3. blogs microblogs message boards & forums photo & video sharing Audio & video podcasts social bookmarking social networks reviews
4. In one way or another, nearly everyone will be in social media in 2009.
5.
6. Why should organizations be on social media? We all trust our peers more than any other source. And the tools to share opinions are free, lightweight and ubiquitous.
7. I use social media – primarily blogs, podcast, Twitter, Facebook and LinkedIn…
8.
9. … along with wikis, blogs, feeds, videos and microsharing behind the firewall at TechTarget. But that’s “Enterprise 2.0” – not Web 2.0.
10. “ Enterprise 2.0 is the use of emergent social software platforms by organizations in pursuit of their goals.” -Professor Andrew McAfee, MIT
13. Case studies for successful enterprise social computing include private industry, like Booz-Allen Hamilton and Lockheed Martin, …and now government, like Intellipedia and A-Space. Or MyBarackObama.com.
14. How do Web 2.0 and enterprise 2.0 work together?
15. So let’s call it “enterprise social computing” …and drop the 2.0.
16. Most public entities need to be on Facebook and at least monitor Twitter and LinkedIn.
17. Employees can & will use smartphones to update them in real-time.
18. In a recent survey by Russell Herder, fewer than one-third of 438 respondents said their organization had a policy in place governing social media use.
19. Only 10% of the companies surveyed indicated that they had conducted employee training on such use.
20. And yet Web applications are at the top of security threats to the enterprise.
21. Is it any wonder that 80% of the executives surveyed said they are fearful of social networking risks?
22. That said… …many organizations will allow some form of social computing for collaboration. Workers are already bringing the tools to work from home when sysadmins don’t provide better versions.
23. And whether it’s Web 2.0 or enterprise social computing… regulatory compliance means relevant social messaging will need to be logged and audited for e-discovery.
25. For those that collaborate most effectively internally and externally, there appear to be major rewards. Research from MIT’s Andrew McAfee indicates that those who use it best – and safely – reap significant competitive benefits
27. Sandboxes can help with security That’s how the White House addressed the issue – at first. Defense contractors complying with “transparency directives” may proceed similarly.
28. Social media policies are key. IBM’s social computing guidelines are a gold standard.
29. And emphasizing common sense & education for employees about security risks is essential. Phishing, XSS and worms are on the rise.
30. You can find me at [email_address] @digiphile or @ITcompliance