There are inherent challenges in adopting Enterprise Social Networking (ESN) within an organization to manage organizational knowledge. However these challenges could be managed using certain best practices which need to be adhered to ensure adoption and smooth roll out.
Social Media kunnen uitstekend intern worden toegepast. Het is een manier van werken die gebruikers kennen en het leidt tot het delen van informatie. Goed voor werknemers en organisatie.
Infographic why every company should implement Internal Social Media attini s...Wilco Turnhout
According to research of Rapid Circle, managers are choosing for Internal Social Media mainly because it enables employees to find colleagues and to connect to them, sharing ideas, experiences and knowledge and to keep young potentials inside the company. Microblogging is the most important feature of a Social Suite, followed by finding colleagues, news and mobile access.
Simply Social Media Premia is your guide to navigating the social media space. Forget the jargon & buzz words that are so often associated with social media, Simply Social Media presents the information you need to know to be successful online in a simple and easy to understand way.
The document provides tips for safely using social networks as an IT manager. It summarizes that:
1) Many businesses lack social media policies, despite risks like reduced productivity and reputation harm. Effective policies educate employees on guidelines while allowing social media's benefits.
2) Social networks are a growing target for malware through social engineering and user-supplied content. However, their interactive nature is why people use them, seeking richer social lives.
3) When using networks like Facebook, one should be choosy about friends and applications, follow browser security steps, and log out of other sites to reduce risks from active content and expanded trust boundaries.
Jennifer Bishop, a LinkedIn expert from Melbourne, Australia, argues that LinkedIn participation and profiles seriously reflect professionals' online brands. With over 100 million users globally and 1.3 million in Australia, LinkedIn leads business conversations where Facebook and Twitter lead social conversations. Bishop says professionals must establish social media policies to manage risks and should have complete LinkedIn profiles linked to their websites and companies to leverage LinkedIn's search engine optimization power. Bishop also notes LinkedIn allows businesses to actively engage with customers and employees to build their brands.
In the “office-optional” business model, all work takes place at home, the neighborhood espresso shop, or anyplace that saves commute time, gas, and office space. Regardless of business model, top organizations know it's critical to achieve meaningful communication, a feeling of camaraderie, and company cohesiveness. This article will explore the unique communication characteristics and needs of the “office-optional” trend as well as review several high-tech and low-tech ways to stay in touch.
Altimeter Report: Making The Business Case For Enterprise Social NetworkingCharlene Li
In 2011, the US hit a milestone — more than half of all adults visit social networking sites at least once a month. But when it comes to using social-networking technologies inside organizations, many business leaders are at a loss to understand what value can be created from Facebook-like status updates within the enterprise. Some organizations have deployed social-networking features with an initial enthusiastic reception, only to see these early efforts wither to just a few stalwart participants. The problem: Most companies approach enterprise social networks as a technology deployment and fail to understand that the new relationships created by enterprise social networks are the source for value creation. In this first of two reports, Altimeter looks at four ways enterprise social networks create value for organizations.
Leading virtual teams in times of disruptionGraham Watson
The document discusses best practices for leading virtual teams during times of disruption. It recommends encouraging more open information sharing to help bond team members. It also suggests using experience sampling apps to take the emotional temperature of virtual teams and detect any outliers. While introverts can work well alone, including extraverts on teams can help maintain connections. Leaders should take advantage of opportunities for face-to-face meetings to rebuild social bonds weakened by virtual interactions.
Social Media kunnen uitstekend intern worden toegepast. Het is een manier van werken die gebruikers kennen en het leidt tot het delen van informatie. Goed voor werknemers en organisatie.
Infographic why every company should implement Internal Social Media attini s...Wilco Turnhout
According to research of Rapid Circle, managers are choosing for Internal Social Media mainly because it enables employees to find colleagues and to connect to them, sharing ideas, experiences and knowledge and to keep young potentials inside the company. Microblogging is the most important feature of a Social Suite, followed by finding colleagues, news and mobile access.
Simply Social Media Premia is your guide to navigating the social media space. Forget the jargon & buzz words that are so often associated with social media, Simply Social Media presents the information you need to know to be successful online in a simple and easy to understand way.
The document provides tips for safely using social networks as an IT manager. It summarizes that:
1) Many businesses lack social media policies, despite risks like reduced productivity and reputation harm. Effective policies educate employees on guidelines while allowing social media's benefits.
2) Social networks are a growing target for malware through social engineering and user-supplied content. However, their interactive nature is why people use them, seeking richer social lives.
3) When using networks like Facebook, one should be choosy about friends and applications, follow browser security steps, and log out of other sites to reduce risks from active content and expanded trust boundaries.
Jennifer Bishop, a LinkedIn expert from Melbourne, Australia, argues that LinkedIn participation and profiles seriously reflect professionals' online brands. With over 100 million users globally and 1.3 million in Australia, LinkedIn leads business conversations where Facebook and Twitter lead social conversations. Bishop says professionals must establish social media policies to manage risks and should have complete LinkedIn profiles linked to their websites and companies to leverage LinkedIn's search engine optimization power. Bishop also notes LinkedIn allows businesses to actively engage with customers and employees to build their brands.
In the “office-optional” business model, all work takes place at home, the neighborhood espresso shop, or anyplace that saves commute time, gas, and office space. Regardless of business model, top organizations know it's critical to achieve meaningful communication, a feeling of camaraderie, and company cohesiveness. This article will explore the unique communication characteristics and needs of the “office-optional” trend as well as review several high-tech and low-tech ways to stay in touch.
Altimeter Report: Making The Business Case For Enterprise Social NetworkingCharlene Li
In 2011, the US hit a milestone — more than half of all adults visit social networking sites at least once a month. But when it comes to using social-networking technologies inside organizations, many business leaders are at a loss to understand what value can be created from Facebook-like status updates within the enterprise. Some organizations have deployed social-networking features with an initial enthusiastic reception, only to see these early efforts wither to just a few stalwart participants. The problem: Most companies approach enterprise social networks as a technology deployment and fail to understand that the new relationships created by enterprise social networks are the source for value creation. In this first of two reports, Altimeter looks at four ways enterprise social networks create value for organizations.
Leading virtual teams in times of disruptionGraham Watson
The document discusses best practices for leading virtual teams during times of disruption. It recommends encouraging more open information sharing to help bond team members. It also suggests using experience sampling apps to take the emotional temperature of virtual teams and detect any outliers. While introverts can work well alone, including extraverts on teams can help maintain connections. Leaders should take advantage of opportunities for face-to-face meetings to rebuild social bonds weakened by virtual interactions.
This document discusses the need for companies to have social media policies that acknowledge the lack of control over employee internet and technology use, and focus on performance accountability instead. It provides examples of key elements to include in a social media policy, such as liability disclaimers, general communication guidelines, and specific rules for social media tools. The document advises ensuring policies inspire rather than overly control employees' social media participation.
This document discusses the opportunities and security risks of using social media in enterprises. It notes that while social media can enable better collaboration, integration and connectivity, its adoption also poses security challenges as hackers target these platforms. The document examines how businesses are embracing social media as a tool, the rise in spam and malware attacks observed on these sites, and provides recommendations for securing enterprise social media use.
The document provides guidance on using social networks professionally by integrating personal and professional networks online. It recommends paying attention to how others use social media professionally and experimenting with social networks as they are still new. Professionals should focus on building genuine relationships through their social networks and share information appropriately while maintaining privacy.
The document discusses how networks are important for innovative individuals and entrepreneurs. It notes that creating a new business relies on an individual's social relationships for accessing resources, information, and support. While networks provide benefits like these, they can also potentially create conflicts of interest between business and personal relationships. Therefore, innovative people must balance the interests of their company with their interpersonal relationships when making decisions. Communities of practice can also stimulate change and innovation by allowing people to learn from one another, though this is often incremental innovation rather than radical innovation.
Security essentials for CIOs - Navigating the risks and rewards of social mediaJoao Perez
The document discusses security essentials for CIOs regarding social media. It makes three key points:
1) Social media provides both opportunities and risks for businesses, with opportunities to connect with customers and prospects but also risks from thieves, spies, and data breaches.
2) To navigate these risks and rewards, companies should define their social media agenda, analyze the inherent risks, and create and communicate clear social media policies to guide employees.
3) At IBM, they have embraced social media engagement but also created social computing guidelines and ongoing education to build a risk-aware culture and engage digitally in a smart and secure way.
Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...WebjamMark2
Webjam is a provider of engaging enterprise social media solutions. We help our clients to connect with their employees and customers by providing them with an easy, affordable solution for social publishing and engagement. Our enterprise social media solutions allow you to create your own social intranet, share ideas and insights, and connect your employees.
http://www.webjam.com
This presentation was based on the Altimeter report. Source - Brian Solis.
Session I presented at Lotusphere 2012 with IBM Champion and Business Partner, Carlos Casas focused on building strong communities for your Social Business efforts.
Social networking has become a major part of how people interact both personally and professionally. Over 70% of workplace learning now occurs informally through interactions with colleagues rather than formal training. As workers increasingly use social networking in their personal lives, they expect and respond better to social learning environments at work. Organizations that do not provide social learning opportunities risk falling behind. Learn.com's LearnCenter platform enables social learning and collaboration in the workplace through features like blogs, forums, document sharing, and more.
Leading Virtual Effectiveness: Four Strategies for Effective CommunicationCitrix Online
This new eBook by Camille Preston of AIM
Leadership reveals 4 steps to mastering effective virtual leadership and communication and provides the tools for managing the shift to the virtual workplace.
The document discusses implementing an open source knowledge management platform for insurers to help address challenges around talent management, organizational responsiveness, cost control, and audit and compliance. It describes how a knowledge management platform can provide features like dynamic knowledge repositories, smart knowledge spaces, and metadata-driven information architecture to make knowledge pervasive across an insurance organization. The platform discussed leverages open source technologies and can quickly deploy knowledge management solutions for insurers to improve collaboration, innovation, and decision-making.
This certificate confirms that Salman Khan successfully completed a Liferay training course on mastering Liferay fundamentals, covering topics such as roles and permissions, collaboration tools, sites and organizations, content management, workflows, and page management. The course lasted 16 hours and was completed on November 4, 2014.
Building an open source business intelligence (BI) platform offers organizations an alternative to expensive proprietary BI systems or one-size-fits-all packages. An open source BI platform provides a framework for developing customized BI solutions with more flexibility and scalability than branded options. The article discusses how to successfully build an open source BI platform that binds various BI application layers to enable improved integration, information delivery, and analysis.
This document provides an overview of social networks from a sociological perspective. It discusses social networks at the micro, meso, and macro levels of analysis and outlines several theoretical approaches and research areas within social network analysis, including structural holes, diffusion of innovations, organizational studies, and social media networks. Network science concepts like small-world networks, scale-free networks, and centrality metrics are also summarized.
- Young adults aged 18-25 have the highest usage rate (78%) of social networks in Argentina. Usage declines with each increasing age group, with those aged 36-100 being 80% less likely to use social networks.
- Higher levels of education are associated with greater social network usage. Those with a university degree are 526% more likely to use social networks than those with only primary education.
- Higher income individuals have the highest usage rate (76%) of social networks. Those in the low income group are 80% less likely to use social networks.
- Frequency of religious service attendance, which may indicate social activity levels, predicts social network usage in Argentina with the most frequent attendees 1000% more likely
The document discusses implementing an open source knowledge management platform for insurers to help address challenges around talent management, organizational responsiveness, cost control, and audit and compliance. It describes how a knowledge management platform can provide features like dynamic knowledge repositories, smart knowledge spaces, and metadata-driven information architecture to make knowledge pervasive across an insurance organization. The platform discussed leverages open source technologies and can quickly deploy knowledge management solutions for insurers to improve collaboration, innovation, and decision-making.
This document provides an overview of lecture 3 which covers online communities and social networks. It discusses:
- The topics to be covered this week including online communities, social networking platforms like Facebook, and growing thriving online communities.
- Instructions for students regarding class representatives, blog assignments, and setting up online profiles for participation. Groups will be allocated to start thinking of online community ideas.
- Key aspects of online communities including their virtual nature, examples like Facebook and Wikipedia, and how they break barriers of time and space compared to offline interactions.
InfoAxon’s ‘Liferay Integration’ services help organizations extend the value of their Liferay Portal deployments by ensuring proper design, architecture, enhancements and integrations with other enterprise applications to deliver production grade Liferay solutions.
At InfoAxon, we have continuously enhanced our CMS and Web Portal capabilities and adopted ‘Liferay ‘ which is one of the world’s leading Open source Portal and Collaborative Content Management Platforms to deliver rich content and people centric portal solutions. We have rich experience in delivering customized Web Portal, Collaboration and Social Networking Solutions using Liferay as core CMS and Web Portal engine.
Through our multiple Portal solutions implementations, our engineering teams have further customized and enhanced Liferay.
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
Web 2.0 is creating new opportunities for communication and collaboration. Part of this explosion is the increase in popularity and use of Social Network Sites (SNSs) for general and domain-specific use. In the emergency domain there are a number of websites, wikis, SNSs, etc. but they stand as silos in the field, unable to allow for cross-site collaboration. In this paper we describe ongoing design science research to develop and refine guiding principles for developing an SNS that will bring together emergency domain professionals in a “one-stop-shop.” We surveyed emergency professionals who study crisis information systems, to ascertain potential functionalities of such an SNS. Preliminary results suggest that there is a need for the envisioned SNS. Future research will continue to explore possible solutions to issues addressed in this paper.
This document discusses customizing Liferay Portal for business needs. It provides an overview of Liferay and common customization scenarios. It then discusses the key environments, tools, and techniques needed for customization, including the Plugins SDK, Liferay IDE, and Developer Studio. Common customization decisions are outlined relating to information architecture, content, sites, roles and authentication, workflows and more. Finally, it provides an example of a content-centric customization focusing on basic techniques and methodology.
This document discusses the need for companies to have social media policies that acknowledge the lack of control over employee internet and technology use, and focus on performance accountability instead. It provides examples of key elements to include in a social media policy, such as liability disclaimers, general communication guidelines, and specific rules for social media tools. The document advises ensuring policies inspire rather than overly control employees' social media participation.
This document discusses the opportunities and security risks of using social media in enterprises. It notes that while social media can enable better collaboration, integration and connectivity, its adoption also poses security challenges as hackers target these platforms. The document examines how businesses are embracing social media as a tool, the rise in spam and malware attacks observed on these sites, and provides recommendations for securing enterprise social media use.
The document provides guidance on using social networks professionally by integrating personal and professional networks online. It recommends paying attention to how others use social media professionally and experimenting with social networks as they are still new. Professionals should focus on building genuine relationships through their social networks and share information appropriately while maintaining privacy.
The document discusses how networks are important for innovative individuals and entrepreneurs. It notes that creating a new business relies on an individual's social relationships for accessing resources, information, and support. While networks provide benefits like these, they can also potentially create conflicts of interest between business and personal relationships. Therefore, innovative people must balance the interests of their company with their interpersonal relationships when making decisions. Communities of practice can also stimulate change and innovation by allowing people to learn from one another, though this is often incremental innovation rather than radical innovation.
Security essentials for CIOs - Navigating the risks and rewards of social mediaJoao Perez
The document discusses security essentials for CIOs regarding social media. It makes three key points:
1) Social media provides both opportunities and risks for businesses, with opportunities to connect with customers and prospects but also risks from thieves, spies, and data breaches.
2) To navigate these risks and rewards, companies should define their social media agenda, analyze the inherent risks, and create and communicate clear social media policies to guide employees.
3) At IBM, they have embraced social media engagement but also created social computing guidelines and ongoing education to build a risk-aware culture and engage digitally in a smart and secure way.
Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...WebjamMark2
Webjam is a provider of engaging enterprise social media solutions. We help our clients to connect with their employees and customers by providing them with an easy, affordable solution for social publishing and engagement. Our enterprise social media solutions allow you to create your own social intranet, share ideas and insights, and connect your employees.
http://www.webjam.com
This presentation was based on the Altimeter report. Source - Brian Solis.
Session I presented at Lotusphere 2012 with IBM Champion and Business Partner, Carlos Casas focused on building strong communities for your Social Business efforts.
Social networking has become a major part of how people interact both personally and professionally. Over 70% of workplace learning now occurs informally through interactions with colleagues rather than formal training. As workers increasingly use social networking in their personal lives, they expect and respond better to social learning environments at work. Organizations that do not provide social learning opportunities risk falling behind. Learn.com's LearnCenter platform enables social learning and collaboration in the workplace through features like blogs, forums, document sharing, and more.
Leading Virtual Effectiveness: Four Strategies for Effective CommunicationCitrix Online
This new eBook by Camille Preston of AIM
Leadership reveals 4 steps to mastering effective virtual leadership and communication and provides the tools for managing the shift to the virtual workplace.
The document discusses implementing an open source knowledge management platform for insurers to help address challenges around talent management, organizational responsiveness, cost control, and audit and compliance. It describes how a knowledge management platform can provide features like dynamic knowledge repositories, smart knowledge spaces, and metadata-driven information architecture to make knowledge pervasive across an insurance organization. The platform discussed leverages open source technologies and can quickly deploy knowledge management solutions for insurers to improve collaboration, innovation, and decision-making.
This certificate confirms that Salman Khan successfully completed a Liferay training course on mastering Liferay fundamentals, covering topics such as roles and permissions, collaboration tools, sites and organizations, content management, workflows, and page management. The course lasted 16 hours and was completed on November 4, 2014.
Building an open source business intelligence (BI) platform offers organizations an alternative to expensive proprietary BI systems or one-size-fits-all packages. An open source BI platform provides a framework for developing customized BI solutions with more flexibility and scalability than branded options. The article discusses how to successfully build an open source BI platform that binds various BI application layers to enable improved integration, information delivery, and analysis.
This document provides an overview of social networks from a sociological perspective. It discusses social networks at the micro, meso, and macro levels of analysis and outlines several theoretical approaches and research areas within social network analysis, including structural holes, diffusion of innovations, organizational studies, and social media networks. Network science concepts like small-world networks, scale-free networks, and centrality metrics are also summarized.
- Young adults aged 18-25 have the highest usage rate (78%) of social networks in Argentina. Usage declines with each increasing age group, with those aged 36-100 being 80% less likely to use social networks.
- Higher levels of education are associated with greater social network usage. Those with a university degree are 526% more likely to use social networks than those with only primary education.
- Higher income individuals have the highest usage rate (76%) of social networks. Those in the low income group are 80% less likely to use social networks.
- Frequency of religious service attendance, which may indicate social activity levels, predicts social network usage in Argentina with the most frequent attendees 1000% more likely
The document discusses implementing an open source knowledge management platform for insurers to help address challenges around talent management, organizational responsiveness, cost control, and audit and compliance. It describes how a knowledge management platform can provide features like dynamic knowledge repositories, smart knowledge spaces, and metadata-driven information architecture to make knowledge pervasive across an insurance organization. The platform discussed leverages open source technologies and can quickly deploy knowledge management solutions for insurers to improve collaboration, innovation, and decision-making.
This document provides an overview of lecture 3 which covers online communities and social networks. It discusses:
- The topics to be covered this week including online communities, social networking platforms like Facebook, and growing thriving online communities.
- Instructions for students regarding class representatives, blog assignments, and setting up online profiles for participation. Groups will be allocated to start thinking of online community ideas.
- Key aspects of online communities including their virtual nature, examples like Facebook and Wikipedia, and how they break barriers of time and space compared to offline interactions.
InfoAxon’s ‘Liferay Integration’ services help organizations extend the value of their Liferay Portal deployments by ensuring proper design, architecture, enhancements and integrations with other enterprise applications to deliver production grade Liferay solutions.
At InfoAxon, we have continuously enhanced our CMS and Web Portal capabilities and adopted ‘Liferay ‘ which is one of the world’s leading Open source Portal and Collaborative Content Management Platforms to deliver rich content and people centric portal solutions. We have rich experience in delivering customized Web Portal, Collaboration and Social Networking Solutions using Liferay as core CMS and Web Portal engine.
Through our multiple Portal solutions implementations, our engineering teams have further customized and enhanced Liferay.
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
Web 2.0 is creating new opportunities for communication and collaboration. Part of this explosion is the increase in popularity and use of Social Network Sites (SNSs) for general and domain-specific use. In the emergency domain there are a number of websites, wikis, SNSs, etc. but they stand as silos in the field, unable to allow for cross-site collaboration. In this paper we describe ongoing design science research to develop and refine guiding principles for developing an SNS that will bring together emergency domain professionals in a “one-stop-shop.” We surveyed emergency professionals who study crisis information systems, to ascertain potential functionalities of such an SNS. Preliminary results suggest that there is a need for the envisioned SNS. Future research will continue to explore possible solutions to issues addressed in this paper.
This document discusses customizing Liferay Portal for business needs. It provides an overview of Liferay and common customization scenarios. It then discusses the key environments, tools, and techniques needed for customization, including the Plugins SDK, Liferay IDE, and Developer Studio. Common customization decisions are outlined relating to information architecture, content, sites, roles and authentication, workflows and more. Finally, it provides an example of a content-centric customization focusing on basic techniques and methodology.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-042012-cyber-warfare/
The minutes summarize a meeting of the Ad Hoc Committee to Develop a Rotary Social Network that took place from April 5-6, 2011 in Evanston, IL. The committee reviewed two proposals for developing a Rotary social network and discussed the purpose, key elements, cultural considerations, and timeline/budget for such a network. The committee agreed Rotary should invest in a social network to facilitate connections between Rotarians and support Rotary's strategic plan. They outlined important initial functionality and emphasized making the network engaging and useful at local/international levels. Further assessment is needed before finalizing plans.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-bible-12012/
Often business stakeholders are confused about choosing the right Open source Portal and CMS. Not only that the confusion prevails on the actual understanding of a Portal and CMS. Liferay and Drupal are one of the most popular Portal and CMS platforms. This presentation helps business stakeholders choose the right Portal and CMS platform.
This document provides an overview of social network analysis and visualization techniques. It discusses modeling and representing social networks as graphs. Key concepts in social network analysis like centrality, clustering, and path length are introduced. Visualization techniques for different types of online social networks like web communities, email groups, and digital libraries are surveyed. These include node-link diagrams, matrix representations, and hybrid approaches. Centrality measures like degree, betweenness, and closeness are also covered.
El documento habla sobre un taller para aprender a utilizar SlideShare, una plataforma para compartir presentaciones. El taller explica los primeros pasos para crear una cuenta en SlideShare, subir presentaciones y compartirlas con otros usuarios.
Social network websites: best practices from leading servicesFabernovel
This document provides a general background for understanding social network websites and the study of online matchmaking websites and business network websites
This study is only the first step. Distributed under creative commons license, it should be completed and improved through the contribution of external experts, firms and web users as major moves in the industry are expected to occur in the coming months
This document provides an overview and definition of social network sites (SNS). It discusses:
- The key features of SNSs including user profiles, friend/connection lists, and viewing friend networks.
- The history and evolution of early SNSs from 1997 onwards, including SixDegrees (1997), AsianAvenue, BlackPlanet, and MiGente in the late 1990s/early 2000s.
- How SNSs vary in their technical features and user bases but generally support maintaining existing social networks through profiles and public lists of connections.
The document provides guidelines for developing effective social media policies for companies and employees. It discusses balancing open communication with protecting proprietary information. It also emphasizes the importance of an inclusive process to create guidelines that reflect the organization's culture. The document details Cision's process for creating their social media guidelines and the nine guidelines they developed, which focus on transparency, professionalism, respect, and protecting confidential information.
This document provides checklists to help companies create social media policies that ensure proper disclosure and compliance with FTC guidelines. The first checklist focuses on best practices for disclosing employee and agency identities when using social media on behalf of a company. It recommends clearly disclosing affiliations from the first encounter, using real identities unless pseudonyms provide privacy or security, and allowing two-way communication to verify involvement in social media content. The overall goal is to make disclosures clear, understandable, and conspicuous to average readers.
This document is a guide for executives on engaging with social media. It discusses why executive engagement is essential both internally and externally. Internally, social media offers a way for executives to share information and insights with employees. Externally, customers and stakeholders expect executive participation and are more likely to trust companies whose leadership uses social media. The guide provides best practices for executive participation, such as being authentic and responsive. It also gives examples of executives like Richard Branson who effectively use social media to engage audiences.
Employee Engagement and Social Media Pecha Kucha - Caroline KealeyCarolineKealey
Caroline Kealey's Pecha Kucha presentation on Employee Engagement and Social Media for the February 9, 2011 Conference Board of Canada’s Public Sector Human Resources Conference, HR Excellence in a Changing World.
Connect with Caroline Kealey at Ingenium Communications:
WEBSITE: http://www.ingeniumcommunications.com
TWITTER: @CarolineKealey
SUBSCRIBE to the Results Map Blog: http://www.resultsmap.com/category/blog/
Collaborative Enterprise & Social Media : definition, reasons & goals, implem...Frédéric Williquet
Enterprise 2.0 involves using social software and technology to facilitate collaboration between employees and with customers. The key goals are to improve collaboration, innovation, and awareness to gain a competitive advantage. Implementing an enterprise collaboration platform can shrink distances between people and information. Reasons to adopt social media internally include dismantling silos, leveraging relationships for ROI, and improving the employee and customer experience. Visualizing networks can help diagnose collaboration challenges and design efficient solutions. Intensive use of social technologies is correlated with market gains and stronger financial performance. Avoiding social networks comes at a cost to relationships and knowledge. The future of social media in organizations involves conversational channels, social search driving value, and work transcending boundaries.
5 Requirements for Enterpris Social SoftwareRalph Paglia
The document outlines 5 critical requirements for enterprise social software:
1) It must create a sharing culture by encouraging microblogging, social networking, and building trust.
2) It must have a high adoption rate by being intuitive to use and providing clear benefits to users like personalized productivity tools.
3) It must fit how people work naturally by integrating with email and mobile devices, allowing offline access, and enabling collaboration with external partners.
4) It must aggregate information from all relevant sources, including workspaces, enterprise applications, and external websites.
5) It must have a low total cost of ownership.
Learn more about Automotive Digital Marketing at the most popular professional network for car dealers and interactive marketers working in the auto industry at http://www.automotivedigitalmarketing.com/
The document discusses best practices for driving adoption of enterprise social software. It recommends establishing ROI and momentum by demonstrating how social software can accelerate key processes like idea generation and learning. It also suggests overcoming objections by emphasizing benefits like increased productivity, decision making speed, and engagement. The document provides guidance on launching a social environment, including starting small, appointing a community manager, and tying launches to real-world events. It stresses sustaining adoption through community governance, advanced analytics for measuring success, and promoting top contributors.
Social Media Governance - Beyond the RisksWalter Adamson
Objectives: To allow Internal Auditors to:
communicate effectively with those managing the use of social media when they are conducting an audit; to understand the inherent release of control of information posted in social media; to understand the tools and systems which might be in use to distribute and monitor social media activity; to understand what governance and control means regarding social media when its utility is heavily linked to not being ‘in control’.
Social Media Governance - how it works in organisationsiGo2 Pty Ltd
Presentation to Internal Auditors to: communicate effectively with those managing the use of social media when they are conducting an audit; to understand the inherent release of control of information posted in social media; to understand the tools and systems which might be in use to distribute and monitor social media activity; to understand what governance and control means regarding social media when its utility is heavily linked to not being ‘in control".
Most Employees Consider Their Private And Work Lives To Be Totally Separate, But Social Media and Social Networking Has Silently And Effectively Bridged That Gap And Blurred That Distinction.
No matter how “separate” a person’s social accounts may seem to be, there will ultimately be someone, somewhere that will link-up that person to your organisation or firm.
Social Media Policy Template http://wp.me/p4RKCt-5P
Social businesses are arguably the next generation of business; a new model of operating, and interacting. They are businesses where success is based on the participation of all, rather than the outputs of a few. Strategists Maggie...
The document discusses the top five pitfalls for collaboration deployment: 1) failing to recognize it as an organizational change, 2) failing to see it as a human activity, 3) treating platforms as an IT project, 4) failing to connect it to business goals, and 5) lacking a framework. It then outlines The Collaboration Methodology, a six-domain approach covering business case, facilitation, diagnosis, strategy, programs, and progress to guide successful collaboration deployment.
What Is Social Business ? A SideraWorks BriefXVA Labs
Social business. A term that’s been steadily gaining traction at the intersection of social media’s rise and the current shift in the business world. But what does it mean?
Clarifying the term “social business” is critical to determining whether it’s something we want our companies to be, and if so, how we go about achieving that. At SideraWorks, we’ve spent a great deal of time defining social business in a way that encompasses its essence, but avoids much of the jargon that simply adds to the confusion.
knowledge management detailed document - meaning , types, knowledge management system lifecycle, Nonaka,s model , KM myths, KM cycle, KM Audit, km matrix, km components , Knowledge application system, Knowledge capture system, Knowledge sharing system, Knowledge discovery system, codification, personalization , 5ikm3 maturity model , CMM maturity model,1. Distinguish between brainstorming and consensus decision making
2. Protocol analysis and Delphi method
3. Repertory guard and nominal group
4. Black boarding and electronic brain storming
This document discusses how technological advances in the workplace are intensifying issues with human resource management by creating personal disconnects despite increased connections. It argues that implementing strategies to improve social skills, identify blind spots, gather feedback, and eliminate blind spots can help develop human resources in a more sustainable way. Specifically, it emphasizes the importance of maintaining meaningful personal relationships through open communication and spending time with colleagues to understand how one is perceived and improve interpersonal skills for successful human resource management.
This executive summary discusses the importance of social networks in knowledge management and organizations. It notes that 85% of managers surveyed obtained crucial career information from other people within their social networks. Examining communication patterns within organizations can provide insight into why knowledge is not being effectively shared. Managing social networks and improving connections between employees can lead to better knowledge sharing, lower costs, greater coherence, and higher social capital - the value of relationships within the organization.
This is a comprehensive guide for large corporations to engage in social media properly, in order to leverage its power and at the same time avoid some of the possible backlashes of a non-existing or improper planned and/or executed social media strategy.
Similar to Enterprise social network challenges & best practices (20)
A global webinar conducted by InfoAxon along with Liferay to discuss how API Pylon - an open source API Gateway middleware created by InfoAxon, fast tracks digital journeys by standardizing the consumption of external services, integration of internal systems while exposing key functionalities as services to external aggregators. This helps organizations provide a seamless & enhanced user experience for both customers as well as partners.
API Pylon has pre-bundled integrations with more than 30+ services including Aadhar, PAN, GSTin, CIBIL, Experian and many more.
Coupled with Liferay DXP, it delivers seamless omnichannel journeys in a simplified and engaging manner.
Designing a Foundational Digital Experience Platform: When Britam decided to build a digital experience platform to overcome challenges in digital transformation, the group turned to Liferay for a state-of-the-art solution. Dramatically decreased costs, plus increased growth, profit, and user adoption were among the key wins Britam experienced.
Gartner has recognized Liferay as a Leader in the newly created Magic Quadrant for Digital Experience Platforms, formerly the MQ for Horizontal Portals. In this key report for digital decision makers, Gartner evaluated 21 providers of digital experience platforms (DXP) based on their completeness of vision and ability to execute.
Read the independent analysis to learn why Gartner positioned Liferay as a Leader for Digital Experience Platforms.
Britam is a leading financial services group in Africa that implemented a digital transformation strategy using Liferay's digital experience platform. The platform allowed Britam to build various portals including customer, advisor, partner and regional websites to overcome challenges of disparate legacy systems and improve the digital experience. This consolidated Britam's online presence, increased efficiency and adoption of new tools, and positioned the company for continued growth across its seven-country footprint in Africa.
Citixsys Digital Engagement Ecosystem: Connecting partners, employees & customers across the globe with improved digital engagement leading to improved collaboration and satisfaction among the users.
Solution Impact:
1. User adoption up from 30% to 90%
2. Message Board transformed into Knowledge based Help Desk leading to enhanced user satisfaction
3. Increased knowledge sharing through Knowledge Digest that dynamically picks contribution & articles to notify all users
4. Mobile Responsive Site enabling anaytime anywhere access
Market research leader IMRB develops new platform for
improved knowledge management for research associates across company leveraging Liferay's Digital Asset Management and Collaboration capabilities.
InfoAxon is India's first open source integration company with experience integrating over 100 open source frameworks and technologies. They have delivered 10 large-scale open source platforms and solutions for government, BFSI, retail, media, and other sectors. InfoAxon has been recognized for its open source expertise by publications like Linux for You and Information Week and has been nominated by IDC as a leading open source company.
This document summarizes InfoAxon's approach to enhancing Pentaho-based business intelligence (BI) deployments using their "Open Source Platforming" methodology. It highlights how InfoAxon has customized Pentaho with new features and integrated other open source components to create standardized, pre-packaged BI solutions. This approach aims to provide more value than a basic Pentaho implementation by offering solutions that are optimized for performance, have advanced data loading behaviors, and support continuous integration and agile development. The document argues this can result in more affordable and business-ready BI solutions for customers with faster turnaround times and lower total cost of ownership compared to traditional BI systems.
UNDP built a knowledge exchange platform called Solution Exchange (SE) to leverage the knowledge and experiences of its development practitioners. SE connects stakeholders like governments, NGOs, and academics in communities of practice to share knowledge and address development challenges. It provides a searchable knowledge repository, consolidated replies that summarize discussions, and allows cross-posting questions to multiple communities. SE enhances existing mailing lists by integrating them with a centralized knowledge base and search, allowing valuable connections and content to be more accessible.
The document describes a social housing business intelligence solution developed by InfoAxon for a leading social housing service provider in the UK. The solution included creating a data warehouse to store data from the client's Choice Based Letting system and developing a web-based business intelligence platform. This allowed users to generate parameterized reports, dashboards, and analyze data through OLAP cubes to help meet reporting needs and support business decisions. InfoAxon developed the solution using open source technologies like Pentaho and PostgreSQL to provide a cost-effective and customizable solution.
Castrol Bike Zone was looking for a business planning and performance management system to better track franchise performance across India. Their existing systems using Excel were inefficient. InfoAxon implemented a solution called BPPMS using open source Pentaho BI and Kettle ETL to integrate data from various sources into a single dashboard. This 3x3 matrix dashboard visualized franchise sustainability and performance scores to help management identify underperforming franchises and take corrective action. The solution provided improved visibility and decision making capabilities.
C&R Associates is a UK market research firm that provides surveys and reports to public bodies. They needed a centralized system to manage surveys, automate repetitive analysis, and allow easy comparison of results. InfoAxon implemented a business intelligence solution using open source tools. This included automated ETL processes, an online reporting portal, predefined and ad-hoc reports, OLAP cubes for data analysis, and dashboards. The solution reduced analysis time, improved productivity, and provided customers access to their survey data and results.
This document summarizes a case study about the development of MyAIDSNexus, a social network based community portal. Key points:
- MyAIDSNexus was created to enhance an existing AIDS portal by empowering individuals and facilitating participation.
- It offers a single access point for micro-services and makes few assumptions about user devices/connectivity.
- InfoAxon developed MyAIDSNexus using a white label knowledge management platform to provide features like social networking, content management and custom user groups.
- The solution was designed to be scalable, decentralized and accessible to users across diverse environments.
The report finds that countries with strong economies like the United States, Western European nations, and Australia lead in open source software development and adoption, while regions like Africa, Latin America, and Eastern Europe lag behind. India, China, and Brazil show higher levels of open source software use than expected given their information society development. Government support has been crucial in advancing open source software adoption, with Germany, France, and Spain leading in Europe and policies in the US and Nordic countries previously lacking.
InfoAxon Technologies is an Indian company that provides open source solutions. It began in 2001 focusing on proprietary technology but transitioned to open source within a year. While initially many companies saw open source as unprofitable, InfoAxon has grown steadily using an approach called "platforming" to build long-term partnerships with customers. Platforming involves developing robust open source platforms that provide ongoing services and support opportunities. This has proven a viable business model for InfoAxon, now with over 80 employees and annual revenues of $100 million.
The adoption of open source infrastructure management tools is rising among Indian CIOs as a way to reduce IT costs and manage growing infrastructure needs. Open source tools like Nagios offer many of the same monitoring capabilities as proprietary tools at a fraction of the cost, with estimated savings of hundreds of thousands of rupees per year. While lower costs are a major motivation, customization possibilities and mature support ecosystems available for some open source tools are also attracting CIOs. Proper planning and support are still important to fully leverage open source tools' potential.
InfoAxon has 10+ years of rich open source solutions delivery experience. InfoAxon has a well defined Open Source BI Practice which is a collection of frameworks, templates, tools, methodologies, services and pre-integrated solutions resulting into customized BI Solutions for specific verticals or specific business problems.
At InfoAxon, we have adopted and developed deep understanding on Pentaho BI platform which is one of the world‟s leading Open source BI Platforms. We have rich experience in delivering customized BI Solutions using Pentaho as core BI engine.
'AdUniverse' is InfoAxon's open source powered white label platform for Media and Advertising Agencies. It helps manage knowledge assets and workflow processes within a media and advertising agency.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Enterprise social network challenges & best practices
1. Best Practices
Challenges and Best Practices for
Knowledge Management using
Enterprise Social Networks
Enterprise Social Network Adoption Challenges
and Best Practices
2. Best Practices
Overview
Most enterprises looking to deploy Enterprise Social Network Platforms are extremely cautious about adopting one. The main
questions that emerge in their mind are:
1. What if this becomes a platform for grapevine or gossip instead of productive and professional activity?
2. How to control or monitor the enterprise social media conversations in a open and professional manner without invading
privacy of an individual at work place?
3. Should we push the social collaboration or shall the business let the social conversations happen on their own and remain
unseen without nudging the collaboration in the work place?
4. How will we control or report abuse as and when it happens? What if this snowballs into a contractual or political issue?
5. Can company secrets be leaked? Invite law suits or similar such events?
The list goes on and on....In most cases these concerns are not as big as they are made out to be. However these continue to
remain challenges for adoption of the Enterprise Social Networks within businesses as a means for Better Knowledge Management.
Challenges
There are several challenges faced by Management while deploying Enterprise Social Network patterns for workforce. Most of these
challenges spiral into strong perception of deployment of Enterprise Social Networks being risky with potential to create unwanted
chaos. The message around how it can dramatically change the Knowledge Management culture is often hidden in the various
perceptions that are formed around its adoption.
Through this table below we have highlighted some of the challenges faced and why these challenges are more around the
perception instead of real risks or concerns.
Perceived Challenges Management may Why the risks/concern is legitimate but is more of a
face while deploying Enterprise Social perception and can be mitigated by understanding it clearly
Networks first before Best Practices are applied.
Inappropriate content and abuse on the Internet is anonymous. One can be who they wish to be. This is
social conversations enabled in the not the case with Enterprise Social Networks and conversations.
enterprise
1. Identity is revealed in case of a Business social network
that ensures that User identity is visible and managed
correctly
2. Within the business community a form of "Self Policing"
emerges and becomes the norm that allows offensive
comments to not only be spotted by others but acts as a
deterrent for any trouble makers.
3. In business social network the formal managers and
leaders also participate. This automatically ensures that
the followers are aware of being monitored and counseled
in case they over step.
4. Younger workforce is social media savvy and learning
www.infoaxon.com
3. Best Practices
slowly how to behave on social media. The same
consciousness is carried over to social networks.
Content is inaccurate 1. As long as the content put by employees and leaders on
enterprise social network is open for scrutiny chances are
that inaccurate content will be spotted much sooner and
pointed out by other work force.
Content that is put on social wall
conversations even though it is 2. However it is important that some form of workflow or
moderation is also put in place for document posts, audio
professional activity and inappropriate
and video initially so that the message is clear that
may be inaccurate representation of
inaccurate content is being watched.
facts and can either confuse or mislead
the work force.
Too much transparency 1. This is very much a legitimate concern but transparency
can be managed well and can lead to a strong brand and
There are often concerns that too much perception of a open and transparent organization.
about the company and its policies or
day to day decisions is "going out" and 2. Educating the workforce clear non negotiable when it
comes to posting company documents or information can
can lead to too much transparency and
be outlined by HR teams.
problems in workplace because of it.
3. Managers and Leaders are also part of the social
conversations and can monitor any violations and raise
and counsel over a period of time to minimize such
occurrences.
4. On the contrary, the transparency and social chatter
around HR policies or similar other events is a great input
to Management provided this is reported, understood and
responded positively.
Insufficient Facilitation of Participation One of the main challenges is also that management is not
(By Management) equipped to encourage or foster participation.
Management needs to work with employees in terms of
communicating that the Social Network deployment is not just a
new technology development but also a new way or culture of
doing daily communication and participation.
Management needs to be involved much more heavily in declaring
and nurturing Communities of Practices (CoPs) within the
business.
High Barriers to Participation (By High barrier for participation means that people do not easily
employees) contribute to online discussions and share their knowledge
publicly.
There are multiple reasons for this kind of behavior: not being
used to using one’s own name in online communities can cause
shyness, and the communication culture of the organization may
be too formal and hierarchical to allow for low-barrier
contributions and unstructured participation.
The most important reason for having a high barrier for
participation, however, is the fact that the participation is not
encouraged enough by the platform, the content or effective
www.infoaxon.com
4. Best Practices
community management.
Management must make sure that employees have clear
understanding of their own rights and responsibilities as active
A users of the new systems. lot of
the
concerns related to risks of Social Media are legitimate concerns but these risks and concerns are actually on closer view much
unfoveral reasons for this:
Best Practices
Integrate Social Network into Business Ways of Working
The Social Network should not just become a set of Wall posts and updates done by employees in their spare time. Actually the
Social Network has ability to replace in some cases existing processes or move along with the other existing business processes to
ensure better outcomes.
One of the simple use cases for this best practice is move of email communication to the social network thus reducing clutter. For
e.g. status meeting reports can simply be published as a announcement alert or wall posting to a large number of users instead of
a select few. This will involve entire teams and bring in a culture of openness visible within the workplace.
Make Reporting Abuse "Visible"
One of the most basic practice is to make it easy for the community users participating in a social conversation to report abuse to
moderators.
This is done by ensuring that reporting abuse feature is visible and promoted actively by business marketing teams and actively
talked about in the organization before the launch of the social network.
For e.g. while showing nested comments of a conversation an access Web UI button to report abuse around the comment made
with the Comment name attached will be very useful and give an impression that the business is monitoring and providing due
weight age to practice of reporting abuse.
Build a Abuse Monitoring Structure
In parallel to have a reporting abuse feature it is also important to draw in user community champions and provide a more "Self
Policing" flavor to monitoring abuse. Reported abuse features should regularly be monitored by the community champion members
and offenders counseled or in extreme cases disciplined.
1. Keep the community of self policing moderators fully represented from the workforce itself. Avoid managers or senior staff
that may not be actively participating in the social conversations in the first place.
2. Choose community moderators that can handle the issues with calm and have ability to counsel the staff if and when such
event occurs.
In terms of best practices any organization adopting Enterprise Social Network has to ensure following:
1. Make sure your organization is not only on board but knows where it's going and gets the kind of participation that truly
makes a difference in productivity, creativity, and collaboration.
2. Make sure the social media in your workplace has the same characteristics as social media in employee personal life
www.infoaxon.com
5. Best Practices
Building Communities of Practices
Communities of Practices (CoPs) is a well formed Knowledge Management strategy.
Research conveys that many of the exchanges of practical information and problem-solving happened during informal gatherings
where experts of some topic of interest exchanged stories about their experience.
In CoP environments, novices could also consult with experts in a non-threatening environment. Through this process, gaps in the
practice were identified and solutions were proposed.
Individuals might apply the solution in their own practice, and the outcomes were fed back to their colleagues for further
refinement of the solution. Eventually these informal communications became the means for sharing information for improving
practice and generating new knowledge and skills.
Community relationships between different business practices should ride on the Enterprise Social Network Foundation. Following
concrete steps are needed alongside the Enterprise Social Network:
1. Identify and Form Communities of Practices within the business.
2. Promotion of Workspaces as Communities of Practices on the Social Network itself. These Sites may exist across functional
areas and reflect a particular interest area such as "Customer Service".
3. Enable automated wall postings whenever a new article has been added (as announcement feed) to promote the practice
area
4. Use Groups and discussions as a means to spread awareness and learning around a Practice Area.
Strong Moderation Capability
A business should assign a team of moderators for the enterprise social network to sustain and thrive. Initially it will be a new tool
for the work force to form communities of interest and exchange ideas and suggestions. Lot of these features are new to the
workplace. We need a team of moderators that can shape the conversations and evaluate whether violations are happening.
Also the moderation team can inject high quality content that attracts and encourages others users to contribute more to this
activity.
Linking with Outcomes
Ultimately the social conversations, blogs, wikis, posts to the social network in a business context must be linked to some outcome
that the business wishes to realize.
Shaping this is quite a challenge because more social networks have emerged from a personal context and most users would
naturally be inclined to keep conversations at a personal level during social conversations.
Shaping these conversations in such a way that they can be linked to a business event or an outcome requires moderators to also
take control and guide the social chatter.
Management can set goals such as "Implementing 5 ideas" this month from the workforce on better delivery of services to
customers. These ideas are then collected and put into shape as actual actions by the management team.
www.infoaxon.com
6. Best Practices
"Measure" and Report Social Conversations
Management has taken a leap of faith when it comes to deploying enterprise social network within the business. Therefore a
mechanism to report social conversations and objectively view the insights that these conversations highlight for the business will
continue to benefit the business and will also help value the social network in the work place as a strategic tool.
The enterprise social conversations can be collected in the knowledge repository and using text and semantic analysis a better
reporting structure should be created.
For e.g. total conversations of a month can be analyzed and the overall "Buzz" at the work place can be articulated in the form of
reporting that measures different grades such as "High Morale" , "Neutral Feedbacks", "Growing Angst" so that these reports can
reflect the HR practices and influence any other decision making.
Make it part of Regular Employee Interaction
Equipped with better social network reporting, management and HR teams can engage employees in a very different manner as
today.
1. Collecting comments from audiences before a HR review cycle
2. Referring to specific posts or views expressed during Management catch up meetings
Suggest Tools
InfoAxon suggests following technology and tools to:
1. Assist in faster adoption of Social Network within the enterprise
2. Report Abuse and Monitoring of Social Network
3. Social Network Analytics Tools
"Pull" Tools and Techniques
Building Social Network for enterprises can benefit from "pull" created through a much more personalized and "Public Social Media"
look and feel. Employees that already access public social media sites such as Facebook, Twitter and Tumblr etc. are already aware
of Social Network usability patterns and features. It is easier to adopt enterprise social network technology that is similar in look
and feel or derived from public social network design patterns.
For e.g.
1. Interactive Chat can be added alongside Social Network to reduce the overall email traffic and create a major PULL factor
allowing users to integrate with existing Social Network Platform.
2. Rating features provided to contributors to rate documents and content shared through social media. This increases
participation and fosters self ranking of content by the community instead of through organizational workflows. These
ranks can be attractively tagged as "X people rated this highly with ranking XXXXXX"
www.infoaxon.com
7. Best Practices
3. Provide attractive and useful personal productivity applications such as:
a. Weather
b. News
c. Subscribe to external web sites.
d. Links
e. Discussion forums
f. FAQ Knowledge Bases
Abuse Monitoring
Enterprise Social Network wall updates and conversations should be treated as "knowledge items" that contain snippets of text
conversations describing a state of mind or event. This is precious data which can be analyzed further for measuring and
monitoring abuse on the enterprise social network sites.
For e.g. using Web harvesting and Semantic programming techniques and open source tools it is possible to crawl a database of
the conversation snippets and updates and report through special keywords whether abuse is taking place. If such a pattern match
is found the moderators are alerted.
Using a rules engine and a "Abuse Dictionary" patterns will be matched and abuse reported and highlighted.
www.infoaxon.com
8. Best Practices
Social Network Analytics
Social Network Analytics is a emerging science and analytical practice around data collected through social network patterns. There
are several ways in which this can be done and InfoAxon can provide add on plug-ins to achieve this.
1. Using Open Source tools such as Pentaho, Social Network analytics InfoAxon plug-in can be used to direct "Social Network"
activity feeds to analytical tools. Using these plug-ins these activity feeds are analyzed against a rules engine and:
a. Abuse, usability patterns, social media metrics can be measured.
b. What content is being shared and where (from which site and users) this is being shared with the social network.
c. How many "abuse" patterns are originating from each site and which site users are most "abusive" on enterprise
social network.
2. "Listening" platform and Dashboard that shows violations and activity feeds with such violations being trapped and shown
real time to the users. The Dashboard will consist of
a. Abuse reporting dashlets that allow administrators to view entire links of abusing content posted. Administrators
can then moderate and flag comment as abusive and remove it from the social network.
www.infoaxon.com
10. About InfoAxon Technologies
InfoAxon is a leading provider of enterprise services and business
solutions powered by open source. We design, architect and support
complete “Enterprise Solution Platforms” using Open Standards, Web 2.0
next generation technologies and Open Source Frameworks providing
end-to-end solutions to business problems.
India’s First Global Open Source Integration Company
We are India's First Global Open Source Integration Company providing
business solutions in areas of Content & Knowledge Management,
Web2.0 Collaboration and Business Intelligence powered by our
unique open source ‘Platforming’ expertise.
INDIA OFFICE: UK OFFICE:
InfoAxon Technologies Ltd. InfoAxon Technologies UK Ltd.
A-105, Sector-63, Building A, Trinity Court,
Electronic City, Wokingham Road,
NODIA-201307, U.P Bracknell, Berkshire RG42 1PL,
India United Kingdom
Phone:+91 120 4350040, Phone: +44 1344 668048,
Fax:+ 91 120 4350065 Fax: +44 1344 668148
Website: www.infoaxon.com | Blog: http://blog.infoaxon.com | E-mail: contactus@infoaxon.com