SlideShare une entreprise Scribd logo
1  sur  30
What is social media?
any electronic platform that allows two way communication or other interaction with content
blogs microblogs message boards & forums photo & video sharing Audio & video podcasts social bookmarking social networks reviews
In one way or another, nearly everyone will be in social media in 2009.
 
Why should organizations be on social media?  We all trust our peers more than any other source. And the tools to share opinions are free, lightweight and ubiquitous.
I use social media – primarily blogs, podcast, Twitter, Facebook and LinkedIn…
 
… along with wikis, blogs, feeds, videos and microsharing behind the firewall at TechTarget. But that’s  “Enterprise 2.0”  – not Web 2.0.
“ Enterprise 2.0 is the use of emergent social software platforms by organizations in pursuit of their goals.” -Professor Andrew McAfee, MIT
Enterprise 2.0 implementations generally use a combination of social software and collaborative technologies
Enterprise social computing includes: blogs ,  RSS ,  social bookmarking ,  social networking  and  wikis .
Case studies for successful enterprise social computing include private industry, like Booz-Allen Hamilton and Lockheed Martin,  …and now government, like Intellipedia and A-Space. Or MyBarackObama.com.
How do Web 2.0 and enterprise 2.0 work together?
So let’s call it  “enterprise social computing” …and drop the 2.0.
Most public entities need to be on Facebook and at least monitor Twitter and LinkedIn.
Employees can & will use smartphones to update them in real-time.
In a recent survey by Russell Herder, fewer than one-third of 438 respondents said their organization had a policy in place governing social media use.
Only 10% of the companies surveyed indicated that they had conducted employee training on such use.
And yet Web applications are at the top of security threats to the enterprise.
Is it any wonder that 80% of the executives surveyed said they are fearful of  social networking  risks?
That said… …many organizations  will  allow some form of social computing for collaboration.  Workers are already bringing the tools to work from home when sysadmins don’t provide better versions.
And whether it’s Web 2.0 or enterprise social computing… regulatory compliance means relevant  social messaging will need to be logged and audited for e-discovery.
Facebook is already “discoverable” in Canada.
For those that collaborate most effectively internally and externally, there appear to be major rewards.  Research from MIT’s Andrew McAfee indicates that those who use it best – and safely – reap significant competitive benefits
Best bets to adapt?
Sandboxes  can help with security That’s how the White House addressed the issue – at first. Defense contractors complying with “transparency directives” may proceed similarly.
Social media policies  are key.   IBM’s social computing guidelines  are a gold standard.
And emphasizing  common sense  &  education  for employees about security risks is essential. Phishing, XSS and worms are on the rise.
You can find me at  [email_address] @digiphile or @ITcompliance

Contenu connexe

Tendances

Behaviour Change and Cyber-Security
Behaviour Change and Cyber-SecurityBehaviour Change and Cyber-Security
Behaviour Change and Cyber-Securityjoinson
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityMason Bird
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Open Government and Social Media
Open Government and Social MediaOpen Government and Social Media
Open Government and Social MediaStrategyWorks
 
Social Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand ProtectionSocial Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand ProtectionStrella Social Media
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
Social Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIASocial Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIAMelissa Murphy
 
Risks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparencyRisks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparencyStan Skrabut, Ed.D.
 
20th March Session Six by Raja Lakshmipathy
20th March Session Six by Raja Lakshmipathy20th March Session Six by Raja Lakshmipathy
20th March Session Six by Raja LakshmipathySharath Kumar
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...Jesse Wilkins
 
Essay 2 IE Business School
Essay 2 IE Business SchoolEssay 2 IE Business School
Essay 2 IE Business SchoolAlexander Klaver
 
ASSIGNMENT Jan-2019 MS-54 Management Information Systems
ASSIGNMENT Jan-2019  MS-54   Management Information SystemsASSIGNMENT Jan-2019  MS-54   Management Information Systems
ASSIGNMENT Jan-2019 MS-54 Management Information SystemsDotcom Publications
 
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk  Wwiscop2009 X Force Treath And Risk  Wwiscop
2009 X Force Treath And Risk WwiscopJuan Carlos Carrillo
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Useuniversity of education,Lahore
 
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Quiver
 

Tendances (19)

Behaviour Change and Cyber-Security
Behaviour Change and Cyber-SecurityBehaviour Change and Cyber-Security
Behaviour Change and Cyber-Security
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of Cybersecurity
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Open Government and Social Media
Open Government and Social MediaOpen Government and Social Media
Open Government and Social Media
 
Social Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand ProtectionSocial Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand Protection
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Naked Security
Naked SecurityNaked Security
Naked Security
 
Social Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIASocial Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIA
 
Risks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparencyRisks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparency
 
20th March Session Six by Raja Lakshmipathy
20th March Session Six by Raja Lakshmipathy20th March Session Six by Raja Lakshmipathy
20th March Session Six by Raja Lakshmipathy
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
 
Essay 2 IE Business School
Essay 2 IE Business SchoolEssay 2 IE Business School
Essay 2 IE Business School
 
ASSIGNMENT Jan-2019 MS-54 Management Information Systems
ASSIGNMENT Jan-2019  MS-54   Management Information SystemsASSIGNMENT Jan-2019  MS-54   Management Information Systems
ASSIGNMENT Jan-2019 MS-54 Management Information Systems
 
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk  Wwiscop2009 X Force Treath And Risk  Wwiscop
2009 X Force Treath And Risk Wwiscop
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
 

Similaire à Social Media and Identity

Micro Blogging In The Enterprise Final
Micro Blogging In The Enterprise FinalMicro Blogging In The Enterprise Final
Micro Blogging In The Enterprise FinalIan McNairn
 
On The Business of social media
On The Business of social media On The Business of social media
On The Business of social media Doug Winfield
 
Huddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media toolsHuddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media toolsAndy McLoughlin
 
GfWM Position Paper Knowledge Management and Enterprise 2.0
GfWM Position Paper Knowledge Management and Enterprise 2.0GfWM Position Paper Knowledge Management and Enterprise 2.0
GfWM Position Paper Knowledge Management and Enterprise 2.0gfwm
 
Case 18Social Networking and Social ResponsibilityThe Beginn.docx
Case 18Social Networking and Social ResponsibilityThe Beginn.docxCase 18Social Networking and Social ResponsibilityThe Beginn.docx
Case 18Social Networking and Social ResponsibilityThe Beginn.docxannandleola
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Centre for Advanced Management Education
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa IntroJesse Wilkins
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
What Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTWWhat Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTWDavid Terrar
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd Marchguestca2060b
 
Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticlePete Modigliani
 
A Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommA Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommB.J. Schone
 
Fyronic seminar at Nehra
Fyronic seminar at NehraFyronic seminar at Nehra
Fyronic seminar at NehraFranky Redant
 
Overview of Web 2.0 in the Government
Overview of Web 2.0 in the GovernmentOverview of Web 2.0 in the Government
Overview of Web 2.0 in the GovernmentAlex Pline
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesAtle Skjekkeland
 
253 By Dr. Patricia Franks and Robert Smallwood .docx
253   By Dr. Patricia Franks and Robert Smallwood   .docx253   By Dr. Patricia Franks and Robert Smallwood   .docx
253 By Dr. Patricia Franks and Robert Smallwood .docxlorainedeserre
 

Similaire à Social Media and Identity (20)

Micro Blogging In The Enterprise Final
Micro Blogging In The Enterprise FinalMicro Blogging In The Enterprise Final
Micro Blogging In The Enterprise Final
 
On The Business of social media
On The Business of social media On The Business of social media
On The Business of social media
 
Huddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media toolsHuddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media tools
 
GfWM Position Paper Knowledge Management and Enterprise 2.0
GfWM Position Paper Knowledge Management and Enterprise 2.0GfWM Position Paper Knowledge Management and Enterprise 2.0
GfWM Position Paper Knowledge Management and Enterprise 2.0
 
Case 18Social Networking and Social ResponsibilityThe Beginn.docx
Case 18Social Networking and Social ResponsibilityThe Beginn.docxCase 18Social Networking and Social ResponsibilityThe Beginn.docx
Case 18Social Networking and Social ResponsibilityThe Beginn.docx
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
What Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTWWhat Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTW
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
 
Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 Article
 
A Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommA Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at Qualcomm
 
Fyronic seminar at Nehra
Fyronic seminar at NehraFyronic seminar at Nehra
Fyronic seminar at Nehra
 
Overview of Web 2.0 in the Government
Overview of Web 2.0 in the GovernmentOverview of Web 2.0 in the Government
Overview of Web 2.0 in the Government
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social Technologies
 
253 By Dr. Patricia Franks and Robert Smallwood .docx
253   By Dr. Patricia Franks and Robert Smallwood   .docx253   By Dr. Patricia Franks and Robert Smallwood   .docx
253 By Dr. Patricia Franks and Robert Smallwood .docx
 

Plus de Alexander Howard

The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism Alexander Howard
 
Data journalism in the second machine age
Data journalism in the second machine ageData journalism in the second machine age
Data journalism in the second machine ageAlexander Howard
 
Media and Citizen Power: Open Africa Summit
Media and Citizen Power: Open Africa SummitMedia and Citizen Power: Open Africa Summit
Media and Citizen Power: Open Africa SummitAlexander Howard
 
Moldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopMoldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopAlexander Howard
 
Big data, a city of things and civic innovation
Big data, a city of things and civic innovationBig data, a city of things and civic innovation
Big data, a city of things and civic innovationAlexander Howard
 
NICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalismNICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalismAlexander Howard
 
Open innovation in governance
Open innovation in governanceOpen innovation in governance
Open innovation in governanceAlexander Howard
 
Social media past, present and future
Social media past, present and futureSocial media past, present and future
Social media past, present and futureAlexander Howard
 
Slides on App Contests & Challenges for EPA Webinar
Slides on App Contests & Challenges for EPA WebinarSlides on App Contests & Challenges for EPA Webinar
Slides on App Contests & Challenges for EPA WebinarAlexander Howard
 
Making open government data sing
Making open government data singMaking open government data sing
Making open government data singAlexander Howard
 
Value proposition of open government data
Value proposition of open government dataValue proposition of open government data
Value proposition of open government dataAlexander Howard
 
Fedtalks Presentation: Chris C. Kemp, NASA CTO
Fedtalks Presentation: Chris C. Kemp, NASA CTOFedtalks Presentation: Chris C. Kemp, NASA CTO
Fedtalks Presentation: Chris C. Kemp, NASA CTOAlexander Howard
 

Plus de Alexander Howard (20)

Collab Space DC Open Data
Collab Space DC Open DataCollab Space DC Open Data
Collab Space DC Open Data
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
 
The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism
 
Data journalism in the second machine age
Data journalism in the second machine ageData journalism in the second machine age
Data journalism in the second machine age
 
Data journalism Overview
Data journalism OverviewData journalism Overview
Data journalism Overview
 
Media and Citizen Power: Open Africa Summit
Media and Citizen Power: Open Africa SummitMedia and Citizen Power: Open Africa Summit
Media and Citizen Power: Open Africa Summit
 
Open data journalism
Open data journalismOpen data journalism
Open data journalism
 
Moldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopMoldova Open Data Journalism Workshop
Moldova Open Data Journalism Workshop
 
Big data, a city of things and civic innovation
Big data, a city of things and civic innovationBig data, a city of things and civic innovation
Big data, a city of things and civic innovation
 
NICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalismNICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalism
 
Open innovation in governance
Open innovation in governanceOpen innovation in governance
Open innovation in governance
 
Social media past, present and future
Social media past, present and futureSocial media past, present and future
Social media past, present and future
 
Open Data Journalism
Open Data JournalismOpen Data Journalism
Open Data Journalism
 
Frbny social media-rfp
Frbny social media-rfpFrbny social media-rfp
Frbny social media-rfp
 
Opening Government
Opening GovernmentOpening Government
Opening Government
 
Slides on App Contests & Challenges for EPA Webinar
Slides on App Contests & Challenges for EPA WebinarSlides on App Contests & Challenges for EPA Webinar
Slides on App Contests & Challenges for EPA Webinar
 
Making open government data sing
Making open government data singMaking open government data sing
Making open government data sing
 
Value proposition of open government data
Value proposition of open government dataValue proposition of open government data
Value proposition of open government data
 
Goscon 2010
Goscon 2010Goscon 2010
Goscon 2010
 
Fedtalks Presentation: Chris C. Kemp, NASA CTO
Fedtalks Presentation: Chris C. Kemp, NASA CTOFedtalks Presentation: Chris C. Kemp, NASA CTO
Fedtalks Presentation: Chris C. Kemp, NASA CTO
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Social Media and Identity

  • 1. What is social media?
  • 2. any electronic platform that allows two way communication or other interaction with content
  • 3. blogs microblogs message boards & forums photo & video sharing Audio & video podcasts social bookmarking social networks reviews
  • 4. In one way or another, nearly everyone will be in social media in 2009.
  • 5.  
  • 6. Why should organizations be on social media? We all trust our peers more than any other source. And the tools to share opinions are free, lightweight and ubiquitous.
  • 7. I use social media – primarily blogs, podcast, Twitter, Facebook and LinkedIn…
  • 8.  
  • 9. … along with wikis, blogs, feeds, videos and microsharing behind the firewall at TechTarget. But that’s “Enterprise 2.0” – not Web 2.0.
  • 10. “ Enterprise 2.0 is the use of emergent social software platforms by organizations in pursuit of their goals.” -Professor Andrew McAfee, MIT
  • 11. Enterprise 2.0 implementations generally use a combination of social software and collaborative technologies
  • 12. Enterprise social computing includes: blogs , RSS , social bookmarking , social networking and wikis .
  • 13. Case studies for successful enterprise social computing include private industry, like Booz-Allen Hamilton and Lockheed Martin, …and now government, like Intellipedia and A-Space. Or MyBarackObama.com.
  • 14. How do Web 2.0 and enterprise 2.0 work together?
  • 15. So let’s call it “enterprise social computing” …and drop the 2.0.
  • 16. Most public entities need to be on Facebook and at least monitor Twitter and LinkedIn.
  • 17. Employees can & will use smartphones to update them in real-time.
  • 18. In a recent survey by Russell Herder, fewer than one-third of 438 respondents said their organization had a policy in place governing social media use.
  • 19. Only 10% of the companies surveyed indicated that they had conducted employee training on such use.
  • 20. And yet Web applications are at the top of security threats to the enterprise.
  • 21. Is it any wonder that 80% of the executives surveyed said they are fearful of social networking risks?
  • 22. That said… …many organizations will allow some form of social computing for collaboration. Workers are already bringing the tools to work from home when sysadmins don’t provide better versions.
  • 23. And whether it’s Web 2.0 or enterprise social computing… regulatory compliance means relevant social messaging will need to be logged and audited for e-discovery.
  • 24. Facebook is already “discoverable” in Canada.
  • 25. For those that collaborate most effectively internally and externally, there appear to be major rewards. Research from MIT’s Andrew McAfee indicates that those who use it best – and safely – reap significant competitive benefits
  • 26. Best bets to adapt?
  • 27. Sandboxes can help with security That’s how the White House addressed the issue – at first. Defense contractors complying with “transparency directives” may proceed similarly.
  • 28. Social media policies are key. IBM’s social computing guidelines are a gold standard.
  • 29. And emphasizing common sense & education for employees about security risks is essential. Phishing, XSS and worms are on the rise.
  • 30. You can find me at [email_address] @digiphile or @ITcompliance