This document summarizes a study on valuing social media technologies for internal business activities. It provides an introduction to social media and its adoption in businesses. It then discusses using an organizational semiotics approach to analyze how social media tools could be used internally and the potential challenges of using social media for internal communication, collaboration, knowledge sharing and management. The aim is to understand stakeholders' perceptions of the benefits and shortcomings of social media for internal business activities and objectives.
Class Actions: The Latest Word – April 2012Now Dentons
This presentation offers a comprehensive overview of recent trends in class actions, including statistics related to class certification motions and certification decisions, employment and securities cases of note, trends in Canadian Securities Class Actions, as well as limitation periods and class actions, litigation holds and document retention policies.
Presentation at Tourism Industry and Education Symposium
March 5-7, 2009 in Jyväskylä, Finland
Innovative and Sustainable Products in the Tourism and Hospitality Business
http://www.jamk.fi/english/research/internationalevents/tie2009/mainpage
Class Actions: The Latest Word – April 2012Now Dentons
This presentation offers a comprehensive overview of recent trends in class actions, including statistics related to class certification motions and certification decisions, employment and securities cases of note, trends in Canadian Securities Class Actions, as well as limitation periods and class actions, litigation holds and document retention policies.
Presentation at Tourism Industry and Education Symposium
March 5-7, 2009 in Jyväskylä, Finland
Innovative and Sustainable Products in the Tourism and Hospitality Business
http://www.jamk.fi/english/research/internationalevents/tie2009/mainpage
IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...Alex J Mitchell
This is a talk from IPOS 2010 on Identification of Patient Reported Distress by Clinical Nurse Specialists in Routine Oncology Practice: A Multicentre UK Study.
Cardiff09 - Detecting Depression in Primary & Secondary Care (May2009)Alex J Mitchell
Lecture for the University of Cardiff Psychiatry programme 2009. Topic is detecting depression - an evidence based approach. 86 slides; most self-explanatory but some slide labels added. Warning! can be a bit statistically heavy!
Making the Case for Impact Sourcing - SamasourceLeila Janah
Impact Sourcing is a new type of business process outsourcing (BPO) that aims to create jobs for individuals with limited opportunity in rural or economically depressed communities. There are a number of new studies which show the significant business benefits for companies that partner with Impact Sourcing providers, including significant cost savings and proven social benefits. Additionally, Impact Sourcing can provide high-quality, reliable services at prices that are at least competitive with traditional BPO centers and, in some cases, almost 40 percent lower than what traditional providers can offer. It is estimated that 40% of companies currently outsourcing to traditional BPOs will allocate at least 25% of their budget toward Impact Sourcing providers by 2015. As a pioneer in Impact Sourcing, Samasource has connected over 3,700 poor women and youth across 9 countries to nearly $3 million in living wages. This work is sourced from some of the world's biggest enterprises including Google, Microsoft, Intuit, and LinkedIn. In this presentation, we explain what Impact Sourcing is, the benefits to clients and beneficiaries, and the forecasted growth of the industry.
Frontiers of Interaction 2010
Program / Programma
Acquario Romano
Rome/Roma
3-4 June/Giugno 2010
www.frontiersofinteraction.com
www.twitter.com/frontiersof
A slide show from the second class of a course titled Cradle to Cradle: Closed Loop Systems, which is part of the Certificate for Global Sustainability at the University of California Los Angeles Extension program.
creating an innovative digital and physical project storage solution for SIAT students at the Surrey Campus of Simon Fraser University with a focus on thoughtful information design, while considering students needs and maintaining the university’s branding.
BlogWell San Francisco Case Study: Sears Holdings Corporation, presented by J...SocialMedia.org
In her BlogWell presentation, Sears Holdings Corporation's DVP, Customer Analytics & Social Media, Jennifer Dominiquini, shares how they built and engaged their community.
IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...Alex J Mitchell
This is a talk from IPOS 2010 on Identification of Patient Reported Distress by Clinical Nurse Specialists in Routine Oncology Practice: A Multicentre UK Study.
Cardiff09 - Detecting Depression in Primary & Secondary Care (May2009)Alex J Mitchell
Lecture for the University of Cardiff Psychiatry programme 2009. Topic is detecting depression - an evidence based approach. 86 slides; most self-explanatory but some slide labels added. Warning! can be a bit statistically heavy!
Making the Case for Impact Sourcing - SamasourceLeila Janah
Impact Sourcing is a new type of business process outsourcing (BPO) that aims to create jobs for individuals with limited opportunity in rural or economically depressed communities. There are a number of new studies which show the significant business benefits for companies that partner with Impact Sourcing providers, including significant cost savings and proven social benefits. Additionally, Impact Sourcing can provide high-quality, reliable services at prices that are at least competitive with traditional BPO centers and, in some cases, almost 40 percent lower than what traditional providers can offer. It is estimated that 40% of companies currently outsourcing to traditional BPOs will allocate at least 25% of their budget toward Impact Sourcing providers by 2015. As a pioneer in Impact Sourcing, Samasource has connected over 3,700 poor women and youth across 9 countries to nearly $3 million in living wages. This work is sourced from some of the world's biggest enterprises including Google, Microsoft, Intuit, and LinkedIn. In this presentation, we explain what Impact Sourcing is, the benefits to clients and beneficiaries, and the forecasted growth of the industry.
Frontiers of Interaction 2010
Program / Programma
Acquario Romano
Rome/Roma
3-4 June/Giugno 2010
www.frontiersofinteraction.com
www.twitter.com/frontiersof
A slide show from the second class of a course titled Cradle to Cradle: Closed Loop Systems, which is part of the Certificate for Global Sustainability at the University of California Los Angeles Extension program.
creating an innovative digital and physical project storage solution for SIAT students at the Surrey Campus of Simon Fraser University with a focus on thoughtful information design, while considering students needs and maintaining the university’s branding.
BlogWell San Francisco Case Study: Sears Holdings Corporation, presented by J...SocialMedia.org
In her BlogWell presentation, Sears Holdings Corporation's DVP, Customer Analytics & Social Media, Jennifer Dominiquini, shares how they built and engaged their community.
Similar to Valuation of Enterprise Social Media (20)
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
2. Outline
• Introduction
– Overview of Social Media
– Social Media adoption in business
• Theory/Methodology
– Organisational Semiotics (OS)
• Valuation Framing Analysis
• Results & Observations
• Summary
3. Introduction
• Web 2.0
“a network as platform, spanning all connected devices” (O'Reilly
2007, p. 17) and
“a more mature, distinctive medium characterised by user
participation, openness and network effects.”(Musser, O’Reilly et al.
2006, p. 4)
4. Introduction
People are rapidly moving towards the use of “Social Media”
90
Percentage Online Global Population
80 1.4
70 9.9 9.9 2.7
5.4 10.3 2.6 2.9
60 4.9 Dec-08
50 Dec-07
12.5 9.6
40 78
65 63 67 64 64
30 61 59 55
20 39 41
10
0 A
y
UK
Au ce
d
ain
ly
n
l
il
Ge ia
ba
an
US
lan
pa
az
It a
an
l
ra
Sp
o
rm
Br
Ja
er
Gl
Fr
st
it z
Sw
Percentage of rise in population for Social Networking sites of Total Online population (Nielsen_Online, 2009)
5. Introduction
Reach and Usage by Country during Apr 2010 (Home & Work)
Social Networking / Blog Sites
(Nielsen, 2010)
% Reach of Active Time per Person
Country Users (hh:mm:ss)
Brazil 86% 05:03:37
Italy 78% 06:28:41
Spain 77% 05:11:44
Japan 75% 02:50:50
United States 74% 06:35:02
United Kingdom 74% 05:52:38
France 73% 04:10:27
Australia 72% 07:19:13
Germany 63% 04:13:05
Switzerland 59% 03:43:58
6. Social Media and Internal Business Activities
Employees have used SM in their personal lives and have
brought this concept to the workplace (Cook 2008)
•Features
– Participation
– Collectivism
– Creativity
– Mass collaboration
– Co-creation
“Enterprise 2.0 is the use of emergent social software
platforms within companies, or between companies and their
partners or customers” (McAfee 2006)
7. Stages of Growth Model
6.. ransformation
T
5. Social
4. Social Enterprise
3. Social Business
2. Internal Commerce
Communications Enterprise wide
1. External New business information and What’s
Communications models to meet decisions by next?
Users aid in customer wire
Communication buying and demands
Corporate Collaboration
fanpages and selling
Connections
tweets
Evolution of SM – Stages of Growth Model Derived from Earl's Model
8. SM Tools and Possible Uses
SM Tool Potential Uses
Forums Internal discussions; practical and process questions, and general staff
issues (Cook 2008)
Blogs General information tool (Tredinnick 2006)
Knowledge management, business intelligence, project management
(Cook 2008)
SNS Connectivity, knowledge sharing, strengthen relationships (Cook
2008)
Wikis Commercial content management systems (Tredinnick 2006)
Knowledge management and information sharing (Jansen 2009)
Social bookmarking Classification of knowledge and information (Tredinnick 2006)
Virtual worlds Meetings, training, and socializing with colleagues (Cook 2008)
Podcasts Briefings and recordings of conference calls (Davidson 2006)
Provide information and presentations and sharing of information
(Zhang 2009)
Media Sharing Informal virtual learning or training (Cook 2008)
9. Challenges
• Social
– IT dept threatened - less influence (Cook 2008)
– Fear of loss of control or inappropriateness (McAfee 2006)
– Interactive environment (Chui, Miller et al. 2009) (McAfee 2006)(Li 2007)
– Managers inability to understand the forces of change (Chui, Miller et al.
2009)
– Lack of understanding - create value (Chui, Miller et al. 2009)
– Perception that internal hierarchies will flatten (Ledbetter 2008)
• Technical
– Integration with existing information systems (Cook 2008)
– Data retrieval and analysis may be an issue (Passant 2007)
10. Motivation
• Will the same challenges be applicable if the focus is on
internal business activities?
• If not, what challenges may occur?
• Validate the findings from literature review in the
context of internal business activities
11. Aim & Objective
• Aim
– To reveal the perceptions of the stakeholders in relation to the
benefits and shortcomings of using social media for internal
business activities in organisations
• Objective
– To understand the impact that the use of social media tools
may have on an organisation’s stakeholders using a semiotic
approach
12. THEORETICAL FRAMEWORK AND FOUNDATIONS
Organisational Semiotics Approach
– focuses on the analysis of how information and human
communication work in organisational contexts (Liu et al. 2001)
by concentrating on the relations among the IT system, business
process and organisation (Liu 2000)
– semiotic concepts applied to the analysis and design of
organisations and information systems (IS) through a range of
methods and frameworks (Liu 2000)
• Application of OS for SM…
• Organisational Containment Analysis (Jacobs, et al., 2010)
• The Semiotic Framework (Jacobs, et al., 2010)
• Valuation Framing
13. MEASUR
MEASUR is a set of Methods for Eliciting, Analyzing and
Specifying User Requirements (Stamper, 1993)
• PAM – Problem Articulation Method
• Valuation Framing - Aids in capturing user perceptions of a
technology that is or will be introduced into an organisation
14. Valuation Framing
• Online survey distributed
• 238 responses - 196 were valid and complete responses
• 7-point Likert scale
• 3 questions from each of the valuation aspects
15. Aspects Descriptions
Subsistence Physical livelihood, existences e.g. impact of the new system on job security
Classification Differentiation of people by sex, age, level of education e.g. whether the new
system improve equal opportunity for all
Territoriality Impact of the new system may lead to an erosion of control, influence or loss of
authority
Temporality Time division, synchronous, asynchronous e.g. issues of time zone differences
Learning Sharing knowledge, gaining awareness e.g. de-skill or more opportunity for
learning new skills
Recreation Fulfilment, joy e.g. whether the job becomes more interesting or boring
Protection Fairness, rights e.g. granting file rights access to the appropriate groups of people
and maintain the confidentiality of information
Exploitation Individual’s vs organisation interests e.g. cutbacks on operating costs with salary-
cut, retrenchment or longer working hours
Association Grouping, alliances e.g. formation of teams to evoke competitiveness and sense of
belonging of the employees
Interaction Interrelations, communications e.g. fostering collaborative attitudes in the work
place
Ten Cultural Aspects for Valuating Impacts on Stakeholders (Stamper, 1988)
16. Example questions
How strongly do you agree or disagree with the following statement about job security and
the use of Social Media within your organisation?
• It will have an impact on my job security.
Strongly disagree ...........Strongly Agree
• It will affect my livelihood.
Strongly disagree ...........Strongly Agree
• It will Not cause me to lose my job.
Strongly disagree ...........Strongly Agree
How strongly do you agree or disagree with the following statements about how the use of
Social Media affects your job fulfillment?
• It increases the level of fulfilment from my job.
Strongly disagree ...........Strongly Agree
• It will make my job more interesting.
Strongly disagree ...........Strongly Agree
• It will not make my job boring.
Strongly disagree ...........Strongly Agree
18. Results & Observations
• Organisational stakeholders value the use of social media for
internal business activities
• Organisational stakeholders feel the use of social media will have the
highest positive impact in the aspects of association, learning and
territoriality
• Organisational stakeholders feel it will negatively impact them in
regards to protection
• It appears that entry level positions place the highest positive value
for the use of social media for internal business activities.
• Contrary to anecdotal data, upper management appears to value
the use of social media for business activities
• Limitations
– Sample size
– Classification of job types
19. Summary
Research context
Increase in social media usage among the Internet population
Gradual and ad hoc introduction of SM into business
What has been done:
Identified the value stakeholders place on SM use for internal
business activities
What is next:
Further analysis of the use of SM tools with internal business
activities to gain understanding of what social media is in
business and how best to introduce these tools
– Semi-structured interviews with organisations and customers will
be conducted for further analysis
Key to social media technologies is web 2.0 which is a characterised by the change of the web from one that is static to one that is more interactive.
the use of emergent social software platforms within companies, or between companies and their partners or customers is known as Enterprise 2.0
Because this has grown organically – organisations do not have a clear understanding of how the adoption of these tools will impact the organisation and nor a methodology for adopting these tools
Based on the Literature Review some social and technical integration challenges were identifiedRequire users to participate(Chui, Miller et al. 2009) Busy knowledge workers may not use the new technologies (McAfee 2006)Forrester survey states that 52 percent are inactive users, 33 percent are passive spectators and 13 percent are actual creators (Li 2007)
Built on the concepts of Organisational Semiotics, the research programme MEASUR (Methods for Eliciting,Analysis and Specifying Users’Requirements) (Stamper 1993) was developed to aid in modelling and requirements specification. MEASUR is based on the idea that an organisation is an Information System and that the social norm is considered the appropriate unit of specification. Although MEASUR can be used in the various stages of system development; infrastructure analysis, system analysis and system construction, this research will focus on infrastructure analysis. Infrastructure analysis combines business strategy analysis and information planning. The aim of infrastructure analysis is to understand the social, organisational, cultural, and technical aspects the business problem in its context. It is particular useful for analysing complex and unidentified business problems. It also aids in capturing semantics and user intentions. These techniques can also be used to implement technical information systems that are flexible and adaptable to the organisational change. When conducting an infrastructure analysis, the first step in MEASUR is to apply the semiotic framework, followed by Problem Articulation Methods (PAM). PAM is one of the five approaches of MEASUR, others are SAM and NAM, Communication and Control Analysis, and Meta-Systems Analysis. Aids in the analysis of environment and is now being used for software design over technology and user center design.
Built on the concepts of Organisational Semiotics, the research programme MEASUR (Methods for Eliciting,Analysis and Specifying Users’Requirements) (Stamper 1993) was ...
Built on the concepts of Organisational Semiotics, the research programme MEASUR (Methods for Eliciting,Analysis and Specifying Users’Requirements) (Stamper 1993) was ...
In order to investigate the values that stakeholders place on the use of social media within their organisation for business activity, I used an online questionnaire based on OS valuation framing through the ten cultural aspects that impact stakeholders. A stakeholder is defined as a person, group of people, or organisation who can be positively or negatively impacted by or cause an impact on the actions of a company.