentation, delivered virtually on February 2, 2024 as part of the Austin ARMA Annual Conference, introduced the idea of a records management playbook. I described the purpose and benefits of a playbook, then outlined the elements of a playbook and the individual plays.
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater St. Louis Chapter on January 18, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater Kansas City Chapter on January 10, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
This presentation, delivered virtually to the ARMA Madison Chapter on December 7, 2023, outlined the value of a business playbook and, specifically, a records and information management (RIM) playbook. Attendees learned about the elements of a playbook and of individual plays and how to construct their own playbooks using a provided template.
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
This presentation, delivered virtually to the ARMA Florida Gulf Chapter on December 19, 2023, outlined the value of certifications and described three class of certifications including RIM, "RIM-adjacent", and "Other". Attendees received an overview of the 6 RIM certifications and a table comparing their exams and programs. The session concluded with a framework for determining how to select the most appropriate certification based on costs, context, and program visibility and market awareness.
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
This presentation was delivered virtually to ARMA San Diego on October 5, 2023. It compared and contrasted the various information governance / information management-related certifications and presented a framework for deciding which one(s) to pursue based on an individual's career goals.
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
This presentation, delivered at the ARMA Canada Information Conference on July 19, 2023 in Toronto, outlined a framework for professional development in the IM industry. Attendees learned about the 4 types of learning and the 5 domains IM professionals need to understand. Attendees also received a professional development plan template.
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
This presentation, delivered on July 17, 2023, at the ARMA Canada Information Conference, compared and contrasted the various IM and IM-adjacent certifications. Attendees also learned how to determine the right certification for them based on their career goals.
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
This keynote, delivered at the ARMA New England Win with IG seminar on September 19, 2023, outlined the state of the IG industry from three perspectives: what industry analysts are talking about, what the key conference sessions are about, and what individual chapters and vendors are talking about. The session concluded with ways for individuals to keep abreast of developments in IG.
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
This presentation, delivered to the ARMA Mile High Denver Chapter on January 17, 2023, outlined the value and benefits of building a records management playbook. Attendees learned about the elements of a playbook and the individual plays within the playbook. The session concluded with a discussion of how to actually build a RM playbook.
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
This presentation, delivered to the ARMA Boston Chapter on June 2, 2016, outlined how to apply information governance practices to social media posts. It described specific social media security threats and gave attendees an opportunity to participate in roundtable discussions.
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
This presentation, delivered at the MER conference in Chicago on May 23, 2023, introduced attendees to the concept of an information governance playbook. Attendees learned the purpose and value of a playbook, as well as the structure of a playbook and of individual plays. The session concluded with a discussion of how to build and maintain a playbook.
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
This presentation, delivered to the AIIM True North chapter virtually on September 12th, introduced ChatGPT and other generative AI tools. I briefly introduced and demonstrated ChatGPT and some other generative AI tools. We reviewed some of the more popular use cases and benefits of using generative AI. We also reviewed some of the challenges these tools present for the organization. Finally, we discussed some practices to use these tools safely and effectively in support of real business outcomes.
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
This session provided the conclusion to the ARMA Nebraska 2023 Spring Seminar in Omaha, Nebraska. Attendees learned what a playbook is, what plays are, and how to develop a RIM/IG playbook tailored to their organization.
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
This session, delivered at the ARMA Nebraska Spring Seminar 2023 on April 19, 2023, introduced the professional development matrix and walked attendees through how to leverage the matrix to develop their own personal professional development plans.
An introduction to the cryptocurrency investment platform Binance Savings.Any kyc Account
Learn how to use Binance Savings to expand your bitcoin holdings. Discover how to maximize your earnings on one of the most reliable cryptocurrency exchange platforms, as well as how to earn interest on your cryptocurrency holdings and the various savings choices available.
In the Adani-Hindenburg case, what is SEBI investigating.pptxAdani case
Adani SEBI investigation revealed that the latter had sought information from five foreign jurisdictions concerning the holdings of the firm’s foreign portfolio investors (FPIs) in relation to the alleged violations of the MPS Regulations. Nevertheless, the economic interest of the twelve FPIs based in tax haven jurisdictions still needs to be determined. The Adani Group firms classed these FPIs as public shareholders. According to Hindenburg, FPIs were used to get around regulatory standards.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
Understanding User Needs and Satisfying ThemAggregage
https://www.productmanagementtoday.com/frs/26903918/understanding-user-needs-and-satisfying-them
We know we want to create products which our customers find to be valuable. Whether we label it as customer-centric or product-led depends on how long we've been doing product management. There are three challenges we face when doing this. The obvious challenge is figuring out what our users need; the non-obvious challenges are in creating a shared understanding of those needs and in sensing if what we're doing is meeting those needs.
In this webinar, we won't focus on the research methods for discovering user-needs. We will focus on synthesis of the needs we discover, communication and alignment tools, and how we operationalize addressing those needs.
Industry expert Scott Sehlhorst will:
• Introduce a taxonomy for user goals with real world examples
• Present the Onion Diagram, a tool for contextualizing task-level goals
• Illustrate how customer journey maps capture activity-level and task-level goals
• Demonstrate the best approach to selection and prioritization of user-goals to address
• Highlight the crucial benchmarks, observable changes, in ensuring fulfillment of customer needs
20110913 ECM Show 2011 Opening Keynote on the Social Business Roadmap
1. Social Business: Using Social Processes and Technologies To Achieve Strategic Objectives Jesse Wilkins, CRM Director, Systems of Engagement AIIM International September 13, 2011
2. About AIIM International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org
3. Jesse Wilkins, CRM Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Frequent industry speaker and author AIIM ERM and E2.0 Expert Blogger Instructor for AIIM Certificate Programs
8. Systems of Record Systems of Record Command and control Transaction-oriented Data-centric User learns system Security is key issue Source = AIIM and TCG Advisors
12. The Next Decade of Enterprise IT Systems of Engagement Systems of Record Command and control Open and accessible Transaction-oriented Interaction-oriented Document-centric User-centric Limited deployment Ubiquitous deployment Central IT-provisioned Self-provisioned
13.
14. “A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers. We call this new kind of company the networked enterprise.”
16. Technology touches everyone. Everyone carries technology expectations into the workplace. Why do I feel so powerful as a consumer and so lame as an employee? Photo source = http://www.flickr.com/photos/notionscapital/5225049493/
25. Strategy Formalization of approach Social business assessment Planning and project management Internal marketing and communication Social business team Organization-specific roadmap 25
26. Development Identify desired capabilities and deployment options Procure and implement tools Develop and deliver training and support Build integration 26
30. Monitoring Listen to conversations before jumping into them Look for tone and sentiment Watch for complaints Set up queries and alerts Empower community managers 30
40. Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.” Policy 2.0 – in 140 characters
41. Optimization Encourage uptake of the tools Monitor efficacy of tools Measure and analyze tools and processes Continue to educate users and stakeholders Identify changes to tools and new tools
42. Conclusion Social business processes and tools are here TODAY Significant business benefits from their use It can be done responsibly It’s time to lead our organizations
43. Jesse Wilkins, CRM, CDIA+, ermm Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins For more information
Editor's Notes
During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
1518We have spent the past several decades of IT investment focused on deploying 'systems of record.' Transaction systems for global commerce . . . Financials, Order Processing, Inventory, HR, CRM, Supply Chain . . .Mainframes, minis, client-server, PC, Internet-enabled, SaaSDrove three decades of investmentData centers everywhereDatabases, OLTP, reporting and analyticsNetwork as a transport mechanismThese systems accomplished two important things: First, they centralized, standardized, and automated business transactions on a global basis, thereby better enabling world trade. Second, they gave top management a global view of the state of the business, thereby better enabling global business management. Spending on the Enterprise Content Management technologies that are at the core of Systems of Record will continue -- and will actually expand as these solutions become more available and relevant to small and mid-sized organizations
The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation.
1050“A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers. We call this new kind of company the networked enterprise.”
350,000 apps in the iStoreOver 10 billion downloads
1541 The roadmap provide organizations with a formal framework for evaluating and implementing social processes and technologies both inside and outside the firewallNot for just implementing a social technology, but benefiting from social processes and technologiesLeverage innovation from the massesMake it lean and agile; Fail fastRoadmap developed based on outcomes of Moore project and research the last 3 years from our 65,000 community membersQUESTION: What is necessary to achieve innovation from the masses (Empowerment covered on next slide)?
1542: Question: What are the prerequisites for Social Business?0. Empowerment: personal projects, measure outcomes, freedom to experiment- Transparency requires that the organization move from a culture of knowledge hoarding to one of knowledge sharing.- Trust requires that the organization trust its users to do what is right, while supporting them with the training and governance required for them to be accountable for that trust.- And technology requires willingness to allow employees to experiment with new tools and processes, trusting that they will not abuse them and permitting them to “fail fast.”
1543 How do you identify and set a Strategy? Answer: Need proof of concept1. Emergence (or Concepts/Skunkworks): Biz and IT innovation from the massesIn this step the organization is not using social technologies in any formal or organized way. Instead, individuals or small groups within the organization are experimenting with social technologies to determine whether there is business value to them.- 1.1 Encourage innovation- 1.2 Find external reference examples- 1.3 PrototypeQUESTION 1: Anybody has additional factors or tasks that will encourage Emergence (Innovation from the masses)?QUESTION 2: How important is it to show ROI?
1549
Identifying what tools to use – here, wiki, blog, user ratings of appsSetting up navigation and classificationDeploying social sharing widgets (which ones, how)
1544 One of the most famous cases studies of Emergence is the beginning of Intellipedia. Now this has led to an entire suite of collaborative tools behind the firewall. Led by champions Don Burke, Sean Dennehy, and Andrea Baker of the Intellipedia Development cell. Social Business tools were brought in for testing in quick and short pilots: urls were shared with test users and programs either stuck or failed-fast. Today the tool set available to users is not as wide as it is on the open net, but it is focused based on best use cases and adoption by the internal community. Tools are inter-connected and a single sign on is available.
1551 Monitoring/Listening: Viral implementationInitially the organization should spend time listening to the conversations taking place in and around a particular tool to get a sense of the nature of the tool, the content of the conversations, the target audiences, and who the leading participants are.This is perhaps more visible in externally focused processes but is important for internal ones as well.QUESTION: How do you support a viral adoption? Answer: rumors, communication, ambassadors, show people, show benefits- 4.1 Listen to internal sites and comments- 4.2 Listen to external sites and comments- 4.3 Set up queries and alerts- 4.4 Empower community managers
1555 http://www.onesocialmedia.com/2011/02/social-media-listening-in-real-time-case-study-toyota-of-des-moines/Social Media account manager was lucky enough to have seen this post only 5 minutes after it had been posted. Because the Facebook post was fairly recent, I decided to call someone at Toyota of Des Moines. I wanted to see if they could find the displeased customer before she left the dealership, in hopes that they could try to work through the issue with her in person. As luck would have it, the customer was still at the dealership at the time that I called to inform them of the post. They were able to talk with her, to let her know that they saw her Facebook post, and that they wanted to work through the issue with her.
1553. Participation: Getting all relevant people to get involvedOnce the organization has done some listening it will be able to participate more meaningfully and should begin doing so according to what it has learned about the target market and the nature of the conversations on the various tools.QUESTION: How do you get all relevant people involved? Answer: Demonstrate benefits, carrot/stick, etc.- 5.1 Seed content into the tools5.2 Ensure consistent messaging across platformsAnd split this step into stages; e.g first get people to register
Move from listening and broadcasting to engagementPlan for engagementTriage for comments, external mentionsEngagement on public, commercial, and third-party sitesAuthenticity and personality
1559 CNN iReporterhttp://ireport.cnn.com/community/assignmentCNN’s iReport assignment desk is an example of community evolution of technology and communication. Eachday and throughout the day as news breaks, the editors of the iReport page put up assignments to the citizenjournalists to help get real and participatory news live from wherever in the world it is happening. They haveembraced the evolution of technology by asking for submissions as the technology evolves and connecting itwith social media through hashtags on Twitter.This creates additional conversation around not only contributions, but the delivery medium itself. Those noteven connected to CNN are able to participate in the conversation because it is being held at the widest possibledistribution point or audience, out in the open on social media streams.
1610
1604
Here’s a very succinct Twitter policy from a blog by an HR-focused law firm, GruntledEmployees.com. “Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.””Pretty good, right? Now, you could argue that this policy is missing a lot of the stuff I just mentioned. But I don’t know that I agree – authentic, professional, discreet, represent us well – that’s pretty close. And regardless of what you think might be missing, I’d argue that if your employees follow this policy, you won’t have many issues with them. And note that this policy is itself Tweetable. [twitter] Policy 2.0 – in 140 characters, courtesy of gruntledemployees.com. http://is.gd/8BpjT[/twitter]