SlideShare a Scribd company logo
Enterprise Social Media:




5         Five Common Questions
          and Lessons Learned




                           www.awarenessnetworks.com
5 Common Questions




 Table of Contents




 3.   Introduction: Approaching the Web 2.0 Groundswell

 4.   Managing Participation

              The Question: How Do You Encourage and Manage User Participation?

              Lesson Learned: Speed Up and Slow Down Community Activity

                      Controlling the Flow of Bad Content and Good

                      Slowing the Surge of Bad Content

                      Controlling What Users Perform

                      Using Automated Moderation Features

                      Leveraging Good Content

 7.   Controlling Security and Access

              The Question: Who Can Get In; and What Can They See and Do?

              Lesson Learned: Categorize Content and Users; Control Access

 9.   Compliance and Auditing

              The Question: Who Did What?

              Lesson Learned: Use Versioning and Audit Tools

10.   Recognizing Content Ownership

              The Question: Who Owns the Content?

              Lesson Learned: Establish Ownership

11. Choosing a Technology Strategy
              The Question: What’s Best for My Users?

              Lesson Learned: Be Ready for Change

12.   Summary: Learning from Experience




                                                          www.awarenessnetworks.com
5 Common Questions




                            Introduction: Approaching the Web 2.0 Groundswell



                            The rise of Web 2.0 communities such as MySpace, Facebook and LinkedIn is
                            driving a groundswell of social media activity that many businesses are clamoring
                            to take advantage of. As organizations begin to think through their social media
                            strategy, they raise a lot of questions. An experienced provider of Web 2.0
                            communities, Awareness hears many of these questions first hand. And we
                            offer practical advice on ways to address them. This report discusses five common
                            questions we hear and the real-world lessons we’ve learned helping customers
                            build effective Web 2.0 strategies.

                            These lessons stem from our experience developing internal- and external-facing
                            social media communities for leading brands such as Marriott, the New York
                            Times, McDonalds, Cannondale, Northwestern Mutual, Discovery Channel,
                            JetBlue and Kodak. One major observation is that regardless of the business a
                            company is in or nature of the community it wants to build, its concerns are
                            shared by almost everyone considering a Web 2.0 strategy. They typically relate
                            to the same issues, including:

                              • Legal considerations
                              • Brand image
                              • Community ethics and integrity
                              • Participation and community dynamics
                              • Intellectual property rights
                              • Technology strategy


                            As your business begins charting its course in the Web 2.0 frontier, you’re likely
                            to encounter the same concerns. The questions highlighted in this report and
                            resulting lessons learned will help you address them with confidence.




www.awarenessnetworks.com                              3
5 Common Questions




1   Managing Participation


    THE QUESTION: How Do You Encourage and Manage User
                  Participation?
    Every community’s success depends on user participation. When considering how to
    optimize this, customers often express two concerns at opposite ends of a spectrum.
    The first is that they will devote resources to a community and no one will participate.
    The second is that everyone will participate in what could become a chaotic, difficult-to-
    manage “wild west” environment.


                                               ?
          No one                        Participation                    Everyone

    Failure?                                                             Wild Wild West?

    Common Web 2.0 Question: Will too few or too many participate?


    Lesson Learned: Speed Up and Slow Down Community Activity
    Effectively managing user participation requires some essential capabilities:
    1) A speedometer that enables you to watch the flow of content, and gauge
       how the community is evolving
    2) An accelerator to increase the rate of contribution and speed up participation
    3) A brake pedal to decrease the rate of contribution and slow down participation
    The best social media solutions provide these capabilities through a combination
    of facilities:

                                          You Need




               Accelerator              Speedometer                Brake Pedal

     Social media tools for controlling the flow of bad content and good content.


    • The ability to place users into different groups and control their permissions
    • The ability to control if a user’s content is published directly to the community or
      requires explicit approval from a moderator first
    • The ability to monitor content with strong manual and automatic moderation tools




                                 4                                      www.awarenessnetworks.com
5 Common Questions




                                     Managing Participation (cont.)



Fostering Open,                      Controlling the Flow of Content
Transparent Communities              Some organizations are understandably concerned about ensuring that community
Monitoring content for contribu-     content is consistent with brand image, not hurtful or offensive, or doesn’t violate IP
tions that are offensive, hurtful    ownership rules. It’s common for these organizations to launch their communities with
or inconsistent with brand           controls that closely regulate the flow of content, then open them up to allow a faster
image, or violate IP leakage rules   rate of participation as they become more comfortable with the dynamics.
is very different from looking for
controversial or critical content.   Slowing the Surge of Bad Content
It may be appropriate to reject      Organizations that notice a surge in “bad” content can use social media software
content that uses swear words,       controls to moderate the postings of specific community members or member groups,
for example, but we advise           and restrict their permissions if necessary. This is often achieved by controlling a user’s
companies not to reject content      status. Two common status settings are Trusted and Untrusted.
from users that criticize the
company or its products or           The contributions of a member who is Untrusted, for example, can be automatically
services. We’ve found that the       routed to a moderator’s inbox for explicit approval before it appears in the community.
best communities are open,           In contrast, the contributions of Trusted users are posted automatically without any
transparent, and enable              moderation restrictions. As community behavior evolves and you learn more about
members to express themselves        specific individuals, you can change a member status and their authority to perform
freely in an appropriate manner.     specific activities. You should also be able to adjust these controls for specific users or
                                     groups of users, depending on the needs of the community.

                                     Controlling User Activities
                                     Controlling what activities a user or a group of users perform is another valuable
                                     capability. For example, some organizations start by allowing some users to just comment
                                     or vote on content. Often, they will later give them the option to post their own content
                                     or edit others’ in a Wiki.

                                     Using Automated Moderation Features
                                     Automated moderation facilities make it possible to watch contributions for bad content
                                     without requiring a moderator to manually review each post. By creating rules that
                                     automatically flag or reject content if it contains certain words or phrases, an
                                     organization can be comfortable that the content flowing to community members
                                     is not violating company ethics, codes of conduct, or IP ownership rules.




www.awarenessnetworks.com                                         5
5 Common Questions




                     Managing Participation (cont.)



The L es son         Leveraging Good Content
                     It can be equally beneficial to watch postings, comments and RSS feeds for “good”
                     content. What qualifies as good content varies by the nature of the community and
3 Use manual
                     goals of the organization. Perhaps you’ve just launched a new product and want to
  and automatic
                     know when a member writes about it. Or, maybe you want to know what people are
  moderation tools
                     saying about an event or user conference you just ran.

3 Control user
                     With automated moderation, your social media software can automatically watch every
  permissions
                     piece of content — such as postings, comments and RSS feeds — to see how often
                     certain words or phrases are used, and notify you when they are posted. This is an
                     effective and nearly effortless way to monitor positive content in your community.
                     You can leverage this capability in other creative ways. Here are two examples:
                     1. Automatic categorization. Some automated moderation facilities automatically
                        assign categories to posts based on the content. This is useful for importing an RSS
                        feed and ensuring that the content is placed in the appropriate categories.
                     2. Automatic link insertion. Having content with appropriate links to other relevant
                        content is a useful capability, but authors often forget to insert the URLs. Some
                        automated moderation facilities replace text in a post. This enables you to watch for
                        certain words and phrases, and then convert them to URLs that point to predefined
                        destinations. For example, you might maintain an online glossary of acronyms and
                        convert any acronyms in a post to live links to entries in the glossary. You can also
                        convert any mention of your company name to the URL of your website. The latter
                        is a capability we use in our public Awareness community.




                                                6                                      www.awarenessnetworks.com
5 Common Questions




      2                     Controlling Security and Access


                            THE QUESTION: Who Can Get In, and What Can They See and Do?

                            Another set of questions involves controlling access to and participation in Web 2.0
                            communities. Common questions we hear include:
                            • Who can access my community?
                            • What security measures do I need to control access?
                            • What content can a user see? Can everyone see all content?
                            • What actions can users perform in the community?


                            When dealing with these questions, here are some issues to consider:
                            1)   Will your community be a public one that anyone can access? Or, will it be private,
                                 for example, only for groups such as employees, customers or partners?
                            2)   Will your community have a mix of participants? If you build a community that
                                 mixes employees with prospects and customers, you need to think about security
                                 and access implications.
                            3)   Will you segment your users? If you build a community that includes all customers,
                                 you should think about giving special permissions to certain customers that have
                                 paid for a “gold” level of service.
                            4)   Will your users require some type of authentication? If this is the case, you might
                                 want to integrate your community with your single sign-on or identity management
                                 systems. You may find it useful to integrate with one system for employees and
                                 another for customers.
                            5)   Is there some content that only certain users can see? If you mix partners and
                                 employees in one community, you may not want your partners to see the same
                                 content that your employees see.
                            6)   Do you need to control what actions a user can take? For example, you may want
                                 to allow a set of users to read and comment on some content, but not directly
                                 contribute to it.


                            Typically, companies start by building two types of communities: 1) Internal-facing
                            communities for employees; or 2) External-facing communities for customers, prospects
                            and/or partners. Eventually, companies find they can achieve the greatest value with a
                            blend of participants. That usually implies that not all of them have access to the same
                            content with the same privileges.




www.awarenessnetworks.com                               7
5 Common Questions




                          Controlling Security and Access (cont.)


                          Lesson Learned: Categorize Content and Users; Control Access
The L es s on             A strong social media solution should blend security and access management with a
                          category structure that enables you to control what specific groups of members see
3 Decide who can get in   and do when they log in. You can apply a category structure to both private and public
                          communities, as well as internal- and external-facing communities. You create categories
3 Build category-level    to match the varying characteristics of different community groups. There are many
  structure               different use cases for category-level access and control. Here are some examples:
                          • Category for executives only
3 Use profiles
                          • Area only for members working on a special project and including a blend of users
                            such as employees, customers and partners
3 Assign privileges
                          • ”From the experts” category where anyone can see or comment, but where only
3 Use single sign-on or     users with an “expert” status can post
  identity management     • ”Suggestion box” where everyone can post but only select people can read
  integration where       • ”Featured posts” area that only select users can write to but anyone can read
  appropriate
                          • Wiki that only select users can edit, but anyone can read




                                       Internal-                                   Topics
                                        facing                                                    Post?
                                        private                                    • Topic 1      Edit?


                               External-        External-
                                                                             ?     • Topic 2
                                                                                   • Topic 3
                                                                                                  Delete?
                                                                                                  Comment?

                                facing           facing
                                public           private



                          Category-Level Security and Access



                          Security and Access Case In Point
                          An innovative online travel business offers a social media community that blends
                          content contributed by consumers with content contributed by travel experts.
                          The expert-provided content in contained in wikis that only the authors are authorized
                          to edit, but anyone can read. This gives the online travel business two advantages:
                          1. Ability to track version histories of expert-delivered content
                          2. Maintains credibility of expert endorsements




                                                       8                                       www.awarenessnetworks.com
5 Common Questions




      3                     Compliance and Auditing



  The L es s on             THE QUESTION: Who Did What?

                            Another common concern we hear is how to find out who did what and when. Consider
  3 Track member content
                            a situation in which an employee posts objectionable content to an internal community
                            and then later realizes the misstep and retracts the posting. What if the posting caused
  3 Version
                            some damage during the short time it was live? Can you prove the employee actually
                            made the post? You can’t if your social media solution permanently removes the
  3 Audit for compliance
                            deleted posting.
    and discovery

                            You need to be able to prove the existence of the original posting, if necessary. This
                            requires capabilities for tracking the history of content posted to the community at any
                            point in time, even content that has been removed from public view. This is particularly
                            important for discovery and compliance purposes.

                            Lesson Learned: Use Versioning and Audit Tools
                            We recommend that you track community content activities with a social media solution
                            that saves deletions and versions all generations of members’ postings. If you’re ever
                            concerned about a user’s activities, you can use the social media software’s auditing
                            features to verify how the user’s content evolved over time.




www.awarenessnetworks.com                               9
5 Common Questions




     4                           Recognizing Content Ownership



The L es son                     THE QUESTION: Who Owns The Content?

                                 Today’s focus on intellectual property rights is sharp. And whether you’re building a
3 Establish ownership
                                 corporate Web 2.0 community or using an open solution like Facebook or MySpace,
                                 you need to ensure that members have a clear understanding of several factors.
3 Understand terms of
                                 These include terms of use, content ownership and what happens in different
  use and different
                                 ownership scenarios.
  ownership scenarios

                                 Lesson Learned: Understand Ownership
                                 If you’re considering an open community to generate conversation about a particular
                                 offering or event, one of the first things you need to think about is how your content
                                 may be used. For example, some social media providers have terms of use agreements
                                 that give them the authority to use your content however they choose. While this may
                                 be appropriate in some cases, you need to consider the implications in respect to the
                                 kind of content you want to generate.

                                 The second factor to understand is who owns the content — whether it’s the user, the
                                 company that sponsors the community or the service provider that stores the content.
                                 The answer to this question is essential for understanding what happens to content in
 The Value of Establishing       different circumstances.
 Ownership:
 Two Cases In Point              For example, if an influential employee leaves your company, should she be able to
 A highly-recognized Microsoft   take her blog with her? You may not have a claim to it if it was executed in an open
 blogger was able to take his    community like Facebook or MySpace. When it’s in your interest to own and control use
 blog with him when he left      of employee blogs, it’s best to build your own Web 2.0 community and ensure that you
 the company. Was that good      have ownership rights to the content.
 or bad for Microsoft?
                                   Terms of use?                              Whose owns it?    What happens when?
 When a former Motorola CTO
                                   “…you grant, to the Company an             • The user?       • The user leaves the company?
 announced her departure for
                                   irrevocable worldwide license to use,      • The company?    • The content is inappropriate?
 Cisco, Motorola was able to       copy, publicly display, reformat, trans-
                                                                              • The provider?   • The content violates
 take her public blog down         late, excerpt and distribute such User                         trademark or IP ownership
                                   Content for any purpose, commercial,
 immediately because it was
                                   advertising, or otherwise.”
 managed in a corporate
 community.

                                 Other questions to consider: If an employee leaves your company, can he take his
                                 e-mail inbox and saved messages with him? Can a sales rep take the contents of your
                                 CRM system? Are contributions to a company-sponsored social community the same
                                 or different?




                                                                    10                               www.awarenessnetworks.com
5 Common Questions




      5                        Choosing a Technology Strategy



  The L es son                 THE QUESTION: What’s Best for My Users?

                               The Web 2.0 world is new for most companies. As a result, deciding what features and
  3 Use scalable, extensible
                               technologies you need in your social communities can be daunting. One point is clear:
    technology
                               Wherever you start, you can be sure you won’t finish in the same place. What’s the
                               implication? As communities evolve and members’ needs grow and change, you need
  3 Use a platform, rather
                               the flexibility to incorporate new capabilities into your Web 2.0 solution as quickly and
     than point product(s)
                               easily as possible.

                               Lesson Learned: Be Ready for Change
                               You need to ensure that you can build a community that can adapt to the addition of
                               new features and enhancements over time. If you create a community with a collection of
                               point products — such as separate blog, wiki and photo sharing tools — the responsibility
                               of integrating these products into a unified community experience falls on you. This is not
                               easy and there are additional challenges when you want to incorporate new features.

                               A better alternative is to use a social media platform. With this strategy, the vendor bears
                               the burden of ensuring a unified community experience and integrating new features
                               over time. You can focus on the business benefit of the community while the vendor
                               focuses on the technology.




www.awarenessnetworks.com                                  11
5 Common Questions




                                     Summary: Learning from Experience



                                     As companies increasingly embrace Web 2.0 communities, they will continue to
                                     encounter questions. Among these are deciding how to approach legal and intellectual
                                     property issues; promoting a consistent brand image; upholding ethics and keeping a
                                     pulse on community dynamics; and implementing effective technology strategies.

                                     Awareness has built a wealth of experience helping leading brands like Marriott, the
                                     New York Times, McDonalds, Cannondale, Northwestern Mutual, Discovery Channel,
                                     JetBlue and Kodak create successful Web 2.0 strategies. In the process, we have learned
                                     valuable lessons on how to effectively meet the challenges of this evolving technology
                                     environment. We share these lessons with you in this report. And we encourage you to
                                     use them to your advantage, as you navigate ways to achieve real business value from
                                     the growing social media groundswell.




Contact Information:                 About Awareness

Awareness, Inc.                      Awareness helps companies build and operate branded Web 2.0 communities. These online
880 Winter Street, Suite 300         communities let customers, prospects, employees, or partners connect with each other and share
Waltham, MA 02451                    content. At the core of the Awareness solution is an on-demand social media platform that
                                     combines the full range of Web 2.0 technologies—blogs, wikis, discussion groups, social
United States
                                     networking, podcasts, RSS, tagging, photos, videos, mapping, etc.—with security, control, and
Tel: 1 866 487 5623
                                     content moderation. Awareness builds these features into complete communities for companies,
Fax: 1 781 622 2378                  or customers use the Awareness API and widgets to integrate Web 2.0 technologies into their
                                     own web properties. Major corporations such as McDonald's, Kodak, the New York Times,
Awareness Canada                     Northwestern Mutual, and Procter and Gamble use Awareness to build brand loyalty, generate
                                     revenue, drive new forms of marketing, improve collaboration, encourage knowledge-sharing,
5050 South Service Road, Suite 100
                                     and build a “corporate memory.”
Burlington, ON L7L 5Y7
Canada
Tel: 1 866 487 5623
Fax: 1 905 632 4922
                                                                                                                      © 2008 AWARENESS, INC.

More Related Content

What's hot

Presentation
PresentationPresentation
Presentation
studentweb20
 
Using social media for innovation
Using social media for innovationUsing social media for innovation
Using social media for innovation
Stephen Murgatroyd, PhD FBPsS FRSA
 
Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0
Shady A. Alefrangy
 
Executive Summary Ayub Jake Salik Mba Itm Thesis 2008
Executive Summary Ayub Jake Salik Mba  Itm Thesis 2008Executive Summary Ayub Jake Salik Mba  Itm Thesis 2008
Executive Summary Ayub Jake Salik Mba Itm Thesis 2008
Ayub Jake Salik, BE, MBA
 
Vu M Kloos 20071116
Vu M Kloos 20071116Vu M Kloos 20071116
Vu M Kloos 20071116
Martin Kloos
 
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...
Ian Truscott
 
Collective Intelligence and Web 2.0 Presentation
Collective Intelligence and Web 2.0 Presentation Collective Intelligence and Web 2.0 Presentation
Collective Intelligence and Web 2.0 Presentation
studentweb20
 
SharePoint voor de social enterprise erwin koens
SharePoint voor de social enterprise   erwin koensSharePoint voor de social enterprise   erwin koens
SharePoint voor de social enterprise erwin koens
Erwin Koens
 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshare
Franky Redant
 
Social media and communications workshop held on 13 July 2012
Social media and communications workshop held on 13 July 2012Social media and communications workshop held on 13 July 2012
Social media and communications workshop held on 13 July 2012
georginachatfield
 
Web 2 0/Social Media Presentation V2
Web 2 0/Social Media Presentation V2Web 2 0/Social Media Presentation V2
Web 2 0/Social Media Presentation V2
Bernie Borges
 
Introduction to Social Computing - Book Chapter
Introduction to Social Computing - Book ChapterIntroduction to Social Computing - Book Chapter
Introduction to Social Computing - Book Chapter
Zaffar Ahmed Shaikh
 
Social media to students
Social media to studentsSocial media to students
Social media to students
thenmozhi Elumalai
 
A Taste of Tech: Finding Function in Social Media
A Taste of Tech: Finding Function in Social MediaA Taste of Tech: Finding Function in Social Media
A Taste of Tech: Finding Function in Social Media
Jordan Epp
 
HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...
HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...
HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...
Spotlight Communications
 
PetNet Social media context
PetNet Social media contextPetNet Social media context
PetNet Social media context
Jo Halliday
 
Enterprise 2.0 – Social Tools used with SharePoint
Enterprise 2.0 – Social Tools used with SharePointEnterprise 2.0 – Social Tools used with SharePoint
Enterprise 2.0 – Social Tools used with SharePoint
Yianni Achele
 
Intranet 2.0 Webinar Oct 2008
Intranet 2.0 Webinar Oct 2008Intranet 2.0 Webinar Oct 2008
Intranet 2.0 Webinar Oct 2008
Prescient Digital Media
 
When Disaster Strikes
When Disaster StrikesWhen Disaster Strikes
When Disaster Strikes
Booz Allen Hamilton
 

What's hot (19)

Presentation
PresentationPresentation
Presentation
 
Using social media for innovation
Using social media for innovationUsing social media for innovation
Using social media for innovation
 
Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0
 
Executive Summary Ayub Jake Salik Mba Itm Thesis 2008
Executive Summary Ayub Jake Salik Mba  Itm Thesis 2008Executive Summary Ayub Jake Salik Mba  Itm Thesis 2008
Executive Summary Ayub Jake Salik Mba Itm Thesis 2008
 
Vu M Kloos 20071116
Vu M Kloos 20071116Vu M Kloos 20071116
Vu M Kloos 20071116
 
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...
 
Collective Intelligence and Web 2.0 Presentation
Collective Intelligence and Web 2.0 Presentation Collective Intelligence and Web 2.0 Presentation
Collective Intelligence and Web 2.0 Presentation
 
SharePoint voor de social enterprise erwin koens
SharePoint voor de social enterprise   erwin koensSharePoint voor de social enterprise   erwin koens
SharePoint voor de social enterprise erwin koens
 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshare
 
Social media and communications workshop held on 13 July 2012
Social media and communications workshop held on 13 July 2012Social media and communications workshop held on 13 July 2012
Social media and communications workshop held on 13 July 2012
 
Web 2 0/Social Media Presentation V2
Web 2 0/Social Media Presentation V2Web 2 0/Social Media Presentation V2
Web 2 0/Social Media Presentation V2
 
Introduction to Social Computing - Book Chapter
Introduction to Social Computing - Book ChapterIntroduction to Social Computing - Book Chapter
Introduction to Social Computing - Book Chapter
 
Social media to students
Social media to studentsSocial media to students
Social media to students
 
A Taste of Tech: Finding Function in Social Media
A Taste of Tech: Finding Function in Social MediaA Taste of Tech: Finding Function in Social Media
A Taste of Tech: Finding Function in Social Media
 
HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...
HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...
HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...
 
PetNet Social media context
PetNet Social media contextPetNet Social media context
PetNet Social media context
 
Enterprise 2.0 – Social Tools used with SharePoint
Enterprise 2.0 – Social Tools used with SharePointEnterprise 2.0 – Social Tools used with SharePoint
Enterprise 2.0 – Social Tools used with SharePoint
 
Intranet 2.0 Webinar Oct 2008
Intranet 2.0 Webinar Oct 2008Intranet 2.0 Webinar Oct 2008
Intranet 2.0 Webinar Oct 2008
 
When Disaster Strikes
When Disaster StrikesWhen Disaster Strikes
When Disaster Strikes
 

Viewers also liked

Application Architecture for Cloud Computing
Application Architecture for Cloud Computing Application Architecture for Cloud Computing
Application Architecture for Cloud Computing
white paper
 
Principles of Web Usabilty II - Fall 2007
Principles of Web Usabilty II - Fall 2007 Principles of Web Usabilty II - Fall 2007
Principles of Web Usabilty II - Fall 2007
white paper
 
Principles of Web Usability I - Summer 2006
Principles of Web Usability I - Summer 2006Principles of Web Usability I - Summer 2006
Principles of Web Usability I - Summer 2006
white paper
 
Facebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized EnterpriseFacebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized Enterprise
white paper
 
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise ApplicationsPre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
white paper
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
white paper
 
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
white paper
 

Viewers also liked (7)

Application Architecture for Cloud Computing
Application Architecture for Cloud Computing Application Architecture for Cloud Computing
Application Architecture for Cloud Computing
 
Principles of Web Usabilty II - Fall 2007
Principles of Web Usabilty II - Fall 2007 Principles of Web Usabilty II - Fall 2007
Principles of Web Usabilty II - Fall 2007
 
Principles of Web Usability I - Summer 2006
Principles of Web Usability I - Summer 2006Principles of Web Usability I - Summer 2006
Principles of Web Usability I - Summer 2006
 
Facebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized EnterpriseFacebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized Enterprise
 
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise ApplicationsPre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
 
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2
 

Similar to Enterprise Social Media: Five Common Questions

Disclosure Best Practices Toolkit
Disclosure Best Practices ToolkitDisclosure Best Practices Toolkit
Disclosure Best Practices Toolkit
Boris Loukanov
 
Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008
Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008
Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008
white paper
 
Guide to Online Community Management
Guide to Online Community ManagementGuide to Online Community Management
Guide to Online Community Management
ReadWrite
 
Defining a Governance Model
Defining a Governance ModelDefining a Governance Model
Defining a Governance Model
nlcmarketing
 
Effective & Compliant Social Media Planning
Effective & Compliant Social Media PlanningEffective & Compliant Social Media Planning
Effective & Compliant Social Media Planning
Bridget Greenwood
 
Rww Community Report
Rww Community ReportRww Community Report
Rww Community Report
Marketingfacts
 
You Name Here1. List several products or services subject to n.docx
You Name Here1. List several products or services subject to n.docxYou Name Here1. List several products or services subject to n.docx
You Name Here1. List several products or services subject to n.docx
jeffevans62972
 
Superfans
Superfans Superfans
Superfans
Lithium
 
20110518-3 ARMA Central Iowa Adoption
20110518-3 ARMA Central Iowa Adoption20110518-3 ARMA Central Iowa Adoption
20110518-3 ARMA Central Iowa Adoption
Jesse Wilkins
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social media
David Brooks
 
Social Media and Customer Engagement
Social Media and Customer EngagementSocial Media and Customer Engagement
Social Media and Customer Engagement
SyahirYusof2
 
Social media ecosystem
Social media ecosystemSocial media ecosystem
Social media ecosystem
BillMo
 
Developing effectie social media policies.pdf
Developing effectie social media policies.pdfDeveloping effectie social media policies.pdf
Developing effectie social media policies.pdf
Anjanette Delgado
 
Social Media For Business Part 1 Social Media Basics
Social Media For Business Part 1 Social Media BasicsSocial Media For Business Part 1 Social Media Basics
Social Media For Business Part 1 Social Media Basics
Steven Fisher
 
4 Essential Steps to Reach Social Community Critical Mass
4 Essential Steps to Reach Social Community Critical Mass4 Essential Steps to Reach Social Community Critical Mass
4 Essential Steps to Reach Social Community Critical Mass
Sandy Adam
 
Social media in organizations
Social media in organizationsSocial media in organizations
Social media in organizations
HtetThuzar
 
Social Media Intro
Social Media  IntroSocial Media  Intro
Social Media Intro
Shashi Bellamkonda
 
Building Effective Social Media Policies
Building Effective Social Media PoliciesBuilding Effective Social Media Policies
Building Effective Social Media Policies
Social iQ Networks
 
Are You You Tubing, Facebooking And Flickring Your Way To Retail Success
Are You You Tubing, Facebooking And Flickring Your Way To Retail SuccessAre You You Tubing, Facebooking And Flickring Your Way To Retail Success
Are You You Tubing, Facebooking And Flickring Your Way To Retail Success
Creative Business Consulting Group
 
6 Steps To Drive Social Software Adoption
6 Steps To Drive Social Software Adoption6 Steps To Drive Social Software Adoption
6 Steps To Drive Social Software Adoption
Blue Economy Agency
 

Similar to Enterprise Social Media: Five Common Questions (20)

Disclosure Best Practices Toolkit
Disclosure Best Practices ToolkitDisclosure Best Practices Toolkit
Disclosure Best Practices Toolkit
 
Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008
Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008
Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008
 
Guide to Online Community Management
Guide to Online Community ManagementGuide to Online Community Management
Guide to Online Community Management
 
Defining a Governance Model
Defining a Governance ModelDefining a Governance Model
Defining a Governance Model
 
Effective & Compliant Social Media Planning
Effective & Compliant Social Media PlanningEffective & Compliant Social Media Planning
Effective & Compliant Social Media Planning
 
Rww Community Report
Rww Community ReportRww Community Report
Rww Community Report
 
You Name Here1. List several products or services subject to n.docx
You Name Here1. List several products or services subject to n.docxYou Name Here1. List several products or services subject to n.docx
You Name Here1. List several products or services subject to n.docx
 
Superfans
Superfans Superfans
Superfans
 
20110518-3 ARMA Central Iowa Adoption
20110518-3 ARMA Central Iowa Adoption20110518-3 ARMA Central Iowa Adoption
20110518-3 ARMA Central Iowa Adoption
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social media
 
Social Media and Customer Engagement
Social Media and Customer EngagementSocial Media and Customer Engagement
Social Media and Customer Engagement
 
Social media ecosystem
Social media ecosystemSocial media ecosystem
Social media ecosystem
 
Developing effectie social media policies.pdf
Developing effectie social media policies.pdfDeveloping effectie social media policies.pdf
Developing effectie social media policies.pdf
 
Social Media For Business Part 1 Social Media Basics
Social Media For Business Part 1 Social Media BasicsSocial Media For Business Part 1 Social Media Basics
Social Media For Business Part 1 Social Media Basics
 
4 Essential Steps to Reach Social Community Critical Mass
4 Essential Steps to Reach Social Community Critical Mass4 Essential Steps to Reach Social Community Critical Mass
4 Essential Steps to Reach Social Community Critical Mass
 
Social media in organizations
Social media in organizationsSocial media in organizations
Social media in organizations
 
Social Media Intro
Social Media  IntroSocial Media  Intro
Social Media Intro
 
Building Effective Social Media Policies
Building Effective Social Media PoliciesBuilding Effective Social Media Policies
Building Effective Social Media Policies
 
Are You You Tubing, Facebooking And Flickring Your Way To Retail Success
Are You You Tubing, Facebooking And Flickring Your Way To Retail SuccessAre You You Tubing, Facebooking And Flickring Your Way To Retail Success
Are You You Tubing, Facebooking And Flickring Your Way To Retail Success
 
6 Steps To Drive Social Software Adoption
6 Steps To Drive Social Software Adoption6 Steps To Drive Social Software Adoption
6 Steps To Drive Social Software Adoption
 

More from white paper

Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
white paper
 
Java Security Overview
Java Security OverviewJava Security Overview
Java Security Overview
white paper
 
Platform Migration Guide
Platform Migration GuidePlatform Migration Guide
Platform Migration Guide
white paper
 
Java Standard Edition 5 Performance
Java Standard Edition 5 PerformanceJava Standard Edition 5 Performance
Java Standard Edition 5 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Memory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual MachineMemory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual Machine
white paper
 
J2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version ChangeJ2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version Change
white paper
 
Java Web Start
Java Web StartJava Web Start
Java Web Start
white paper
 
Java Tuning White Paper
Java Tuning White PaperJava Tuning White Paper
Java Tuning White Paper
white paper
 
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d ApplicationsJava Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
white paper
 
Introduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIIntroduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging API
white paper
 
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
white paper
 
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java PlatformJava 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
white paper
 
Concurrency Utilities Overview
Concurrency Utilities OverviewConcurrency Utilities Overview
Concurrency Utilities Overview
white paper
 
Defining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting SystemsDefining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting Systems
white paper
 
Usability Performance Benchmarks
Usability Performance BenchmarksUsability Performance Benchmarks
Usability Performance Benchmarks
white paper
 

More from white paper (20)

Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
 
Java Security Overview
Java Security OverviewJava Security Overview
Java Security Overview
 
Platform Migration Guide
Platform Migration GuidePlatform Migration Guide
Platform Migration Guide
 
Java Standard Edition 5 Performance
Java Standard Edition 5 PerformanceJava Standard Edition 5 Performance
Java Standard Edition 5 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Memory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual MachineMemory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual Machine
 
J2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version ChangeJ2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version Change
 
Java Web Start
Java Web StartJava Web Start
Java Web Start
 
Java Tuning White Paper
Java Tuning White PaperJava Tuning White Paper
Java Tuning White Paper
 
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d ApplicationsJava Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
 
Introduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIIntroduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging API
 
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
 
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java PlatformJava 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
 
Concurrency Utilities Overview
Concurrency Utilities OverviewConcurrency Utilities Overview
Concurrency Utilities Overview
 
Defining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting SystemsDefining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting Systems
 
Usability Performance Benchmarks
Usability Performance BenchmarksUsability Performance Benchmarks
Usability Performance Benchmarks
 

Recently uploaded

Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
Any kyc Account
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
➑➌➋➑➒➎➑➑➊➍
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 

Recently uploaded (20)

Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 

Enterprise Social Media: Five Common Questions

  • 1. Enterprise Social Media: 5 Five Common Questions and Lessons Learned www.awarenessnetworks.com
  • 2. 5 Common Questions Table of Contents 3. Introduction: Approaching the Web 2.0 Groundswell 4. Managing Participation The Question: How Do You Encourage and Manage User Participation? Lesson Learned: Speed Up and Slow Down Community Activity Controlling the Flow of Bad Content and Good Slowing the Surge of Bad Content Controlling What Users Perform Using Automated Moderation Features Leveraging Good Content 7. Controlling Security and Access The Question: Who Can Get In; and What Can They See and Do? Lesson Learned: Categorize Content and Users; Control Access 9. Compliance and Auditing The Question: Who Did What? Lesson Learned: Use Versioning and Audit Tools 10. Recognizing Content Ownership The Question: Who Owns the Content? Lesson Learned: Establish Ownership 11. Choosing a Technology Strategy The Question: What’s Best for My Users? Lesson Learned: Be Ready for Change 12. Summary: Learning from Experience www.awarenessnetworks.com
  • 3. 5 Common Questions Introduction: Approaching the Web 2.0 Groundswell The rise of Web 2.0 communities such as MySpace, Facebook and LinkedIn is driving a groundswell of social media activity that many businesses are clamoring to take advantage of. As organizations begin to think through their social media strategy, they raise a lot of questions. An experienced provider of Web 2.0 communities, Awareness hears many of these questions first hand. And we offer practical advice on ways to address them. This report discusses five common questions we hear and the real-world lessons we’ve learned helping customers build effective Web 2.0 strategies. These lessons stem from our experience developing internal- and external-facing social media communities for leading brands such as Marriott, the New York Times, McDonalds, Cannondale, Northwestern Mutual, Discovery Channel, JetBlue and Kodak. One major observation is that regardless of the business a company is in or nature of the community it wants to build, its concerns are shared by almost everyone considering a Web 2.0 strategy. They typically relate to the same issues, including: • Legal considerations • Brand image • Community ethics and integrity • Participation and community dynamics • Intellectual property rights • Technology strategy As your business begins charting its course in the Web 2.0 frontier, you’re likely to encounter the same concerns. The questions highlighted in this report and resulting lessons learned will help you address them with confidence. www.awarenessnetworks.com 3
  • 4. 5 Common Questions 1 Managing Participation THE QUESTION: How Do You Encourage and Manage User Participation? Every community’s success depends on user participation. When considering how to optimize this, customers often express two concerns at opposite ends of a spectrum. The first is that they will devote resources to a community and no one will participate. The second is that everyone will participate in what could become a chaotic, difficult-to- manage “wild west” environment. ? No one Participation Everyone Failure? Wild Wild West? Common Web 2.0 Question: Will too few or too many participate? Lesson Learned: Speed Up and Slow Down Community Activity Effectively managing user participation requires some essential capabilities: 1) A speedometer that enables you to watch the flow of content, and gauge how the community is evolving 2) An accelerator to increase the rate of contribution and speed up participation 3) A brake pedal to decrease the rate of contribution and slow down participation The best social media solutions provide these capabilities through a combination of facilities: You Need Accelerator Speedometer Brake Pedal Social media tools for controlling the flow of bad content and good content. • The ability to place users into different groups and control their permissions • The ability to control if a user’s content is published directly to the community or requires explicit approval from a moderator first • The ability to monitor content with strong manual and automatic moderation tools 4 www.awarenessnetworks.com
  • 5. 5 Common Questions Managing Participation (cont.) Fostering Open, Controlling the Flow of Content Transparent Communities Some organizations are understandably concerned about ensuring that community Monitoring content for contribu- content is consistent with brand image, not hurtful or offensive, or doesn’t violate IP tions that are offensive, hurtful ownership rules. It’s common for these organizations to launch their communities with or inconsistent with brand controls that closely regulate the flow of content, then open them up to allow a faster image, or violate IP leakage rules rate of participation as they become more comfortable with the dynamics. is very different from looking for controversial or critical content. Slowing the Surge of Bad Content It may be appropriate to reject Organizations that notice a surge in “bad” content can use social media software content that uses swear words, controls to moderate the postings of specific community members or member groups, for example, but we advise and restrict their permissions if necessary. This is often achieved by controlling a user’s companies not to reject content status. Two common status settings are Trusted and Untrusted. from users that criticize the company or its products or The contributions of a member who is Untrusted, for example, can be automatically services. We’ve found that the routed to a moderator’s inbox for explicit approval before it appears in the community. best communities are open, In contrast, the contributions of Trusted users are posted automatically without any transparent, and enable moderation restrictions. As community behavior evolves and you learn more about members to express themselves specific individuals, you can change a member status and their authority to perform freely in an appropriate manner. specific activities. You should also be able to adjust these controls for specific users or groups of users, depending on the needs of the community. Controlling User Activities Controlling what activities a user or a group of users perform is another valuable capability. For example, some organizations start by allowing some users to just comment or vote on content. Often, they will later give them the option to post their own content or edit others’ in a Wiki. Using Automated Moderation Features Automated moderation facilities make it possible to watch contributions for bad content without requiring a moderator to manually review each post. By creating rules that automatically flag or reject content if it contains certain words or phrases, an organization can be comfortable that the content flowing to community members is not violating company ethics, codes of conduct, or IP ownership rules. www.awarenessnetworks.com 5
  • 6. 5 Common Questions Managing Participation (cont.) The L es son Leveraging Good Content It can be equally beneficial to watch postings, comments and RSS feeds for “good” content. What qualifies as good content varies by the nature of the community and 3 Use manual goals of the organization. Perhaps you’ve just launched a new product and want to and automatic know when a member writes about it. Or, maybe you want to know what people are moderation tools saying about an event or user conference you just ran. 3 Control user With automated moderation, your social media software can automatically watch every permissions piece of content — such as postings, comments and RSS feeds — to see how often certain words or phrases are used, and notify you when they are posted. This is an effective and nearly effortless way to monitor positive content in your community. You can leverage this capability in other creative ways. Here are two examples: 1. Automatic categorization. Some automated moderation facilities automatically assign categories to posts based on the content. This is useful for importing an RSS feed and ensuring that the content is placed in the appropriate categories. 2. Automatic link insertion. Having content with appropriate links to other relevant content is a useful capability, but authors often forget to insert the URLs. Some automated moderation facilities replace text in a post. This enables you to watch for certain words and phrases, and then convert them to URLs that point to predefined destinations. For example, you might maintain an online glossary of acronyms and convert any acronyms in a post to live links to entries in the glossary. You can also convert any mention of your company name to the URL of your website. The latter is a capability we use in our public Awareness community. 6 www.awarenessnetworks.com
  • 7. 5 Common Questions 2 Controlling Security and Access THE QUESTION: Who Can Get In, and What Can They See and Do? Another set of questions involves controlling access to and participation in Web 2.0 communities. Common questions we hear include: • Who can access my community? • What security measures do I need to control access? • What content can a user see? Can everyone see all content? • What actions can users perform in the community? When dealing with these questions, here are some issues to consider: 1) Will your community be a public one that anyone can access? Or, will it be private, for example, only for groups such as employees, customers or partners? 2) Will your community have a mix of participants? If you build a community that mixes employees with prospects and customers, you need to think about security and access implications. 3) Will you segment your users? If you build a community that includes all customers, you should think about giving special permissions to certain customers that have paid for a “gold” level of service. 4) Will your users require some type of authentication? If this is the case, you might want to integrate your community with your single sign-on or identity management systems. You may find it useful to integrate with one system for employees and another for customers. 5) Is there some content that only certain users can see? If you mix partners and employees in one community, you may not want your partners to see the same content that your employees see. 6) Do you need to control what actions a user can take? For example, you may want to allow a set of users to read and comment on some content, but not directly contribute to it. Typically, companies start by building two types of communities: 1) Internal-facing communities for employees; or 2) External-facing communities for customers, prospects and/or partners. Eventually, companies find they can achieve the greatest value with a blend of participants. That usually implies that not all of them have access to the same content with the same privileges. www.awarenessnetworks.com 7
  • 8. 5 Common Questions Controlling Security and Access (cont.) Lesson Learned: Categorize Content and Users; Control Access The L es s on A strong social media solution should blend security and access management with a category structure that enables you to control what specific groups of members see 3 Decide who can get in and do when they log in. You can apply a category structure to both private and public communities, as well as internal- and external-facing communities. You create categories 3 Build category-level to match the varying characteristics of different community groups. There are many structure different use cases for category-level access and control. Here are some examples: • Category for executives only 3 Use profiles • Area only for members working on a special project and including a blend of users such as employees, customers and partners 3 Assign privileges • ”From the experts” category where anyone can see or comment, but where only 3 Use single sign-on or users with an “expert” status can post identity management • ”Suggestion box” where everyone can post but only select people can read integration where • ”Featured posts” area that only select users can write to but anyone can read appropriate • Wiki that only select users can edit, but anyone can read Internal- Topics facing Post? private • Topic 1 Edit? External- External- ? • Topic 2 • Topic 3 Delete? Comment? facing facing public private Category-Level Security and Access Security and Access Case In Point An innovative online travel business offers a social media community that blends content contributed by consumers with content contributed by travel experts. The expert-provided content in contained in wikis that only the authors are authorized to edit, but anyone can read. This gives the online travel business two advantages: 1. Ability to track version histories of expert-delivered content 2. Maintains credibility of expert endorsements 8 www.awarenessnetworks.com
  • 9. 5 Common Questions 3 Compliance and Auditing The L es s on THE QUESTION: Who Did What? Another common concern we hear is how to find out who did what and when. Consider 3 Track member content a situation in which an employee posts objectionable content to an internal community and then later realizes the misstep and retracts the posting. What if the posting caused 3 Version some damage during the short time it was live? Can you prove the employee actually made the post? You can’t if your social media solution permanently removes the 3 Audit for compliance deleted posting. and discovery You need to be able to prove the existence of the original posting, if necessary. This requires capabilities for tracking the history of content posted to the community at any point in time, even content that has been removed from public view. This is particularly important for discovery and compliance purposes. Lesson Learned: Use Versioning and Audit Tools We recommend that you track community content activities with a social media solution that saves deletions and versions all generations of members’ postings. If you’re ever concerned about a user’s activities, you can use the social media software’s auditing features to verify how the user’s content evolved over time. www.awarenessnetworks.com 9
  • 10. 5 Common Questions 4 Recognizing Content Ownership The L es son THE QUESTION: Who Owns The Content? Today’s focus on intellectual property rights is sharp. And whether you’re building a 3 Establish ownership corporate Web 2.0 community or using an open solution like Facebook or MySpace, you need to ensure that members have a clear understanding of several factors. 3 Understand terms of These include terms of use, content ownership and what happens in different use and different ownership scenarios. ownership scenarios Lesson Learned: Understand Ownership If you’re considering an open community to generate conversation about a particular offering or event, one of the first things you need to think about is how your content may be used. For example, some social media providers have terms of use agreements that give them the authority to use your content however they choose. While this may be appropriate in some cases, you need to consider the implications in respect to the kind of content you want to generate. The second factor to understand is who owns the content — whether it’s the user, the company that sponsors the community or the service provider that stores the content. The answer to this question is essential for understanding what happens to content in The Value of Establishing different circumstances. Ownership: Two Cases In Point For example, if an influential employee leaves your company, should she be able to A highly-recognized Microsoft take her blog with her? You may not have a claim to it if it was executed in an open blogger was able to take his community like Facebook or MySpace. When it’s in your interest to own and control use blog with him when he left of employee blogs, it’s best to build your own Web 2.0 community and ensure that you the company. Was that good have ownership rights to the content. or bad for Microsoft? Terms of use? Whose owns it? What happens when? When a former Motorola CTO “…you grant, to the Company an • The user? • The user leaves the company? announced her departure for irrevocable worldwide license to use, • The company? • The content is inappropriate? Cisco, Motorola was able to copy, publicly display, reformat, trans- • The provider? • The content violates take her public blog down late, excerpt and distribute such User trademark or IP ownership Content for any purpose, commercial, immediately because it was advertising, or otherwise.” managed in a corporate community. Other questions to consider: If an employee leaves your company, can he take his e-mail inbox and saved messages with him? Can a sales rep take the contents of your CRM system? Are contributions to a company-sponsored social community the same or different? 10 www.awarenessnetworks.com
  • 11. 5 Common Questions 5 Choosing a Technology Strategy The L es son THE QUESTION: What’s Best for My Users? The Web 2.0 world is new for most companies. As a result, deciding what features and 3 Use scalable, extensible technologies you need in your social communities can be daunting. One point is clear: technology Wherever you start, you can be sure you won’t finish in the same place. What’s the implication? As communities evolve and members’ needs grow and change, you need 3 Use a platform, rather the flexibility to incorporate new capabilities into your Web 2.0 solution as quickly and than point product(s) easily as possible. Lesson Learned: Be Ready for Change You need to ensure that you can build a community that can adapt to the addition of new features and enhancements over time. If you create a community with a collection of point products — such as separate blog, wiki and photo sharing tools — the responsibility of integrating these products into a unified community experience falls on you. This is not easy and there are additional challenges when you want to incorporate new features. A better alternative is to use a social media platform. With this strategy, the vendor bears the burden of ensuring a unified community experience and integrating new features over time. You can focus on the business benefit of the community while the vendor focuses on the technology. www.awarenessnetworks.com 11
  • 12. 5 Common Questions Summary: Learning from Experience As companies increasingly embrace Web 2.0 communities, they will continue to encounter questions. Among these are deciding how to approach legal and intellectual property issues; promoting a consistent brand image; upholding ethics and keeping a pulse on community dynamics; and implementing effective technology strategies. Awareness has built a wealth of experience helping leading brands like Marriott, the New York Times, McDonalds, Cannondale, Northwestern Mutual, Discovery Channel, JetBlue and Kodak create successful Web 2.0 strategies. In the process, we have learned valuable lessons on how to effectively meet the challenges of this evolving technology environment. We share these lessons with you in this report. And we encourage you to use them to your advantage, as you navigate ways to achieve real business value from the growing social media groundswell. Contact Information: About Awareness Awareness, Inc. Awareness helps companies build and operate branded Web 2.0 communities. These online 880 Winter Street, Suite 300 communities let customers, prospects, employees, or partners connect with each other and share Waltham, MA 02451 content. At the core of the Awareness solution is an on-demand social media platform that combines the full range of Web 2.0 technologies—blogs, wikis, discussion groups, social United States networking, podcasts, RSS, tagging, photos, videos, mapping, etc.—with security, control, and Tel: 1 866 487 5623 content moderation. Awareness builds these features into complete communities for companies, Fax: 1 781 622 2378 or customers use the Awareness API and widgets to integrate Web 2.0 technologies into their own web properties. Major corporations such as McDonald's, Kodak, the New York Times, Awareness Canada Northwestern Mutual, and Procter and Gamble use Awareness to build brand loyalty, generate revenue, drive new forms of marketing, improve collaboration, encourage knowledge-sharing, 5050 South Service Road, Suite 100 and build a “corporate memory.” Burlington, ON L7L 5Y7 Canada Tel: 1 866 487 5623 Fax: 1 905 632 4922 © 2008 AWARENESS, INC.