SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Social Networking and Identity – A
                                         g            y
                                  Cautionary Tale
Alice Wang
awang@burtongroup.com            November 5 2009
                                          5,
Mike Gotta
mgotta@burtongroup.com
mikeg.typepad.com



                                                All Contents © 2009 Burton Group. All rights reserved.
Two Sides Of The Social Networking Coin                       2




Why are we here…
• Use of social networking tools and applications to improve
  information sharing and collaboration will transform how
  organizations think about, and manage, identities
• Profiles, social graphs, and activity streams enable employees to
  construct their own social identities across internal and external
  constituencies
• Participation in social networks and community contributions
  enable employees to establish their own social roles and
  reputations
• However, what are the benefits, risks, and implications of more
  open collaboration and transparent knowledge sharing on identity
  management strategies
Two Sides Of The Social Networking Coin            3




 +1-234-567-9012
zxcvbcvxvxcccb@bah.com




 zxcvxvxcccb
 +1-234-567-9012
zxcvbcvxvxcccb@bah.com
               @




                                                         Source: Booz Allen Hamilton
Two Sides Of The Social Networking Coin                 4




Benefits expected from social tools and applications
• Connect people internally and externally
• B k down organizationall b i and iinformation silos
  Break d            i ti     barriers d f          ti il
• Promote employee innovation
• Address generational shifts; meet technology expectations of
  younger workers
• Support strategic talent and learning initiatives

However – open and transparent environments can raise identity
and security concerns
Use Case #1: Social Network Site               5




      +1-234-567-9012
     zxcvbcvxvxcccb@bah.com




      zxcvxvxcccb
     +1-234-567-9012
    zxcvbcvxvxcccb@bah.com




                                       Trusted Identity Sources
Enterprise Identity            HRMS   Directory Other Systems-of-Record
Use Case #1: Social Network Site    6




   +1-234-567-9012
  zxcvbcvxvxcccb@bah.com




   zxcvxvxcccb
  +1-234-567-9012
 zxcvbcvxvxcccb@bah.com




Personal                    Internal Social Identity
 Claims
Use Case #2: Profile Proliferation                                 7




 A single profile? Multiple profiles? Federated profiles?
                                                               Women
                    Employee      Women’s                    Returning To
                    Profile #2    Support                     Work After
                                   Group                      Extended
                                                                Leave




Employee     Internal                                               Employee
                                                       Outreach
 Profile    “Facebook                                               Profile #3
                                                       Network
               Site”



                                                                       Gay &
    Professional                                                      Lesbian
    Exchange of                  Community                           Community
                                 Of Practice
   Best Practices                              Employee
                                               Profile #4
Use Case #3: Activity Streams & Profiles                                8




     Over-sharing via social conversation and community actions

Employee
  p y
 Profile
                                         Jane Doe: Joined Community:
             “Women Supporting Women”      “Women Supporting Women”
                                         John Doe: “W ki
                                         J h D “Working on a big M&A d l
                                                                  bi       deal,
                                         need to work late tonight… stay tuned!”
             “Gay & Lesbian Employees”
                                         Fred Smith: &#%^%$* we just lost the
              Outreach                   Company ABC account…
Automatic
A t     ti
posting of                               Jane Doe: Joined Community:
community                                   “Gay & Lesbian Employees Outreach”
  actions                                Betty Smith: @
                                             y        @Bob Jones That p
                                                                      patient
                                         ID number is 123456789

              Activity streams &         Bob Jones: @SamJ I’ve changed the access
                                         controls so you can get into the workspace
                   Enterprise
                 “Enterprise
              Twitter” messages
Use Case #4: First Comes Aggregation   9




   +1-234-567-9012
  zxcvbcvxvxcccb@bah.com




   zxcvxvxcccb
  +1-234-567-9012
 zxcvbcvxvxcccb@bah.com




Personal                      External Social
 Claims                         Identities
Use Case #4: Followed By Correlation                                     10




     Is it me? How much is being shared? Under what controls?
                                       Profile
              Profile                  Status Message             Profile
              Groups                   Activities
                                       A ti iti                   Following / Followers
              Contacts                 Photos                     “Tweets”




                                       Unification of an                       My politics
Enterprise Identity                                                            My g p
                                                                                y groups
                                      employee s
                                      employee’s social
Enterprise “Social Identity”                                                   My music
                                         structures
                                                                               My friends
                               “The                      “The
                               Work                     Citizen
                                Me”                       Me”
Use Case #5: Leveraging Consumer Tools            11




                             Enterprise roles and
                             identities can collide
                             with personal use of
           “The     “The         social media
          Citizen Employee
            Me”      Me”
Use Case #6: Enterprise Roles                               12




                                       Trusted Id tit Sources
                                       T t d Identity S

                          HRMS       Directory Other Systems-of-Record

                                                             Role Sources
                                 Authentication,
                                 Authentication
  +1-234-567-9012
 zxcvbcvxvxcccb@bah.com                                  Role Management
                                 Authorization,          Applications
                                 Provisioning,
                                 RBAC, etc.              Business Process
  zxcvxvxcccb
 +1-234-567-9012                                         Management (BPM)
zxcvbcvxvxcccb@bah.com
                                                         Systems
My Roles
• IT Architect                                           Enterprise Portals
• SME on “ABC”
• Approver for access to “XYZ”
• Certified on “123”                               Enterprise Roles
Use Case #6: Emergence Of “Social Roles”                  13




“Answer P
“A      Person”
              ”     “Wiki G d
                          Gardener”
                                  ”     “Idea Person”
                                        “Id P       ”       “News Filt ”
                                                            “N    Filter”

    Social Role         Social Data Aggregation &       Social Network
     Attributes                 Correlation                Analysis
                               Social Roles
Use Case #6: Community Equity                                          14




 From roles to reputation
  • Reputation is as aspect of someone’s identity; need a social value system
    based on social activities
  • Analyze social data to derive community equity
      • Aggregate social activities: edit, tag, bookmark, follow, comment, reply, post,
        attach, subscribe join
        attach subscribe, join…
      • Correlate patterns: participation, contributions, skills, reputation, social graph




                                       Skills
                Contributions                            Reputation
Participation                   Community Equity                       Social Graph
Use Case #7: Analyzing Relationships                                  15




Social analytics
• Assess, correlate, and visualize relationship structures
• Di
  Discovery of llatent connections most valuable
             f t t           ti        t l bl

                                                       Needs to figure out
                                                          how to help a
                                                       company deal with
                                                         export / import
                                                      regulations iin country
                                                          l ti            t
                                       Node 8                  XYZ
                                       To Node 10
                                       To Node 14
                                       To Node 15
                                                    Has dealt with import
                                                    / export problems in
                                                       country XYZ for
                                                    years in past job role
                   Source: Telligent
Use Case #7: Analyzing Relationships                                              16




   Without proper controls, identity and security issues can arise
    • Evolution of tool capabilities can discover too much information on
      organizational structures activities, and relationships
                     structures, activities
                                                                                   Person 4
                  Product C
                                                       Product B
                      Person 2                                                          SCN Group1



                  Product A           Purchased   Customer X                  Business Process 2

 Key talent in
 organization                      Person 5
developing new
                                                               Marketing Campaign 1
  ideas and
   products
                                                                    Part of

                     Source: SAP
                                      Sale Process 1                               Person 3
Awareness & Management Of Risks                                      17




General concerns relevant to identity and security teams
• Identity
   •   Assuring profiles (identities) – internal and external
   •   Populating profiles with trusted enterprise data
   •   Assessing social identity attribute claims
   •   Making sure that controls exist to satisfy privacy mandates
• Security
   •   Applying policy-based management (including enforcement)
   •   Inclusion of monitoring, discovery, and audit mechanisms
   •   Validating "fine-grained” access controls and role modeling capabilities
   •   Satisfying
       S ti f i compliance, di
                        li     discovery and related d t t ti controls
                                            d l t d data-retention    t l
   •   Ensuring data loss protection
Awareness & Management Of Risks                                        18




Use Case concerns relevant to identity and security teams
• Profiles And Profiling
   • Credibility of profile and social claims
   • Possible bias against employees by co-workers based on race, diversity,
     affiliation information made open and transparent via social media tools
• Information Security
   • Intellectual property, compliance, e-Discovery, monitoring…
   • Aggregation / correlation capabilities
       gg g                       p       s
   • Data management and data integration (profiles, roles, etc)
• Privacy
   • Adherence to regulatory statutes, level of employee controls, possible
     stalking situations (hostile workplace)
• Social Network Analysis
                     y
   • Makes relationships visible that perhaps should not (“connecting the dots”)
   • May lead to “befriend / defraud” situations, social engineering
Recommendations                                             19




Moving forward with social media and social networking efforts
• Social media and social networking are strategic initiatives that are
  here to stay – saying “no” is not the right approach
                         no
• A decision-making framework and governance model is an
  essential component of any strategy
• Policies and procedures need to focus on the human element and
  avoid technology as a panacea
• Id tit and security objectives need t b viewed on th same
  Identity d         it bj ti          d to be i    d the
  level as desires for openness and transparency
• IT teams that should be viewed as key stakeholders in social
  media and social networking strategies include:
   • Groups responsible for collaboration and community efforts
   • Id tit management and security groups
     Identity           t d         it
   • Information management and data analysis groups
A Look Ahead                                                        20




     Do we someday reach a point where social networking, social
     roles, and community equity enable self-regulating systems?

Social Role not                                             No change
                            Enterprise             Social
associated with               Role                  Role
enterprise role or
entitlement

Social role indicates                                       Discovery of latent talent
synergies with enterprise        Enterprise    Social       in the agency, perhaps a
                                                                   agency
                                   Role         Role        new subject matter expert
role and entitlements


Social role becomes                                         Provisioning and access
synonymous with              Enterprise       Social        controls adapt based
enterprise role and
      p                           Role        Role          level of community equity
entitlement                                                 performing social role
21




Q&A



      All Contents © 2009 Burton Group. All rights reserved.

Contenu connexe

Tendances

Social Software and Social Media Marketing for frivillige organisationer, NGO...
Social Software and Social Media Marketing for frivillige organisationer, NGO...Social Software and Social Media Marketing for frivillige organisationer, NGO...
Social Software and Social Media Marketing for frivillige organisationer, NGO...
IBM Danmark
 
Linked In Tutorial03 26 09(1)
Linked In Tutorial03 26 09(1)Linked In Tutorial03 26 09(1)
Linked In Tutorial03 26 09(1)
MYMCNA
 
Social Media: It's About Engagement by Raghav Singh
Social Media: It's About Engagement by Raghav SinghSocial Media: It's About Engagement by Raghav Singh
Social Media: It's About Engagement by Raghav Singh
Cachinko
 

Tendances (17)

Social Software and Social Media Marketing for frivillige organisationer, NGO...
Social Software and Social Media Marketing for frivillige organisationer, NGO...Social Software and Social Media Marketing for frivillige organisationer, NGO...
Social Software and Social Media Marketing for frivillige organisationer, NGO...
 
Knowledge and Content UK 2009 (KCUK) presentation and case study
Knowledge and Content UK 2009 (KCUK) presentation and case studyKnowledge and Content UK 2009 (KCUK) presentation and case study
Knowledge and Content UK 2009 (KCUK) presentation and case study
 
The New Networking
The New NetworkingThe New Networking
The New Networking
 
Digital Rites of Passage - Managing Your Social …
Digital Rites of Passage - Managing Your Social …Digital Rites of Passage - Managing Your Social …
Digital Rites of Passage - Managing Your Social …
 
Using Linked In For Sales Prospecting - 4 Strategies For Account Managers
Using Linked In For Sales Prospecting - 4 Strategies For Account ManagersUsing Linked In For Sales Prospecting - 4 Strategies For Account Managers
Using Linked In For Sales Prospecting - 4 Strategies For Account Managers
 
Linked In Tutorial03 26 09(1)
Linked In Tutorial03 26 09(1)Linked In Tutorial03 26 09(1)
Linked In Tutorial03 26 09(1)
 
Social Media: It's About Engagement by Raghav Singh
Social Media: It's About Engagement by Raghav SinghSocial Media: It's About Engagement by Raghav Singh
Social Media: It's About Engagement by Raghav Singh
 
Social Media for HR
Social Media for HRSocial Media for HR
Social Media for HR
 
Social Media-Q&A, tutorial, best practices, etc
Social Media-Q&A, tutorial, best practices, etcSocial Media-Q&A, tutorial, best practices, etc
Social Media-Q&A, tutorial, best practices, etc
 
Facilitator guide
Facilitator guideFacilitator guide
Facilitator guide
 
Social Media & Social CRM Presentation
Social Media & Social CRM PresentationSocial Media & Social CRM Presentation
Social Media & Social CRM Presentation
 
HR and Social Media 041011
HR and Social Media 041011HR and Social Media 041011
HR and Social Media 041011
 
Facebook.govt - GOVIS09
Facebook.govt - GOVIS09Facebook.govt - GOVIS09
Facebook.govt - GOVIS09
 
Connected Practice Presentation - Taking Youth Work Online
Connected Practice Presentation - Taking Youth Work OnlineConnected Practice Presentation - Taking Youth Work Online
Connected Practice Presentation - Taking Youth Work Online
 
ID Slide Presentation
ID Slide PresentationID Slide Presentation
ID Slide Presentation
 
LinkedIn & Facebook Handouts
LinkedIn & Facebook HandoutsLinkedIn & Facebook Handouts
LinkedIn & Facebook Handouts
 
Cluetrain at 10 - Celebrating the Customer in Charge
Cluetrain at 10 - Celebrating the Customer in ChargeCluetrain at 10 - Celebrating the Customer in Charge
Cluetrain at 10 - Celebrating the Customer in Charge
 

En vedette (7)

Is Enterprise Search Ripe for Open Source Disruption?
Is Enterprise Search Ripe for Open Source Disruption?Is Enterprise Search Ripe for Open Source Disruption?
Is Enterprise Search Ripe for Open Source Disruption?
 
El castillo ambulante de lisa
El castillo ambulante de lisaEl castillo ambulante de lisa
El castillo ambulante de lisa
 
El super
El superEl super
El super
 
Real World: Customer Edition Panel "Stories about Social Computing Deployment"
Real World: Customer Edition Panel "Stories about Social Computing Deployment"Real World: Customer Edition Panel "Stories about Social Computing Deployment"
Real World: Customer Edition Panel "Stories about Social Computing Deployment"
 
Montreal Elasticsearch Meetup
Montreal Elasticsearch MeetupMontreal Elasticsearch Meetup
Montreal Elasticsearch Meetup
 
OLPC Presentation for Jamaica Linux Users Group
OLPC Presentation for Jamaica Linux Users GroupOLPC Presentation for Jamaica Linux Users Group
OLPC Presentation for Jamaica Linux Users Group
 
BigData et Hadoop
BigData et HadoopBigData et Hadoop
BigData et Hadoop
 

Similaire à Social Networking and Identify - A Cautionary Tale

Getting Started with business social networking
Getting Started with business social networkingGetting Started with business social networking
Getting Started with business social networking
Lee Bryant
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity Final
Mike Gotta
 
LinkedIn Tips for Nonprofit HR Professionals.
LinkedIn Tips for Nonprofit HR Professionals.LinkedIn Tips for Nonprofit HR Professionals.
LinkedIn Tips for Nonprofit HR Professionals.
Box
 
Cannexus ottawa january 24th 2011
Cannexus ottawa january 24th 2011Cannexus ottawa january 24th 2011
Cannexus ottawa january 24th 2011
David Perry
 
Business Gets Social, BGS2012, Sofia
Business Gets Social, BGS2012, SofiaBusiness Gets Social, BGS2012, Sofia
Business Gets Social, BGS2012, Sofia
IBS Bulgaria
 
Who says HR and social media can't be friends?
Who says HR and social media can't be friends?Who says HR and social media can't be friends?
Who says HR and social media can't be friends?
Kristen Vang
 

Similaire à Social Networking and Identify - A Cautionary Tale (20)

The How Tos Of Social Media For Recruiting Final
The How Tos Of Social Media For Recruiting   FinalThe How Tos Of Social Media For Recruiting   Final
The How Tos Of Social Media For Recruiting Final
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
 
Getting Started with business social networking
Getting Started with business social networkingGetting Started with business social networking
Getting Started with business social networking
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity Final
 
LinkedIn Tips for Nonprofit HR Professionals.
LinkedIn Tips for Nonprofit HR Professionals.LinkedIn Tips for Nonprofit HR Professionals.
LinkedIn Tips for Nonprofit HR Professionals.
 
Social Media For Lawyers Ibj 2009 1
Social Media For Lawyers Ibj 2009 1Social Media For Lawyers Ibj 2009 1
Social Media For Lawyers Ibj 2009 1
 
Social Media for Internal Company Communications by @JoeyShepp
Social Media for Internal Company Communications by @JoeySheppSocial Media for Internal Company Communications by @JoeyShepp
Social Media for Internal Company Communications by @JoeyShepp
 
Cannexus ottawa january 24th 2011
Cannexus ottawa january 24th 2011Cannexus ottawa january 24th 2011
Cannexus ottawa january 24th 2011
 
Linked In 101 Workshop
Linked In 101 WorkshopLinked In 101 Workshop
Linked In 101 Workshop
 
The social workplace
The social workplaceThe social workplace
The social workplace
 
Chesapeake Bay Forum - Using Social Media
Chesapeake Bay Forum - Using Social MediaChesapeake Bay Forum - Using Social Media
Chesapeake Bay Forum - Using Social Media
 
HKD2 - LinkedIn - Demystifying Social Networking
HKD2 - LinkedIn - Demystifying Social NetworkingHKD2 - LinkedIn - Demystifying Social Networking
HKD2 - LinkedIn - Demystifying Social Networking
 
Improve your employability through social media
Improve your employability through social mediaImprove your employability through social media
Improve your employability through social media
 
Govt2.0
Govt2.0Govt2.0
Govt2.0
 
Business Gets Social, BGS2012, Sofia
Business Gets Social, BGS2012, SofiaBusiness Gets Social, BGS2012, Sofia
Business Gets Social, BGS2012, Sofia
 
Benelux Chamber Beijing: Recruiting And Social Media
Benelux Chamber Beijing:  Recruiting And Social MediaBenelux Chamber Beijing:  Recruiting And Social Media
Benelux Chamber Beijing: Recruiting And Social Media
 
Saas social hr
Saas social hrSaas social hr
Saas social hr
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
Who says HR and social media can't be friends?
Who says HR and social media can't be friends?Who says HR and social media can't be friends?
Who says HR and social media can't be friends?
 
Beyond Simple Social - Presented at Salesforce
Beyond Simple Social - Presented at SalesforceBeyond Simple Social - Presented at Salesforce
Beyond Simple Social - Presented at Salesforce
 

Plus de Enterprise 2.0 Conference

Developing a Cutting Edge Social Enterprise Software Strategy that Leverages ...
Developing a Cutting Edge Social Enterprise Software Strategy that Leverages ...Developing a Cutting Edge Social Enterprise Software Strategy that Leverages ...
Developing a Cutting Edge Social Enterprise Software Strategy that Leverages ...
Enterprise 2.0 Conference
 

Plus de Enterprise 2.0 Conference (20)

The Hardest Problem in E2.0 - Changing Our Culture
The Hardest Problem in E2.0 - Changing Our CultureThe Hardest Problem in E2.0 - Changing Our Culture
The Hardest Problem in E2.0 - Changing Our Culture
 
The Ex-CXO: Why Your Employees Will be Running Your Enterprise in 5 Years, an...
The Ex-CXO: Why Your Employees Will be Running Your Enterprise in 5 Years, an...The Ex-CXO: Why Your Employees Will be Running Your Enterprise in 5 Years, an...
The Ex-CXO: Why Your Employees Will be Running Your Enterprise in 5 Years, an...
 
Social Business Intelligence: The Future of Listening
Social Business Intelligence: The Future of ListeningSocial Business Intelligence: The Future of Listening
Social Business Intelligence: The Future of Listening
 
Pulling It Together: Connecting External Activities With Internal Conversations
Pulling It Together: Connecting External Activities With Internal ConversationsPulling It Together: Connecting External Activities With Internal Conversations
Pulling It Together: Connecting External Activities With Internal Conversations
 
Performance and Passion: Creating New Connections
Performance and Passion: Creating New ConnectionsPerformance and Passion: Creating New Connections
Performance and Passion: Creating New Connections
 
Developing a Cutting Edge Social Enterprise Software Strategy that Leverages ...
Developing a Cutting Edge Social Enterprise Software Strategy that Leverages ...Developing a Cutting Edge Social Enterprise Software Strategy that Leverages ...
Developing a Cutting Edge Social Enterprise Software Strategy that Leverages ...
 
The Promise of Enterprise Prediction Markets
The Promise of Enterprise Prediction MarketsThe Promise of Enterprise Prediction Markets
The Promise of Enterprise Prediction Markets
 
Leading Collaborative Teams
Leading Collaborative TeamsLeading Collaborative Teams
Leading Collaborative Teams
 
Driving Virtual Team Productivity
Driving Virtual Team ProductivityDriving Virtual Team Productivity
Driving Virtual Team Productivity
 
Applying the Successful Strategies of Social Networks to the Enterprise
Applying the Successful Strategies of Social Networks to the EnterpriseApplying the Successful Strategies of Social Networks to the Enterprise
Applying the Successful Strategies of Social Networks to the Enterprise
 
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROI
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROIMulti-Enterprise 2.0 - Leveraging Social Software for Real ROI
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROI
 
Ignite Technologies Overview
Ignite Technologies OverviewIgnite Technologies Overview
Ignite Technologies Overview
 
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer ExperienceSincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
 
Angels & Demons
Angels & DemonsAngels & Demons
Angels & Demons
 
Jump Starting Collaboration with Social Search
Jump Starting Collaboration with Social SearchJump Starting Collaboration with Social Search
Jump Starting Collaboration with Social Search
 
Connecting the Dots with Conectbeam Social Networking Services
Connecting the Dots with Conectbeam Social Networking ServicesConnecting the Dots with Conectbeam Social Networking Services
Connecting the Dots with Conectbeam Social Networking Services
 
Is Enterprise Search Ripe for Open Source Disruption?
Is Enterprise Search Ripe for Open Source Disruption?Is Enterprise Search Ripe for Open Source Disruption?
Is Enterprise Search Ripe for Open Source Disruption?
 
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and MetricsEnterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
 
Reality 2.0: Enterprise Social Networks (A Field Research Study)
Reality 2.0: Enterprise Social Networks (A Field Research Study)Reality 2.0: Enterprise Social Networks (A Field Research Study)
Reality 2.0: Enterprise Social Networks (A Field Research Study)
 
Delivering Results that Endure
Delivering Results that EndureDelivering Results that Endure
Delivering Results that Endure
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Social Networking and Identify - A Cautionary Tale

  • 1. Social Networking and Identity – A g y Cautionary Tale Alice Wang awang@burtongroup.com November 5 2009 5, Mike Gotta mgotta@burtongroup.com mikeg.typepad.com All Contents © 2009 Burton Group. All rights reserved.
  • 2. Two Sides Of The Social Networking Coin 2 Why are we here… • Use of social networking tools and applications to improve information sharing and collaboration will transform how organizations think about, and manage, identities • Profiles, social graphs, and activity streams enable employees to construct their own social identities across internal and external constituencies • Participation in social networks and community contributions enable employees to establish their own social roles and reputations • However, what are the benefits, risks, and implications of more open collaboration and transparent knowledge sharing on identity management strategies
  • 3. Two Sides Of The Social Networking Coin 3 +1-234-567-9012 zxcvbcvxvxcccb@bah.com zxcvxvxcccb +1-234-567-9012 zxcvbcvxvxcccb@bah.com @ Source: Booz Allen Hamilton
  • 4. Two Sides Of The Social Networking Coin 4 Benefits expected from social tools and applications • Connect people internally and externally • B k down organizationall b i and iinformation silos Break d i ti barriers d f ti il • Promote employee innovation • Address generational shifts; meet technology expectations of younger workers • Support strategic talent and learning initiatives However – open and transparent environments can raise identity and security concerns
  • 5. Use Case #1: Social Network Site 5 +1-234-567-9012 zxcvbcvxvxcccb@bah.com zxcvxvxcccb +1-234-567-9012 zxcvbcvxvxcccb@bah.com Trusted Identity Sources Enterprise Identity HRMS Directory Other Systems-of-Record
  • 6. Use Case #1: Social Network Site 6 +1-234-567-9012 zxcvbcvxvxcccb@bah.com zxcvxvxcccb +1-234-567-9012 zxcvbcvxvxcccb@bah.com Personal Internal Social Identity Claims
  • 7. Use Case #2: Profile Proliferation 7 A single profile? Multiple profiles? Federated profiles? Women Employee Women’s Returning To Profile #2 Support Work After Group Extended Leave Employee Internal Employee Outreach Profile “Facebook Profile #3 Network Site” Gay & Professional Lesbian Exchange of Community Community Of Practice Best Practices Employee Profile #4
  • 8. Use Case #3: Activity Streams & Profiles 8 Over-sharing via social conversation and community actions Employee p y Profile Jane Doe: Joined Community: “Women Supporting Women” “Women Supporting Women” John Doe: “W ki J h D “Working on a big M&A d l bi deal, need to work late tonight… stay tuned!” “Gay & Lesbian Employees” Fred Smith: &#%^%$* we just lost the Outreach Company ABC account… Automatic A t ti posting of Jane Doe: Joined Community: community “Gay & Lesbian Employees Outreach” actions Betty Smith: @ y @Bob Jones That p patient ID number is 123456789 Activity streams & Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace Enterprise “Enterprise Twitter” messages
  • 9. Use Case #4: First Comes Aggregation 9 +1-234-567-9012 zxcvbcvxvxcccb@bah.com zxcvxvxcccb +1-234-567-9012 zxcvbcvxvxcccb@bah.com Personal External Social Claims Identities
  • 10. Use Case #4: Followed By Correlation 10 Is it me? How much is being shared? Under what controls? Profile Profile Status Message Profile Groups Activities A ti iti Following / Followers Contacts Photos “Tweets” Unification of an My politics Enterprise Identity My g p y groups employee s employee’s social Enterprise “Social Identity” My music structures My friends “The “The Work Citizen Me” Me”
  • 11. Use Case #5: Leveraging Consumer Tools 11 Enterprise roles and identities can collide with personal use of “The “The social media Citizen Employee Me” Me”
  • 12. Use Case #6: Enterprise Roles 12 Trusted Id tit Sources T t d Identity S HRMS Directory Other Systems-of-Record Role Sources Authentication, Authentication +1-234-567-9012 zxcvbcvxvxcccb@bah.com Role Management Authorization, Applications Provisioning, RBAC, etc. Business Process zxcvxvxcccb +1-234-567-9012 Management (BPM) zxcvbcvxvxcccb@bah.com Systems My Roles • IT Architect Enterprise Portals • SME on “ABC” • Approver for access to “XYZ” • Certified on “123” Enterprise Roles
  • 13. Use Case #6: Emergence Of “Social Roles” 13 “Answer P “A Person” ” “Wiki G d Gardener” ” “Idea Person” “Id P ” “News Filt ” “N Filter” Social Role Social Data Aggregation & Social Network Attributes Correlation Analysis Social Roles
  • 14. Use Case #6: Community Equity 14 From roles to reputation • Reputation is as aspect of someone’s identity; need a social value system based on social activities • Analyze social data to derive community equity • Aggregate social activities: edit, tag, bookmark, follow, comment, reply, post, attach, subscribe join attach subscribe, join… • Correlate patterns: participation, contributions, skills, reputation, social graph Skills Contributions Reputation Participation Community Equity Social Graph
  • 15. Use Case #7: Analyzing Relationships 15 Social analytics • Assess, correlate, and visualize relationship structures • Di Discovery of llatent connections most valuable f t t ti t l bl Needs to figure out how to help a company deal with export / import regulations iin country l ti t Node 8 XYZ To Node 10 To Node 14 To Node 15 Has dealt with import / export problems in country XYZ for years in past job role Source: Telligent
  • 16. Use Case #7: Analyzing Relationships 16 Without proper controls, identity and security issues can arise • Evolution of tool capabilities can discover too much information on organizational structures activities, and relationships structures, activities Person 4 Product C Product B Person 2 SCN Group1 Product A Purchased Customer X Business Process 2 Key talent in organization Person 5 developing new Marketing Campaign 1 ideas and products Part of Source: SAP Sale Process 1 Person 3
  • 17. Awareness & Management Of Risks 17 General concerns relevant to identity and security teams • Identity • Assuring profiles (identities) – internal and external • Populating profiles with trusted enterprise data • Assessing social identity attribute claims • Making sure that controls exist to satisfy privacy mandates • Security • Applying policy-based management (including enforcement) • Inclusion of monitoring, discovery, and audit mechanisms • Validating "fine-grained” access controls and role modeling capabilities • Satisfying S ti f i compliance, di li discovery and related d t t ti controls d l t d data-retention t l • Ensuring data loss protection
  • 18. Awareness & Management Of Risks 18 Use Case concerns relevant to identity and security teams • Profiles And Profiling • Credibility of profile and social claims • Possible bias against employees by co-workers based on race, diversity, affiliation information made open and transparent via social media tools • Information Security • Intellectual property, compliance, e-Discovery, monitoring… • Aggregation / correlation capabilities gg g p s • Data management and data integration (profiles, roles, etc) • Privacy • Adherence to regulatory statutes, level of employee controls, possible stalking situations (hostile workplace) • Social Network Analysis y • Makes relationships visible that perhaps should not (“connecting the dots”) • May lead to “befriend / defraud” situations, social engineering
  • 19. Recommendations 19 Moving forward with social media and social networking efforts • Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach no • A decision-making framework and governance model is an essential component of any strategy • Policies and procedures need to focus on the human element and avoid technology as a panacea • Id tit and security objectives need t b viewed on th same Identity d it bj ti d to be i d the level as desires for openness and transparency • IT teams that should be viewed as key stakeholders in social media and social networking strategies include: • Groups responsible for collaboration and community efforts • Id tit management and security groups Identity t d it • Information management and data analysis groups
  • 20. A Look Ahead 20 Do we someday reach a point where social networking, social roles, and community equity enable self-regulating systems? Social Role not No change Enterprise Social associated with Role Role enterprise role or entitlement Social role indicates Discovery of latent talent synergies with enterprise Enterprise Social in the agency, perhaps a agency Role Role new subject matter expert role and entitlements Social role becomes Provisioning and access synonymous with Enterprise Social controls adapt based enterprise role and p Role Role level of community equity entitlement performing social role
  • 21. 21 Q&A All Contents © 2009 Burton Group. All rights reserved.